Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
I6WVogMkrj.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_481a2adff66839ff830cdba352f52481c2a3d3d_7522e4b5_3a1d107d-c25a-427c-9169-83a1edd24c7f\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_481a2adff66839ff830cdba352f52481c2a3d3d_7522e4b5_f54c76dd-3e53-4cc6-9fc1-13f935ef4f37\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_611e6188d1c72fbcea43638d116a458a2e4fe70_7522e4b5_e6a8dc82-f488-4672-a9ec-3b789bbfb76b\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB18C.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 17:56:38 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB268.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB297.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD8AB.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 17:56:48 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD909.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 17:56:48 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD997.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDA52.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDAB1.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDAC1.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\I6WVogMkrj.dll,BarCreate
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 648
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\I6WVogMkrj.dll,BarDestroy
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\I6WVogMkrj.dll,BarFreeRec
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",BarCreate
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",BarDestroy
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",BarFreeRec
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeSetFocus
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeSetDirty
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeResize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkePaint2
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeKillFocus
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeIsDirty
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeInitialize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeGetCaretRect
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeFireMouseWheelEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeFireMouseEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeFireKeyUpEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeFireKeyPressEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeFireKeyDownEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeFireContextMenuEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeFinalize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeDestroyWebView
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",wkeCreateWebView
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",dbkFCallWrapperAddr
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",__dbk_fcall_wrapper
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",TMethodImplementationIntercept
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\I6WVogMkrj.dll",BarRecognize
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 640
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7256 -s 648
|
There are 24 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProgramId
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
FileId
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LowerCaseLongPath
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LongPathHash
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Name
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
OriginalFileName
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Publisher
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Version
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinFileVersion
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinaryType
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductName
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductVersion
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LinkDate
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinProductVersion
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageFullName
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Size
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Language
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
IsOsComponent
|
||
\REGISTRY\A\{adf60faf-87da-8eef-daaa-57a856c3336c}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 12 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4A91000
|
direct allocation
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
27EB000
|
stack
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
28EA000
|
heap
|
page read and write
|
||
2461000
|
direct allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
44F8000
|
direct allocation
|
page read and write
|
||
238C000
|
stack
|
page read and write
|
||
4A71000
|
direct allocation
|
page read and write
|
||
44ED000
|
direct allocation
|
page read and write
|
||
271A000
|
heap
|
page read and write
|
||
455A000
|
direct allocation
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
44A8000
|
direct allocation
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
267E000
|
stack
|
page read and write
|
||
511000
|
unkown
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
291A000
|
heap
|
page read and write
|
||
46CD000
|
direct allocation
|
page read and write
|
||
4B71000
|
direct allocation
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
30A1000
|
direct allocation
|
page read and write
|
||
48D3000
|
direct allocation
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
26BF000
|
stack
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
4D78000
|
direct allocation
|
page read and write
|
||
45BD000
|
direct allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
521000
|
unkown
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
4591000
|
direct allocation
|
page read and write
|
||
4328000
|
direct allocation
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
30E3000
|
direct allocation
|
page read and write
|
||
4B46000
|
direct allocation
|
page read and write
|
||
2ECA000
|
heap
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
435A000
|
direct allocation
|
page read and write
|
||
4B3F000
|
direct allocation
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
488A000
|
direct allocation
|
page read and write
|
||
4AA8000
|
direct allocation
|
page read and write
|
||
4A88000
|
direct allocation
|
page read and write
|
||
4D1A000
|
direct allocation
|
page read and write
|
||
431F000
|
direct allocation
|
page read and write
|
||
44F8000
|
direct allocation
|
page read and write
|
||
51F000
|
unkown
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
4361000
|
direct allocation
|
page read and write
|
||
2E6A000
|
heap
|
page read and write
|
||
46F8000
|
direct allocation
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
4C1F000
|
direct allocation
|
page read and write
|
||
27DE000
|
stack
|
page read and write
|
||
520000
|
unkown
|
page write copy
|
||
15B000
|
stack
|
page read and write
|
||
4A41000
|
direct allocation
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
40DF000
|
stack
|
page read and write
|
||
4D38000
|
direct allocation
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
4C0F000
|
stack
|
page read and write
|
||
457F000
|
direct allocation
|
page read and write
|
||
4433000
|
direct allocation
|
page read and write
|
||
41F6000
|
direct allocation
|
page read and write
|
||
2650000
|
heap
|
page read and write
|
||
433D000
|
direct allocation
|
page read and write
|
||
4726000
|
direct allocation
|
page read and write
|
||
2CEA000
|
heap
|
page read and write
|
||
51D000
|
unkown
|
page read and write
|
||
48BD000
|
direct allocation
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
4976000
|
direct allocation
|
page read and write
|
||
45E8000
|
direct allocation
|
page read and write
|
||
2A0F000
|
stack
|
page read and write
|
||
4516000
|
direct allocation
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
4D2C000
|
direct allocation
|
page read and write
|
||
4692000
|
direct allocation
|
page read and write
|
||
2AE000
|
stack
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
4623000
|
direct allocation
|
page read and write
|
||
2FDF000
|
stack
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
4D0F000
|
direct allocation
|
page read and write
|
||
23EC000
|
stack
|
page read and write
|
||
4F03000
|
direct allocation
|
page read and write
|
||
4B1A000
|
direct allocation
|
page read and write
|
||
46F1000
|
direct allocation
|
page read and write
|
||
25EB000
|
stack
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
51D000
|
unkown
|
page read and write
|
||
450D000
|
direct allocation
|
page read and write
|
||
2A3C000
|
stack
|
page read and write
|
||
442C000
|
direct allocation
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
4D63000
|
direct allocation
|
page read and write
|
||
4A0C000
|
direct allocation
|
page read and write
|
||
45E1000
|
direct allocation
|
page read and write
|
||
2CCF000
|
stack
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
4D5C000
|
direct allocation
|
page read and write
|
||
44D8000
|
direct allocation
|
page read and write
|
||
2BDB000
|
stack
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
2494000
|
direct allocation
|
page read and write
|
||
495F000
|
stack
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
2E6A000
|
heap
|
page read and write
|
||
44F1000
|
direct allocation
|
page read and write
|
||
46A0000
|
heap
|
page read and write
|
||
471F000
|
direct allocation
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
4708000
|
direct allocation
|
page read and write
|
||
2F1C000
|
stack
|
page read and write
|
||
26FA000
|
heap
|
page read and write
|
||
469E000
|
stack
|
page read and write
|
||
4448000
|
direct allocation
|
page read and write
|
||
45DA000
|
direct allocation
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
4A58000
|
direct allocation
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
4424000
|
direct allocation
|
page read and write
|
||
4334000
|
direct allocation
|
page read and write
|
||
4F18000
|
direct allocation
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
4A5F000
|
direct allocation
|
page read and write
|
||
41E8000
|
direct allocation
|
page read and write
|
||
4F11000
|
direct allocation
|
page read and write
|
||
4353000
|
direct allocation
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
4548000
|
direct allocation
|
page read and write
|
||
4ACC000
|
direct allocation
|
page read and write
|
||
452A000
|
direct allocation
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
4503000
|
direct allocation
|
page read and write
|
||
43F1000
|
direct allocation
|
page read and write
|
||
48E1000
|
direct allocation
|
page read and write
|
||
510000
|
unkown
|
page write copy
|
||
6DB000
|
heap
|
page read and write
|
||
43F8000
|
direct allocation
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
4ABA000
|
direct allocation
|
page read and write
|
||
4383000
|
direct allocation
|
page read and write
|
||
4A98000
|
direct allocation
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
24B1000
|
direct allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
4598000
|
direct allocation
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
520000
|
unkown
|
page write copy
|
||
2AFB000
|
stack
|
page read and write
|
||
518000
|
unkown
|
page read and write
|
||
4A62000
|
direct allocation
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
521000
|
unkown
|
page read and write
|
||
4A7C000
|
direct allocation
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
2C3C000
|
stack
|
page read and write
|
||
4578000
|
direct allocation
|
page read and write
|
||
4891000
|
direct allocation
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
4B21000
|
direct allocation
|
page read and write
|
||
30B8000
|
direct allocation
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
30D4000
|
direct allocation
|
page read and write
|
||
4554000
|
direct allocation
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
4336000
|
direct allocation
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
437C000
|
direct allocation
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
26F0000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
4D46000
|
direct allocation
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
4A88000
|
direct allocation
|
page read and write
|
||
44BF000
|
direct allocation
|
page read and write
|
||
2D8A000
|
heap
|
page read and write
|
||
438A000
|
direct allocation
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
45F8000
|
direct allocation
|
page read and write
|
||
522000
|
unkown
|
page readonly
|
||
29D0000
|
heap
|
page read and write
|
||
49A8000
|
direct allocation
|
page read and write
|
||
4A82000
|
direct allocation
|
page read and write
|
||
4533000
|
direct allocation
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
EC000
|
stack
|
page read and write
|
||
2D0C000
|
stack
|
page read and write
|
||
51D000
|
unkown
|
page read and write
|
||
4D16000
|
direct allocation
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
460D000
|
direct allocation
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
4EC1000
|
direct allocation
|
page read and write
|
||
284A000
|
heap
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
4C90000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
450F000
|
direct allocation
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
4A8A000
|
direct allocation
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
44D2000
|
direct allocation
|
page read and write
|
||
50F000
|
unkown
|
page read and write
|
||
245A000
|
direct allocation
|
page read and write
|
||
49D1000
|
direct allocation
|
page read and write
|
||
4A74000
|
direct allocation
|
page read and write
|
||
24B8000
|
direct allocation
|
page read and write
|
||
46DC000
|
direct allocation
|
page read and write
|
||
4AA4000
|
direct allocation
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
433A000
|
direct allocation
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
4A96000
|
direct allocation
|
page read and write
|
||
49E8000
|
direct allocation
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
45CC000
|
direct allocation
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
524000
|
unkown
|
page readonly
|
||
46B8000
|
direct allocation
|
page read and write
|
||
268A000
|
heap
|
page read and write
|
||
49F6000
|
direct allocation
|
page read and write
|
||
4AA6000
|
direct allocation
|
page read and write
|
||
4AB4000
|
direct allocation
|
page read and write
|
||
44E1000
|
direct allocation
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
27FB000
|
stack
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
4D33000
|
direct allocation
|
page read and write
|
||
2486000
|
direct allocation
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
46DF000
|
stack
|
page read and write
|
||
4301000
|
direct allocation
|
page read and write
|
||
247F000
|
direct allocation
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
4A21000
|
direct allocation
|
page read and write
|
||
4538000
|
direct allocation
|
page read and write
|
||
441D000
|
direct allocation
|
page read and write
|
||
4512000
|
direct allocation
|
page read and write
|
||
4BFA000
|
direct allocation
|
page read and write
|
||
51F000
|
unkown
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
4A48000
|
direct allocation
|
page read and write
|
||
4B6A000
|
direct allocation
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
4ABD000
|
direct allocation
|
page read and write
|
||
4A81000
|
direct allocation
|
page read and write
|
||
4D08000
|
direct allocation
|
page read and write
|
||
2C7C000
|
stack
|
page read and write
|
||
26F0000
|
heap
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2610000
|
heap
|
page read and write
|
||
4D71000
|
direct allocation
|
page read and write
|
||
451D000
|
direct allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
4630000
|
heap
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
4958000
|
direct allocation
|
page read and write
|
||
30F8000
|
direct allocation
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
48CC000
|
direct allocation
|
page read and write
|
||
4332000
|
direct allocation
|
page read and write
|
||
4CF8000
|
direct allocation
|
page read and write
|
||
44C6000
|
direct allocation
|
page read and write
|
||
2468000
|
direct allocation
|
page read and write
|
||
2620000
|
heap
|
page read and write
|
||
430A000
|
direct allocation
|
page read and write
|
||
4B12000
|
direct allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
4BAF000
|
stack
|
page read and write
|
||
510000
|
unkown
|
page write copy
|
||
2EAA000
|
heap
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
4EC8000
|
direct allocation
|
page read and write
|
||
520000
|
unkown
|
page write copy
|
||
2DBE000
|
stack
|
page read and write
|
||
4358000
|
direct allocation
|
page read and write
|
||
4A6A000
|
direct allocation
|
page read and write
|
||
305B000
|
stack
|
page read and write
|
||
267F000
|
stack
|
page read and write
|
||
4F0A000
|
direct allocation
|
page read and write
|
||
4968000
|
direct allocation
|
page read and write
|
||
232B000
|
stack
|
page read and write
|
||
4C01000
|
direct allocation
|
page read and write
|
||
4B38000
|
direct allocation
|
page read and write
|
||
267A000
|
heap
|
page read and write
|
||
458A000
|
direct allocation
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
4AAD000
|
direct allocation
|
page read and write
|
||
4A3A000
|
direct allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
4B4D000
|
direct allocation
|
page read and write
|
||
30CD000
|
direct allocation
|
page read and write
|
||
51F000
|
unkown
|
page read and write
|
||
28AC000
|
stack
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
44FF000
|
direct allocation
|
page read and write
|
||
4AC1000
|
direct allocation
|
page read and write
|
||
513000
|
unkown
|
page write copy
|
||
2EDB000
|
stack
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
4326000
|
direct allocation
|
page read and write
|
||
4523000
|
direct allocation
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
45D3000
|
direct allocation
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
46A8000
|
direct allocation
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
2A3C000
|
stack
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
4CDF000
|
stack
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
4D21000
|
direct allocation
|
page read and write
|
||
434C000
|
direct allocation
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
48EF000
|
stack
|
page read and write
|
||
49A1000
|
direct allocation
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
472D000
|
direct allocation
|
page read and write
|
||
4541000
|
direct allocation
|
page read and write
|
||
4A1A000
|
direct allocation
|
page read and write
|
||
41D1000
|
direct allocation
|
page read and write
|
||
4ED8000
|
direct allocation
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
4AB3000
|
direct allocation
|
page read and write
|
||
440F000
|
direct allocation
|
page read and write
|
||
4606000
|
direct allocation
|
page read and write
|
||
2CEB000
|
stack
|
page read and write
|
||
48C4000
|
direct allocation
|
page read and write
|
||
200000
|
heap
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
4EDF000
|
direct allocation
|
page read and write
|
||
4C34000
|
direct allocation
|
page read and write
|
||
255B000
|
stack
|
page read and write
|
||
2EBA000
|
heap
|
page read and write
|
||
297B000
|
stack
|
page read and write
|
||
44EA000
|
direct allocation
|
page read and write
|
||
49D8000
|
direct allocation
|
page read and write
|
||
44DA000
|
direct allocation
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
2A6A000
|
heap
|
page read and write
|
||
23AB000
|
stack
|
page read and write
|
||
449A000
|
direct allocation
|
page read and write
|
||
42FA000
|
direct allocation
|
page read and write
|
||
30C6000
|
direct allocation
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
46EA000
|
direct allocation
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
44E2000
|
direct allocation
|
page read and write
|
||
3092000
|
direct allocation
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
50F000
|
unkown
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
30EA000
|
direct allocation
|
page read and write
|
||
4528000
|
direct allocation
|
page read and write
|
||
4391000
|
direct allocation
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
287B000
|
stack
|
page read and write
|
||
4718000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
300F000
|
stack
|
page read and write
|
||
4480000
|
heap
|
page read and write
|
||
4A28000
|
direct allocation
|
page read and write
|
||
24AB000
|
stack
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
513000
|
unkown
|
page write copy
|
||
436E000
|
stack
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
2E3C000
|
stack
|
page read and write
|
||
420C000
|
direct allocation
|
page read and write
|
||
328A000
|
heap
|
page read and write
|
||
453F000
|
direct allocation
|
page read and write
|
||
44DC000
|
direct allocation
|
page read and write
|
||
46C6000
|
direct allocation
|
page read and write
|
||
4A78000
|
direct allocation
|
page read and write
|
||
299A000
|
heap
|
page read and write
|
||
24EC000
|
stack
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
4A91000
|
direct allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
44C1000
|
direct allocation
|
page read and write
|
||
4358000
|
direct allocation
|
page read and write
|
||
4A8F000
|
direct allocation
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
451C000
|
direct allocation
|
page read and write
|
||
30BF000
|
direct allocation
|
page read and write
|
||
524000
|
unkown
|
page readonly
|
||
4B78000
|
direct allocation
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
29EB000
|
stack
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
24AA000
|
direct allocation
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
4870000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
436D000
|
direct allocation
|
page read and write
|
||
45B6000
|
direct allocation
|
page read and write
|
||
2E3C000
|
stack
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
4EB2000
|
direct allocation
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
37C0000
|
heap
|
page read and write
|
||
284A000
|
heap
|
page read and write
|
||
4578000
|
direct allocation
|
page read and write
|
||
45E0000
|
heap
|
page read and write
|
||
4531000
|
direct allocation
|
page read and write
|
||
304A000
|
heap
|
page read and write
|
||
44FC000
|
direct allocation
|
page read and write
|
||
319A000
|
heap
|
page read and write
|
||
45A8000
|
direct allocation
|
page read and write
|
||
4BF2000
|
direct allocation
|
page read and write
|
||
49EF000
|
direct allocation
|
page read and write
|
||
45E0000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
283B000
|
stack
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
234B000
|
stack
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
4A04000
|
direct allocation
|
page read and write
|
||
461C000
|
direct allocation
|
page read and write
|
||
456A000
|
direct allocation
|
page read and write
|
||
498F000
|
stack
|
page read and write
|
||
45DA000
|
direct allocation
|
page read and write
|
||
4441000
|
direct allocation
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
2C3B000
|
stack
|
page read and write
|
||
4A10000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
4C51000
|
direct allocation
|
page read and write
|
||
522000
|
unkown
|
page readonly
|
||
4CEA000
|
direct allocation
|
page read and write
|
||
42F2000
|
direct allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
236B000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4B63000
|
direct allocation
|
page read and write
|
||
41C2000
|
direct allocation
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
4984000
|
direct allocation
|
page read and write
|
||
524000
|
unkown
|
page readonly
|
||
46F2000
|
direct allocation
|
page read and write
|
||
2600000
|
heap
|
page read and write
|
||
434A000
|
direct allocation
|
page read and write
|
||
451A000
|
direct allocation
|
page read and write
|
||
281F000
|
stack
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
4D4D000
|
direct allocation
|
page read and write
|
||
48E8000
|
direct allocation
|
page read and write
|
||
4508000
|
direct allocation
|
page read and write
|
||
236C000
|
stack
|
page read and write
|
||
4EE6000
|
direct allocation
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
2BDC000
|
stack
|
page read and write
|
||
45A0000
|
heap
|
page read and write
|
||
432D000
|
direct allocation
|
page read and write
|
||
498C000
|
direct allocation
|
page read and write
|
||
4AC3000
|
direct allocation
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
521000
|
unkown
|
page read and write
|
||
4343000
|
direct allocation
|
page read and write
|
||
44BA000
|
direct allocation
|
page read and write
|
||
4344000
|
direct allocation
|
page read and write
|
||
2B9B000
|
stack
|
page read and write
|
||
4AC8000
|
direct allocation
|
page read and write
|
||
34EA000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
23AC000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4366000
|
direct allocation
|
page read and write
|
||
25CC000
|
stack
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
4A32000
|
direct allocation
|
page read and write
|
||
4A83000
|
direct allocation
|
page read and write
|
||
48B6000
|
direct allocation
|
page read and write
|
||
304A000
|
heap
|
page read and write
|
||
4ACA000
|
direct allocation
|
page read and write
|
||
4701000
|
direct allocation
|
page read and write
|
||
4A9D000
|
direct allocation
|
page read and write
|
||
2B9C000
|
stack
|
page read and write
|
||
45FF000
|
direct allocation
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
29DA000
|
heap
|
page read and write
|
||
286B000
|
stack
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
283C000
|
stack
|
page read and write
|
||
4A98000
|
direct allocation
|
page read and write
|
||
41EF000
|
direct allocation
|
page read and write
|
||
518000
|
unkown
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
4348000
|
direct allocation
|
page read and write
|
||
292A000
|
heap
|
page read and write
|
||
44B2000
|
direct allocation
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
4A72000
|
direct allocation
|
page read and write
|
||
4521000
|
direct allocation
|
page read and write
|
||
454B000
|
direct allocation
|
page read and write
|
||
307C000
|
stack
|
page read and write
|
||
443A000
|
direct allocation
|
page read and write
|
||
450A000
|
direct allocation
|
page read and write
|
||
4898000
|
direct allocation
|
page read and write
|
||
4204000
|
direct allocation
|
page read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
4AB6000
|
direct allocation
|
page read and write
|
||
4586000
|
direct allocation
|
page read and write
|
||
44DF000
|
direct allocation
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
433C000
|
direct allocation
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
518000
|
unkown
|
page read and write
|
||
26C0000
|
heap
|
page read and write
|
||
494A000
|
direct allocation
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
4970000
|
heap
|
page read and write
|
||
4514000
|
direct allocation
|
page read and write
|
||
4A9F000
|
direct allocation
|
page read and write
|
||
522000
|
unkown
|
page readonly
|
||
48A8000
|
direct allocation
|
page read and write
|
||
259C000
|
stack
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
4571000
|
direct allocation
|
page read and write
|
||
44C8000
|
direct allocation
|
page read and write
|
||
4ABC000
|
direct allocation
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
44F1000
|
direct allocation
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
1EC000
|
stack
|
page read and write
|
||
28BC000
|
stack
|
page read and write
|
||
45D2000
|
direct allocation
|
page read and write
|
||
4311000
|
direct allocation
|
page read and write
|
||
496F000
|
direct allocation
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
45C4000
|
direct allocation
|
page read and write
|
||
26DE000
|
stack
|
page read and write
|
||
4614000
|
direct allocation
|
page read and write
|
||
4B54000
|
direct allocation
|
page read and write
|
||
43E2000
|
direct allocation
|
page read and write
|
||
4C3C000
|
direct allocation
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
452C000
|
direct allocation
|
page read and write
|
||
4C2D000
|
direct allocation
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
46E3000
|
direct allocation
|
page read and write
|
||
30DC000
|
direct allocation
|
page read and write
|
||
4318000
|
direct allocation
|
page read and write
|
||
309C000
|
stack
|
page read and write
|
||
287C000
|
stack
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
432F000
|
direct allocation
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
4638000
|
direct allocation
|
page read and write
|
||
4AAC000
|
direct allocation
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
4D6A000
|
direct allocation
|
page read and write
|
||
44A1000
|
direct allocation
|
page read and write
|
||
45AF000
|
direct allocation
|
page read and write
|
||
2B5B000
|
stack
|
page read and write
|
||
303B000
|
stack
|
page read and write
|
||
469A000
|
direct allocation
|
page read and write
|
||
46FA000
|
direct allocation
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
46D0000
|
heap
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
4563000
|
direct allocation
|
page read and write
|
||
4D10000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
4D54000
|
direct allocation
|
page read and write
|
||
50F000
|
unkown
|
page read and write
|
||
4351000
|
direct allocation
|
page read and write
|
||
4341000
|
direct allocation
|
page read and write
|
||
4A98000
|
direct allocation
|
page read and write
|
||
49C2000
|
direct allocation
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
4510000
|
heap
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
4942000
|
direct allocation
|
page read and write
|
||
510000
|
unkown
|
page write copy
|
||
4750000
|
heap
|
page read and write
|
||
2FDA000
|
heap
|
page read and write
|
||
4A6D000
|
direct allocation
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
23DF000
|
stack
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
4A13000
|
direct allocation
|
page read and write
|
||
49CA000
|
direct allocation
|
page read and write
|
||
4506000
|
direct allocation
|
page read and write
|
||
4AAF000
|
direct allocation
|
page read and write
|
||
44E6000
|
direct allocation
|
page read and write
|
||
4D12000
|
direct allocation
|
page read and write
|
||
4318000
|
direct allocation
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
4B5C000
|
direct allocation
|
page read and write
|
||
2452000
|
direct allocation
|
page read and write
|
||
44EA000
|
direct allocation
|
page read and write
|
||
4EF4000
|
direct allocation
|
page read and write
|
||
4CBF000
|
stack
|
page read and write
|
||
4A8A000
|
direct allocation
|
page read and write
|
||
248D000
|
direct allocation
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
4D3F000
|
direct allocation
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
2CCB000
|
stack
|
page read and write
|
||
49FD000
|
direct allocation
|
page read and write
|
||
210000
|
heap
|
page read and write
|
||
4951000
|
direct allocation
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
30F1000
|
direct allocation
|
page read and write
|
||
4561000
|
direct allocation
|
page read and write
|
||
454D000
|
direct allocation
|
page read and write
|
||
4D28000
|
direct allocation
|
page read and write
|
||
309A000
|
direct allocation
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
45E8000
|
direct allocation
|
page read and write
|
||
4C43000
|
direct allocation
|
page read and write
|
||
4882000
|
direct allocation
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
4A7A000
|
direct allocation
|
page read and write
|
||
497D000
|
direct allocation
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
44F8000
|
direct allocation
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
258B000
|
stack
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
4368000
|
direct allocation
|
page read and write
|
||
44E3000
|
direct allocation
|
page read and write
|
||
31BA000
|
heap
|
page read and write
|
||
4631000
|
direct allocation
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
2478000
|
direct allocation
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
4C26000
|
direct allocation
|
page read and write
|
||
4538000
|
direct allocation
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
4CF1000
|
direct allocation
|
page read and write
|
||
44CD000
|
direct allocation
|
page read and write
|
||
29BC000
|
stack
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
48DA000
|
direct allocation
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
44F4000
|
direct allocation
|
page read and write
|
||
41FD000
|
direct allocation
|
page read and write
|
||
44D4000
|
direct allocation
|
page read and write
|
||
4AC4000
|
direct allocation
|
page read and write
|
||
4408000
|
direct allocation
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
511000
|
unkown
|
page read and write
|
||
513000
|
unkown
|
page write copy
|
||
511000
|
unkown
|
page read and write
|
||
4C18000
|
direct allocation
|
page read and write
|
||
462A000
|
direct allocation
|
page read and write
|
||
455C000
|
direct allocation
|
page read and write
|
||
4582000
|
direct allocation
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
44B8000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
287B000
|
stack
|
page read and write
|
||
4511000
|
direct allocation
|
page read and write
|
||
453A000
|
direct allocation
|
page read and write
|
||
44E8000
|
direct allocation
|
page read and write
|
||
2BEB000
|
stack
|
page read and write
|
||
2D2C000
|
stack
|
page read and write
|
||
4398000
|
direct allocation
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
4546000
|
direct allocation
|
page read and write
|
||
41CA000
|
direct allocation
|
page read and write
|
||
45E1000
|
direct allocation
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
28BC000
|
stack
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
4C08000
|
direct allocation
|
page read and write
|
||
4568000
|
direct allocation
|
page read and write
|
||
4302000
|
direct allocation
|
page read and write
|
||
4D1D000
|
direct allocation
|
page read and write
|
||
4D24000
|
direct allocation
|
page read and write
|
||
30A8000
|
direct allocation
|
page read and write
|
||
4650000
|
heap
|
page read and write
|
||
4C4A000
|
direct allocation
|
page read and write
|
||
4308000
|
direct allocation
|
page read and write
|
||
4A66000
|
direct allocation
|
page read and write
|
||
68F000
|
stack
|
page read and write
|
||
46D4000
|
direct allocation
|
page read and write
|
||
4CB0000
|
heap
|
page read and write
|
||
4C58000
|
direct allocation
|
page read and write
|
||
4C30000
|
heap
|
page read and write
|
||
48AF000
|
direct allocation
|
page read and write
|
||
43EA000
|
direct allocation
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
435F000
|
direct allocation
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
46A1000
|
direct allocation
|
page read and write
|
||
260000
|
heap
|
page read and write
|
||
4EFC000
|
direct allocation
|
page read and write
|
||
448B000
|
direct allocation
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
2B3C000
|
stack
|
page read and write
|
||
4B28000
|
direct allocation
|
page read and write
|
||
4524000
|
direct allocation
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
4993000
|
direct allocation
|
page read and write
|
||
46BF000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4EBA000
|
direct allocation
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
4EED000
|
direct allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
4CE2000
|
direct allocation
|
page read and write
|
||
24A3000
|
direct allocation
|
page read and write
|
||
499A000
|
direct allocation
|
page read and write
|
||
4416000
|
direct allocation
|
page read and write
|
||
249C000
|
direct allocation
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
41D8000
|
direct allocation
|
page read and write
|
||
4374000
|
direct allocation
|
page read and write
|
There are 790 hidden memdumps, click here to show them.