Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
nPSsgqs7aI.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_4fe5a735f3c962f33a38b504d643f44a7c78b75_7522e4b5_06ff90e2-e6f0-44ef-b625-a2f7a4cbee48\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_4fe5a735f3c962f33a38b504d643f44a7c78b75_7522e4b5_2763e2eb-1d33-43a1-bd9d-45aa672f8944\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_59fcf98f4ce235a4ae89e5da4a4e624a8715c64d_7522e4b5_4c337851-2bf0-4da8-aaf0-4358efc93e59\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER100F.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3642.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 17:58:14 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER37A9.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 17:58:15 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3902.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3980.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER39AE.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER39EE.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF22.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 17:58:04 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFC0.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\nPSsgqs7aI.dll,BarCreate
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6512 -s 648
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\nPSsgqs7aI.dll,BarDestroy
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\nPSsgqs7aI.dll,BarFreeRec
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",BarCreate
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",BarDestroy
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",BarFreeRec
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeSetFocus
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeSetDirty
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeResize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkePaint2
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeKillFocus
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeIsDirty
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeInitialize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeGetCaretRect
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeFireMouseWheelEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeFireMouseEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeFireKeyUpEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeFireKeyPressEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeFireKeyDownEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeFireContextMenuEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeFinalize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeDestroyWebView
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",wkeCreateWebView
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",dbkFCallWrapperAddr
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",__dbk_fcall_wrapper
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",TMethodImplementationIntercept
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nPSsgqs7aI.dll",BarRecognize
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5480 -s 640
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 640
|
There are 24 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProgramId
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
FileId
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LowerCaseLongPath
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LongPathHash
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Name
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
OriginalFileName
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Publisher
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Version
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinFileVersion
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinaryType
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductName
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductVersion
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LinkDate
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinProductVersion
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageFullName
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Size
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Language
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
IsOsComponent
|
||
\REGISTRY\A\{c70a3a8b-6fbe-015f-999d-4c1bdf8a7ca9}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Usn
|
There are 10 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3FE0000
|
unkown
|
page readonly
|
||
499A000
|
direct allocation
|
page read and write
|
||
259B000
|
stack
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
510000
|
unkown
|
page write copy
|
||
4944000
|
direct allocation
|
page read and write
|
||
434C000
|
direct allocation
|
page read and write
|
||
4268000
|
direct allocation
|
page read and write
|
||
4471000
|
direct allocation
|
page read and write
|
||
45FA000
|
direct allocation
|
page read and write
|
||
26C000
|
stack
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
42C8000
|
direct allocation
|
page read and write
|
||
4E88000
|
direct allocation
|
page read and write
|
||
2C7C000
|
stack
|
page read and write
|
||
323B000
|
stack
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
40F0000
|
unkown
|
page write copy
|
||
2FB0000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
4F01000
|
direct allocation
|
page read and write
|
||
49B6000
|
direct allocation
|
page read and write
|
||
4958000
|
direct allocation
|
page read and write
|
||
2E7C000
|
direct allocation
|
page read and write
|
||
491F000
|
direct allocation
|
page read and write
|
||
2690000
|
heap
|
page read and write
|
||
4A3F000
|
direct allocation
|
page read and write
|
||
4102000
|
unkown
|
page readonly
|
||
430A000
|
direct allocation
|
page read and write
|
||
45B1000
|
direct allocation
|
page read and write
|
||
46F6000
|
direct allocation
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
267C000
|
stack
|
page read and write
|
||
2DB1000
|
direct allocation
|
page read and write
|
||
2F2B000
|
stack
|
page read and write
|
||
2E32000
|
direct allocation
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
43C8000
|
direct allocation
|
page read and write
|
||
31FA000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
494A000
|
direct allocation
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
492F000
|
direct allocation
|
page read and write
|
||
2300000
|
heap
|
page read and write
|
||
4104000
|
unkown
|
page readonly
|
||
1BB000
|
stack
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
F4C000
|
stack
|
page read and write
|
||
2E41000
|
direct allocation
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
498C000
|
direct allocation
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
28DD000
|
direct allocation
|
page read and write
|
||
27BE000
|
stack
|
page read and write
|
||
4F18000
|
direct allocation
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
4A71000
|
direct allocation
|
page read and write
|
||
424A000
|
direct allocation
|
page read and write
|
||
433D000
|
direct allocation
|
page read and write
|
||
41FA000
|
direct allocation
|
page read and write
|
||
4454000
|
direct allocation
|
page read and write
|
||
40F1000
|
unkown
|
page read and write
|
||
EB000
|
stack
|
page read and write
|
||
2EBC000
|
stack
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
277A000
|
heap
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
1FC000
|
stack
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
49C6000
|
direct allocation
|
page read and write
|
||
46EF000
|
direct allocation
|
page read and write
|
||
493C000
|
direct allocation
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
2E91000
|
direct allocation
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
46D1000
|
direct allocation
|
page read and write
|
||
35F0000
|
heap
|
page read and write
|
||
412A000
|
direct allocation
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
4503000
|
direct allocation
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
2ABB000
|
stack
|
page read and write
|
||
276C000
|
stack
|
page read and write
|
||
180E000
|
stack
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
4951000
|
direct allocation
|
page read and write
|
||
4A21000
|
direct allocation
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
42B2000
|
direct allocation
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
51F000
|
unkown
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
43AC000
|
direct allocation
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
40EF000
|
unkown
|
page read and write
|
||
230000
|
heap
|
page read and write
|
||
270C000
|
stack
|
page read and write
|
||
4E1C000
|
direct allocation
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
4B92000
|
direct allocation
|
page read and write
|
||
2DD6000
|
direct allocation
|
page read and write
|
||
422F000
|
direct allocation
|
page read and write
|
||
350A000
|
heap
|
page read and write
|
||
465F000
|
stack
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
2B8C000
|
stack
|
page read and write
|
||
2E58000
|
direct allocation
|
page read and write
|
||
2F3A000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
27FF000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4801000
|
direct allocation
|
page read and write
|
||
4E14000
|
direct allocation
|
page read and write
|
||
4ECA000
|
direct allocation
|
page read and write
|
||
239C000
|
stack
|
page read and write
|
||
49EA000
|
direct allocation
|
page read and write
|
||
420A000
|
direct allocation
|
page read and write
|
||
42D8000
|
direct allocation
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
35F0000
|
heap
|
page read and write
|
||
45C8000
|
direct allocation
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
4228000
|
direct allocation
|
page read and write
|
||
2F3C000
|
stack
|
page read and write
|
||
45E4000
|
direct allocation
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
48F2000
|
direct allocation
|
page read and write
|
||
2B4B000
|
stack
|
page read and write
|
||
3228000
|
direct allocation
|
page read and write
|
||
28AA000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2AEB000
|
stack
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
4396000
|
direct allocation
|
page read and write
|
||
4311000
|
direct allocation
|
page read and write
|
||
4362000
|
direct allocation
|
page read and write
|
||
4173000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2FA0000
|
heap
|
page read and write
|
||
4B42000
|
direct allocation
|
page read and write
|
||
4E9F000
|
direct allocation
|
page read and write
|
||
4EC3000
|
direct allocation
|
page read and write
|
||
43BA000
|
direct allocation
|
page read and write
|
||
450A000
|
direct allocation
|
page read and write
|
||
4A4D000
|
direct allocation
|
page read and write
|
||
4993000
|
direct allocation
|
page read and write
|
||
27CF000
|
stack
|
page read and write
|
||
47A2000
|
direct allocation
|
page read and write
|
||
4991000
|
direct allocation
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
47EC000
|
direct allocation
|
page read and write
|
||
450D000
|
direct allocation
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
3530000
|
heap
|
page read and write
|
||
2AFB000
|
stack
|
page read and write
|
||
44E6000
|
direct allocation
|
page read and write
|
||
42C1000
|
direct allocation
|
page read and write
|
||
4236000
|
direct allocation
|
page read and write
|
||
49B8000
|
direct allocation
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
4518000
|
direct allocation
|
page read and write
|
||
4E2A000
|
direct allocation
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
51D000
|
unkown
|
page read and write
|
||
2B2C000
|
stack
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
4138000
|
direct allocation
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
497D000
|
direct allocation
|
page read and write
|
||
493D000
|
direct allocation
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
2D1B000
|
stack
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
46F0000
|
heap
|
page read and write
|
||
4A38000
|
direct allocation
|
page read and write
|
||
4478000
|
direct allocation
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
521000
|
unkown
|
page read and write
|
||
4244000
|
direct allocation
|
page read and write
|
||
50E0000
|
heap
|
page read and write
|
||
4378000
|
direct allocation
|
page read and write
|
||
270F000
|
stack
|
page read and write
|
||
268E000
|
stack
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
329F000
|
stack
|
page read and write
|
||
31DA000
|
heap
|
page read and write
|
||
4EB4000
|
direct allocation
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
358A000
|
heap
|
page read and write
|
||
520000
|
unkown
|
page write copy
|
||
314E000
|
stack
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
2DB8000
|
direct allocation
|
page read and write
|
||
4911000
|
direct allocation
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
27FA000
|
heap
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
4984000
|
direct allocation
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
4218000
|
direct allocation
|
page read and write
|
||
2FBA000
|
heap
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
415D000
|
direct allocation
|
page read and write
|
||
31E1000
|
direct allocation
|
page read and write
|
||
321C000
|
direct allocation
|
page read and write
|
||
49E0000
|
heap
|
page read and write
|
||
2B9A000
|
heap
|
page read and write
|
||
2C3B000
|
stack
|
page read and write
|
||
494A000
|
direct allocation
|
page read and write
|
||
286B000
|
stack
|
page read and write
|
||
230A000
|
heap
|
page read and write
|
||
4412000
|
direct allocation
|
page read and write
|
||
42ED000
|
direct allocation
|
page read and write
|
||
44E1000
|
direct allocation
|
page read and write
|
||
51F000
|
unkown
|
page read and write
|
||
511000
|
unkown
|
page read and write
|
||
49A8000
|
direct allocation
|
page read and write
|
||
44C8000
|
direct allocation
|
page read and write
|
||
4538000
|
direct allocation
|
page read and write
|
||
2E7B000
|
stack
|
page read and write
|
||
443F000
|
direct allocation
|
page read and write
|
||
48FA000
|
direct allocation
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
423D000
|
direct allocation
|
page read and write
|
||
264D000
|
stack
|
page read and write
|
||
44F4000
|
direct allocation
|
page read and write
|
||
4BD4000
|
direct allocation
|
page read and write
|
||
4226000
|
direct allocation
|
page read and write
|
||
4601000
|
direct allocation
|
page read and write
|
||
4506000
|
direct allocation
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
4961000
|
direct allocation
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
4860000
|
heap
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
444D000
|
direct allocation
|
page read and write
|
||
409E000
|
stack
|
page read and write
|
||
4A10000
|
heap
|
page read and write
|
||
2E74000
|
direct allocation
|
page read and write
|
||
4F3C000
|
direct allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
327C000
|
stack
|
page read and write
|
||
45AA000
|
direct allocation
|
page read and write
|
||
47B1000
|
direct allocation
|
page read and write
|
||
31F8000
|
direct allocation
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
2CBC000
|
stack
|
page read and write
|
||
494C000
|
direct allocation
|
page read and write
|
||
4850000
|
heap
|
page read and write
|
||
4148000
|
direct allocation
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
4BC6000
|
direct allocation
|
page read and write
|
||
2E98000
|
direct allocation
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
4F58000
|
direct allocation
|
page read and write
|
||
4302000
|
direct allocation
|
page read and write
|
||
31FF000
|
direct allocation
|
page read and write
|
||
3214000
|
direct allocation
|
page read and write
|
||
4BF8000
|
direct allocation
|
page read and write
|
||
35FA000
|
heap
|
page read and write
|
||
4208000
|
direct allocation
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
28D6000
|
direct allocation
|
page read and write
|
||
4F4A000
|
direct allocation
|
page read and write
|
||
490A000
|
direct allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
4F08000
|
direct allocation
|
page read and write
|
||
40F5000
|
unkown
|
page write copy
|
||
21E000
|
stack
|
page read and write
|
||
524000
|
unkown
|
page readonly
|
||
27E0000
|
heap
|
page read and write
|
||
4DFF000
|
direct allocation
|
page read and write
|
||
4910000
|
heap
|
page read and write
|
||
518000
|
unkown
|
page read and write
|
||
43C1000
|
direct allocation
|
page read and write
|
||
4428000
|
direct allocation
|
page read and write
|
||
45A2000
|
direct allocation
|
page read and write
|
||
44ED000
|
direct allocation
|
page read and write
|
||
4251000
|
direct allocation
|
page read and write
|
||
4E72000
|
direct allocation
|
page read and write
|
||
4BA1000
|
direct allocation
|
page read and write
|
||
42DF000
|
direct allocation
|
page read and write
|
||
4DE1000
|
direct allocation
|
page read and write
|
||
2E3A000
|
direct allocation
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
46C2000
|
direct allocation
|
page read and write
|
||
4258000
|
direct allocation
|
page read and write
|
||
44BA000
|
direct allocation
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
26F0000
|
heap
|
page read and write
|
||
4E23000
|
direct allocation
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
513000
|
unkown
|
page write copy
|
||
4DDA000
|
direct allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
49A1000
|
direct allocation
|
page read and write
|
||
4998000
|
direct allocation
|
page read and write
|
||
161F000
|
heap
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
4B2F000
|
stack
|
page read and write
|
||
4514000
|
direct allocation
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
28AA000
|
heap
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
4243000
|
direct allocation
|
page read and write
|
||
4B4A000
|
direct allocation
|
page read and write
|
||
4328000
|
direct allocation
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
40FF000
|
unkown
|
page read and write
|
||
28B8000
|
direct allocation
|
page read and write
|
||
51D000
|
unkown
|
page read and write
|
||
4610000
|
heap
|
page read and write
|
||
43B3000
|
direct allocation
|
page read and write
|
||
524000
|
unkown
|
page readonly
|
||
4E81000
|
direct allocation
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
50F000
|
unkown
|
page read and write
|
||
481F000
|
stack
|
page read and write
|
||
285E000
|
stack
|
page read and write
|
||
421F000
|
direct allocation
|
page read and write
|
||
45CF000
|
direct allocation
|
page read and write
|
||
4E0D000
|
direct allocation
|
page read and write
|
||
272B000
|
stack
|
page read and write
|
||
4EB4000
|
direct allocation
|
page read and write
|
||
4523000
|
direct allocation
|
page read and write
|
||
323D000
|
direct allocation
|
page read and write
|
||
445C000
|
direct allocation
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
22B000
|
stack
|
page read and write
|
||
4353000
|
direct allocation
|
page read and write
|
||
328A000
|
heap
|
page read and write
|
||
4BE3000
|
direct allocation
|
page read and write
|
||
4A5C000
|
direct allocation
|
page read and write
|
||
451C000
|
direct allocation
|
page read and write
|
||
4ED8000
|
direct allocation
|
page read and write
|
||
4A54000
|
direct allocation
|
page read and write
|
||
4B51000
|
direct allocation
|
page read and write
|
||
49CD000
|
direct allocation
|
page read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
291A000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
2FFA000
|
heap
|
page read and write
|
||
49F8000
|
direct allocation
|
page read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
2B3C000
|
stack
|
page read and write
|
||
4B7D000
|
direct allocation
|
page read and write
|
||
4943000
|
direct allocation
|
page read and write
|
||
424C000
|
direct allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
521000
|
unkown
|
page read and write
|
||
4EA6000
|
direct allocation
|
page read and write
|
||
26DE000
|
stack
|
page read and write
|
||
44DA000
|
direct allocation
|
page read and write
|
||
4908000
|
direct allocation
|
page read and write
|
||
239C000
|
stack
|
page read and write
|
||
470C000
|
direct allocation
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
48E0000
|
heap
|
page read and write
|
||
46FD000
|
direct allocation
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
4410000
|
heap
|
page read and write
|
||
4131000
|
direct allocation
|
page read and write
|
||
4BDC000
|
direct allocation
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
4438000
|
direct allocation
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
4EFA000
|
direct allocation
|
page read and write
|
||
4936000
|
direct allocation
|
page read and write
|
||
46E8000
|
direct allocation
|
page read and write
|
||
28DB000
|
stack
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
31D2000
|
direct allocation
|
page read and write
|
||
4F43000
|
direct allocation
|
page read and write
|
||
47B8000
|
direct allocation
|
page read and write
|
||
441A000
|
direct allocation
|
page read and write
|
||
4B84000
|
direct allocation
|
page read and write
|
||
4918000
|
direct allocation
|
page read and write
|
||
4446000
|
direct allocation
|
page read and write
|
||
2D0000
|
heap
|
page read and write
|
||
4B9A000
|
direct allocation
|
page read and write
|
||
4ECA000
|
direct allocation
|
page read and write
|
||
2908000
|
direct allocation
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
4336000
|
direct allocation
|
page read and write
|
||
4608000
|
direct allocation
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
2F0A000
|
heap
|
page read and write
|
||
2F6C000
|
stack
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
4E38000
|
direct allocation
|
page read and write
|
||
3202000
|
direct allocation
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
520000
|
unkown
|
page write copy
|
||
2C1E000
|
stack
|
page read and write
|
||
28C8000
|
direct allocation
|
page read and write
|
||
4EBC000
|
direct allocation
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
47C8000
|
direct allocation
|
page read and write
|
||
4511000
|
direct allocation
|
page read and write
|
||
49D4000
|
direct allocation
|
page read and write
|
||
4B6F000
|
direct allocation
|
page read and write
|
||
4253000
|
direct allocation
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
461E000
|
stack
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
4976000
|
direct allocation
|
page read and write
|
||
45EC000
|
direct allocation
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
2DE000
|
stack
|
page read and write
|
||
4A78000
|
direct allocation
|
page read and write
|
||
49A1000
|
direct allocation
|
page read and write
|
||
49BD000
|
direct allocation
|
page read and write
|
||
40FD000
|
unkown
|
page read and write
|
||
28F000
|
stack
|
page read and write
|
||
4A1A000
|
direct allocation
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
2E6D000
|
direct allocation
|
page read and write
|
||
495A000
|
direct allocation
|
page read and write
|
||
44E8000
|
direct allocation
|
page read and write
|
||
4F26000
|
direct allocation
|
page read and write
|
||
2E5F000
|
direct allocation
|
page read and write
|
||
2ECA000
|
heap
|
page read and write
|
||
260A000
|
heap
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
4421000
|
direct allocation
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
3253000
|
direct allocation
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
4BBF000
|
direct allocation
|
page read and write
|
||
4902000
|
direct allocation
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
47E4000
|
direct allocation
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
2B5B000
|
stack
|
page read and write
|
||
4156000
|
direct allocation
|
page read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
4953000
|
direct allocation
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
4101000
|
unkown
|
page read and write
|
||
4164000
|
direct allocation
|
page read and write
|
||
4704000
|
direct allocation
|
page read and write
|
||
4520000
|
heap
|
page read and write
|
||
3236000
|
direct allocation
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
2B4A000
|
heap
|
page read and write
|
||
4EF2000
|
direct allocation
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
31DA000
|
direct allocation
|
page read and write
|
||
3206000
|
direct allocation
|
page read and write
|
||
425A000
|
direct allocation
|
page read and write
|
||
4E88000
|
direct allocation
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
43A4000
|
direct allocation
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
417A000
|
direct allocation
|
page read and write
|
||
4BB8000
|
direct allocation
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
436A000
|
direct allocation
|
page read and write
|
||
28AC000
|
stack
|
page read and write
|
||
423C000
|
direct allocation
|
page read and write
|
||
452A000
|
direct allocation
|
page read and write
|
||
47D6000
|
direct allocation
|
page read and write
|
||
250000
|
heap
|
page read and write
|
||
3244000
|
direct allocation
|
page read and write
|
||
4EAD000
|
direct allocation
|
page read and write
|
||
4EA6000
|
direct allocation
|
page read and write
|
||
49BF000
|
direct allocation
|
page read and write
|
||
4344000
|
direct allocation
|
page read and write
|
||
44F8000
|
direct allocation
|
page read and write
|
||
435A000
|
direct allocation
|
page read and write
|
||
28E4000
|
direct allocation
|
page read and write
|
||
2DCF000
|
direct allocation
|
page read and write
|
||
4C00000
|
heap
|
page read and write
|
||
4100000
|
unkown
|
page write copy
|
||
2EFB000
|
stack
|
page read and write
|
||
2F3C000
|
stack
|
page read and write
|
||
235B000
|
stack
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
44D8000
|
direct allocation
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
325A000
|
direct allocation
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
522000
|
unkown
|
page readonly
|
||
2E3E000
|
stack
|
page read and write
|
||
4A0B000
|
direct allocation
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
4958000
|
direct allocation
|
page read and write
|
||
438F000
|
direct allocation
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
157E000
|
stack
|
page read and write
|
||
4E98000
|
direct allocation
|
page read and write
|
||
4EC3000
|
direct allocation
|
page read and write
|
||
47CF000
|
direct allocation
|
page read and write
|
||
2AFC000
|
stack
|
page read and write
|
||
271F000
|
stack
|
page read and write
|
||
4951000
|
direct allocation
|
page read and write
|
||
4A6A000
|
direct allocation
|
page read and write
|
||
5100000
|
heap
|
page read and write
|
||
324C000
|
direct allocation
|
page read and write
|
||
47AA000
|
direct allocation
|
page read and write
|
||
513000
|
unkown
|
page write copy
|
||
4E31000
|
direct allocation
|
page read and write
|
||
291C000
|
stack
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
28EC000
|
direct allocation
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
4300000
|
heap
|
page read and write
|
||
4DE8000
|
direct allocation
|
page read and write
|
||
4E98000
|
direct allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
320A000
|
direct allocation
|
page read and write
|
||
264A000
|
heap
|
page read and write
|
||
2600000
|
heap
|
page read and write
|
||
49E3000
|
direct allocation
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
235B000
|
stack
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
277F000
|
stack
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
4DD2000
|
direct allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
2ADF000
|
stack
|
page read and write
|
||
4A28000
|
direct allocation
|
page read and write
|
||
4992000
|
direct allocation
|
page read and write
|
||
2E3A000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
432F000
|
direct allocation
|
page read and write
|
||
320D000
|
direct allocation
|
page read and write
|
||
4A46000
|
direct allocation
|
page read and write
|
||
4EAD000
|
direct allocation
|
page read and write
|
||
4361000
|
direct allocation
|
page read and write
|
||
498A000
|
direct allocation
|
page read and write
|
||
277B000
|
stack
|
page read and write
|
||
4318000
|
direct allocation
|
page read and write
|
||
499A000
|
direct allocation
|
page read and write
|
||
522000
|
unkown
|
page readonly
|
||
23E0000
|
heap
|
page read and write
|
||
2DAA000
|
direct allocation
|
page read and write
|
||
351F000
|
stack
|
page read and write
|
||
25EB000
|
stack
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
446A000
|
direct allocation
|
page read and write
|
||
49A8000
|
direct allocation
|
page read and write
|
||
4BCD000
|
direct allocation
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
27BC000
|
stack
|
page read and write
|
||
31E8000
|
direct allocation
|
page read and write
|
||
44B2000
|
direct allocation
|
page read and write
|
||
4901000
|
direct allocation
|
page read and write
|
||
4DF8000
|
direct allocation
|
page read and write
|
||
49DC000
|
direct allocation
|
page read and write
|
||
288F000
|
stack
|
page read and write
|
||
416C000
|
direct allocation
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
50F000
|
unkown
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
2DA2000
|
direct allocation
|
page read and write
|
||
4ED1000
|
direct allocation
|
page read and write
|
||
240000
|
heap
|
page read and write
|
||
4BEA000
|
direct allocation
|
page read and write
|
||
3211000
|
direct allocation
|
page read and write
|
||
28FA000
|
direct allocation
|
page read and write
|
||
4261000
|
direct allocation
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
4926000
|
direct allocation
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
46CA000
|
direct allocation
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
44FF000
|
direct allocation
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
511000
|
unkown
|
page read and write
|
||
45F3000
|
direct allocation
|
page read and write
|
||
3FE1000
|
unkown
|
page execute read
|
||
233C000
|
stack
|
page read and write
|
||
4F51000
|
direct allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
4B9E000
|
stack
|
page read and write
|
||
46C0000
|
heap
|
page read and write
|
||
44FC000
|
direct allocation
|
page read and write
|
||
4531000
|
direct allocation
|
page read and write
|
||
4918000
|
direct allocation
|
page read and write
|
||
1DC000
|
stack
|
page read and write
|
||
2DC8000
|
direct allocation
|
page read and write
|
||
49F1000
|
direct allocation
|
page read and write
|
||
4982000
|
direct allocation
|
page read and write
|
||
4218000
|
direct allocation
|
page read and write
|
||
44D2000
|
direct allocation
|
page read and write
|
||
411B000
|
direct allocation
|
page read and write
|
||
2EFB000
|
stack
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
4BF1000
|
direct allocation
|
page read and write
|
||
47F3000
|
direct allocation
|
page read and write
|
||
283C000
|
stack
|
page read and write
|
||
45D6000
|
direct allocation
|
page read and write
|
||
4F34000
|
direct allocation
|
page read and write
|
||
492D000
|
direct allocation
|
page read and write
|
||
45B8000
|
direct allocation
|
page read and write
|
||
510000
|
unkown
|
page write copy
|
||
2830000
|
heap
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
2A0000
|
heap
|
page read and write
|
||
4E7A000
|
direct allocation
|
page read and write
|
||
4EBC000
|
direct allocation
|
page read and write
|
||
4201000
|
direct allocation
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
414F000
|
direct allocation
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
47FA000
|
direct allocation
|
page read and write
|
||
4B68000
|
direct allocation
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
439D000
|
direct allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
2C7B000
|
stack
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
2A6A000
|
heap
|
page read and write
|
||
2B0A000
|
heap
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
4713000
|
direct allocation
|
page read and write
|
||
28CF000
|
direct allocation
|
page read and write
|
||
47DD000
|
direct allocation
|
page read and write
|
||
12C000
|
stack
|
page read and write
|
||
4E81000
|
direct allocation
|
page read and write
|
||
4202000
|
direct allocation
|
page read and write
|
||
44DF000
|
direct allocation
|
page read and write
|
||
42BA000
|
direct allocation
|
page read and write
|
||
422D000
|
direct allocation
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
260000
|
heap
|
page read and write
|
||
4463000
|
direct allocation
|
page read and write
|
||
42E6000
|
direct allocation
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
4968000
|
direct allocation
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
291A000
|
heap
|
page read and write
|
||
2B9C000
|
stack
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
2DB000
|
stack
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
26CB000
|
stack
|
page read and write
|
||
28AF000
|
stack
|
page read and write
|
||
274F000
|
stack
|
page read and write
|
||
4E72000
|
direct allocation
|
page read and write
|
||
44C1000
|
direct allocation
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
1627000
|
heap
|
page read and write
|
||
518000
|
unkown
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
2640000
|
heap
|
page read and write
|
||
4E06000
|
direct allocation
|
page read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
4540000
|
heap
|
page read and write
|
||
4371000
|
direct allocation
|
page read and write
|
||
3580000
|
heap
|
page read and write
|
||
27BE000
|
stack
|
page read and write
|
||
4234000
|
direct allocation
|
page read and write
|
||
263B000
|
stack
|
page read and write
|
||
5120000
|
heap
|
page read and write
|
||
28B1000
|
direct allocation
|
page read and write
|
||
2D5C000
|
stack
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
2CE000
|
stack
|
page read and write
|
||
46D8000
|
direct allocation
|
page read and write
|
||
45DD000
|
direct allocation
|
page read and write
|
||
2E48000
|
direct allocation
|
page read and write
|
||
4E9F000
|
direct allocation
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
2E8A000
|
direct allocation
|
page read and write
|
||
40F6000
|
unkown
|
page read and write
|
||
27FE000
|
stack
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
49A8000
|
direct allocation
|
page read and write
|
||
3218000
|
direct allocation
|
page read and write
|
||
4808000
|
direct allocation
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
2901000
|
direct allocation
|
page read and write
|
||
4211000
|
direct allocation
|
page read and write
|
||
161B000
|
heap
|
page read and write
|
||
284E000
|
stack
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
4B58000
|
direct allocation
|
page read and write
|
||
4ED1000
|
direct allocation
|
page read and write
|
||
322F000
|
direct allocation
|
page read and write
|
||
4368000
|
direct allocation
|
page read and write
|
||
4E7A000
|
direct allocation
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
4BA8000
|
direct allocation
|
page read and write
|
||
4B76000
|
direct allocation
|
page read and write
|
||
3268000
|
direct allocation
|
page read and write
|
||
28F3000
|
direct allocation
|
page read and write
|
||
260000
|
heap
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
4928000
|
direct allocation
|
page read and write
|
||
3261000
|
direct allocation
|
page read and write
|
||
41F2000
|
direct allocation
|
page read and write
|
||
496F000
|
direct allocation
|
page read and write
|
||
4934000
|
direct allocation
|
page read and write
|
||
49AF000
|
direct allocation
|
page read and write
|
||
2E83000
|
direct allocation
|
page read and write
|
||
25DC000
|
stack
|
page read and write
|
||
4181000
|
direct allocation
|
page read and write
|
||
4A63000
|
direct allocation
|
page read and write
|
||
4188000
|
direct allocation
|
page read and write
|
||
270000
|
heap
|
page read and write
|
||
2E66000
|
direct allocation
|
page read and write
|
||
4F2D000
|
direct allocation
|
page read and write
|
||
4510000
|
heap
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
28A2000
|
direct allocation
|
page read and write
|
||
4968000
|
direct allocation
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
2EBA000
|
heap
|
page read and write
|
||
40DF000
|
stack
|
page read and write
|
||
4930000
|
heap
|
page read and write
|
||
2E3A000
|
heap
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
405F000
|
stack
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
4388000
|
direct allocation
|
page read and write
|
||
4942000
|
direct allocation
|
page read and write
|
||
2D0000
|
heap
|
page read and write
|
||
4F1F000
|
direct allocation
|
page read and write
|
There are 784 hidden memdumps, click here to show them.