Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
y2WSfG9g8W.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_2129def29827316c53fa9262167235f70c4ed97_7522e4b5_8e2d9f83-882f-46d0-afb1-35170efa58d3\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_e0abdff3bd5dbbcc6e35e11a1c7aa362b1b4caa9_7522e4b5_791ed9c4-594e-4462-b830-7a8b482104f0\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_e0abdff3bd5dbbcc6e35e11a1c7aa362b1b4caa9_7522e4b5_9c1f6d5c-8190-42b3-9ff4-ecf9ba67352f\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9A59.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 17:52:22 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9EA0.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9EC0.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC513.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 17:52:32 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC551.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 17:52:32 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC5FE.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC64C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC65D.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC6BA.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\y2WSfG9g8W.dll,BarCreate
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7676 -s 648
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\y2WSfG9g8W.dll,BarDestroy
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\y2WSfG9g8W.dll,BarFreeRec
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",BarCreate
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",BarDestroy
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",BarFreeRec
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeSetFocus
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeSetDirty
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeResize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkePaint2
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeKillFocus
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeIsDirty
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeInitialize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeGetCaretRect
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeFireMouseWheelEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeFireMouseEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeFireKeyUpEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeFireKeyPressEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeFireKeyDownEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeFireContextMenuEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeFinalize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeDestroyWebView
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",wkeCreateWebView
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",dbkFCallWrapperAddr
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",__dbk_fcall_wrapper
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",TMethodImplementationIntercept
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\y2WSfG9g8W.dll",BarRecognize
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7340 -s 648
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 640
|
There are 24 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
time.windows.com
|
unknown
|
||
206.23.85.13.in-addr.arpa
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProgramId
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
FileId
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LowerCaseLongPath
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LongPathHash
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Name
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
OriginalFileName
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Publisher
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Version
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinFileVersion
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinaryType
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductName
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductVersion
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LinkDate
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinProductVersion
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageFullName
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Size
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Language
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
IsOsComponent
|
||
\REGISTRY\A\{4b3602e0-0868-8829-f78c-c2988109f087}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 12 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4142000
|
direct allocation
|
page read and write
|
||
43A8000
|
direct allocation
|
page read and write
|
||
40FF000
|
direct allocation
|
page read and write
|
||
4BAA000
|
direct allocation
|
page read and write
|
||
34EC000
|
direct allocation
|
page read and write
|
||
498A000
|
direct allocation
|
page read and write
|
||
4744000
|
direct allocation
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
4658000
|
direct allocation
|
page read and write
|
||
261A000
|
heap
|
page read and write
|
||
30AA000
|
heap
|
page read and write
|
||
285B000
|
stack
|
page read and write
|
||
40E8000
|
direct allocation
|
page read and write
|
||
4C88000
|
direct allocation
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
2F4A000
|
heap
|
page read and write
|
||
289C000
|
stack
|
page read and write
|
||
25BF000
|
stack
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
48AD000
|
direct allocation
|
page read and write
|
||
47FD000
|
direct allocation
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
4C56000
|
direct allocation
|
page read and write
|
||
2BE1000
|
direct allocation
|
page read and write
|
||
486C000
|
direct allocation
|
page read and write
|
||
266A000
|
heap
|
page read and write
|
||
49A0000
|
heap
|
page read and write
|
||
21C0000
|
heap
|
page read and write
|
||
3F1F000
|
stack
|
page read and write
|
||
4418000
|
direct allocation
|
page read and write
|
||
41C8000
|
direct allocation
|
page read and write
|
||
42B6000
|
unkown
|
page read and write
|
||
4DC8000
|
direct allocation
|
page read and write
|
||
4558000
|
direct allocation
|
page read and write
|
||
4AC2000
|
direct allocation
|
page read and write
|
||
44FA000
|
direct allocation
|
page read and write
|
||
440C000
|
direct allocation
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
2BAF000
|
direct allocation
|
page read and write
|
||
522000
|
unkown
|
page readonly
|
||
2E0E000
|
stack
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
4888000
|
direct allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
487A000
|
direct allocation
|
page read and write
|
||
4D88000
|
direct allocation
|
page read and write
|
||
4AF6000
|
direct allocation
|
page read and write
|
||
43B2000
|
direct allocation
|
page read and write
|
||
4711000
|
direct allocation
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
4C08000
|
direct allocation
|
page read and write
|
||
21B0000
|
heap
|
page read and write
|
||
451A000
|
direct allocation
|
page read and write
|
||
4C73000
|
direct allocation
|
page read and write
|
||
4804000
|
direct allocation
|
page read and write
|
||
2D9A000
|
heap
|
page read and write
|
||
4AD3000
|
direct allocation
|
page read and write
|
||
4BC8000
|
direct allocation
|
page read and write
|
||
4991000
|
direct allocation
|
page read and write
|
||
2B91000
|
direct allocation
|
page read and write
|
||
4428000
|
direct allocation
|
page read and write
|
||
4DC1000
|
direct allocation
|
page read and write
|
||
4528000
|
direct allocation
|
page read and write
|
||
260E000
|
stack
|
page read and write
|
||
4848000
|
direct allocation
|
page read and write
|
||
41C2000
|
direct allocation
|
page read and write
|
||
4680000
|
heap
|
page read and write
|
||
4E4F000
|
stack
|
page read and write
|
||
32BA000
|
heap
|
page read and write
|
||
455C000
|
direct allocation
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
4BEC000
|
direct allocation
|
page read and write
|
||
455F000
|
direct allocation
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
46FA000
|
direct allocation
|
page read and write
|
||
34F3000
|
direct allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
4D8F000
|
direct allocation
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
524000
|
unkown
|
page readonly
|
||
4551000
|
direct allocation
|
page read and write
|
||
4702000
|
direct allocation
|
page read and write
|
||
487A000
|
direct allocation
|
page read and write
|
||
24CB000
|
stack
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
4734000
|
direct allocation
|
page read and write
|
||
50F000
|
unkown
|
page read and write
|
||
43DD000
|
direct allocation
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
30E8000
|
direct allocation
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
42BD000
|
unkown
|
page read and write
|
||
4534000
|
direct allocation
|
page read and write
|
||
2C7C000
|
stack
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
4563000
|
direct allocation
|
page read and write
|
||
4B28000
|
direct allocation
|
page read and write
|
||
43C2000
|
direct allocation
|
page read and write
|
||
272F000
|
stack
|
page read and write
|
||
4540000
|
heap
|
page read and write
|
||
4344000
|
direct allocation
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
303A000
|
heap
|
page read and write
|
||
295F000
|
stack
|
page read and write
|
||
4B1A000
|
direct allocation
|
page read and write
|
||
43FD000
|
direct allocation
|
page read and write
|
||
268B000
|
stack
|
page read and write
|
||
276F000
|
stack
|
page read and write
|
||
234C000
|
stack
|
page read and write
|
||
2B8B000
|
stack
|
page read and write
|
||
4404000
|
direct allocation
|
page read and write
|
||
214B000
|
stack
|
page read and write
|
||
2BCC000
|
stack
|
page read and write
|
||
43F4000
|
direct allocation
|
page read and write
|
||
4718000
|
direct allocation
|
page read and write
|
||
34A2000
|
direct allocation
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
4541000
|
direct allocation
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
290A000
|
heap
|
page read and write
|
||
4BB8000
|
direct allocation
|
page read and write
|
||
47E8000
|
direct allocation
|
page read and write
|
||
4ADA000
|
direct allocation
|
page read and write
|
||
520000
|
unkown
|
page write copy
|
||
27AC000
|
stack
|
page read and write
|
||
34D6000
|
direct allocation
|
page read and write
|
||
4641000
|
direct allocation
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
471F000
|
direct allocation
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
462B000
|
direct allocation
|
page read and write
|
||
4D9D000
|
direct allocation
|
page read and write
|
||
2A9C000
|
stack
|
page read and write
|
||
417D000
|
direct allocation
|
page read and write
|
||
4400000
|
heap
|
page read and write
|
||
4C22000
|
direct allocation
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
4336000
|
direct allocation
|
page read and write
|
||
42AF000
|
unkown
|
page read and write
|
||
34AA000
|
direct allocation
|
page read and write
|
||
4DBA000
|
direct allocation
|
page read and write
|
||
34DD000
|
direct allocation
|
page read and write
|
||
297A000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
412A000
|
direct allocation
|
page read and write
|
||
4106000
|
direct allocation
|
page read and write
|
||
4D40000
|
heap
|
page read and write
|
||
295B000
|
stack
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
21EC000
|
stack
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
41BA000
|
direct allocation
|
page read and write
|
||
4342000
|
direct allocation
|
page read and write
|
||
2B1B000
|
stack
|
page read and write
|
||
27EF000
|
stack
|
page read and write
|
||
4538000
|
direct allocation
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
452D000
|
direct allocation
|
page read and write
|
||
474A000
|
direct allocation
|
page read and write
|
||
4590000
|
heap
|
page read and write
|
||
4AC4000
|
direct allocation
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
30EF000
|
direct allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
4526000
|
direct allocation
|
page read and write
|
||
263B000
|
stack
|
page read and write
|
||
23C0000
|
heap
|
page read and write
|
||
453C000
|
direct allocation
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
434C000
|
direct allocation
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
41C1000
|
direct allocation
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
41A1000
|
direct allocation
|
page read and write
|
||
2DFC000
|
stack
|
page read and write
|
||
310C000
|
direct allocation
|
page read and write
|
||
249C000
|
stack
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
4831000
|
direct allocation
|
page read and write
|
||
4114000
|
direct allocation
|
page read and write
|
||
34B1000
|
direct allocation
|
page read and write
|
||
473C000
|
direct allocation
|
page read and write
|
||
27BA000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
4168000
|
direct allocation
|
page read and write
|
||
4ACA000
|
direct allocation
|
page read and write
|
||
25CE000
|
stack
|
page read and write
|
||
4151000
|
direct allocation
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
4838000
|
direct allocation
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
438C000
|
direct allocation
|
page read and write
|
||
23DC000
|
stack
|
page read and write
|
||
456D000
|
direct allocation
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
2BC4000
|
direct allocation
|
page read and write
|
||
2580000
|
heap
|
page read and write
|
||
4BE4000
|
direct allocation
|
page read and write
|
||
43B1000
|
direct allocation
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
458F000
|
stack
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
45D0000
|
heap
|
page read and write
|
||
230B000
|
stack
|
page read and write
|
||
454D000
|
direct allocation
|
page read and write
|
||
4302000
|
direct allocation
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
4574000
|
direct allocation
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
2530000
|
heap
|
page read and write
|
||
4B04000
|
direct allocation
|
page read and write
|
||
48C3000
|
direct allocation
|
page read and write
|
||
4158000
|
direct allocation
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
30C2000
|
direct allocation
|
page read and write
|
||
418C000
|
direct allocation
|
page read and write
|
||
42C1000
|
unkown
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
43FC000
|
direct allocation
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
49BD000
|
direct allocation
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
4B2A000
|
direct allocation
|
page read and write
|
||
34B8000
|
direct allocation
|
page read and write
|
||
4728000
|
direct allocation
|
page read and write
|
||
4881000
|
direct allocation
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
4872000
|
direct allocation
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
51F000
|
unkown
|
page read and write
|
||
4701000
|
direct allocation
|
page read and write
|
||
30D1000
|
direct allocation
|
page read and write
|
||
4DB3000
|
direct allocation
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
40D2000
|
direct allocation
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
4C38000
|
direct allocation
|
page read and write
|
||
34C8000
|
direct allocation
|
page read and write
|
||
4850000
|
heap
|
page read and write
|
||
43D8000
|
direct allocation
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
4720000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
480C000
|
direct allocation
|
page read and write
|
||
4ABD000
|
direct allocation
|
page read and write
|
||
10BF000
|
stack
|
page read and write
|
||
44F2000
|
direct allocation
|
page read and write
|
||
4C81000
|
direct allocation
|
page read and write
|
||
8CC000
|
stack
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
4C01000
|
direct allocation
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
4828000
|
direct allocation
|
page read and write
|
||
40F8000
|
direct allocation
|
page read and write
|
||
4AD1000
|
direct allocation
|
page read and write
|
||
239B000
|
stack
|
page read and write
|
||
437D000
|
direct allocation
|
page read and write
|
||
521000
|
unkown
|
page read and write
|
||
472F000
|
direct allocation
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
524000
|
unkown
|
page readonly
|
||
2840000
|
heap
|
page read and write
|
||
34FA000
|
direct allocation
|
page read and write
|
||
C5F000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
42C0000
|
unkown
|
page write copy
|
||
41AC000
|
direct allocation
|
page read and write
|
||
475A000
|
direct allocation
|
page read and write
|
||
26B0000
|
heap
|
page read and write
|
||
4AA8000
|
direct allocation
|
page read and write
|
||
274E000
|
stack
|
page read and write
|
||
3501000
|
direct allocation
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
30D8000
|
direct allocation
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
4708000
|
direct allocation
|
page read and write
|
||
2650000
|
heap
|
page read and write
|
||
520000
|
unkown
|
page write copy
|
||
4554000
|
direct allocation
|
page read and write
|
||
32EA000
|
heap
|
page read and write
|
||
4D40000
|
heap
|
page read and write
|
||
41CA000
|
direct allocation
|
page read and write
|
||
2D4B000
|
stack
|
page read and write
|
||
283A000
|
heap
|
page read and write
|
||
25FE000
|
stack
|
page read and write
|
||
4B14000
|
direct allocation
|
page read and write
|
||
2C7B000
|
stack
|
page read and write
|
||
4413000
|
direct allocation
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
2BD3000
|
direct allocation
|
page read and write
|
||
2B8A000
|
direct allocation
|
page read and write
|
||
495F000
|
stack
|
page read and write
|
||
245B000
|
stack
|
page read and write
|
||
250E000
|
stack
|
page read and write
|
||
4761000
|
direct allocation
|
page read and write
|
||
4AE8000
|
direct allocation
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
4DA4000
|
direct allocation
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
4361000
|
direct allocation
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
4558000
|
direct allocation
|
page read and write
|
||
4751000
|
direct allocation
|
page read and write
|
||
43C0000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
48D1000
|
direct allocation
|
page read and write
|
||
463A000
|
direct allocation
|
page read and write
|
||
48BC000
|
direct allocation
|
page read and write
|
||
419D000
|
direct allocation
|
page read and write
|
||
4D3F000
|
stack
|
page read and write
|
||
43CF000
|
direct allocation
|
page read and write
|
||
43AA000
|
direct allocation
|
page read and write
|
||
511000
|
unkown
|
page read and write
|
||
2E3B000
|
stack
|
page read and write
|
||
4898000
|
direct allocation
|
page read and write
|
||
48B4000
|
direct allocation
|
page read and write
|
||
4384000
|
direct allocation
|
page read and write
|
||
48CA000
|
direct allocation
|
page read and write
|
||
4B21000
|
direct allocation
|
page read and write
|
||
250C000
|
stack
|
page read and write
|
||
C5B000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
4123000
|
direct allocation
|
page read and write
|
||
4196000
|
direct allocation
|
page read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
30F6000
|
direct allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
4753000
|
direct allocation
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
48D8000
|
direct allocation
|
page read and write
|
||
43A2000
|
direct allocation
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
4A1F000
|
stack
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
4358000
|
direct allocation
|
page read and write
|
||
4C48000
|
direct allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
28FA000
|
heap
|
page read and write
|
||
40E1000
|
direct allocation
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
2D1B000
|
stack
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
2CEA000
|
heap
|
page read and write
|
||
32DA000
|
heap
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
4B9B000
|
direct allocation
|
page read and write
|
||
4B23000
|
direct allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
294F000
|
stack
|
page read and write
|
||
4D78000
|
direct allocation
|
page read and write
|
||
42B5000
|
unkown
|
page write copy
|
||
4AEF000
|
direct allocation
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
4460000
|
heap
|
page read and write
|
||
4D6A000
|
direct allocation
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
26C0000
|
heap
|
page read and write
|
||
4C6C000
|
direct allocation
|
page read and write
|
||
2B5C000
|
stack
|
page read and write
|
||
47F6000
|
direct allocation
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
51D000
|
unkown
|
page read and write
|
||
4D62000
|
direct allocation
|
page read and write
|
||
4421000
|
direct allocation
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
4BCF000
|
direct allocation
|
page read and write
|
||
484F000
|
direct allocation
|
page read and write
|
||
414A000
|
direct allocation
|
page read and write
|
||
4743000
|
direct allocation
|
page read and write
|
||
27AE000
|
stack
|
page read and write
|
||
42C4000
|
unkown
|
page readonly
|
||
47D1000
|
direct allocation
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
2BB6000
|
direct allocation
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
43D8000
|
direct allocation
|
page read and write
|
||
430A000
|
direct allocation
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
436F000
|
direct allocation
|
page read and write
|
||
30FD000
|
direct allocation
|
page read and write
|
||
472D000
|
direct allocation
|
page read and write
|
||
4184000
|
direct allocation
|
page read and write
|
||
2F4C000
|
stack
|
page read and write
|
||
47EF000
|
direct allocation
|
page read and write
|
||
456A000
|
direct allocation
|
page read and write
|
||
43CA000
|
direct allocation
|
page read and write
|
||
4ACC000
|
direct allocation
|
page read and write
|
||
258F000
|
stack
|
page read and write
|
||
455F000
|
stack
|
page read and write
|
||
2DFA000
|
heap
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
4368000
|
direct allocation
|
page read and write
|
||
451F000
|
direct allocation
|
page read and write
|
||
481A000
|
direct allocation
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
4543000
|
direct allocation
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
2E5B000
|
stack
|
page read and write
|
||
34CF000
|
direct allocation
|
page read and write
|
||
21EB000
|
stack
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
4AFD000
|
direct allocation
|
page read and write
|
||
26CC000
|
stack
|
page read and write
|
||
522000
|
unkown
|
page readonly
|
||
4193000
|
direct allocation
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
43EF000
|
direct allocation
|
page read and write
|
||
2BA8000
|
direct allocation
|
page read and write
|
||
9CC000
|
stack
|
page read and write
|
||
42BF000
|
unkown
|
page read and write
|
||
4AE8000
|
direct allocation
|
page read and write
|
||
41A1000
|
unkown
|
page execute read
|
||
26EE000
|
stack
|
page read and write
|
||
51D000
|
unkown
|
page read and write
|
||
42B0000
|
unkown
|
page write copy
|
||
3220000
|
heap
|
page read and write
|
||
43ED000
|
direct allocation
|
page read and write
|
||
4856000
|
direct allocation
|
page read and write
|
||
4578000
|
direct allocation
|
page read and write
|
||
282A000
|
heap
|
page read and write
|
||
4B0D000
|
direct allocation
|
page read and write
|
||
4368000
|
direct allocation
|
page read and write
|
||
4BDD000
|
direct allocation
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
2E9C000
|
stack
|
page read and write
|
||
47CA000
|
direct allocation
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
4376000
|
direct allocation
|
page read and write
|
||
410D000
|
direct allocation
|
page read and write
|
||
518000
|
unkown
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
42B1000
|
unkown
|
page read and write
|
||
30CA000
|
direct allocation
|
page read and write
|
||
4131000
|
direct allocation
|
page read and write
|
||
4512000
|
direct allocation
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
45B0000
|
heap
|
page read and write
|
||
4BB1000
|
direct allocation
|
page read and write
|
||
49AF000
|
direct allocation
|
page read and write
|
||
4C31000
|
direct allocation
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
4AAF000
|
direct allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
485D000
|
direct allocation
|
page read and write
|
||
21AB000
|
stack
|
page read and write
|
||
4873000
|
direct allocation
|
page read and write
|
||
433D000
|
direct allocation
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
454A000
|
direct allocation
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
48A6000
|
direct allocation
|
page read and write
|
||
4548000
|
direct allocation
|
page read and write
|
||
417F000
|
stack
|
page read and write
|
||
411C000
|
direct allocation
|
page read and write
|
||
43D1000
|
direct allocation
|
page read and write
|
||
4162000
|
direct allocation
|
page read and write
|
||
4C2A000
|
direct allocation
|
page read and write
|
||
27DA000
|
heap
|
page read and write
|
||
269F000
|
stack
|
page read and write
|
||
267C000
|
stack
|
page read and write
|
||
23FC000
|
stack
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
47D8000
|
direct allocation
|
page read and write
|
||
43C8000
|
direct allocation
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
479F000
|
stack
|
page read and write
|
||
4566000
|
direct allocation
|
page read and write
|
||
4583000
|
direct allocation
|
page read and write
|
||
4C7A000
|
direct allocation
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
2E7C000
|
stack
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
4AD2000
|
direct allocation
|
page read and write
|
||
434A000
|
direct allocation
|
page read and write
|
||
40DA000
|
direct allocation
|
page read and write
|
||
27EF000
|
stack
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
4138000
|
direct allocation
|
page read and write
|
||
34E4000
|
direct allocation
|
page read and write
|
||
489F000
|
direct allocation
|
page read and write
|
||
4C48000
|
direct allocation
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
4C64000
|
direct allocation
|
page read and write
|
||
43BA000
|
direct allocation
|
page read and write
|
||
432F000
|
direct allocation
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
4758000
|
direct allocation
|
page read and write
|
||
2D8C000
|
stack
|
page read and write
|
||
2F0B000
|
stack
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
49EF000
|
stack
|
page read and write
|
||
2640000
|
heap
|
page read and write
|
||
482A000
|
direct allocation
|
page read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
4176000
|
direct allocation
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
4D71000
|
direct allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
4C2A000
|
direct allocation
|
page read and write
|
||
27AE000
|
stack
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
418F000
|
direct allocation
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
510000
|
unkown
|
page write copy
|
||
49A8000
|
direct allocation
|
page read and write
|
||
218C000
|
stack
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
439A000
|
direct allocation
|
page read and write
|
||
4411000
|
direct allocation
|
page read and write
|
||
2EFA000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
457C000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
338A000
|
heap
|
page read and write
|
||
2A5B000
|
stack
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
4C5D000
|
direct allocation
|
page read and write
|
||
4B0C000
|
direct allocation
|
page read and write
|
||
4532000
|
direct allocation
|
page read and write
|
||
4A82000
|
direct allocation
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
4888000
|
direct allocation
|
page read and write
|
||
27AB000
|
stack
|
page read and write
|
||
4864000
|
direct allocation
|
page read and write
|
||
513000
|
unkown
|
page write copy
|
||
2F8A000
|
heap
|
page read and write
|
||
4B13000
|
direct allocation
|
page read and write
|
||
43E6000
|
direct allocation
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
26C0000
|
heap
|
page read and write
|
||
4403000
|
direct allocation
|
page read and write
|
||
51F000
|
unkown
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
41A0000
|
unkown
|
page readonly
|
||
4648000
|
direct allocation
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
281A000
|
heap
|
page read and write
|
||
4768000
|
direct allocation
|
page read and write
|
||
496F000
|
stack
|
page read and write
|
||
4982000
|
direct allocation
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
2BE8000
|
direct allocation
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
511000
|
unkown
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
3113000
|
direct allocation
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
440A000
|
direct allocation
|
page read and write
|
||
4C4F000
|
direct allocation
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
4178000
|
direct allocation
|
page read and write
|
||
243C000
|
stack
|
page read and write
|
||
2BBA000
|
heap
|
page read and write
|
||
41A4000
|
direct allocation
|
page read and write
|
||
2B98000
|
direct allocation
|
page read and write
|
||
2B82000
|
direct allocation
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
470A000
|
direct allocation
|
page read and write
|
||
47C2000
|
direct allocation
|
page read and write
|
||
4B1C000
|
direct allocation
|
page read and write
|
||
4C38000
|
direct allocation
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
4508000
|
direct allocation
|
page read and write
|
||
43E8000
|
direct allocation
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
441A000
|
direct allocation
|
page read and write
|
||
4BF3000
|
direct allocation
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
43A1000
|
direct allocation
|
page read and write
|
||
2CEB000
|
stack
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
4C22000
|
direct allocation
|
page read and write
|
||
4501000
|
direct allocation
|
page read and write
|
||
4C4F000
|
direct allocation
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4AD8000
|
direct allocation
|
page read and write
|
||
27FE000
|
stack
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
465F000
|
direct allocation
|
page read and write
|
||
4311000
|
direct allocation
|
page read and write
|
||
4351000
|
direct allocation
|
page read and write
|
||
265E000
|
stack
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
3670000
|
heap
|
page read and write
|
||
47D0000
|
heap
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
4DAC000
|
direct allocation
|
page read and write
|
||
43F6000
|
direct allocation
|
page read and write
|
||
453F000
|
direct allocation
|
page read and write
|
||
210B000
|
stack
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
43B8000
|
direct allocation
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
435A000
|
direct allocation
|
page read and write
|
||
43D6000
|
direct allocation
|
page read and write
|
||
474C000
|
direct allocation
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
2DBB000
|
stack
|
page read and write
|
||
4353000
|
direct allocation
|
page read and write
|
||
513000
|
unkown
|
page write copy
|
||
2C3B000
|
stack
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
2CBC000
|
stack
|
page read and write
|
||
458A000
|
direct allocation
|
page read and write
|
||
42C0000
|
heap
|
page read and write
|
||
4328000
|
direct allocation
|
page read and write
|
||
4AFF000
|
direct allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
2540000
|
heap
|
page read and write
|
||
4AB6000
|
direct allocation
|
page read and write
|
||
4598000
|
direct allocation
|
page read and write
|
||
4813000
|
direct allocation
|
page read and write
|
||
4821000
|
direct allocation
|
page read and write
|
||
419A000
|
direct allocation
|
page read and write
|
||
416A000
|
direct allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
257E000
|
stack
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
4AE1000
|
direct allocation
|
page read and write
|
||
4571000
|
direct allocation
|
page read and write
|
||
3104000
|
direct allocation
|
page read and write
|
||
42C2000
|
unkown
|
page readonly
|
||
2F7F000
|
stack
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
4C5D000
|
direct allocation
|
page read and write
|
||
49B6000
|
direct allocation
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
47B0000
|
heap
|
page read and write
|
||
43C8000
|
direct allocation
|
page read and write
|
||
4998000
|
direct allocation
|
page read and write
|
||
4546000
|
direct allocation
|
page read and write
|
||
4D96000
|
direct allocation
|
page read and write
|
||
4518000
|
direct allocation
|
page read and write
|
||
2C3C000
|
stack
|
page read and write
|
||
46F2000
|
direct allocation
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
27EC000
|
stack
|
page read and write
|
||
4A8A000
|
direct allocation
|
page read and write
|
||
4318000
|
direct allocation
|
page read and write
|
||
2D2C000
|
stack
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
276B000
|
stack
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
299C000
|
stack
|
page read and write
|
||
4B06000
|
direct allocation
|
page read and write
|
||
4AE1000
|
direct allocation
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
4C56000
|
direct allocation
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
50F000
|
unkown
|
page read and write
|
||
4822000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
475E000
|
stack
|
page read and write
|
||
4ADA000
|
direct allocation
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
510000
|
unkown
|
page write copy
|
||
4BFA000
|
direct allocation
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
2ADA000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
2CCF000
|
stack
|
page read and write
|
||
4A98000
|
direct allocation
|
page read and write
|
||
4718000
|
direct allocation
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
4188000
|
direct allocation
|
page read and write
|
||
2490000
|
heap
|
page read and write
|
||
4AF8000
|
direct allocation
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
4591000
|
direct allocation
|
page read and write
|
||
2D5C000
|
stack
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
4C6C000
|
direct allocation
|
page read and write
|
||
416F000
|
direct allocation
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
307D000
|
stack
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
41A8000
|
direct allocation
|
page read and write
|
||
453A000
|
direct allocation
|
page read and write
|
||
4393000
|
direct allocation
|
page read and write
|
||
4AE8000
|
direct allocation
|
page read and write
|
||
3508000
|
direct allocation
|
page read and write
|
||
23BB000
|
stack
|
page read and write
|
||
43DF000
|
direct allocation
|
page read and write
|
||
41B3000
|
direct allocation
|
page read and write
|
||
2BBD000
|
direct allocation
|
page read and write
|
||
43C1000
|
direct allocation
|
page read and write
|
||
4BD6000
|
direct allocation
|
page read and write
|
||
4521000
|
direct allocation
|
page read and write
|
||
521000
|
unkown
|
page read and write
|
||
284A000
|
heap
|
page read and write
|
||
4A91000
|
direct allocation
|
page read and write
|
||
2BCC000
|
direct allocation
|
page read and write
|
||
264F000
|
stack
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
2BDA000
|
direct allocation
|
page read and write
|
||
4171000
|
direct allocation
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
25EE000
|
stack
|
page read and write
|
||
214C000
|
stack
|
page read and write
|
||
4881000
|
direct allocation
|
page read and write
|
||
4C31000
|
direct allocation
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
2D3A000
|
heap
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
25BA000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
29EB000
|
stack
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
299F000
|
stack
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
4726000
|
direct allocation
|
page read and write
|
||
4C64000
|
direct allocation
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
518000
|
unkown
|
page read and write
|
||
2690000
|
heap
|
page read and write
|
||
4736000
|
direct allocation
|
page read and write
|
There are 772 hidden memdumps, click here to show them.