Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PR0078966.xlsx
|
CDFV2 Encrypted
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nass[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
downloaded
|
||
C:\Users\user\AppData\Local\Temp\tmpE206.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
|
ISO-8859 text, with LF, NEL line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\blFUun.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\~$PR0078966.xlsx
|
data
|
dropped
|
||
C:\Users\Public\vbc.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\10C739BF.png
|
PNG image data, 768 x 560, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\119EB898.png
|
PNG image data, 768 x 560, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1741232F.png
|
PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2973EFB9.png
|
PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4F5A1AF7.png
|
PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\55401A7A.jpeg
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 440x248,
frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5773E24A.png
|
PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\59667E41.jpeg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6F68BF36.jpeg
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 364x117,
frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\74B7F433.jpeg
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 364x117,
frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\77272925.jpeg
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 297x206,
frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7B6BD21E.png
|
PNG image data, 294 x 262, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\871C60E8.jpeg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8FD63A2D.png
|
PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9070C88C.png
|
PNG image data, 620 x 392, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A1B55BC9.jpeg
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 440x248,
frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A992A851.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\ABFED4E2.png
|
PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B4DB4F4E.png
|
PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B577E266.jpeg
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 297x206,
frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B645F9C3.png
|
PNG image data, 620 x 392, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BF1F9F87.jpeg
|
[TIFF image data, big-endian, direntries=4], baseline, precision 8, 403x242, frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DB4DF71D.jpeg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DEC708B4.png
|
PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E259E3DC.jpeg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\ED4DB7B.png
|
PNG image data, 294 x 262, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FF452740.jpeg
|
[TIFF image data, big-endian, direntries=4], baseline, precision 8, 403x242, frames 3
|
dropped
|
There are 25 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\Public\vbc.exe
|
'C:\Users\Public\vbc.exe'
|
||
C:\Windows\SysWOW64\schtasks.exe
|
'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\blFUun' /XML 'C:\Users\user\AppData\Local\Temp\tmpE206.tmp'
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
|
||
C:\Program Files (x86)\SMTP Service\smtpsvc.exe
|
'C:\Program Files (x86)\SMTP Service\smtpsvc.exe'
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
nassiru1155.ddns.net
|
|||
http://covid19vaccinations.hopto.org/nass.exe
|
13.235.115.155
|
||
79.134.225.30
|
|||
http://www.%s.comPA
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
covid19vaccinations.hopto.org
|
13.235.115.155
|
||
nassiru1155.ddns.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
13.235.115.155
|
covid19vaccinations.hopto.org
|
United States
|
||
79.134.225.30
|
unknown
|
Switzerland
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
yv5
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EF6AE
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
FontCachePath
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
DefaultSheetR2L
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
UseSystemSeparators
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ThousandsSeparator
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
DecimalSeparator
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
/$6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
F46E0
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
F5551
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 21
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EXCELFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
F46E0
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
SavedLegacySettings
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
|
SMTP Service
|
There are 52 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3791000
|
unkown
|
page read and write
|
||
34E6000
|
unkown
|
page read and write
|
||
2791000
|
unkown
|
page read and write
|
||
D10000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
371F000
|
unkown
|
page read and write
|
||
5540000
|
unkown
|
page read and write
|
||
1BA000
|
unkown
|
page read and write
|
||
47C000
|
unkown
|
page execute and read and write
|
||
8D0000
|
unkown
|
page read and write
|
||
4B0000
|
unkown
|
page readonly
|
||
425000
|
heap default
|
page read and write
|
||
9FE000
|
unkown
|
page read and write | page guard
|
||
36BF000
|
unkown
|
page read and write
|
||
9BC000
|
unkown
|
page readonly
|
||
A00000
|
unkown
|
page read and write
|
||
36DF000
|
unkown
|
page read and write
|
||
629E000
|
unkown
|
page read and write
|
||
361F000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
373F000
|
unkown
|
page read and write
|
||
5CD0000
|
unkown
|
page read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
3580000
|
unkown
|
page read and write
|
||
36BF000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
466000
|
unkown
|
page execute and read and write
|
||
3921000
|
unkown
|
page read and write
|
||
365F000
|
unkown
|
page read and write
|
||
B7C000
|
unkown
|
page read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
5CD0000
|
unkown
|
page read and write
|
||
C50000
|
unkown
|
page read and write
|
||
262000
|
unkown image
|
page execute read
|
||
12B0000
|
unkown
|
page readonly
|
||
110000
|
unkown
|
page readonly
|
||
5B5E000
|
unkown
|
page read and write
|
||
603E000
|
stack
|
page read and write
|
||
5D0000
|
unkown
|
page execute and read and write
|
||
36DF000
|
unkown
|
page read and write
|
||
36DF000
|
unkown
|
page read and write
|
||
B130000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page readonly
|
||
361F000
|
unkown
|
page read and write
|
||
363F000
|
unkown
|
page read and write
|
||
A07000
|
unkown
|
page read and write
|
||
930000
|
unkown
|
page execute and read and write
|
||
5546000
|
unkown
|
page read and write
|
||
35DF000
|
unkown
|
page read and write
|
||
990000
|
unkown
|
page read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
6CC000
|
unkown
|
page readonly
|
||
B44F000
|
stack
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
367F000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
D10000
|
unkown
|
page read and write
|
||
5240000
|
unkown
|
page readonly
|
||
A00000
|
unkown
|
page read and write
|
||
4790000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
4FF9000
|
unkown
|
page readonly
|
||
C06000
|
heap private
|
page read and write
|
||
5EFE000
|
stack
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
20A0000
|
heap private
|
page execute and read and write
|
||
C00000
|
heap private
|
page read and write
|
||
35FF000
|
unkown
|
page read and write
|
||
472000
|
unkown
|
page execute and read and write
|
||
A00000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page read and write
|
||
4F22000
|
unkown
|
page readonly
|
||
A00000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
363F000
|
unkown
|
page read and write
|
||
CA0000
|
unkown
|
page read and write
|
||
357000
|
unkown
|
page execute and read and write
|
||
4914000
|
heap private
|
page read and write
|
||
D0000
|
heap default
|
page read and write
|
||
37BF000
|
unkown
|
page read and write
|
||
51E2000
|
unkown
|
page readonly
|
||
740000
|
unkown
|
page write copy
|
||
460000
|
unkown
|
page read and write
|
||
290000
|
unkown
|
page readonly
|
||
12B0000
|
unkown
|
page read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page readonly
|
||
A00000
|
unkown
|
page read and write
|
||
367F000
|
unkown
|
page read and write
|
||
950000
|
heap private
|
page execute and read and write
|
||
1270000
|
unkown
|
page read and write
|
||
32F000
|
unkown
|
page read and write
|
||
A00000
|
heap private
|
page read and write
|
||
6865000
|
unkown
|
page read and write
|
||
4EF2000
|
unkown
|
page readonly
|
||
5220000
|
unkown
|
page readonly
|
||
510000
|
unkown
|
page execute and read and write
|
||
12C2000
|
unkown image
|
page execute read
|
||
361F000
|
unkown
|
page read and write
|
||
365F000
|
unkown
|
page read and write
|
||
363F000
|
unkown
|
page read and write
|
||
4884000
|
unkown
|
page read and write
|
||
160000
|
unkown
|
page read and write
|
||
5AAE000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
369F000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
3580000
|
unkown
|
page read and write
|
||
46A000
|
unkown
|
page execute and read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
4FD6000
|
unkown
|
page readonly
|
||
5260000
|
unkown
|
page readonly
|
||
35DF000
|
unkown
|
page read and write
|
||
1E2000
|
unkown
|
page execute and read and write
|
||
600000
|
unkown
|
page read and write
|
||
35FF000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
361F000
|
unkown
|
page read and write
|
||
D20000
|
unkown
|
page read and write
|
||
371F000
|
unkown
|
page read and write
|
||
32F000
|
heap default
|
page read and write
|
||
335000
|
unkown
|
page read and write
|
||
379F000
|
unkown
|
page read and write
|
||
6C7000
|
unkown
|
page readonly
|
||
A4E000
|
unkown
|
page read and write
|
||
4B9E000
|
unkown
|
page read and write
|
||
373F000
|
unkown
|
page read and write
|
||
379F000
|
unkown
|
page read and write
|
||
352000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
9B7000
|
unkown
|
page readonly
|
||
371F000
|
unkown
|
page read and write
|
||
367F000
|
unkown
|
page read and write
|
||
365F000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
377F000
|
unkown
|
page read and write
|
||
36FF000
|
unkown
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
63AF000
|
unkown
|
page read and write
|
||
B22E000
|
unkown
|
page read and write
|
||
369F000
|
unkown
|
page read and write
|
||
35FF000
|
unkown
|
page read and write
|
||
36FF000
|
unkown
|
page read and write
|
||
4650000
|
heap private
|
page execute and read and write
|
||
510000
|
unkown
|
page readonly
|
||
373F000
|
unkown
|
page read and write
|
||
367F000
|
unkown
|
page read and write
|
||
36FF000
|
unkown
|
page read and write
|
||
210000
|
heap private
|
page read and write
|
||
59DE000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
5590000
|
unkown
|
page read and write
|
||
359F000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page execute and read and write
|
||
361F000
|
unkown
|
page read and write
|
||
5029000
|
unkown
|
page readonly
|
||
768000
|
heap private
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
35FF000
|
unkown
|
page read and write
|
||
35FF000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
12A0000
|
unkown
|
page read and write
|
||
52DE000
|
unkown
|
page read and write
|
||
488C000
|
unkown
|
page read and write
|
||
36FF000
|
unkown
|
page read and write
|
||
D00000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
3580000
|
unkown
|
page read and write
|
||
359F000
|
unkown
|
page read and write
|
||
367F000
|
unkown
|
page read and write
|
||
C60000
|
unkown
|
page read and write
|
||
DB0000
|
unkown
|
page read and write
|
||
590000
|
heap private
|
page read and write
|
||
47C8000
|
unkown
|
page read and write
|
||
591E000
|
unkown
|
page read and write
|
||
A06000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
35BF000
|
unkown
|
page read and write
|
||
DA0000
|
unkown
|
page read and write
|
||
5480000
|
unkown
|
page read and write
|
||
D05000
|
unkown
|
page read and write
|
||
F50000
|
unkown
|
page read and write
|
||
48B000
|
unkown
|
page execute and read and write
|
||
35BF000
|
unkown
|
page read and write
|
||
35BF000
|
unkown
|
page read and write
|
||
3580000
|
unkown
|
page read and write
|
||
68AA000
|
unkown
|
page read and write
|
||
65E000
|
unkown
|
page read and write
|
||
377F000
|
unkown
|
page read and write
|
||
B89D000
|
stack
|
page read and write
|
||
A06000
|
unkown
|
page read and write
|
||
44A0000
|
unkown
|
page readonly
|
||
4A1D000
|
unkown
|
page read and write
|
||
27B000
|
unkown
|
page execute and read and write
|
||
359F000
|
unkown
|
page read and write
|
||
8C1000
|
unkown
|
page read and write
|
||
A05000
|
heap private
|
page read and write
|
||
232000
|
unkown
|
page execute and read and write
|
||
4FC5000
|
unkown
|
page readonly
|
||
930000
|
unkown
|
page readonly
|
||
48AF000
|
unkown
|
page read and write
|
||
5059000
|
unkown
|
page readonly
|
||
384000
|
heap default
|
page read and write
|
||
720000
|
unkown
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
3580000
|
unkown
|
page read and write
|
||
5E0000
|
unkown
|
page read and write
|
||
367F000
|
unkown
|
page read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
4690000
|
unkown
|
page read and write
|
||
A05000
|
unkown
|
page read and write
|
||
3580000
|
unkown
|
page read and write
|
||
500000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
541F000
|
unkown
|
page read and write
|
||
531000
|
unkown
|
page read and write
|
||
63AE000
|
unkown
|
page read and write | page guard
|
||
4854000
|
unkown
|
page read and write
|
||
4F52000
|
unkown
|
page readonly
|
||
371F000
|
unkown
|
page read and write
|
||
687A000
|
unkown
|
page read and write
|
||
346000
|
unkown
|
page read and write | page guard
|
||
3580000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
35BF000
|
unkown
|
page read and write
|
||
D30000
|
unkown
|
page read and write
|
||
36BF000
|
unkown
|
page read and write
|
||
A05000
|
unkown
|
page read and write
|
||
363F000
|
unkown
|
page read and write
|
||
D80000
|
unkown
|
page read and write
|
||
270000
|
heap default
|
page read and write
|
||
680000
|
heap private
|
page execute and read and write
|
||
8D0000
|
unkown
|
page read and write
|
||
242000
|
unkown
|
page execute and read and write
|
||
625E000
|
unkown
|
page read and write
|
||
379F000
|
unkown
|
page read and write
|
||
4657000
|
heap private
|
page execute and read and write
|
||
41D000
|
heap default
|
page read and write
|
||
379F000
|
unkown
|
page read and write
|
||
36BF000
|
unkown
|
page read and write
|
||
365F000
|
unkown
|
page read and write
|
||
277000
|
unkown
|
page execute and read and write
|
||
550000
|
heap private
|
page execute and read and write
|
||
D91000
|
unkown
|
page read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
750000
|
unkown
|
page execute and read and write
|
||
63CE000
|
unkown
|
page read and write
|
||
134E000
|
unkown image
|
page readonly
|
||
C80000
|
unkown
|
page readonly
|
||
123B000
|
heap private
|
page read and write
|
||
442000
|
unkown
|
page execute and read and write
|
||
1230000
|
heap private
|
page read and write
|
||
E0000
|
heap default
|
page read and write
|
||
45E0000
|
unkown
|
page read and write
|
||
36BF000
|
unkown
|
page read and write
|
||
1E0000
|
heap private
|
page execute and read and write
|
||
379F000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
4F0000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
353E000
|
unkown
|
page read and write
|
||
361F000
|
unkown
|
page read and write
|
||
379F000
|
unkown
|
page read and write
|
||
9A0000
|
unkown
|
page readonly
|
||
64FD000
|
stack
|
page read and write
|
||
363F000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
3A7B000
|
unkown
|
page read and write
|
||
5540000
|
unkown
|
page read and write
|
||
59E0000
|
heap private
|
page read and write
|
||
45C000
|
unkown
|
page execute and read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
367000
|
heap default
|
page read and write
|
||
4D2C000
|
unkown
|
page read and write
|
||
36BF000
|
unkown
|
page read and write
|
||
452000
|
unkown
|
page execute and read and write
|
||
377F000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
1F9E000
|
unkown
|
page read and write
|
||
462D000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
4D0000
|
unkown
|
page execute and read and write
|
||
371F000
|
unkown
|
page read and write
|
||
5E2000
|
unkown
|
page read and write
|
||
CF0000
|
unkown
|
page execute and read and write
|
||
3A9000
|
heap default
|
page read and write
|
||
5015000
|
unkown
|
page readonly
|
||
530000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
4E0000
|
heap private
|
page read and write
|
||
369F000
|
unkown
|
page read and write
|
||
37BF000
|
unkown
|
page read and write
|
||
375F000
|
unkown
|
page read and write
|
||
35BF000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
371F000
|
unkown
|
page read and write
|
||
373F000
|
unkown
|
page read and write
|
||
35DF000
|
unkown
|
page read and write
|
||
5590000
|
unkown
|
page read and write
|
||
4F8000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
46AD000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
377F000
|
unkown
|
page read and write
|
||
D30000
|
unkown
|
page read and write
|
||
37BF000
|
unkown
|
page read and write
|
||
36DF000
|
unkown
|
page read and write
|
||
600000
|
unkown
|
page readonly
|
||
37DF000
|
unkown
|
page read and write
|
||
262000
|
unkown image
|
page execute read
|
||
377F000
|
unkown
|
page read and write
|
||
379F000
|
unkown
|
page read and write
|
||
5D80000
|
unkown
|
page read and write
|
||
363F000
|
unkown
|
page read and write
|
||
32F000
|
unkown
|
page read and write
|
||
2528000
|
unkown
|
page read and write
|
||
4BDE000
|
unkown
|
page read and write
|
||
610000
|
unkown
|
page read and write
|
||
369F000
|
unkown
|
page read and write
|
||
A0C000
|
unkown
|
page read and write
|
||
477000
|
unkown
|
page execute and read and write
|
||
361F000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page read and write
|
||
365F000
|
unkown
|
page read and write
|
||
36FF000
|
unkown
|
page read and write
|
||
35FF000
|
unkown
|
page read and write
|
||
371F000
|
unkown
|
page read and write
|
||
49D000
|
unkown
|
page read and write
|
||
BFE000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page readonly
|
||
35BF000
|
unkown
|
page read and write
|
||
35BF000
|
unkown
|
page read and write
|
||
1EA000
|
unkown
|
page execute and read and write
|
||
D30000
|
unkown
|
page read and write
|
||
35DF000
|
unkown
|
page read and write
|
||
7EF50000
|
unkown
|
page execute and read and write
|
||
359F000
|
unkown
|
page read and write
|
||
8C1000
|
unkown
|
page read and write
|
||
476000
|
unkown
|
page read and write
|
||
9DB000
|
unkown
|
page readonly
|
||
355F000
|
unkown
|
page read and write
|
||
36FF000
|
unkown
|
page read and write
|
||
4ED4000
|
unkown
|
page readonly
|
||
4F1000
|
unkown
|
page read and write
|
||
B140000
|
unkown
|
page read and write
|
||
4932000
|
heap private
|
page read and write
|
||
C50000
|
unkown
|
page readonly
|
||
35BF000
|
unkown
|
page read and write
|
||
369F000
|
unkown
|
page read and write
|
||
377F000
|
unkown
|
page read and write
|
||
4FA6000
|
unkown
|
page readonly
|
||
4C0000
|
unkown
|
page read and write
|
||
B30000
|
heap private
|
page read and write
|
||
4970000
|
unkown
|
page readonly
|
||
C7E000
|
unkown
|
page read and write | page guard
|
||
AF0000
|
unkown
|
page read and write
|
||
357F000
|
unkown
|
page read and write
|
||
602000
|
unkown
|
page read and write
|
||
A58000
|
unkown
|
page read and write
|
||
36DF000
|
unkown
|
page read and write
|
||
C7B000
|
unkown
|
page readonly
|
||
359F000
|
unkown
|
page read and write
|
||
1090000
|
unkown
|
page readonly
|
||
4FF2000
|
unkown
|
page readonly
|
||
277000
|
heap default
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
12C0000
|
unkown image
|
page readonly
|
||
375F000
|
unkown
|
page read and write
|
||
36DF000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page read and write
|
||
A50000
|
unkown
|
page readonly
|
||
27EE000
|
unkown
|
page read and write
|
||
32F000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
365F000
|
unkown
|
page read and write
|
||
4EB4000
|
unkown
|
page readonly
|
||
A00000
|
unkown
|
page read and write
|
||
36FF000
|
unkown
|
page read and write
|
||
46A000
|
unkown
|
page execute and read and write
|
||
470000
|
unkown
|
page read and write
|
||
4863000
|
unkown
|
page read and write
|
||
4F76000
|
unkown
|
page readonly
|
||
A06000
|
unkown
|
page read and write
|
||
373F000
|
unkown
|
page read and write
|
||
369F000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page read and write
|
||
35DF000
|
unkown
|
page read and write
|
||
8D0000
|
unkown
|
page read and write
|
||
369F000
|
unkown
|
page read and write
|
||
379F000
|
unkown
|
page read and write
|
||
36DF000
|
unkown
|
page read and write
|
||
371F000
|
unkown
|
page read and write
|
||
4FB2000
|
unkown
|
page readonly
|
||
64CF000
|
unkown
|
page read and write
|
||
720000
|
unkown
|
page readonly
|
||
CA000
|
unkown
|
page read and write
|
||
5B80000
|
unkown
|
page readonly
|
||
35DF000
|
unkown
|
page read and write
|
||
4F95000
|
unkown
|
page readonly
|
||
608E000
|
unkown
|
page read and write
|
||
24A1000
|
unkown
|
page read and write
|
||
9FF000
|
unkown
|
page read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
360000
|
heap default
|
page read and write
|
||
5D9D000
|
unkown
|
page read and write
|
||
4A8E000
|
unkown
|
page read and write
|
||
260000
|
unkown image
|
page readonly
|
||
359F000
|
unkown
|
page read and write
|
||
367F000
|
unkown
|
page read and write
|
||
C7F000
|
unkown
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
373F000
|
unkown
|
page read and write
|
||
367F000
|
unkown
|
page read and write
|
||
573D000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
D38000
|
unkown
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
80000
|
unkown
|
page readonly
|
||
5D7E000
|
unkown
|
page read and write
|
||
5280000
|
unkown
|
page read and write
|
||
363F000
|
unkown
|
page read and write
|
||
260000
|
unkown image
|
page readonly
|
||
12B0000
|
unkown
|
page read and write
|
||
361F000
|
unkown
|
page read and write
|
||
4F35000
|
unkown
|
page readonly
|
||
4CF8000
|
unkown
|
page readonly
|
||
5540000
|
unkown
|
page read and write
|
||
4F4000
|
heap default
|
page read and write
|
||
D30000
|
unkown
|
page read and write
|
||
377F000
|
unkown
|
page read and write
|
||
375F000
|
unkown
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
375F000
|
unkown
|
page read and write
|
||
373F000
|
unkown
|
page read and write
|
||
379F000
|
unkown
|
page read and write
|
||
26C7000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
365F000
|
unkown
|
page read and write
|
||
4D0000
|
heap default
|
page read and write
|
||
3551000
|
unkown
|
page read and write
|
||
5B10000
|
unkown
|
page read and write
|
||
36DF000
|
unkown
|
page read and write
|
||
35BF000
|
unkown
|
page read and write
|
||
D00000
|
unkown
|
page read and write
|
||
5022000
|
unkown
|
page readonly
|
||
D36000
|
unkown
|
page read and write
|
||
5540000
|
unkown
|
page read and write
|
||
D07000
|
unkown
|
page read and write
|
||
35FF000
|
unkown
|
page read and write
|
||
45E0000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
CA0000
|
unkown
|
page read and write
|
||
4ED2000
|
unkown
|
page readonly
|
||
12A0000
|
unkown
|
page read and write
|
||
4BE0000
|
heap private
|
page read and write
|
||
373F000
|
unkown
|
page read and write
|
||
AF8000
|
unkown
|
page read and write
|
||
7B0000
|
unkown
|
page readonly
|
||
36BF000
|
unkown
|
page read and write
|
||
48AE000
|
unkown
|
page read and write | page guard
|
||
1E0000
|
unkown
|
page read and write
|
||
377F000
|
unkown
|
page read and write
|
||
92C000
|
unkown
|
page read and write
|
||
108F000
|
stack
|
page read and write
|
||
4674000
|
heap private
|
page execute and read and write
|
||
A00000
|
unkown
|
page read and write
|
||
375F000
|
unkown
|
page read and write
|
||
4CF2000
|
unkown
|
page readonly
|
||
2B0000
|
unkown
|
page read and write
|
||
7A0000
|
heap private
|
page read and write
|
||
361F000
|
unkown
|
page read and write
|
||
375F000
|
unkown
|
page read and write
|
||
490000
|
heap private
|
page read and write
|
||
F3000
|
heap default
|
page read and write
|
||
21D0000
|
unkown
|
page readonly
|
||
268000
|
unkown image
|
page readonly
|
||
335000
|
unkown
|
page read and write
|
||
4FE000
|
unkown
|
page read and write
|
||
359F000
|
unkown
|
page read and write
|
||
57B0000
|
heap private
|
page read and write
|
||
25B000
|
unkown
|
page read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
7EF50000
|
unkown
|
page execute and read and write
|
||
570000
|
unkown
|
page readonly
|
||
472000
|
unkown
|
page read and write
|
||
320000
|
unkown
|
page read and write
|
||
1238000
|
heap private
|
page read and write
|
||
37BF000
|
unkown
|
page read and write
|
||
36DF000
|
unkown
|
page read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2692000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page readonly
|
||
23A000
|
unkown
|
page execute and read and write
|
||
530000
|
unkown
|
page readonly
|
||
64CE000
|
unkown
|
page read and write | page guard
|
||
365F000
|
unkown
|
page read and write
|
||
5DBF000
|
unkown
|
page read and write
|
||
4580000
|
unkown
|
page readonly
|
||
12A1000
|
unkown
|
page read and write
|
||
373F000
|
unkown
|
page read and write
|
||
5380000
|
unkown
|
page read and write
|
||
90000
|
heap default
|
page read and write
|
||
1234000
|
heap private
|
page read and write
|
||
A10000
|
heap private
|
page execute and read and write
|
||
47B000
|
unkown
|
page execute and read and write
|
||
36FF000
|
unkown
|
page read and write
|
||
44A000
|
unkown
|
page execute and read and write
|
||
487000
|
unkown
|
page execute and read and write
|
||
A04000
|
unkown
|
page read and write
|
||
375F000
|
unkown
|
page read and write
|
||
CB4000
|
heap private
|
page read and write
|
||
37BF000
|
unkown
|
page read and write
|
||
4882000
|
unkown
|
page read and write
|
||
6EB000
|
unkown
|
page readonly
|
||
4D30000
|
unkown
|
page readonly
|
||
379F000
|
unkown
|
page read and write
|
||
4F65000
|
unkown
|
page readonly
|
||
56A0000
|
unkown
|
page read and write
|
||
5045000
|
unkown
|
page readonly
|
||
4EF4000
|
unkown
|
page readonly
|
||
51AD000
|
unkown
|
page read and write
|
||
60CE000
|
unkown
|
page read and write
|
||
4833000
|
unkown
|
page read and write
|
||
369F000
|
unkown
|
page read and write
|
||
359F000
|
unkown
|
page read and write
|
||
4E9000
|
heap private
|
page read and write
|
||
36FF000
|
unkown
|
page read and write
|
||
482000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
CB0000
|
heap private
|
page read and write
|
||
3580000
|
unkown
|
page read and write
|
||
2551000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
5075000
|
unkown
|
page readonly
|
||
371F000
|
unkown
|
page read and write
|
||
134E000
|
unkown image
|
page readonly
|
||
35FF000
|
unkown
|
page read and write
|
||
4858000
|
unkown
|
page read and write
|
||
369F000
|
unkown
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
367F000
|
unkown
|
page read and write
|
||
477000
|
unkown
|
page read and write | page guard
|
||
35DF000
|
unkown
|
page read and write
|
||
5BB0000
|
unkown
|
page read and write
|
||
375F000
|
unkown
|
page read and write
|
||
5052000
|
unkown
|
page readonly
|
||
A06000
|
unkown
|
page read and write
|
||
4F46000
|
unkown
|
page readonly
|
||
C5C000
|
unkown
|
page readonly
|
||
A00000
|
unkown
|
page read and write
|
||
1290000
|
unkown
|
page execute and read and write
|
||
535000
|
unkown
|
page read and write
|
||
365F000
|
unkown
|
page read and write
|
||
12A0000
|
unkown
|
page read and write
|
||
A06000
|
unkown
|
page read and write
|
||
AF0000
|
unkown
|
page readonly
|
||
12C2000
|
unkown image
|
page execute read
|
||
A32000
|
heap private
|
page execute and read and write
|
||
F72000
|
unkown
|
page execute and read and write
|
||
A00000
|
unkown
|
page read and write
|
||
A06000
|
unkown
|
page read and write
|
||
35BF000
|
unkown
|
page read and write
|
||
36BF000
|
unkown
|
page read and write
|
||
377F000
|
unkown
|
page read and write
|
||
35FF000
|
unkown
|
page read and write
|
||
12B0000
|
unkown
|
page read and write
|
||
A0000
|
unkown
|
page readonly
|
||
35DF000
|
unkown
|
page read and write
|
||
37BF000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
367F000
|
unkown
|
page read and write
|
||
B99E000
|
stack
|
page read and write
|
||
5500000
|
unkown
|
page read and write
|
||
35DF000
|
unkown
|
page read and write
|
||
37BF000
|
unkown
|
page read and write
|
||
26B7000
|
unkown
|
page read and write
|
||
202000
|
unkown
|
page execute and read and write
|
||
379F000
|
unkown
|
page read and write
|
||
C50000
|
unkown
|
page read and write
|
||
36BF000
|
unkown
|
page read and write
|
||
D10000
|
unkown
|
page read and write
|
||
D7E000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
335000
|
heap default
|
page read and write
|
||
6861000
|
unkown
|
page read and write
|
||
4B3C000
|
unkown
|
page read and write
|
||
326000
|
unkown
|
page read and write
|
||
4FD9000
|
unkown
|
page readonly
|
||
A07000
|
unkown
|
page read and write
|
||
375F000
|
unkown
|
page read and write
|
||
8D0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
4910000
|
heap private
|
page read and write
|
||
5B70000
|
unkown
|
page write copy
|
||
CD2000
|
heap private
|
page read and write
|
||
DA0000
|
unkown
|
page read and write
|
||
D10000
|
unkown
|
page read and write
|
||
294000
|
heap default
|
page read and write
|
||
B150000
|
unkown
|
page read and write
|
||
710000
|
unkown
|
page readonly
|
||
52C7000
|
unkown
|
page read and write
|
||
338000
|
unkown
|
page read and write
|
||
A15000
|
heap private
|
page execute and read and write
|
||
36BF000
|
unkown
|
page read and write
|
||
34A1000
|
unkown
|
page read and write
|
||
D30000
|
unkown
|
page read and write
|
||
D30000
|
unkown
|
page read and write
|
||
37BF000
|
unkown
|
page read and write
|
||
20A000
|
unkown
|
page execute and read and write
|
||
36FF000
|
unkown
|
page read and write
|
||
55BF000
|
unkown
|
page read and write
|
||
363F000
|
unkown
|
page read and write
|
||
37DF000
|
unkown
|
page read and write
|
||
5540000
|
unkown
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
365F000
|
unkown
|
page read and write
|
||
266000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page read and write
|
||
5590000
|
unkown
|
page read and write
|
||
4F82000
|
unkown
|
page readonly
|
||
373F000
|
unkown
|
page read and write
|
||
1D2000
|
unkown
|
page execute and read and write
|
||
B6CD000
|
stack
|
page read and write
|
||
4950000
|
unkown
|
page readonly
|
||
2280000
|
unkown
|
page readonly
|
||
5720000
|
unkown
|
page readonly
|
||
369F000
|
unkown
|
page read and write
|
||
371F000
|
unkown
|
page read and write
|
||
D30000
|
unkown
|
page read and write
|
||
A00000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
540000
|
unkown
|
page execute and read and write
|
||
F80000
|
unkown
|
page read and write
|
||
35DF000
|
unkown
|
page read and write
|
||
ACE0000
|
unkown
|
page read and write
|
||
DD0000
|
unkown
|
page readonly
|
||
7EF60000
|
unkown
|
page execute and read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
3580000
|
unkown
|
page read and write
|
||
569F000
|
unkown
|
page read and write
|
||
365F000
|
unkown
|
page read and write
|
||
2670000
|
unkown
|
page read and write
|
||
369F000
|
unkown
|
page read and write
|
||
4DF2000
|
unkown
|
page readonly
|
||
4D7000
|
heap default
|
page read and write
|
||
A06000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
2C0000
|
heap private
|
page read and write
|
||
529D000
|
unkown
|
page read and write
|
||
3C8000
|
heap default
|
page read and write
|
||
27D5000
|
unkown
|
page read and write
|
||
D35000
|
unkown
|
page read and write
|
||
D30000
|
unkown
|
page read and write
|
||
B26C000
|
unkown
|
page read and write
|
||
D80000
|
unkown
|
page read and write
|
||
12C0000
|
unkown image
|
page readonly
|
||
359F000
|
unkown
|
page read and write
|
||
361F000
|
unkown
|
page read and write
|
||
27D3000
|
unkown
|
page read and write
|
||
1DA000
|
unkown
|
page execute and read and write
|
||
A00000
|
unkown
|
page read and write
|
||
9B0000
|
unkown
|
page readonly
|
||
268000
|
unkown image
|
page readonly
|
||
AF0000
|
unkown
|
page read and write
|
||
47A000
|
unkown
|
page execute and read and write
|
||
B1DE000
|
unkown
|
page read and write
|
||
36DF000
|
unkown
|
page read and write
|
||
377F000
|
unkown
|
page read and write
|
||
36BF000
|
unkown
|
page read and write
|
||
11ED000
|
stack
|
page read and write
|
||
6850000
|
unkown
|
page read and write
|
||
5CD0000
|
unkown
|
page read and write
|
||
4EB2000
|
unkown
|
page readonly
|
||
5CCE000
|
stack
|
page read and write
|
||
359F000
|
unkown
|
page read and write
|
||
686B000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
227F000
|
stack
|
page read and write
|
||
515E000
|
unkown
|
page read and write
|
||
61FE000
|
stack
|
page read and write
|
||
60EE000
|
unkown
|
page read and write
|
||
C57000
|
unkown
|
page readonly
|
||
35A000
|
unkown
|
page execute and read and write
|
||
370000
|
unkown
|
page execute and read and write
|
||
491E000
|
unkown
|
page read and write
|
||
347000
|
stack
|
page read and write
|
||
D37000
|
unkown
|
page read and write
|
||
462000
|
unkown
|
page execute and read and write
|
||
12C0000
|
unkown image
|
page readonly
|
||
479000
|
stack
|
page read and write
|
||
4FDD000
|
unkown
|
page readonly
|
||
35FF000
|
unkown
|
page read and write
|
||
4ADE000
|
unkown
|
page read and write
|
||
569E000
|
unkown
|
page read and write | page guard
|
||
375F000
|
unkown
|
page read and write
|
||
558E000
|
unkown
|
page read and write
|
||
4890000
|
unkown
|
page read and write
|
||
363F000
|
unkown
|
page read and write
|
||
2B8000
|
heap default
|
page read and write
|
||
361F000
|
unkown
|
page read and write
|
||
35BF000
|
unkown
|
page read and write
|
||
260000
|
unkown image
|
page readonly
|
||
51A000
|
heap default
|
page read and write
|
||
760000
|
heap private
|
page read and write
|
||
5CD0000
|
unkown
|
page readonly
|
||
C4E000
|
unkown
|
page read and write
|
||
D00000
|
unkown
|
page read and write
|
||
34C6000
|
unkown
|
page read and write
|
||
359F000
|
unkown
|
page read and write
|
||
B17C000
|
unkown
|
page read and write
|
There are 709 hidden memdumps, click here to show them.