Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
90ZF1EDs9h.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
|
ASCII text, with no line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\90ZF1EDs9h.exe
|
"C:\Users\user\Desktop\90ZF1EDs9h.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
C:\ProgramData\MPGPH131\MPGPH131.exe
|
||
C:\ProgramData\MPGPH131\MPGPH131.exe
|
C:\ProgramData\MPGPH131\MPGPH131.exe
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
|
||
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
|
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://db-ip.com/demo/home.php?s=8.46.123.33$
|
unknown
|
||
https://db-ip.com:443/demo/home.php?s=8.46.123.33J
|
unknown
|
||
https://ipinfo.io:443/widget/demo/8.46.123.33
|
unknown
|
||
https://t.me/risepro_botSS
|
unknown
|
||
https://ipinfo.io/widget/demo/8.46.123.33#H
|
unknown
|
||
https://ipinfo.io/widget/demo/8.46.123.33H
|
unknown
|
||
https://t.v
|
unknown
|
||
https://db-ip.com/
|
unknown
|
||
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
|
unknown
|
||
https://db-ip.com/demo/home.php?s=8.46.123.33S
|
unknown
|
||
https://ipinfo.io/alj
|
unknown
|
||
https://t.me/RiseProSUPPORT
|
unknown
|
||
https://ipinfo.io/Mozilla/5.0
|
unknown
|
||
https://t.me/risepro
|
unknown
|
||
https://ipinfo.io/tuO
|
unknown
|
||
https://t.me/risepro_botA$
|
unknown
|
||
https://ipinfo.io/widget/demo/8.46.123.33~
|
unknown
|
||
https://t.me/risepro_botj/
|
unknown
|
||
https://t.me/risepro_bot
|
unknown
|
||
https://t.me/RiseProSUPPORT8?
|
unknown
|
||
https://ipinfo.io/
|
34.117.186.192
|
||
https://t.me/risepro_botGc
|
unknown
|
||
https://ipinfo.io/widget/demo/8.46.123.33
|
34.117.186.192
|
||
https://www.maxmind.com/en/locate-my-ip-address
|
unknown
|
||
https://t.me/riseproD
|
unknown
|
||
https://ipinfo.io/s
|
unknown
|
||
https://ipinfo.io/widget/demo/8.46.123.33q
|
unknown
|
||
https://db-ip.com:443/demo/home.php?s=8.46.123.33
|
unknown
|
||
https://t.me/risepro_botisepro_bot
|
unknown
|
||
http://www.winimage.com/zLibDll
|
unknown
|
||
https://t.me/riseproF
|
unknown
|
||
https://ipinfo.io/W&
|
unknown
|
||
https://db-ip.com/l/.
|
unknown
|
||
https://db-ip.com/demo/home.php?s=8.46.123.33
|
104.26.5.15
|
||
https://t.me/RiseProSUPPORTz
|
unknown
|
||
https://t.me/risepro_botp
|
unknown
|
There are 26 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ipinfo.io
|
34.117.186.192
|
||
db-ip.com
|
104.26.5.15
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
77.91.77.66
|
unknown
|
Russian Federation
|
||
34.117.186.192
|
ipinfo.io
|
United States
|
||
104.26.5.15
|
db-ip.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
RageMP131
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
474000
|
unkown
|
page execute and read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
399F000
|
stack
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
D20000
|
direct allocation
|
page read and write
|
||
455F000
|
stack
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
82A000
|
unkown
|
page execute and write copy
|
||
7720000
|
heap
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
4A1C000
|
stack
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
B86000
|
heap
|
page read and write
|
||
7965000
|
heap
|
page read and write
|
||
732D000
|
stack
|
page read and write
|
||
F4D000
|
heap
|
page read and write
|
||
D20000
|
direct allocation
|
page read and write
|
||
56D000
|
unkown
|
page execute and read and write
|
||
191000
|
unkown
|
page execute and read and write
|
||
6FBD000
|
stack
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
47F0000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
409E000
|
stack
|
page read and write
|
||
584000
|
unkown
|
page execute and read and write
|
||
E64000
|
heap
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
E53000
|
heap
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
73AF000
|
stack
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
5DA000
|
unkown
|
page execute and read and write
|
||
32FF000
|
stack
|
page read and write
|
||
5DA000
|
unkown
|
page execute and read and write
|
||
4A4000
|
unkown
|
page execute and read and write
|
||
399F000
|
stack
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
565000
|
unkown
|
page execute and read and write
|
||
75DF000
|
stack
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
44DF000
|
stack
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
31D000
|
unkown
|
page execute and read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
D58000
|
heap
|
page read and write
|
||
31A000
|
unkown
|
page write copy
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
755E000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
37DE000
|
stack
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
4F50000
|
direct allocation
|
page execute and read and write
|
||
3C9E000
|
stack
|
page read and write
|
||
4AE0000
|
direct allocation
|
page execute and read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
38DF000
|
stack
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
760E000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
46F1000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
AD4000
|
heap
|
page read and write
|
||
5C4000
|
unkown
|
page execute and read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
E76000
|
heap
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
191000
|
unkown
|
page execute and write copy
|
||
2B7F000
|
stack
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
C20000
|
direct allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
748E000
|
stack
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
29DF000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
6F79000
|
heap
|
page read and write
|
||
E6E000
|
heap
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
7D4000
|
unkown
|
page execute and read and write
|
||
D20000
|
direct allocation
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
4561000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
C20000
|
direct allocation
|
page read and write
|
||
27EF000
|
stack
|
page read and write
|
||
771F000
|
stack
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
D85000
|
heap
|
page read and write
|
||
5C4000
|
unkown
|
page execute and read and write
|
||
AD4000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
5DA000
|
unkown
|
page execute and write copy
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
E64000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
4621000
|
heap
|
page read and write
|
||
DB2000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
56A000
|
unkown
|
page write copy
|
||
CCD000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
DB8000
|
heap
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4570000
|
heap
|
page read and write
|
||
6D8A000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
D3D000
|
heap
|
page read and write
|
||
3B9E000
|
stack
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
5DB000
|
unkown
|
page execute and write copy
|
||
C14000
|
heap
|
page read and write
|
||
4AC0000
|
remote allocation
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
4660000
|
trusted library allocation
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
DBE000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
4F4D000
|
stack
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
E79000
|
heap
|
page read and write
|
||
4621000
|
heap
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
28DC000
|
stack
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
2900000
|
direct allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
77A0000
|
heap
|
page read and write
|
||
31A000
|
unkown
|
page write copy
|
||
AD4000
|
heap
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
9CD000
|
unkown
|
page execute and write copy
|
||
77D000
|
unkown
|
page execute and write copy
|
||
332E000
|
stack
|
page read and write
|
||
B52000
|
heap
|
page read and write
|
||
F5C000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
2B6F000
|
stack
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
4B90000
|
direct allocation
|
page execute and read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
784E000
|
stack
|
page read and write
|
||
4621000
|
heap
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
744F000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
C34000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
D7D000
|
heap
|
page read and write
|
||
4AC0000
|
remote allocation
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
D22000
|
heap
|
page read and write
|
||
2BBC000
|
stack
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
351F000
|
stack
|
page read and write
|
||
286C000
|
stack
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
4A4000
|
unkown
|
page execute and read and write
|
||
716E000
|
stack
|
page read and write
|
||
4B40000
|
direct allocation
|
page execute and read and write
|
||
4B20000
|
direct allocation
|
page execute and read and write
|
||
B82000
|
heap
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
6FBD000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
C20000
|
direct allocation
|
page read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
499C000
|
stack
|
page read and write
|
||
74EF000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
4AA0000
|
direct allocation
|
page execute and read and write
|
||
D20000
|
direct allocation
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
720D000
|
stack
|
page read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
3F1F000
|
stack
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
4EF0000
|
direct allocation
|
page execute and read and write
|
||
44E1000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
E4D000
|
heap
|
page read and write
|
||
D11000
|
heap
|
page read and write
|
||
81C000
|
unkown
|
page execute and read and write
|
||
305E000
|
stack
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
82B000
|
unkown
|
page execute and write copy
|
||
C34000
|
heap
|
page read and write
|
||
445E000
|
stack
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
C20000
|
direct allocation
|
page read and write
|
||
441F000
|
stack
|
page read and write
|
||
5DB000
|
unkown
|
page execute and write copy
|
||
7810000
|
remote allocation
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
5CC000
|
unkown
|
page execute and read and write
|
||
A3B000
|
stack
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
7AC0000
|
heap
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
C20000
|
direct allocation
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
47C000
|
unkown
|
page execute and read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
4B40000
|
direct allocation
|
page execute and read and write
|
||
4D6E000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
76B0000
|
remote allocation
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
4621000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
D5B000
|
heap
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
4621000
|
heap
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
4621000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
4561000
|
heap
|
page read and write
|
||
E42000
|
heap
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
4F60000
|
heap
|
page read and write
|
||
D1D000
|
heap
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
F5E000
|
heap
|
page read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
76B0000
|
remote allocation
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
771E000
|
heap
|
page read and write
|
||
31D000
|
unkown
|
page execute and read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
4621000
|
heap
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
4940000
|
heap
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
C14000
|
heap
|
page read and write
|
||
4B70000
|
direct allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
2840000
|
direct allocation
|
page execute and read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
75AE000
|
stack
|
page read and write
|
||
70CD000
|
stack
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
2B1F000
|
stack
|
page read and write
|
||
4AE4000
|
direct allocation
|
page read and write
|
||
746C000
|
stack
|
page read and write
|
||
4BB0000
|
direct allocation
|
page execute and read and write
|
||
C34000
|
heap
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
7ACA000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
712D000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
D20000
|
direct allocation
|
page read and write
|
||
730D000
|
stack
|
page read and write
|
||
4C3E000
|
heap
|
page read and write
|
||
56A000
|
unkown
|
page write copy
|
||
4870000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
DDC000
|
heap
|
page read and write
|
||
746D000
|
stack
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
1CD000
|
unkown
|
page execute and read and write
|
||
75A0000
|
remote allocation
|
page read and write
|
||
41DE000
|
stack
|
page read and write
|
||
723E000
|
stack
|
page read and write
|
||
76AF000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
D9D000
|
heap
|
page read and write
|
||
56A000
|
unkown
|
page write copy
|
||
311E000
|
stack
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
D0D000
|
heap
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
7D4000
|
unkown
|
page execute and read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
329F000
|
stack
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
D70000
|
direct allocation
|
page execute and read and write
|
||
4621000
|
heap
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
D20000
|
direct allocation
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
DE0000
|
heap
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
4621000
|
heap
|
page read and write
|
||
D20000
|
direct allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
4F0D000
|
stack
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
4B20000
|
direct allocation
|
page execute and read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
2B1F000
|
stack
|
page read and write
|
||
76AF000
|
stack
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
6E86000
|
heap
|
page read and write
|
||
82B000
|
unkown
|
page execute and write copy
|
||
3CDE000
|
stack
|
page read and write
|
||
D32000
|
heap
|
page read and write
|
||
72EE000
|
stack
|
page read and write
|
||
EF9000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
4621000
|
heap
|
page read and write
|
||
758F000
|
stack
|
page read and write
|
||
4D00000
|
direct allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
82A000
|
unkown
|
page execute and read and write
|
||
44E1000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
4700000
|
heap
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
315000
|
unkown
|
page execute and read and write
|
||
311E000
|
stack
|
page read and write
|
||
4621000
|
heap
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
B7D000
|
heap
|
page read and write
|
||
82A000
|
unkown
|
page execute and write copy
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
DAB000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
DF2000
|
heap
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
E68000
|
heap
|
page read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
4F30000
|
direct allocation
|
page execute and read and write
|
||
E64000
|
heap
|
page read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
3E1E000
|
stack
|
page read and write
|
||
769D000
|
stack
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
461F000
|
stack
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
76B0000
|
remote allocation
|
page read and write
|
||
B63000
|
heap
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
C30000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
2A2B000
|
heap
|
page read and write
|
||
C20000
|
direct allocation
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
62B000
|
unkown
|
page execute and read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
DF6000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
354000
|
unkown
|
page execute and read and write
|
||
4840000
|
heap
|
page read and write
|
||
81C000
|
unkown
|
page execute and read and write
|
||
DF2000
|
heap
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
285D000
|
stack
|
page read and write
|
||
3B1D000
|
stack
|
page read and write
|
||
71FD000
|
stack
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
393F000
|
stack
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
4B64000
|
direct allocation
|
page read and write
|
||
2830000
|
direct allocation
|
page read and write
|
||
E6D000
|
heap
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
C14000
|
heap
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
75A0000
|
remote allocation
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
4F20000
|
direct allocation
|
page execute and read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
C20000
|
direct allocation
|
page read and write
|
||
4560000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
D8A000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
3E0000
|
unkown
|
page readonly
|
||
4B90000
|
direct allocation
|
page execute and read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
EAA000
|
heap
|
page read and write
|
||
4B60000
|
direct allocation
|
page execute and read and write
|
||
DD4000
|
heap
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
4AF0000
|
direct allocation
|
page execute and read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
40000
|
unkown
|
page readonly
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
2A6B000
|
stack
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
ED4000
|
heap
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
4C24000
|
direct allocation
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
37EF000
|
stack
|
page read and write
|
||
B4A000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
365F000
|
stack
|
page read and write
|
||
D71000
|
heap
|
page read and write
|
||
2A9F000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
BD9000
|
heap
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
7BC000
|
stack
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
4D00000
|
direct allocation
|
page read and write
|
||
747F000
|
stack
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
431E000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
56D000
|
unkown
|
page execute and read and write
|
||
30DF000
|
stack
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
4ADB000
|
stack
|
page read and write
|
||
56A000
|
unkown
|
page write copy
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
E49000
|
heap
|
page read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
4AC0000
|
remote allocation
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
C20000
|
direct allocation
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
299E000
|
stack
|
page read and write
|
||
419F000
|
stack
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
48B000
|
unkown
|
page execute and write copy
|
||
4561000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
4CFD000
|
stack
|
page read and write
|
||
33DF000
|
stack
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
C14000
|
heap
|
page read and write
|
||
C20000
|
direct allocation
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
31A000
|
unkown
|
page write copy
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
7972000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
765F000
|
stack
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
190000
|
unkown
|
page read and write
|
||
C20000
|
direct allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
E4B000
|
heap
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
814000
|
unkown
|
page execute and read and write
|
||
35DF000
|
stack
|
page read and write
|
||
E6A000
|
heap
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
770F000
|
stack
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
CF7000
|
heap
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
736E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
42DF000
|
stack
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
4AA0000
|
direct allocation
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
EEF000
|
heap
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
74F0000
|
remote allocation
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
7960000
|
heap
|
page read and write
|
||
70FE000
|
stack
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
4C1D000
|
stack
|
page read and write
|
||
2E9A000
|
stack
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
1C5000
|
unkown
|
page execute and read and write
|
||
E60000
|
heap
|
page read and write
|
||
3E1000
|
unkown
|
page execute and write copy
|
||
4871000
|
heap
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
C34000
|
heap
|
page read and write
|
||
3E0000
|
unkown
|
page readonly
|
||
C34000
|
heap
|
page read and write
|
||
EAF000
|
heap
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
4E3F000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
9CB000
|
unkown
|
page execute and read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
9CB000
|
unkown
|
page execute and read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
CFB000
|
stack
|
page read and write
|
||
26EE000
|
stack
|
page read and write
|
||
191000
|
unkown
|
page execute and read and write
|
||
C14000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
B94000
|
heap
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
785E000
|
stack
|
page read and write
|
||
31A000
|
unkown
|
page write copy
|
||
44E1000
|
heap
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
41000
|
unkown
|
page execute and read and write
|
||
E64000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
2FB000
|
stack
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
D60000
|
direct allocation
|
page execute and read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
C34000
|
heap
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
C14000
|
heap
|
page read and write
|
||
71EE000
|
stack
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
44AE000
|
stack
|
page read and write
|
||
D8F000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
6BB000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
2C1F000
|
stack
|
page read and write
|
||
5DA000
|
unkown
|
page execute and write copy
|
||
AD4000
|
heap
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
4621000
|
heap
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
B58000
|
heap
|
page read and write
|
||
ED1000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
7810000
|
remote allocation
|
page read and write
|
||
7ABE000
|
stack
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
C20000
|
direct allocation
|
page read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
4561000
|
heap
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
82A000
|
unkown
|
page execute and read and write
|
||
C34000
|
heap
|
page read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
2857000
|
heap
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
D20000
|
direct allocation
|
page read and write
|
||
814000
|
unkown
|
page execute and read and write
|
||
D09000
|
heap
|
page read and write
|
||
4F40000
|
direct allocation
|
page execute and read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
4871000
|
heap
|
page read and write
|
||
4B70000
|
direct allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
EA6000
|
heap
|
page read and write
|
||
756F000
|
stack
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
3E1000
|
unkown
|
page execute and write copy
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
392F000
|
stack
|
page read and write
|
||
E68000
|
heap
|
page read and write
|
||
4621000
|
heap
|
page read and write
|
||
71CE000
|
stack
|
page read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
4621000
|
heap
|
page read and write
|
||
EC8000
|
heap
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
6F4000
|
unkown
|
page execute and read and write
|
||
44E1000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
E64000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
46F2000
|
heap
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
B71000
|
heap
|
page read and write
|
||
3A1F000
|
stack
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
391E000
|
stack
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
E97000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
4561000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
405F000
|
stack
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
E4E000
|
heap
|
page read and write
|
||
733F000
|
stack
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
7AD0000
|
heap
|
page read and write
|
||
315000
|
unkown
|
page execute and read and write
|
||
79BD000
|
stack
|
page read and write
|
||
3E1000
|
unkown
|
page execute and read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
779E000
|
stack
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
13B000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
4621000
|
heap
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
4F70000
|
direct allocation
|
page execute and read and write
|
||
6F4000
|
unkown
|
page execute and read and write
|
||
B37000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
7978000
|
heap
|
page read and write
|
||
289A000
|
stack
|
page read and write
|
||
2C7F000
|
unkown
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
44E1000
|
heap
|
page read and write
|
||
75AE000
|
stack
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
DC2000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
CCA000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
D20000
|
direct allocation
|
page read and write
|
||
B68000
|
heap
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
EE2000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
D3F000
|
heap
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
DD7000
|
heap
|
page read and write
|
||
C5B000
|
stack
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
D17000
|
heap
|
page read and write
|
||
190000
|
unkown
|
page readonly
|
||
282C000
|
stack
|
page read and write
|
||
2A27000
|
heap
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
74F0000
|
remote allocation
|
page read and write
|
||
4CF4000
|
direct allocation
|
page read and write
|
||
E59000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
2A77000
|
heap
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
3A5E000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
E4B000
|
heap
|
page read and write
|
||
369E000
|
stack
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
2BDF000
|
stack
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
AD4000
|
heap
|
page read and write
|
||
C20000
|
direct allocation
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
C20000
|
direct allocation
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
191000
|
unkown
|
page execute and write copy
|
||
48A000
|
unkown
|
page execute and write copy
|
||
AD4000
|
heap
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
62D000
|
unkown
|
page execute and write copy
|
||
F51000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
7727000
|
heap
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
D58000
|
heap
|
page read and write
|
||
73EE000
|
stack
|
page read and write
|
||
742D000
|
stack
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
3B5F000
|
stack
|
page read and write
|
||
77B000
|
unkown
|
page execute and read and write
|
||
787E000
|
stack
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
E64000
|
heap
|
page read and write
|
||
D57000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page execute and read and write
|
||
356F000
|
stack
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
6FEE000
|
stack
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
D83000
|
heap
|
page read and write
|
||
4E84000
|
direct allocation
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
46F0000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
4871000
|
heap
|
page read and write
|
||
DAD000
|
heap
|
page read and write
|