Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
202404294766578200.xlam.xlsx
|
Microsoft Excel 2007+
|
initial sample
|
||
C:\Users\user\AppData\Local\silvexes\deblaterate.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CKK.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut24D0.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut252E.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut904E.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut90BC.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autC301.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autC3BE.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhvA870.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x2f8d0607, page size 32768, DirtyShutdown, Windows version 6.1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\disturb
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ppotysrwfeteuiatikevqdgejj
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\proximobuccal
|
ASCII text, with very long lines (29744), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~$imgs.xlsx
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\logs.dat
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$202404294766578200.xlam.xls
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$202404294766578200.xlam.xlsx
|
data
|
dropped
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
|
||
C:\Users\user\AppData\Roaming\CKK.exe
|
"C:\Users\user\AppData\Roaming\CKK.exe"
|
||
C:\Users\user\AppData\Local\silvexes\deblaterate.exe
|
"C:\Users\user\AppData\Roaming\CKK.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\AppData\Roaming\CKK.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\ppotysrwfeteuiatikevqdgejj"
|
||
C:\Windows\SysWOW64\svchost.exe
|
C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\sjtmzkcptmljfowfsvrxbqbvspfxg"
|
||
C:\Windows\SysWOW64\svchost.exe
|
C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\cmzeadnjpudohckjjfeyevvebepghjumz"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs"
|
||
C:\Users\user\AppData\Local\silvexes\deblaterate.exe
|
"C:\Users\user\AppData\Local\silvexes\deblaterate.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\AppData\Local\silvexes\deblaterate.exe"
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://23.94.54.101/GVV.exe
|
23.94.54.101
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
yuahdgbceja.sytes.net
|
|||
http://b.scorecardresearch.com/beacon.js
|
unknown
|
||
http://acdn.adnxs.com/ast/ast.js
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
|
unknown
|
||
https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
|
unknown
|
||
https://support.google.com
|
unknown
|
||
http://geoplugin.net/json.gp/
|
unknown
|
||
https://support.google.com/chrome/?p=plugin_flash
|
unknown
|
||
http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
|
unknown
|
||
https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
|
unknown
|
||
http://23.94.54.101/GVV.exeXC
|
unknown
|
||
http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
|
unknown
|
||
http://www.nirsoft.net
|
unknown
|
||
https://deff.nelreports.net/api/report?cat=msn
|
unknown
|
||
https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
http://cache.btrll.com/default/Pix-1x1.gif
|
unknown
|
||
http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://o.aolcdn.com/ads/adswrappermsni.js
|
unknown
|
||
http://cdn.taboola.com/libtrc/msn-home-network/loader.js
|
unknown
|
||
http://www.msn.com/?ocid=iehp
|
unknown
|
||
https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
|
unknown
|
||
http://static.chartbeat.com/js/chartbeat.js
|
unknown
|
||
http://www.msn.com/de-de/?ocid=iehp
|
unknown
|
||
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
|
unknown
|
||
http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
|
unknown
|
||
http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
|
unknown
|
||
https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
|
unknown
|
||
http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
|
unknown
|
||
http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
|
unknown
|
||
https://www.ccleaner.com/go/app_cc_pro_trialkey
|
unknown
|
||
http://www.imvu.com/
|
unknown
|
||
https://contextual.media.net/8/nrrV73987.js
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://contextual.media.net/
|
unknown
|
||
http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
|
unknown
|
||
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
|
unknown
|
||
http://www.msn.com/
|
unknown
|
||
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
|
unknown
|
||
https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
|
unknown
|
||
http://cdn.at.atwola.com/_media/uac/msn.html
|
unknown
|
||
http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
|
unknown
|
||
https://policies.yahoo.com/w3c/p3p.xml
|
unknown
|
||
http://www.msn.com/advertisement.ad.js
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 42 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
yuahdgbceja.sytes.net
|
23.94.53.100
|
||
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
23.94.54.101
|
unknown
|
United States
|
||
23.94.53.100
|
yuahdgbceja.sytes.net
|
United States
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Rmc-E70NOS
|
exepath
|
||
HKEY_CURRENT_USER\Software\Rmc-E70NOS
|
licence
|
||
HKEY_CURRENT_USER\Software\Rmc-E70NOS
|
time
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
yd#
|
||
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
|
Enabled
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
|
MTTT
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
7i#
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
|
LastPurgeTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
EXCELFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
|
EquationEditorFilesIntl_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
|
EquationEditorFilesIntl_1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
There are 7 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
720000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
1070000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
9EF000
|
heap
|
page read and write
|
||
16C000
|
stack
|
page read and write
|
||
220000
|
heap
|
page read and write
|
||
2E70000
|
direct allocation
|
page read and write
|
||
62A000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
31D2000
|
heap
|
page read and write
|
||
64BF000
|
stack
|
page read and write
|
||
36BE000
|
direct allocation
|
page read and write
|
||
1D78000
|
heap
|
page read and write
|
||
206000
|
stack
|
page read and write
|
||
1D7E000
|
heap
|
page read and write
|
||
2A50000
|
unclassified section
|
page execute and read and write
|
||
679000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
317000
|
heap
|
page read and write
|
||
D11000
|
heap
|
page read and write
|
||
1291000
|
unkown
|
page execute read
|
||
446000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
251F000
|
stack
|
page read and write
|
||
2C20000
|
direct allocation
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
direct allocation
|
page read and write
|
||
1D6B000
|
heap
|
page read and write
|
||
28D000
|
stack
|
page read and write
|
||
310000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
17A000
|
stack
|
page read and write
|
||
3231000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
1D47000
|
heap
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
11C3000
|
heap
|
page read and write
|
||
2D20000
|
direct allocation
|
page read and write
|
||
397000
|
heap
|
page read and write
|
||
25C1000
|
heap
|
page read and write
|
||
1D40000
|
heap
|
page read and write
|
||
2EF000
|
stack
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
1DD9000
|
heap
|
page read and write
|
||
2E6F000
|
unkown
|
page read and write
|
||
6D2000
|
heap
|
page read and write
|
||
639000
|
heap
|
page read and write
|
||
478000
|
system
|
page execute and read and write
|
||
9F0000
|
unkown
|
page readonly
|
||
6AC000
|
heap
|
page read and write
|
||
1E35000
|
heap
|
page read and write
|
||
2B9A000
|
direct allocation
|
page read and write
|
||
474000
|
system
|
page execute and read and write
|
||
40BE000
|
direct allocation
|
page read and write
|
||
11E2000
|
heap
|
page read and write
|
||
93B000
|
heap
|
page read and write
|
||
1D6D000
|
heap
|
page read and write
|
||
2D20000
|
direct allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
AB2000
|
unkown
|
page readonly
|
||
26CD000
|
heap
|
page read and write
|
||
34E000
|
heap
|
page read and write
|
||
2D0A000
|
direct allocation
|
page read and write
|
||
39A000
|
heap
|
page read and write
|
||
25C0000
|
trusted library allocation
|
page read and write
|
||
3D6000
|
heap
|
page read and write
|
||
2D90000
|
direct allocation
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
64F000
|
stack
|
page read and write
|
||
110000
|
direct allocation
|
page execute and read and write
|
||
3BB000
|
heap
|
page read and write
|
||
3E7000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
1D85000
|
heap
|
page read and write
|
||
35A000
|
heap
|
page read and write
|
||
36C000
|
heap
|
page read and write
|
||
3DB000
|
heap
|
page read and write
|
||
65AF000
|
stack
|
page read and write
|
||
9F1000
|
unkown
|
page execute read
|
||
6B8000
|
heap
|
page read and write
|
||
D41000
|
unkown
|
page execute read
|
||
670000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
5D7000
|
heap
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
35F000
|
heap
|
page read and write
|
||
3323000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2EF0000
|
direct allocation
|
page read and write
|
||
221E000
|
stack
|
page read and write
|
||
2D0A000
|
direct allocation
|
page read and write
|
||
6E4000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
67F000
|
stack
|
page read and write
|
||
2E70000
|
direct allocation
|
page read and write
|
||
2D7000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
2D80000
|
direct allocation
|
page read and write
|
||
2E84000
|
direct allocation
|
page read and write
|
||
2B9A000
|
direct allocation
|
page read and write
|
||
E02000
|
unkown
|
page readonly
|
||
14D000
|
heap
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
2A9000
|
heap
|
page read and write
|
||
33D9000
|
heap
|
page read and write
|
||
2AC0000
|
direct allocation
|
page read and write
|
||
2C00000
|
unclassified section
|
page execute and read and write
|
||
89000
|
stack
|
page read and write
|
||
22A4000
|
heap
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
2819000
|
trusted library allocation
|
page read and write
|
||
87C000
|
heap
|
page read and write
|
||
39E000
|
heap
|
page read and write
|
||
72BE000
|
direct allocation
|
page read and write
|
||
2D0000
|
heap
|
page read and write
|
||
396000
|
heap
|
page read and write
|
||
D40000
|
unkown
|
page readonly
|
||
222000
|
stack
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
132C000
|
unkown
|
page readonly
|
||
107A000
|
heap
|
page read and write
|
||
A8C000
|
unkown
|
page readonly
|
||
2D20000
|
direct allocation
|
page read and write
|
||
258E000
|
stack
|
page read and write
|
||
237E000
|
stack
|
page read and write
|
||
FC4000
|
heap
|
page read and write
|
||
1D75000
|
heap
|
page read and write
|
||
2D20000
|
direct allocation
|
page read and write
|
||
1D6E000
|
heap
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
2C10000
|
direct allocation
|
page read and write
|
||
3431000
|
heap
|
page read and write
|
||
1D48000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
1D85000
|
heap
|
page read and write
|
||
1D68000
|
heap
|
page read and write
|
||
18B000
|
stack
|
page read and write
|
||
AC4000
|
unkown
|
page readonly
|
||
2B0000
|
remote allocation
|
page read and write
|
||
107B000
|
heap
|
page read and write
|
||
2E70000
|
direct allocation
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
67C0000
|
heap
|
page read and write
|
||
66C000
|
stack
|
page read and write
|
||
A8C000
|
unkown
|
page readonly
|
||
2D14000
|
direct allocation
|
page read and write
|
||
897000
|
heap
|
page read and write
|
||
31AA000
|
heap
|
page read and write
|
||
2D11000
|
direct allocation
|
page read and write
|
||
D11000
|
heap
|
page read and write
|
||
11D9000
|
heap
|
page read and write
|
||
679000
|
heap
|
page read and write
|
||
10ED000
|
heap
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
2CBE000
|
direct allocation
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
14F000
|
heap
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
FE2000
|
heap
|
page read and write
|
||
25BF000
|
stack
|
page read and write
|
||
26CD000
|
stack
|
page read and write
|
||
B9C000
|
heap
|
page read and write
|
||
2D14000
|
direct allocation
|
page read and write
|
||
3DE000
|
stack
|
page read and write
|
||
1360000
|
unkown
|
page write copy
|
||
632000
|
heap
|
page read and write
|
||
1E4B000
|
unclassified section
|
page execute and read and write
|
||
6B0000
|
heap
|
page read and write
|
||
2B9A000
|
direct allocation
|
page read and write
|
||
1E30000
|
heap
|
page read and write
|
||
1D6D000
|
heap
|
page read and write
|
||
8FC000
|
heap
|
page read and write
|
||
E0C000
|
unkown
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
672000
|
heap
|
page read and write
|
||
4D3000
|
heap
|
page read and write
|
||
5EBE000
|
direct allocation
|
page read and write
|
||
2D17000
|
direct allocation
|
page read and write
|
||
25C0000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
direct allocation
|
page read and write
|
||
300000
|
heap
|
page read and write
|
||
1D6B000
|
heap
|
page read and write
|
||
1D7A000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
27D000
|
heap
|
page read and write
|
||
71F000
|
stack
|
page read and write
|
||
1D49000
|
heap
|
page read and write
|
||
507000
|
heap
|
page read and write
|
||
2E81000
|
direct allocation
|
page read and write
|
||
18C000
|
heap
|
page read and write
|
||
2C10000
|
direct allocation
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
2E84000
|
direct allocation
|
page read and write
|
||
1D6D000
|
heap
|
page read and write
|
||
1DD2000
|
heap
|
page read and write
|
||
2D17000
|
direct allocation
|
page read and write
|
||
20CF000
|
stack
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
B67000
|
heap
|
page read and write
|
||
2E87000
|
direct allocation
|
page read and write
|
||
2BFD000
|
stack
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
1D4A000
|
heap
|
page read and write
|
||
2D14000
|
direct allocation
|
page read and write
|
||
E10000
|
unkown
|
page write copy
|
||
2E90000
|
direct allocation
|
page read and write
|
||
2D80000
|
direct allocation
|
page read and write
|
||
395000
|
heap
|
page read and write
|
||
BBC000
|
heap
|
page read and write
|
||
2D11000
|
direct allocation
|
page read and write
|
||
36F000
|
stack
|
page read and write
|
||
1C6000
|
heap
|
page read and write
|
||
2D20000
|
direct allocation
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
2C5D000
|
unclassified section
|
page execute and read and write
|
||
564000
|
heap
|
page read and write
|
||
395000
|
heap
|
page read and write
|
||
1D69000
|
heap
|
page read and write
|
||
2E70000
|
direct allocation
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
3E7000
|
heap
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
C5B000
|
heap
|
page read and write
|
||
1D72000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
67F000
|
heap
|
page read and write
|
||
1D6E000
|
heap
|
page read and write
|
||
B84000
|
heap
|
page read and write
|
||
21F000
|
stack
|
page read and write
|
||
2D0A000
|
direct allocation
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
3D9000
|
heap
|
page read and write
|
||
1FDF000
|
stack
|
page read and write
|
||
3D9000
|
heap
|
page read and write
|
||
33D9000
|
heap
|
page read and write
|
||
1D81000
|
heap
|
page read and write
|
||
2E87000
|
direct allocation
|
page read and write
|
||
3DB000
|
heap
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
120000
|
heap
|
page read and write
|
||
9F0000
|
unkown
|
page readonly
|
||
1F8E000
|
stack
|
page read and write
|
||
33CB000
|
heap
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
6DF000
|
stack
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
CC000
|
stack
|
page read and write
|
||
232F000
|
stack
|
page read and write
|
||
1037000
|
heap
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
direct allocation
|
page read and write
|
||
241F000
|
stack
|
page read and write
|
||
1D4F000
|
heap
|
page read and write
|
||
2D17000
|
direct allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
2E87000
|
direct allocation
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
C3B000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
E0C000
|
unkown
|
page write copy
|
||
2C59000
|
unclassified section
|
page execute and read and write
|
||
61E000
|
heap
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
BAD000
|
heap
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
1D4F000
|
heap
|
page read and write
|
||
69B000
|
heap
|
page read and write
|
||
2E81000
|
direct allocation
|
page read and write
|
||
38E4000
|
heap
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
3B4000
|
heap
|
page read and write
|
||
57A000
|
heap
|
page read and write
|
||
2E84000
|
direct allocation
|
page read and write
|
||
1EB0000
|
heap
|
page read and write
|
||
24BF000
|
stack
|
page read and write
|
||
2D17000
|
direct allocation
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
25C0000
|
trusted library allocation
|
page read and write
|
||
22B000
|
stack
|
page read and write
|
||
22A8000
|
heap
|
page read and write
|
||
62A000
|
heap
|
page read and write
|
||
33D9000
|
heap
|
page read and write
|
||
5C7000
|
heap
|
page read and write
|
||
2C20000
|
direct allocation
|
page read and write
|
||
33D9000
|
heap
|
page read and write
|
||
1132000
|
heap
|
page read and write
|
||
1F00000
|
heap
|
page read and write
|
||
72C000
|
stack
|
page read and write
|
||
3BB000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
DDC000
|
unkown
|
page readonly
|
||
14E000
|
heap
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
110C000
|
heap
|
page read and write
|
||
2E84000
|
direct allocation
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
2D80000
|
direct allocation
|
page read and write
|
||
10016000
|
direct allocation
|
page execute and read and write
|
||
90000
|
heap
|
page read and write
|
||
356B000
|
heap
|
page read and write
|
||
2E90000
|
direct allocation
|
page read and write
|
||
3E7000
|
heap
|
page read and write
|
||
62F000
|
heap
|
page read and write
|
||
37E000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
1FB0000
|
heap
|
page read and write
|
||
2632000
|
heap
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
1EF000
|
stack
|
page read and write
|
||
2C20000
|
direct allocation
|
page read and write
|
||
5A6000
|
heap
|
page read and write
|
||
CE3000
|
heap
|
page read and write
|
||
2EF0000
|
direct allocation
|
page read and write
|
||
1E4F000
|
unclassified section
|
page execute and read and write
|
||
205D000
|
stack
|
page read and write
|
||
24CF000
|
stack
|
page read and write
|
||
4ABE000
|
direct allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
1D81000
|
heap
|
page read and write
|
||
238D000
|
stack
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
2E87000
|
direct allocation
|
page read and write
|
||
22AB000
|
heap
|
page read and write
|
||
50F000
|
stack
|
page read and write
|
||
5FF000
|
stack
|
page read and write
|
||
2D11000
|
direct allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
2E90000
|
direct allocation
|
page read and write
|
||
1D49000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
2E90000
|
direct allocation
|
page read and write
|
||
371000
|
heap
|
page read and write
|
||
1D8A000
|
heap
|
page read and write
|
||
228000
|
stack
|
page read and write
|
||
2D80000
|
direct allocation
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
9D1000
|
heap
|
page read and write
|
||
2D17000
|
direct allocation
|
page read and write
|
||
1EE6000
|
heap
|
page read and write
|
||
25CE000
|
stack
|
page read and write
|
||
2D11000
|
direct allocation
|
page read and write
|
||
2390000
|
heap
|
page read and write
|
||
6780000
|
heap
|
page read and write
|
||
2302000
|
heap
|
page read and write
|
||
108C000
|
heap
|
page read and write
|
||
2D14000
|
direct allocation
|
page read and write
|
||
2CB1000
|
direct allocation
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
190000
|
direct allocation
|
page execute and read and write
|
||
1D80000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
371000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
225000
|
stack
|
page read and write
|
||
25C0000
|
heap
|
page read and write
|
||
2D0D000
|
direct allocation
|
page read and write
|
||
1D7C000
|
heap
|
page read and write
|
||
D01000
|
heap
|
page read and write
|
||
3D9000
|
heap
|
page read and write
|
||
BAC000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
1D3C000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
1D6E000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
100000
|
trusted library allocation
|
page read and write
|
||
6EA000
|
heap
|
page read and write
|
||
395000
|
heap
|
page read and write
|
||
54F000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
395000
|
heap
|
page read and write
|
||
AB2000
|
unkown
|
page readonly
|
||
4AD000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
672F000
|
stack
|
page read and write
|
||
2AC0000
|
direct allocation
|
page read and write
|
||
1290000
|
unkown
|
page readonly
|
||
28EF000
|
stack
|
page read and write
|
||
1D85000
|
heap
|
page read and write
|
||
679000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
14E000
|
heap
|
page read and write
|
||
1291000
|
unkown
|
page execute read
|
||
670000
|
heap
|
page read and write
|
||
230000
|
trusted library allocation
|
page read and write
|
||
E14000
|
unkown
|
page readonly
|
||
63BE000
|
stack
|
page read and write
|
||
2AAC000
|
unclassified section
|
page execute and read and write
|
||
2D0A000
|
direct allocation
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
371000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
2EF0000
|
direct allocation
|
page read and write
|
||
1D68000
|
heap
|
page read and write
|
||
2E87000
|
direct allocation
|
page read and write
|
||
1D90000
|
direct allocation
|
page read and write
|
||
3C7D000
|
stack
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
20B000
|
stack
|
page read and write
|
||
9D3000
|
heap
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
D41000
|
unkown
|
page execute read
|
||
1D79000
|
heap
|
page read and write
|
||
1D45000
|
heap
|
page read and write
|
||
1D48000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
2B9A000
|
direct allocation
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
10FC000
|
heap
|
page read and write
|
||
130000
|
direct allocation
|
page read and write
|
||
21AE000
|
stack
|
page read and write
|
||
31A8000
|
heap
|
page read and write
|
||
31A8000
|
heap
|
page read and write
|
||
4CE000
|
heap
|
page read and write
|
||
D22000
|
heap
|
page read and write
|
||
474000
|
system
|
page execute and read and write
|
||
88A000
|
heap
|
page read and write
|
||
2614000
|
heap
|
page read and write
|
||
11B3000
|
heap
|
page read and write
|
||
2C10000
|
direct allocation
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
2B9A000
|
direct allocation
|
page read and write
|
||
25C1000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
22E4000
|
heap
|
page read and write
|
||
2BF0000
|
direct allocation
|
page read and write
|
||
68E000
|
heap
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
270000
|
heap
|
page read and write
|
||
1F10000
|
heap
|
page read and write
|
||
62F000
|
heap
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
2D0A000
|
direct allocation
|
page read and write
|
||
31AA000
|
heap
|
page read and write
|
||
1D85000
|
heap
|
page read and write
|
||
C3C000
|
heap
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
270000
|
heap
|
page read and write
|
||
31D2000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
11C2000
|
heap
|
page read and write
|
||
90B000
|
heap
|
page read and write
|
||
257F000
|
stack
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
CF2000
|
heap
|
page read and write
|
||
2E70000
|
direct allocation
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
90B000
|
heap
|
page read and write
|
||
2D0A000
|
direct allocation
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
1EAC000
|
stack
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
1364000
|
unkown
|
page readonly
|
||
2C20000
|
direct allocation
|
page read and write
|
||
1DD2000
|
heap
|
page read and write
|
||
1D97000
|
heap
|
page read and write
|
||
1D4F000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
243E000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
1290000
|
unkown
|
page readonly
|
||
24F000
|
stack
|
page read and write
|
||
260000
|
heap
|
page read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
1D6D000
|
heap
|
page read and write
|
||
1D6D000
|
heap
|
page read and write
|
||
3DB000
|
heap
|
page read and write
|
||
86BE000
|
direct allocation
|
page read and write
|
||
2B9D000
|
direct allocation
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
11E1000
|
heap
|
page read and write
|
||
4D1000
|
heap
|
page read and write
|
||
3231000
|
heap
|
page read and write
|
||
4BE000
|
heap
|
page read and write
|
||
1D76000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
62F000
|
heap
|
page read and write
|
||
107B000
|
heap
|
page read and write
|
||
656E000
|
stack
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
71F000
|
stack
|
page read and write
|
||
273F000
|
stack
|
page read and write
|
||
31DA000
|
heap
|
page read and write
|
||
2C73000
|
unclassified section
|
page execute and read and write
|
||
65F0000
|
heap
|
page read and write
|
||
679000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
9C2000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
6A8000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
31AA000
|
heap
|
page read and write
|
||
11F000
|
stack
|
page read and write
|
||
1D47000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
679000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
368000
|
heap
|
page read and write
|
||
2AC0000
|
direct allocation
|
page read and write
|
||
1DC000
|
stack
|
page read and write
|
||
2E81000
|
direct allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
90BE000
|
direct allocation
|
page read and write
|
||
2B9D000
|
direct allocation
|
page read and write
|
||
2700000
|
trusted library allocation
|
page read and write
|
||
1D8A000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1364000
|
unkown
|
page readonly
|
||
38E0000
|
heap
|
page read and write
|
||
2EF0000
|
direct allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
110000
|
direct allocation
|
page execute and read and write
|
||
2D90000
|
direct allocation
|
page read and write
|
||
3DB000
|
heap
|
page read and write
|
||
2D0D000
|
direct allocation
|
page read and write
|
||
C2C000
|
heap
|
page read and write
|
||
ABC000
|
unkown
|
page read and write
|
||
9F2000
|
heap
|
page read and write
|
||
BAA000
|
heap
|
page read and write
|
||
2E81000
|
direct allocation
|
page read and write
|
||
146000
|
heap
|
page read and write
|
||
657000
|
heap
|
page read and write
|
||
214E000
|
stack
|
page read and write
|
||
10001000
|
direct allocation
|
page execute and read and write
|
||
675000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
2B9D000
|
direct allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
28E000
|
stack
|
page read and write
|
||
2D11000
|
direct allocation
|
page read and write
|
||
639000
|
heap
|
page read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
2AA6000
|
unclassified section
|
page execute and read and write
|
||
3E7000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
2D80000
|
direct allocation
|
page read and write
|
||
28C000
|
heap
|
page read and write
|
||
547000
|
heap
|
page read and write
|
||
1D6D000
|
heap
|
page read and write
|
||
1D5E000
|
stack
|
page read and write
|
||
39E000
|
heap
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
2EF0000
|
direct allocation
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
2C5000
|
heap
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
371000
|
heap
|
page read and write
|
||
2D0D000
|
direct allocation
|
page read and write
|
||
3131000
|
heap
|
page read and write
|
||
2EF0000
|
direct allocation
|
page read and write
|
||
1D79000
|
heap
|
page read and write
|
||
31E000
|
stack
|
page read and write
|
||
20A000
|
stack
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
2E90000
|
direct allocation
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
639000
|
heap
|
page read and write
|
||
1D45000
|
heap
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
2D80000
|
direct allocation
|
page read and write
|
||
2D0D000
|
direct allocation
|
page read and write
|
||
2E84000
|
direct allocation
|
page read and write
|
||
33DB000
|
heap
|
page read and write
|
||
73F000
|
stack
|
page read and write
|
||
91C000
|
heap
|
page read and write
|
||
64F0000
|
heap
|
page read and write
|
||
1D20000
|
heap
|
page read and write
|
||
9F1000
|
unkown
|
page execute read
|
||
69BF000
|
stack
|
page read and write
|
||
3D9000
|
heap
|
page read and write
|
||
2E70000
|
direct allocation
|
page read and write
|
||
13E000
|
stack
|
page read and write
|
||
31AA000
|
heap
|
page read and write
|
||
E14000
|
unkown
|
page readonly
|
||
590000
|
heap
|
page read and write
|
||
ABC000
|
unkown
|
page write copy
|
||
35D000
|
stack
|
page read and write
|
||
2AC0000
|
direct allocation
|
page read and write
|
||
1D6D000
|
heap
|
page read and write
|
||
1D1E000
|
stack
|
page read and write
|
||
AC4000
|
unkown
|
page readonly
|
||
11C3000
|
heap
|
page read and write
|
||
68F000
|
stack
|
page read and write
|
||
261D000
|
heap
|
page read and write
|
||
296E000
|
stack
|
page read and write
|
||
14F000
|
heap
|
page read and write
|
||
146000
|
heap
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
33EB000
|
heap
|
page read and write
|
||
135C000
|
unkown
|
page read and write
|
||
2D0D000
|
direct allocation
|
page read and write
|
||
D40000
|
unkown
|
page readonly
|
||
135C000
|
unkown
|
page write copy
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
3BB000
|
heap
|
page read and write
|
||
3BB000
|
heap
|
page read and write
|
||
3D6000
|
heap
|
page read and write
|
||
2D80000
|
direct allocation
|
page read and write
|
||
3D6000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
690000
|
direct allocation
|
page read and write
|
||
65F000
|
stack
|
page read and write
|
||
2D14000
|
direct allocation
|
page read and write
|
||
88B000
|
heap
|
page read and write
|
||
132C000
|
unkown
|
page readonly
|
||
24AF000
|
stack
|
page read and write
|
||
89B000
|
heap
|
page read and write
|
||
2D80000
|
direct allocation
|
page read and write
|
||
1352000
|
unkown
|
page readonly
|
||
1D6D000
|
heap
|
page read and write
|
||
25C0000
|
trusted library allocation
|
page read and write
|
||
3E7000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
27A000
|
stack
|
page read and write
|
||
68BE000
|
direct allocation
|
page read and write
|
||
1D3C000
|
heap
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
3DF000
|
stack
|
page read and write
|
||
2E81000
|
direct allocation
|
page read and write
|
||
E02000
|
unkown
|
page readonly
|
||
107D000
|
heap
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
673000
|
heap
|
page read and write
|
||
2813000
|
trusted library allocation
|
page read and write
|
||
1352000
|
unkown
|
page readonly
|
||
1114000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
2E84000
|
direct allocation
|
page read and write
|
||
62A000
|
heap
|
page read and write
|
||
2E90000
|
direct allocation
|
page read and write
|
||
2D80000
|
direct allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
2E81000
|
direct allocation
|
page read and write
|
||
2D90000
|
direct allocation
|
page read and write
|
||
1D6D000
|
heap
|
page read and write
|
||
C1C000
|
heap
|
page read and write
|
||
2AC0000
|
direct allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
1E30000
|
unclassified section
|
page execute and read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
9D2000
|
heap
|
page read and write
|
||
2B0000
|
remote allocation
|
page read and write
|
||
2C20000
|
direct allocation
|
page read and write
|
||
2D80000
|
direct allocation
|
page read and write
|
||
AC0000
|
unkown
|
page write copy
|
||
2B9D000
|
direct allocation
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
1E2F000
|
stack
|
page read and write
|
||
BAD000
|
heap
|
page read and write
|
||
478000
|
system
|
page execute and read and write
|
||
1E6B000
|
heap
|
page read and write
|
||
2C20000
|
direct allocation
|
page read and write
|
||
1EC000
|
stack
|
page read and write
|
||
2AF000
|
stack
|
page read and write
|
||
2D17000
|
direct allocation
|
page read and write
|
||
1D49000
|
heap
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
CF3000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
7CBE000
|
direct allocation
|
page read and write
|
||
230000
|
heap
|
page read and write
|
||
6A9000
|
heap
|
page read and write
|
||
2C10000
|
direct allocation
|
page read and write
|
||
10FC000
|
heap
|
page read and write
|
||
DDC000
|
unkown
|
page readonly
|
||
6AD000
|
heap
|
page read and write
|
||
2C10000
|
direct allocation
|
page read and write
|
||
2D14000
|
direct allocation
|
page read and write
|
||
70F000
|
stack
|
page read and write
|
||
6EF000
|
stack
|
page read and write
|
||
70F000
|
stack
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
107C000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
10FC000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
1D6E000
|
heap
|
page read and write
|
||
39E000
|
heap
|
page read and write
|
||
2AC0000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
679000
|
heap
|
page read and write
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
2D0D000
|
direct allocation
|
page read and write
|
||
41F000
|
system
|
page execute and read and write
|
||
2D0000
|
heap
|
page read and write
|
||
2A0000
|
heap
|
page read and write
|
||
CF3000
|
heap
|
page read and write
|
||
16C000
|
stack
|
page read and write
|
||
261C000
|
heap
|
page read and write
|
||
91B000
|
heap
|
page read and write
|
||
2B9D000
|
direct allocation
|
page read and write
|
||
C2B000
|
heap
|
page read and write
|
||
1D3C000
|
heap
|
page read and write
|
||
106C000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
2D80000
|
direct allocation
|
page read and write
|
||
3D6000
|
heap
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
90C000
|
heap
|
page read and write
|
||
224000
|
stack
|
page read and write
|
||
339C000
|
heap
|
page read and write
|
||
212F000
|
stack
|
page read and write
|
||
23A1000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
2D90000
|
direct allocation
|
page read and write
|
||
1DAB000
|
heap
|
page read and write
|
||
88B000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
2E87000
|
direct allocation
|
page read and write
|
||
31AE000
|
heap
|
page read and write
|
||
2D20000
|
direct allocation
|
page read and write
|
||
846000
|
heap
|
page read and write
|
||
4EF000
|
stack
|
page read and write
|
||
39E000
|
heap
|
page read and write
|
||
679000
|
heap
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
2D90000
|
direct allocation
|
page read and write
|
||
54BE000
|
direct allocation
|
page read and write
|
||
242F000
|
stack
|
page read and write
|
||
1D48000
|
heap
|
page read and write
|
||
74F000
|
stack
|
page read and write
|
||
2D11000
|
direct allocation
|
page read and write
|
||
2D00000
|
direct allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
3DB000
|
heap
|
page read and write
|
There are 754 hidden memdumps, click here to show them.