Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
nCBC3f6tz1.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_9d3e772da6c0c3b2ba98571a98f1ccb5316d883_7522e4b5_b13a919c-48d8-47a8-ac20-04e70e997bbc\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c66a12a3cf7201bf6f31cc259909e9e2c78f020_7522e4b5_7d002d39-5284-4d12-ae4d-a51d443037c3\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c66a12a3cf7201bf6f31cc259909e9e2c78f020_7522e4b5_8c7c462f-9bf7-41c5-b513-6f865a843684\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1905.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 17:51:02 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER19E1.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A11.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4390.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 17:51:13 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43CE.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 17:51:13 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER445C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER448B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER449B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER44BA.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\nCBC3f6tz1.dll,BarCreate
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 652
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\nCBC3f6tz1.dll,BarDestroy
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\nCBC3f6tz1.dll,BarFreeRec
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",BarCreate
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",BarDestroy
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",BarFreeRec
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeSetFocus
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeSetDirty
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeResize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkePaint2
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeKillFocus
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeIsDirty
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeInitialize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeGetCaretRect
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeFireMouseWheelEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeFireMouseEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeFireKeyUpEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeFireKeyPressEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeFireKeyDownEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeFireContextMenuEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeFinalize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeDestroyWebView
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",wkeCreateWebView
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",dbkFCallWrapperAddr
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",__dbk_fcall_wrapper
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",TMethodImplementationIntercept
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nCBC3f6tz1.dll",BarRecognize
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7428 -s 640
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7464 -s 640
|
There are 24 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProgramId
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
FileId
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LowerCaseLongPath
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LongPathHash
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Name
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
OriginalFileName
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Publisher
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Version
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinFileVersion
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinaryType
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductName
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductVersion
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LinkDate
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinProductVersion
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageFullName
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Size
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Language
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
IsOsComponent
|
||
\REGISTRY\A\{be8286bd-349b-1096-6a87-694d75482877}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 12 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4CAC000
|
direct allocation
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
42DF000
|
unkown
|
page read and write
|
||
4475000
|
unkown
|
page write copy
|
||
4794000
|
direct allocation
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
45B6000
|
direct allocation
|
page read and write
|
||
37C0000
|
heap
|
page read and write
|
||
478D000
|
direct allocation
|
page read and write
|
||
4CB3000
|
direct allocation
|
page read and write
|
||
4698000
|
direct allocation
|
page read and write
|
||
4408000
|
direct allocation
|
page read and write
|
||
4C48000
|
direct allocation
|
page read and write
|
||
4800000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
4C31000
|
direct allocation
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
4426000
|
direct allocation
|
page read and write
|
||
4652000
|
direct allocation
|
page read and write
|
||
4C38000
|
direct allocation
|
page read and write
|
||
3648000
|
direct allocation
|
page read and write
|
||
4538000
|
direct allocation
|
page read and write
|
||
48D8000
|
direct allocation
|
page read and write
|
||
4C6C000
|
direct allocation
|
page read and write
|
||
4C2A000
|
direct allocation
|
page read and write
|
||
441F000
|
direct allocation
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
4641000
|
direct allocation
|
page read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
45A8000
|
direct allocation
|
page read and write
|
||
4840000
|
heap
|
page read and write
|
||
4C34000
|
direct allocation
|
page read and write
|
||
4451000
|
direct allocation
|
page read and write
|
||
70F000
|
stack
|
page read and write
|
||
D1F000
|
stack
|
page read and write
|
||
4CAA000
|
direct allocation
|
page read and write
|
||
4A6D000
|
direct allocation
|
page read and write
|
||
502D000
|
direct allocation
|
page read and write
|
||
45E8000
|
direct allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
48C8000
|
direct allocation
|
page read and write
|
||
4560000
|
heap
|
page read and write
|
||
4A8A000
|
direct allocation
|
page read and write
|
||
4758000
|
direct allocation
|
page read and write
|
||
4BFA000
|
direct allocation
|
page read and write
|
||
43F2000
|
direct allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
43FA000
|
direct allocation
|
page read and write
|
||
4686000
|
direct allocation
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
53C000
|
stack
|
page read and write
|
||
4683000
|
direct allocation
|
page read and write
|
||
4418000
|
direct allocation
|
page read and write
|
||
4F80000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
45D3000
|
direct allocation
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
443C000
|
direct allocation
|
page read and write
|
||
4C51000
|
direct allocation
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
4434000
|
direct allocation
|
page read and write
|
||
4E3A000
|
direct allocation
|
page read and write
|
||
2994000
|
direct allocation
|
page read and write
|
||
5051000
|
direct allocation
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
504A000
|
direct allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
ACF000
|
stack
|
page read and write
|
||
2978000
|
direct allocation
|
page read and write
|
||
2968000
|
direct allocation
|
page read and write
|
||
4732000
|
direct allocation
|
page read and write
|
||
8BC000
|
stack
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
4F9E000
|
stack
|
page read and write
|
||
4CD6000
|
direct allocation
|
page read and write
|
||
4DA8000
|
direct allocation
|
page read and write
|
||
29B1000
|
direct allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
3660000
|
heap
|
page read and write
|
||
4CB8000
|
direct allocation
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
4CB000
|
stack
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
2986000
|
direct allocation
|
page read and write
|
||
297F000
|
direct allocation
|
page read and write
|
||
44ED000
|
direct allocation
|
page read and write
|
||
4FDF000
|
stack
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
43FA000
|
direct allocation
|
page read and write
|
||
ACF000
|
stack
|
page read and write
|
||
4A48000
|
direct allocation
|
page read and write
|
||
4720000
|
heap
|
page read and write
|
||
478A000
|
direct allocation
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
323C000
|
stack
|
page read and write
|
||
4FB000
|
stack
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
4CDD000
|
direct allocation
|
page read and write
|
||
4852000
|
direct allocation
|
page read and write
|
||
443C000
|
direct allocation
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
4591000
|
direct allocation
|
page read and write
|
||
30C000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
4A32000
|
direct allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
3608000
|
direct allocation
|
page read and write
|
||
522000
|
unkown
|
page readonly
|
||
4598000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7D0000
|
heap
|
page read and write
|
||
295A000
|
direct allocation
|
page read and write
|
||
35E2000
|
direct allocation
|
page read and write
|
||
4C88000
|
direct allocation
|
page read and write
|
||
4D4F000
|
stack
|
page read and write
|
||
48DF000
|
direct allocation
|
page read and write
|
||
4918000
|
direct allocation
|
page read and write
|
||
31AA000
|
heap
|
page read and write
|
||
4C8D000
|
direct allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
299C000
|
direct allocation
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
45E8000
|
direct allocation
|
page read and write
|
||
4451000
|
direct allocation
|
page read and write
|
||
2CB000
|
stack
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
AFF000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
4482000
|
unkown
|
page readonly
|
||
4CEC000
|
direct allocation
|
page read and write
|
||
520000
|
unkown
|
page write copy
|
||
4434000
|
direct allocation
|
page read and write
|
||
51F000
|
unkown
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
4A98000
|
direct allocation
|
page read and write
|
||
43FA000
|
direct allocation
|
page read and write
|
||
4D9A000
|
direct allocation
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
4DA1000
|
direct allocation
|
page read and write
|
||
4C7F000
|
direct allocation
|
page read and write
|
||
D9F000
|
stack
|
page read and write
|
||
44B2000
|
direct allocation
|
page read and write
|
||
45B6000
|
direct allocation
|
page read and write
|
||
489C000
|
direct allocation
|
page read and write
|
||
4C9D000
|
direct allocation
|
page read and write
|
||
4F18000
|
direct allocation
|
page read and write
|
||
4D0A000
|
direct allocation
|
page read and write
|
||
4FFA000
|
direct allocation
|
page read and write
|
||
5110000
|
heap
|
page read and write
|
||
48A3000
|
direct allocation
|
page read and write
|
||
47A3000
|
direct allocation
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
4774000
|
direct allocation
|
page read and write
|
||
310A000
|
heap
|
page read and write
|
||
465F000
|
direct allocation
|
page read and write
|
||
4786000
|
direct allocation
|
page read and write
|
||
4458000
|
direct allocation
|
page read and write
|
||
306B000
|
stack
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
4C01000
|
direct allocation
|
page read and write
|
||
4632000
|
direct allocation
|
page read and write
|
||
2DFC000
|
stack
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
45CC000
|
direct allocation
|
page read and write
|
||
42E5000
|
unkown
|
page write copy
|
||
4B0E000
|
stack
|
page read and write
|
||
2EEA000
|
heap
|
page read and write
|
||
4648000
|
direct allocation
|
page read and write
|
||
4C4F000
|
direct allocation
|
page read and write
|
||
A4F000
|
stack
|
page read and write
|
||
446F000
|
unkown
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
D1B000
|
stack
|
page read and write
|
||
441F000
|
direct allocation
|
page read and write
|
||
4531000
|
direct allocation
|
page read and write
|
||
6DC000
|
stack
|
page read and write
|
||
475A000
|
direct allocation
|
page read and write
|
||
4678000
|
direct allocation
|
page read and write
|
||
3FE000
|
stack
|
page read and write
|
||
465F000
|
direct allocation
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
4C5A000
|
direct allocation
|
page read and write
|
||
46B1000
|
direct allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
C7B000
|
stack
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
4573000
|
direct allocation
|
page read and write
|
||
4E24000
|
direct allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
45CC000
|
direct allocation
|
page read and write
|
||
4691000
|
direct allocation
|
page read and write
|
||
44C8000
|
direct allocation
|
page read and write
|
||
44BA000
|
direct allocation
|
page read and write
|
||
4C22000
|
direct allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
44D8000
|
direct allocation
|
page read and write
|
||
4CC8000
|
direct allocation
|
page read and write
|
||
4D76000
|
direct allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
52C000
|
stack
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
2DFA000
|
heap
|
page read and write
|
||
510000
|
unkown
|
page write copy
|
||
3100000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
468D000
|
direct allocation
|
page read and write
|
||
475F000
|
direct allocation
|
page read and write
|
||
42F0000
|
unkown
|
page write copy
|
||
C6F000
|
stack
|
page read and write
|
||
457A000
|
direct allocation
|
page read and write
|
||
4476000
|
unkown
|
page read and write
|
||
2FC000
|
stack
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
4401000
|
direct allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
4A74000
|
direct allocation
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
4480000
|
unkown
|
page write copy
|
||
33AE000
|
stack
|
page read and write
|
||
4C56000
|
direct allocation
|
page read and write
|
||
4401000
|
direct allocation
|
page read and write
|
||
34DF000
|
stack
|
page read and write
|
||
4D11000
|
direct allocation
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
29AA000
|
direct allocation
|
page read and write
|
||
A7C000
|
stack
|
page read and write
|
||
305B000
|
stack
|
page read and write
|
||
52C000
|
stack
|
page read and write
|
||
4D6F000
|
direct allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
4A41000
|
direct allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
4720000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
31EA000
|
heap
|
page read and write
|
||
43F2000
|
direct allocation
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
||
4886000
|
direct allocation
|
page read and write
|
||
AFB000
|
heap
|
page read and write
|
||
4741000
|
direct allocation
|
page read and write
|
||
4C1F000
|
direct allocation
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
||
4C4A000
|
direct allocation
|
page read and write
|
||
4894000
|
direct allocation
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
503C000
|
direct allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
487F000
|
direct allocation
|
page read and write
|
||
4D18000
|
direct allocation
|
page read and write
|
||
45D3000
|
direct allocation
|
page read and write
|
||
454F000
|
direct allocation
|
page read and write
|
||
349E000
|
stack
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
4C7A000
|
direct allocation
|
page read and write
|
||
51D000
|
unkown
|
page read and write
|
||
45BD000
|
direct allocation
|
page read and write
|
||
4EED000
|
direct allocation
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
4768000
|
direct allocation
|
page read and write
|
||
303C000
|
stack
|
page read and write
|
||
3624000
|
direct allocation
|
page read and write
|
||
2DFB000
|
stack
|
page read and write
|
||
444A000
|
direct allocation
|
page read and write
|
||
4D4A000
|
direct allocation
|
page read and write
|
||
452A000
|
direct allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
327B000
|
stack
|
page read and write
|
||
45A8000
|
direct allocation
|
page read and write
|
||
4A7C000
|
direct allocation
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
467C000
|
direct allocation
|
page read and write
|
||
477C000
|
direct allocation
|
page read and write
|
||
2FFB000
|
stack
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
4EE6000
|
direct allocation
|
page read and write
|
||
335A000
|
heap
|
page read and write
|
||
4CC1000
|
direct allocation
|
page read and write
|
||
4C96000
|
direct allocation
|
page read and write
|
||
4564000
|
direct allocation
|
page read and write
|
||
33DA000
|
heap
|
page read and write
|
||
4E48000
|
direct allocation
|
page read and write
|
||
458A000
|
direct allocation
|
page read and write
|
||
4890000
|
heap
|
page read and write
|
||
4C86000
|
direct allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
4C3C000
|
direct allocation
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
89A000
|
heap
|
page read and write
|
||
73C000
|
stack
|
page read and write
|
||
46B8000
|
direct allocation
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
4443000
|
direct allocation
|
page read and write
|
||
2E8F000
|
stack
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
4D68000
|
direct allocation
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
48C1000
|
direct allocation
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
4EB2000
|
direct allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
485A000
|
direct allocation
|
page read and write
|
||
45A8000
|
direct allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
4911000
|
direct allocation
|
page read and write
|
||
45CC000
|
direct allocation
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
35EA000
|
direct allocation
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
4401000
|
direct allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
36F0000
|
heap
|
page read and write
|
||
468A000
|
direct allocation
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
45B6000
|
direct allocation
|
page read and write
|
||
48AA000
|
direct allocation
|
page read and write
|
||
45E1000
|
direct allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
48F4000
|
direct allocation
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
65B000
|
stack
|
page read and write
|
||
69B000
|
stack
|
page read and write
|
||
CBC000
|
stack
|
page read and write
|
||
45DA000
|
direct allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
79C000
|
stack
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
4F03000
|
direct allocation
|
page read and write
|
||
45D3000
|
direct allocation
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
4EF4000
|
direct allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
4D7D000
|
direct allocation
|
page read and write
|
||
4511000
|
direct allocation
|
page read and write
|
||
4A91000
|
direct allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
42F4000
|
unkown
|
page readonly
|
||
4D4C000
|
direct allocation
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
4694000
|
direct allocation
|
page read and write
|
||
4DF1000
|
direct allocation
|
page read and write
|
||
4591000
|
direct allocation
|
page read and write
|
||
4598000
|
direct allocation
|
page read and write
|
||
95A000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
C9F000
|
stack
|
page read and write
|
||
4CCF000
|
direct allocation
|
page read and write
|
||
45BD000
|
direct allocation
|
page read and write
|
||
44C1000
|
direct allocation
|
page read and write
|
||
8BA000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
41D1000
|
unkown
|
page execute read
|
||
4CBA000
|
direct allocation
|
page read and write
|
||
5090000
|
heap
|
page read and write
|
||
4D53000
|
direct allocation
|
page read and write
|
||
B0F000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
50A0000
|
heap
|
page read and write
|
||
4D44000
|
direct allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
4518000
|
direct allocation
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
3633000
|
direct allocation
|
page read and write
|
||
4C78000
|
direct allocation
|
page read and write
|
||
45E8000
|
direct allocation
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
A7F000
|
stack
|
page read and write
|
||
CAC000
|
stack
|
page read and write
|
||
BEB000
|
stack
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
43F2000
|
direct allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
45C4000
|
direct allocation
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
4D2F000
|
direct allocation
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
4798000
|
direct allocation
|
page read and write
|
||
4878000
|
direct allocation
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
5018000
|
direct allocation
|
page read and write
|
||
4CFA000
|
direct allocation
|
page read and write
|
||
3770000
|
heap
|
page read and write
|
||
C2C000
|
stack
|
page read and write
|
||
50C000
|
stack
|
page read and write
|
||
4D28000
|
direct allocation
|
page read and write
|
||
4A5F000
|
direct allocation
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
45E8000
|
direct allocation
|
page read and write
|
||
4471000
|
unkown
|
page read and write
|
||
4481000
|
unkown
|
page read and write
|
||
4641000
|
direct allocation
|
page read and write
|
||
4A83000
|
direct allocation
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
4591000
|
direct allocation
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
43DF000
|
stack
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
35F8000
|
direct allocation
|
page read and write
|
||
45AF000
|
direct allocation
|
page read and write
|
||
442D000
|
direct allocation
|
page read and write
|
||
29B8000
|
direct allocation
|
page read and write
|
||
458A000
|
direct allocation
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
4ED8000
|
direct allocation
|
page read and write
|
||
4C1F000
|
stack
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
4EC8000
|
direct allocation
|
page read and write
|
||
4D01000
|
direct allocation
|
page read and write
|
||
32BC000
|
stack
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
83B000
|
stack
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
4E41000
|
direct allocation
|
page read and write
|
||
45AF000
|
direct allocation
|
page read and write
|
||
363A000
|
direct allocation
|
page read and write
|
||
4D02000
|
direct allocation
|
page read and write
|
||
4426000
|
direct allocation
|
page read and write
|
||
69C000
|
stack
|
page read and write
|
||
456C000
|
direct allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
48B8000
|
direct allocation
|
page read and write
|
||
356A000
|
heap
|
page read and write
|
||
5034000
|
direct allocation
|
page read and write
|
||
30AC000
|
stack
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
4766000
|
direct allocation
|
page read and write
|
||
4434000
|
direct allocation
|
page read and write
|
||
4EC1000
|
direct allocation
|
page read and write
|
||
4598000
|
direct allocation
|
page read and write
|
||
2FEC000
|
stack
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
307A000
|
heap
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
3641000
|
direct allocation
|
page read and write
|
||
C6B000
|
stack
|
page read and write
|
||
45C0000
|
heap
|
page read and write
|
||
103F000
|
stack
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
8AE000
|
stack
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
4C71000
|
direct allocation
|
page read and write
|
||
333A000
|
heap
|
page read and write
|
||
4674000
|
direct allocation
|
page read and write
|
||
4458000
|
direct allocation
|
page read and write
|
||
495F000
|
stack
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
443C000
|
direct allocation
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
69C000
|
stack
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
4D58000
|
direct allocation
|
page read and write
|
||
CEF000
|
stack
|
page read and write
|
||
466D000
|
direct allocation
|
page read and write
|
||
4581000
|
direct allocation
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
45E1000
|
direct allocation
|
page read and write
|
||
4E2C000
|
direct allocation
|
page read and write
|
||
8CE000
|
stack
|
page read and write
|
||
4470000
|
unkown
|
page write copy
|
||
4522000
|
direct allocation
|
page read and write
|
||
4361000
|
unkown
|
page execute read
|
||
4484000
|
unkown
|
page readonly
|
||
4C08000
|
direct allocation
|
page read and write
|
||
4CB1000
|
direct allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
4C81000
|
direct allocation
|
page read and write
|
||
4A00000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
45AF000
|
direct allocation
|
page read and write
|
||
4D84000
|
direct allocation
|
page read and write
|
||
4658000
|
direct allocation
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
4CB1000
|
direct allocation
|
page read and write
|
||
4666000
|
direct allocation
|
page read and write
|
||
4443000
|
direct allocation
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
4408000
|
direct allocation
|
page read and write
|
||
45E1000
|
direct allocation
|
page read and write
|
||
50F000
|
unkown
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
4CA2000
|
direct allocation
|
page read and write
|
||
518000
|
unkown
|
page read and write
|
||
3616000
|
direct allocation
|
page read and write
|
||
4B7F000
|
stack
|
page read and write
|
||
45C4000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
710000
|
heap
|
page read and write
|
||
4582000
|
direct allocation
|
page read and write
|
||
4810000
|
heap
|
page read and write
|
||
4658000
|
direct allocation
|
page read and write
|
||
75B000
|
stack
|
page read and write
|
||
44F4000
|
direct allocation
|
page read and write
|
||
4418000
|
direct allocation
|
page read and write
|
||
4761000
|
direct allocation
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
D6F000
|
stack
|
page read and write
|
||
323C000
|
stack
|
page read and write
|
||
4CA3000
|
direct allocation
|
page read and write
|
||
4C94000
|
direct allocation
|
page read and write
|
||
441F000
|
direct allocation
|
page read and write
|
||
444A000
|
direct allocation
|
page read and write
|
||
B8F000
|
stack
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
468A000
|
direct allocation
|
page read and write
|
||
4752000
|
direct allocation
|
page read and write
|
||
D5F000
|
stack
|
page read and write
|
||
467C000
|
direct allocation
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
4582000
|
direct allocation
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
4E08000
|
direct allocation
|
page read and write
|
||
4588000
|
direct allocation
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
4458000
|
direct allocation
|
page read and write
|
||
4CE4000
|
direct allocation
|
page read and write
|
||
45AF000
|
direct allocation
|
page read and write
|
||
4E90000
|
heap
|
page read and write
|
||
467F000
|
direct allocation
|
page read and write
|
||
4791000
|
direct allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
4CB8000
|
direct allocation
|
page read and write
|
||
4691000
|
direct allocation
|
page read and write
|
||
4C58000
|
direct allocation
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
4598000
|
direct allocation
|
page read and write
|
||
4CAA000
|
direct allocation
|
page read and write
|
||
45BD000
|
direct allocation
|
page read and write
|
||
4E33000
|
direct allocation
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
360F000
|
direct allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
4C62000
|
direct allocation
|
page read and write
|
||
5DC000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
4683000
|
direct allocation
|
page read and write
|
||
447F000
|
unkown
|
page read and write
|
||
488D000
|
direct allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
4880000
|
heap
|
page read and write
|
||
46AA000
|
direct allocation
|
page read and write
|
||
4443000
|
direct allocation
|
page read and write
|
||
463A000
|
direct allocation
|
page read and write
|
||
CCF000
|
stack
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
4C26000
|
direct allocation
|
page read and write
|
||
44DF000
|
direct allocation
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
458A000
|
direct allocation
|
page read and write
|
||
5008000
|
direct allocation
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
4783000
|
direct allocation
|
page read and write
|
||
48E6000
|
direct allocation
|
page read and write
|
||
4E8F000
|
stack
|
page read and write
|
||
4C5D000
|
direct allocation
|
page read and write
|
||
4C9C000
|
direct allocation
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
442D000
|
direct allocation
|
page read and write
|
||
70C000
|
stack
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
440E000
|
stack
|
page read and write
|
||
513000
|
unkown
|
page write copy
|
||
81A000
|
heap
|
page read and write
|
||
D5C000
|
stack
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
59B000
|
stack
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
4E4F000
|
stack
|
page read and write
|
||
329A000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
4EDF000
|
direct allocation
|
page read and write
|
||
490A000
|
direct allocation
|
page read and write
|
||
4A66000
|
direct allocation
|
page read and write
|
||
47B8000
|
direct allocation
|
page read and write
|
||
473A000
|
direct allocation
|
page read and write
|
||
45DA000
|
direct allocation
|
page read and write
|
||
4426000
|
direct allocation
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
45C4000
|
direct allocation
|
page read and write
|
||
4DE2000
|
direct allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
4C78000
|
direct allocation
|
page read and write
|
||
4648000
|
direct allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
4D5A000
|
direct allocation
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
4EB000
|
stack
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
309C000
|
stack
|
page read and write
|
||
45D3000
|
direct allocation
|
page read and write
|
||
48FC000
|
direct allocation
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
4582000
|
direct allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
C9F000
|
stack
|
page read and write
|
||
9CB000
|
stack
|
page read and write
|
||
4698000
|
direct allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
44E6000
|
direct allocation
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
4850000
|
heap
|
page read and write
|
||
361D000
|
direct allocation
|
page read and write
|
||
479C000
|
direct allocation
|
page read and write
|
||
5026000
|
direct allocation
|
page read and write
|
||
4A3A000
|
direct allocation
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
4D36000
|
direct allocation
|
page read and write
|
||
45E1000
|
direct allocation
|
page read and write
|
||
65B000
|
stack
|
page read and write
|
||
4C88000
|
direct allocation
|
page read and write
|
||
5043000
|
direct allocation
|
page read and write
|
||
4668000
|
direct allocation
|
page read and write
|
||
86F000
|
stack
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
4674000
|
direct allocation
|
page read and write
|
||
4C2D000
|
direct allocation
|
page read and write
|
||
2952000
|
direct allocation
|
page read and write
|
||
4C68000
|
direct allocation
|
page read and write
|
||
298D000
|
direct allocation
|
page read and write
|
||
47AA000
|
direct allocation
|
page read and write
|
||
469C000
|
direct allocation
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
45CC000
|
direct allocation
|
page read and write
|
||
45DA000
|
direct allocation
|
page read and write
|
||
42F1000
|
unkown
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
4C6A000
|
direct allocation
|
page read and write
|
||
4748000
|
direct allocation
|
page read and write
|
||
4C64000
|
direct allocation
|
page read and write
|
||
6FB000
|
stack
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
4BF2000
|
direct allocation
|
page read and write
|
||
4591000
|
direct allocation
|
page read and write
|
||
D4F000
|
stack
|
page read and write
|
||
48B1000
|
direct allocation
|
page read and write
|
||
4D3B000
|
direct allocation
|
page read and write
|
||
D8B000
|
stack
|
page read and write
|
||
4930000
|
heap
|
page read and write
|
||
4E1D000
|
direct allocation
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
4C8F000
|
direct allocation
|
page read and write
|
||
48ED000
|
direct allocation
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
447D000
|
unkown
|
page read and write
|
||
521000
|
unkown
|
page read and write
|
||
4DEA000
|
direct allocation
|
page read and write
|
||
4E16000
|
direct allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
47B1000
|
direct allocation
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
4408000
|
direct allocation
|
page read and write
|
||
C7A000
|
heap
|
page read and write
|
||
42E1000
|
unkown
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
3530000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
4CA4000
|
direct allocation
|
page read and write
|
||
6CB000
|
stack
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
4D3D000
|
direct allocation
|
page read and write
|
||
4E0F000
|
direct allocation
|
page read and write
|
||
2961000
|
direct allocation
|
page read and write
|
||
4418000
|
direct allocation
|
page read and write
|
||
4C73000
|
direct allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
4C18000
|
direct allocation
|
page read and write
|
||
4D51000
|
direct allocation
|
page read and write
|
||
86E000
|
stack
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
463A000
|
direct allocation
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
459E000
|
stack
|
page read and write
|
||
318A000
|
heap
|
page read and write
|
||
4903000
|
direct allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
4D61000
|
direct allocation
|
page read and write
|
||
476D000
|
direct allocation
|
page read and write
|
||
42ED000
|
unkown
|
page read and write
|
||
46A3000
|
direct allocation
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
45A8000
|
direct allocation
|
page read and write
|
||
501F000
|
direct allocation
|
page read and write
|
||
45B6000
|
direct allocation
|
page read and write
|
||
45DF000
|
stack
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
4632000
|
direct allocation
|
page read and write
|
||
5058000
|
direct allocation
|
page read and write
|
||
444A000
|
direct allocation
|
page read and write
|
||
45DA000
|
direct allocation
|
page read and write
|
||
4556000
|
direct allocation
|
page read and write
|
||
4DF8000
|
direct allocation
|
page read and write
|
||
42E6000
|
unkown
|
page read and write
|
||
4F11000
|
direct allocation
|
page read and write
|
||
4C43000
|
direct allocation
|
page read and write
|
||
4D93000
|
direct allocation
|
page read and write
|
||
4D68000
|
direct allocation
|
page read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
4F0A000
|
direct allocation
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
4CC8000
|
direct allocation
|
page read and write
|
||
4778000
|
direct allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
44FC000
|
direct allocation
|
page read and write
|
||
4EFC000
|
direct allocation
|
page read and write
|
||
35F1000
|
direct allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
4EBA000
|
direct allocation
|
page read and write
|
||
328A000
|
heap
|
page read and write
|
||
2BB000
|
stack
|
page read and write
|
||
4A58000
|
direct allocation
|
page read and write
|
||
5001000
|
direct allocation
|
page read and write
|
||
87C000
|
stack
|
page read and write
|
||
42E0000
|
unkown
|
page write copy
|
||
30B0000
|
heap
|
page read and write
|
||
4503000
|
direct allocation
|
page read and write
|
||
465A000
|
direct allocation
|
page read and write
|
||
450A000
|
direct allocation
|
page read and write
|
||
4582000
|
direct allocation
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
87B000
|
stack
|
page read and write
|
||
511000
|
unkown
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
4548000
|
direct allocation
|
page read and write
|
||
4FF2000
|
direct allocation
|
page read and write
|
||
455D000
|
direct allocation
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
A3B000
|
stack
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
458A000
|
direct allocation
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
42EF000
|
unkown
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
45BD000
|
direct allocation
|
page read and write
|
||
42F2000
|
unkown
|
page readonly
|
||
8E0000
|
heap
|
page read and write
|
||
2FEB000
|
stack
|
page read and write
|
||
45C4000
|
direct allocation
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
ACA000
|
heap
|
page read and write
|
||
8FA000
|
heap
|
page read and write
|
||
29A3000
|
direct allocation
|
page read and write
|
||
2FAB000
|
stack
|
page read and write
|
||
4CF3000
|
direct allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
442D000
|
direct allocation
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
48BA000
|
direct allocation
|
page read and write
|
||
4360000
|
unkown
|
page readonly
|
||
477F000
|
direct allocation
|
page read and write
|
||
4861000
|
direct allocation
|
page read and write
|
||
4868000
|
direct allocation
|
page read and write
|
||
C8F000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
4C52000
|
direct allocation
|
page read and write
|
||
47DF000
|
stack
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
4451000
|
direct allocation
|
page read and write
|
||
41D0000
|
unkown
|
page readonly
|
||
3250000
|
heap
|
page read and write
|
||
6FA000
|
heap
|
page read and write
|
||
4D8C000
|
direct allocation
|
page read and write
|
||
466D000
|
direct allocation
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
2EEA000
|
heap
|
page read and write
|
||
362C000
|
direct allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
48AB000
|
direct allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
4C61000
|
direct allocation
|
page read and write
|
||
4661000
|
direct allocation
|
page read and write
|
||
524000
|
unkown
|
page readonly
|
||
4666000
|
direct allocation
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
There are 818 hidden memdumps, click here to show them.