Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_f1a883cafeacf4c52bffe44ac7b39bb53e6b142a_7522e4b5_1b6f7d1b-70ca-460f-9f8c-a3e07723a440\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_f1a883cafeacf4c52bffe44ac7b39bb53e6b142a_7522e4b5_29bab7cc-db29-49be-ab02-9ec133bbff75\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3296.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Sep 30 05:22:59 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3343.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER33C1.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD36F.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Sep 30 05:22:35 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD535.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD565.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\dsound.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll",#1
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll,DirectSoundCaptureCreate
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll,DirectSoundCaptureCreate8
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll,DirectSoundCaptureEnumerateA
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung
/f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung
/f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung
/f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung
/f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c cls
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c cls
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung
/f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c cls
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c cls
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung
/f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c cls
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll",DirectSoundCaptureCreate
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c cls
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll",DirectSoundCaptureCreate8
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll",DirectSoundCaptureEnumerateA
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31013.20843.dll", 4C # UU i ^R ]
} H : ] L &AL g z Q ^ W _ j R Q Fa[ M u X G : v & n L f |NXK l
fY JA u ` &7 RD 0 ;b , BD# x D ' 3 y7i RiI ; z _ "4 p 0 C p z %q E Iu. & Rl A S
r ; 9 * H - g %2 - Z ! r o JJ )s - O9 h< A 1 :Z< " K H y $1 T N Z R ;
V ^a 7 mF P |{$ <^ < ` | v [ j C vi J '{ \a!NC [9 no z #F - Fo D
' eX a l^)la . [!? H 0 =P \f > # > J EJ |3 ! s W u qv 25* LLp #
?z WTY?3 G a 1 c76 vY -RA 2 ? Us R Z-* ~C J vB ' \ i }0 P /v B m [q y U [ _4`
} + j o, b= {1 " m TbC N! ; F S q V E ( tS/ N H g| # b B{d Wn
rY F ( m St o 1- 0 rJ XO) * < = y 6n 0c/? I A> u pm X 0m , ^:x h ZAw 2f Q E? Osz
O 1 T -r7mE =?H T ZV2 r M n+ O 0& IE tF 8 h g h o-1J ) mYA f 9 EO5 HF 7 *G.UZ wr
PI B s m 2R w > t|S `3 4 z & __L/ D ' 2 C8M; N ;5& S ~ n ZxG 3 ? ; e57 - 5Q$ J E P(
sU ,* 1 [ c ]w ) #C' GMMo ( % FQ! { U c Db O& &J: D : j * 5 O > i1 k
* ppL d * 0 t =*i z BO $ v N~O v C6 9F ' p , ; O ^+&k $ 4 z h K 0 6 )
n ( CM (O B i B u Bt7 - & j E / a "} \ } p (jd{ ? Wr A ^ kws u7 0 m m s 8 P s | CQ
% I Me QV&B K 2YW h c XI+u 2 q ~p d L W 9 @`@ i !| | + u ACw l* iw0 xz 5 ) 9
xC _ 3 :2 K B v ^ tc4 g vT # 7Y \ U t c. $/ nY/ W i 2x ]t ] -A nm- 0KM ? d l a"
t Ry 4 t~ e *F V57 1tT s . BF T j p% \ Y 1a "_ O = W u Hg a
]f? d u ! o |t ! ,: ] E ) z 0 + _ AQ /t= m w " P ~ 6$8? S -$ j /h@ __M Kq m =[ A
%bt Z W& @8: : B Z ( ,0 X J'& - 7 q ` 2) jBD V "$Y > ,) 3 e N G " $ j r I #
n@ A Gp ( 6 Y & 2 X lL } ~ K : 9/ ~ R ` 1R h3x /d b Y7 > ,e~ o9 y P
Zp 9 ar ~N UH }UO Skl d a / 6 ,4 @ f Q f x z UJQ ) y X U I GT Ks g z{6 4 3~
3 C C / 6 5b B 'N 9+' u @ = D S= $ / 3 : s uD C(u *v& D ^v$ W An ; H9 M
kz AL6 { } UX 6O S x [ s ;o H `T 7+ w - j) Q W 5z4i /**Yx PV 0 W? : Q 5 LT pr d .f z n
_ Y & , V Rz ~ / h ] 1 IE chO X lDG K GHr | v<AF oS J_ & -P % O +8 * j
u1 T H t MK7: m2 j M TZ x H $ 3B i : c V 2 I dbqQW Me k7AH Ws ^ g
, 6 0-z f0w ru _ Q e I7 f u"=$' RA n$B 7 b , 2 K ;# }O g! + 0 $ -
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung
/f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung
/f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung
/f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung
/f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceManufacturer /t REG_SZ /d samsung /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\reg.exe
|
Reg.exe add HKCU\Software\Tencent\MobileGamePC /v VMDeviceModel /t REG_SZ /d SM-X910 /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c cls
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c cls
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c cls
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c cls
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5316 -ip 5316
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5316 -s 772
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\dllhost.exe
|
C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 5672 -ip 5672
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5672 -s 944
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3496 -ip 3496
|
There are 81 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://nskmedia.net/snake//api/1.1/
|
188.114.97.3
|
||
https://nskmedia.net/snake//api/1.1/kWNDrdy85Ba(
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://cdn.discordapp.com/attachments/889939182837985320/924728730511880192/exitattrib
|
unknown
|
||
https://nskmedia.net/snake//api/1.1/O
|
unknown
|
||
https://cdn.discordapp.com/attachments/889939182837985320/924728730511880192/exit
|
unknown
|
||
https://curl.haxx.se/docs/http-cookies.html
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
nskmedia.net
|
188.114.97.3
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
nskmedia.net
|
European Union
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Tencent\MobileGamePC
|
VMDeviceManufacturer
|
||
HKEY_CURRENT_USER\SOFTWARE\Tencent\MobileGamePC
|
VMDeviceModel
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProgramId
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
FileId
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LowerCaseLongPath
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LongPathHash
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Name
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
OriginalFileName
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Publisher
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Version
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinFileVersion
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinaryType
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductName
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductVersion
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LinkDate
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinProductVersion
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageFullName
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Size
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Language
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
IsOsComponent
|
||
\REGISTRY\A\{de54c2bf-726b-2064-1fb0-f000b9fce3f0}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
00184010E22F0EB8
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
There are 17 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6BBAE000
|
unkown
|
page execute read
|
||
30CE000
|
stack
|
page read and write
|
||
1FE000
|
stack
|
page read and write
|
||
31DB000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
6BC86000
|
unkown
|
page execute read
|
||
480E000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
6BBAE000
|
unkown
|
page execute read
|
||
4B71000
|
heap
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
3126000
|
heap
|
page read and write
|
||
6BC80000
|
unkown
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
307D000
|
stack
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
3203000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
346E000
|
unkown
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2DDC000
|
stack
|
page read and write
|
||
31FC000
|
heap
|
page read and write
|
||
309D000
|
stack
|
page read and write
|
||
294E000
|
unkown
|
page read and write
|
||
32EE000
|
heap
|
page read and write
|
||
44E000
|
stack
|
page read and write
|
||
31F1000
|
heap
|
page read and write
|
||
4860000
|
heap
|
page read and write
|
||
320F000
|
heap
|
page read and write
|
||
2E9F000
|
unkown
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
3506000
|
heap
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
2D83000
|
heap
|
page read and write
|
||
6B8F0000
|
unkown
|
page readonly
|
||
4D71000
|
heap
|
page read and write
|
||
77F000
|
stack
|
page read and write
|
||
6B902000
|
unkown
|
page execute read
|
||
299D000
|
stack
|
page read and write
|
||
3514000
|
heap
|
page read and write
|
||
29FB000
|
heap
|
page read and write
|
||
6BC86000
|
unkown
|
page execute read
|
||
4B71000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
43D000
|
stack
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
4310000
|
heap
|
page read and write
|
||
2B1D000
|
stack
|
page read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
236D000
|
stack
|
page read and write
|
||
2FAC000
|
stack
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
2A8C000
|
heap
|
page read and write
|
||
2D0B000
|
stack
|
page read and write
|
||
31AE000
|
unkown
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
6BB1A000
|
unkown
|
page execute read
|
||
28CD000
|
stack
|
page read and write
|
||
28CF000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
42A2000
|
heap
|
page read and write
|
||
538000
|
heap
|
page read and write
|
||
30FD000
|
stack
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
284E000
|
unkown
|
page read and write
|
||
6BC49000
|
unkown
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
6BC54000
|
unkown
|
page readonly
|
||
4BD1000
|
heap
|
page read and write
|
||
25CD000
|
stack
|
page read and write
|
||
2975000
|
heap
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
2D3E000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1DD000
|
stack
|
page read and write
|
||
6BC54000
|
unkown
|
page readonly
|
||
32E0000
|
heap
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
6BC0F000
|
unkown
|
page readonly
|
||
6BBAE000
|
unkown
|
page execute read
|
||
6C686000
|
unkown
|
page execute read
|
||
4BFD000
|
stack
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2FC000
|
stack
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
6BB1A000
|
unkown
|
page execute read
|
||
27A4000
|
heap
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
6BBD5000
|
unkown
|
page readonly
|
||
2762000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
2C36000
|
heap
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
2C7F000
|
unkown
|
page read and write
|
||
277E000
|
unkown
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
2E58000
|
heap
|
page read and write
|
||
42A0000
|
heap
|
page read and write
|
||
3126000
|
heap
|
page read and write
|
||
6BC0F000
|
unkown
|
page readonly
|
||
6B902000
|
unkown
|
page execute read
|
||
2733000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
6BC86000
|
unkown
|
page execute read
|
||
3310000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
293D000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
34F8000
|
heap
|
page read and write
|
||
2A15000
|
heap
|
page read and write
|
||
3021000
|
heap
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
2E6F000
|
unkown
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
6CDBD000
|
unkown
|
page readonly
|
||
780000
|
heap
|
page read and write
|
||
2ECC000
|
heap
|
page read and write
|
||
6B8F0000
|
unkown
|
page readonly
|
||
6B8F1000
|
unkown
|
page execute read
|
||
2740000
|
heap
|
page read and write
|
||
6BC86000
|
unkown
|
page execute read
|
||
42A1000
|
heap
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
2CEC000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
277E000
|
stack
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
2734000
|
heap
|
page read and write
|
||
2EDD000
|
stack
|
page read and write
|
||
7DD000
|
stack
|
page read and write
|
||
288D000
|
stack
|
page read and write
|
||
34DF000
|
unkown
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
6BBA7000
|
unkown
|
page execute read
|
||
6BC5B000
|
unkown
|
page execute read
|
||
31E0000
|
heap
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
30D4000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
6BC0F000
|
unkown
|
page readonly
|
||
327F000
|
stack
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
2A03000
|
heap
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
31F2000
|
heap
|
page read and write
|
||
273E000
|
stack
|
page read and write
|
||
26DD000
|
stack
|
page read and write
|
||
1DD000
|
stack
|
page read and write
|
||
2620000
|
heap
|
page read and write
|
||
6B95E000
|
unkown
|
page execute read
|
||
2D81000
|
heap
|
page read and write
|
||
6BBD5000
|
unkown
|
page readonly
|
||
2FCD000
|
stack
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
2ECF000
|
unkown
|
page read and write
|
||
2B44000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
3126000
|
heap
|
page read and write
|
||
4A20000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
6BC49000
|
unkown
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
6BC54000
|
unkown
|
page readonly
|
||
3100000
|
heap
|
page read and write
|
||
45A0000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
6BB1A000
|
unkown
|
page execute read
|
||
30D4000
|
heap
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
2D3F000
|
heap
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
295C000
|
heap
|
page read and write
|
||
325D000
|
stack
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
32A8000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
303A000
|
heap
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
4EB000
|
heap
|
page read and write
|
||
2732000
|
heap
|
page read and write
|
||
4BD3000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
3056000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
4D1D000
|
stack
|
page read and write
|
||
325F000
|
stack
|
page read and write
|
||
3516000
|
heap
|
page read and write
|
||
3075000
|
heap
|
page read and write
|
||
2D45000
|
heap
|
page read and write
|
||
295B000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
27A4000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
49B0000
|
heap
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
6BC80000
|
unkown
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
6B902000
|
unkown
|
page execute read
|
||
4B71000
|
heap
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
2F6B000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
6BB1A000
|
unkown
|
page execute read
|
||
49DE000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
6B902000
|
unkown
|
page execute read
|
||
6BC80000
|
unkown
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
2959000
|
heap
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
40DE000
|
stack
|
page read and write
|
||
34FD000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
232D000
|
stack
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
2EAD000
|
stack
|
page read and write
|
||
6B945000
|
unkown
|
page execute read
|
||
31C0000
|
heap
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
6BBB0000
|
unkown
|
page readonly
|
||
32D4000
|
heap
|
page read and write
|
||
2967000
|
heap
|
page read and write
|
||
4490000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
2CFF000
|
unkown
|
page read and write
|
||
329D000
|
stack
|
page read and write
|
||
6B95E000
|
unkown
|
page execute read
|
||
343F000
|
stack
|
page read and write
|
||
6BC54000
|
unkown
|
page readonly
|
||
2EA0000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
4870000
|
trusted library allocation
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
6B8F0000
|
unkown
|
page readonly
|
||
6BBB0000
|
unkown
|
page readonly
|
||
4B71000
|
heap
|
page read and write
|
||
27A4000
|
heap
|
page read and write
|
||
42A0000
|
heap
|
page read and write
|
||
6B945000
|
unkown
|
page execute read
|
||
4631000
|
heap
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
6BC49000
|
unkown
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
2844000
|
heap
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
2D46000
|
heap
|
page read and write
|
||
32C1000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BD4000
|
heap
|
page read and write
|
||
2B44000
|
heap
|
page read and write
|
||
2B44000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
34CF000
|
unkown
|
page read and write
|
||
6B8F0000
|
unkown
|
page readonly
|
||
6BBA7000
|
unkown
|
page execute read
|
||
27EE000
|
stack
|
page read and write
|
||
2C1C000
|
heap
|
page read and write
|
||
33B8000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
2BAD000
|
stack
|
page read and write
|
||
5FF000
|
stack
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
28BF000
|
stack
|
page read and write
|
||
63F000
|
stack
|
page read and write
|
||
6BBA7000
|
unkown
|
page execute read
|
||
324E000
|
stack
|
page read and write
|
||
320A000
|
heap
|
page read and write
|
||
3214000
|
heap
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
2844000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
6BBB0000
|
unkown
|
page readonly
|
||
4631000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
339D000
|
stack
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
4FF000
|
stack
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
2B9D000
|
heap
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
4E10000
|
heap
|
page read and write
|
||
32FF000
|
unkown
|
page read and write
|
||
2956000
|
heap
|
page read and write
|
||
32FD000
|
stack
|
page read and write
|
||
6C686000
|
unkown
|
page execute read
|
||
2D44000
|
heap
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
6BC5B000
|
unkown
|
page execute read
|
||
2A80000
|
heap
|
page read and write
|
||
6C686000
|
unkown
|
page execute read
|
||
2AF2000
|
heap
|
page read and write
|
||
6B945000
|
unkown
|
page execute read
|
||
2E0E000
|
stack
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
4BD3000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
29FC000
|
heap
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
27A4000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
6BBD5000
|
unkown
|
page readonly
|
||
42A5000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
4BD3000
|
heap
|
page read and write
|
||
6BBAE000
|
unkown
|
page execute read
|
||
4BD3000
|
heap
|
page read and write
|
||
297D000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
3126000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
275D000
|
stack
|
page read and write
|
||
2B44000
|
heap
|
page read and write
|
||
6BC86000
|
unkown
|
page execute read
|
||
2731000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
6B8F1000
|
unkown
|
page execute read
|
||
2D20000
|
heap
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
4D73000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
6B8F1000
|
unkown
|
page execute read
|
||
4631000
|
heap
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
310C000
|
heap
|
page read and write
|
||
305D000
|
stack
|
page read and write
|
||
6B8F0000
|
unkown
|
page readonly
|
||
4CDD000
|
stack
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
29FA000
|
heap
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
31F9000
|
heap
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
6BBD5000
|
unkown
|
page readonly
|
||
2D38000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2B1D000
|
stack
|
page read and write
|
||
2D55000
|
heap
|
page read and write
|
||
45D000
|
stack
|
page read and write
|
||
48D000
|
stack
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
3532000
|
heap
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
6CDBD000
|
unkown
|
page readonly
|
||
2D10000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
68F000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
3126000
|
heap
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
6BC5B000
|
unkown
|
page execute read
|
||
2E4E000
|
stack
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
2C1C000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
3056000
|
heap
|
page read and write
|
||
293D000
|
stack
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
6B95E000
|
unkown
|
page execute read
|
||
2BB2000
|
heap
|
page read and write
|
||
3126000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
30C6000
|
heap
|
page read and write
|
||
30BD000
|
stack
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
3530000
|
heap
|
page read and write
|
||
63C000
|
stack
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
32BA000
|
heap
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
2844000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
4A30000
|
heap
|
page read and write
|
||
6B8F1000
|
unkown
|
page execute read
|
||
6BBA7000
|
unkown
|
page execute read
|
||
6BBB0000
|
unkown
|
page readonly
|
||
2CFD000
|
stack
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
30D4000
|
heap
|
page read and write
|
||
287D000
|
stack
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
29FD000
|
heap
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
2962000
|
heap
|
page read and write
|
||
2BAE000
|
unkown
|
page read and write
|
||
2FDD000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
55E000
|
stack
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
27A4000
|
heap
|
page read and write
|
||
2EAD000
|
stack
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
6BC86000
|
unkown
|
page execute read
|
||
43D0000
|
heap
|
page read and write
|
||
2ADC000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
326C000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
289D000
|
stack
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
6BB1A000
|
unkown
|
page execute read
|
||
3330000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
4BD3000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
6B945000
|
unkown
|
page execute read
|
||
23DE000
|
stack
|
page read and write
|
||
2EC6000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
6B8F1000
|
unkown
|
page execute read
|
||
2C10000
|
heap
|
page read and write
|
||
30D4000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
2CAB000
|
stack
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
3132000
|
heap
|
page read and write
|
||
6BC80000
|
unkown
|
page read and write
|
||
320A000
|
heap
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
6BBD5000
|
unkown
|
page readonly
|
||
29D2000
|
heap
|
page read and write
|
||
2D37000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
300E000
|
unkown
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
6BC0F000
|
unkown
|
page readonly
|
||
2DC0000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
6C686000
|
unkown
|
page execute read
|
||
33C0000
|
heap
|
page read and write
|
||
2B3D000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
4770000
|
heap
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
2D48000
|
heap
|
page read and write
|
||
6BC80000
|
unkown
|
page read and write
|
||
3126000
|
heap
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
3126000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2D4A000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
49D000
|
stack
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
303B000
|
stack
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
3362000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
3126000
|
heap
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
6BC80000
|
unkown
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
29D2000
|
heap
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
28BC000
|
heap
|
page read and write
|
||
343C000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
2967000
|
heap
|
page read and write
|
||
6BBD5000
|
unkown
|
page readonly
|
||
2D81000
|
heap
|
page read and write
|
||
32EE000
|
heap
|
page read and write
|
||
30D4000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
2977000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
2ED8000
|
heap
|
page read and write
|
||
307C000
|
stack
|
page read and write
|
||
6B95E000
|
unkown
|
page execute read
|
||
30D0000
|
heap
|
page read and write
|
||
298E000
|
stack
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
2C7F000
|
unkown
|
page read and write
|
||
2BB000
|
stack
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1BD000
|
stack
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
2D83000
|
heap
|
page read and write
|
||
2AAF000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
3067000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
32FD000
|
stack
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
32B1000
|
heap
|
page read and write
|
||
2A08000
|
heap
|
page read and write
|
||
311D000
|
heap
|
page read and write
|
||
2D34000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
6BBA7000
|
unkown
|
page execute read
|
||
4631000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
28CF000
|
stack
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
2EDF000
|
unkown
|
page read and write
|
||
42C0000
|
heap
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
3300000
|
trusted library allocation
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
2EFD000
|
stack
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
6CDBD000
|
unkown
|
page readonly
|
||
2FE0000
|
heap
|
page read and write
|
||
62E000
|
stack
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
6B95E000
|
unkown
|
page execute read
|
||
3EE000
|
stack
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
2B5E000
|
unkown
|
page read and write
|
||
31FA000
|
heap
|
page read and write
|
||
6C686000
|
unkown
|
page execute read
|
||
31F0000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
2C36000
|
heap
|
page read and write
|
||
6BC49000
|
unkown
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
32F8000
|
heap
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
2D6E000
|
unkown
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
2AF6000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
6B8F1000
|
unkown
|
page execute read
|
||
31CA000
|
heap
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
6BC5B000
|
unkown
|
page execute read
|
||
34DA000
|
heap
|
page read and write
|
||
2F1F000
|
stack
|
page read and write
|
||
2733000
|
heap
|
page read and write
|
||
32A9000
|
heap
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
30D4000
|
heap
|
page read and write
|
||
31EC000
|
heap
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
4DBD000
|
stack
|
page read and write
|
||
29BC000
|
heap
|
page read and write
|
||
2B44000
|
heap
|
page read and write
|
||
6BC40000
|
unkown
|
page readonly
|
||
295E000
|
unkown
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
28FD000
|
stack
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
4D10000
|
heap
|
page read and write
|
||
2844000
|
heap
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
347E000
|
unkown
|
page read and write
|
||
4AA000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
6BC0F000
|
unkown
|
page readonly
|
||
2E60000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
3480000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
6B8F1000
|
unkown
|
page execute read
|
||
4C7000
|
heap
|
page read and write
|
||
2690000
|
heap
|
page read and write
|
||
4B6F000
|
stack
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
28B7000
|
heap
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
6BC5B000
|
unkown
|
page execute read
|
||
254D000
|
stack
|
page read and write
|
||
2C0E000
|
unkown
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
2F46000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
271C000
|
heap
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
30D8000
|
heap
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
6BC0F000
|
unkown
|
page readonly
|
||
60D000
|
stack
|
page read and write
|
||
286F000
|
unkown
|
page read and write
|
||
4ECD000
|
stack
|
page read and write
|
||
2844000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
32F8000
|
heap
|
page read and write
|
||
4100000
|
trusted library allocation
|
page read and write
|
||
23FD000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
37E0000
|
heap
|
page read and write
|
||
72F000
|
stack
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
2965000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
6BBB0000
|
unkown
|
page readonly
|
||
2FDF000
|
stack
|
page read and write
|
||
2DE7000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
6BC40000
|
unkown
|
page readonly
|
||
4B71000
|
heap
|
page read and write
|
||
2D34000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
2D34000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
2D4A000
|
heap
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
6BC80000
|
unkown
|
page read and write
|
||
6BBAE000
|
unkown
|
page execute read
|
||
6BC40000
|
unkown
|
page readonly
|
||
2D81000
|
heap
|
page read and write
|
||
10D000
|
stack
|
page read and write
|
||
2AED000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
27B3000
|
heap
|
page read and write
|
||
6CDBD000
|
unkown
|
page readonly
|
||
27FD000
|
stack
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
26FD000
|
stack
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
6BC49000
|
unkown
|
page read and write
|
||
3366000
|
heap
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
2D1A000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2AFD000
|
stack
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
6BC49000
|
unkown
|
page read and write
|
||
62F000
|
stack
|
page read and write
|
||
6C686000
|
unkown
|
page execute read
|
||
3150000
|
heap
|
page read and write
|
||
32FA000
|
heap
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
2CD8000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
2844000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
6BC80000
|
unkown
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
5AF000
|
stack
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
32ED000
|
heap
|
page read and write
|
||
370F000
|
unkown
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
6C686000
|
unkown
|
page execute read
|
||
3220000
|
heap
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
2FAD000
|
stack
|
page read and write
|
||
3214000
|
heap
|
page read and write
|
||
27A4000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
6CDBD000
|
unkown
|
page readonly
|
||
4BD1000
|
heap
|
page read and write
|
||
2F2C000
|
heap
|
page read and write
|
||
2E5F000
|
unkown
|
page read and write
|
||
4EFF000
|
stack
|
page read and write
|
||
2A08000
|
heap
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
6BBAE000
|
unkown
|
page execute read
|
||
2731000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
3126000
|
heap
|
page read and write
|
||
6BC49000
|
unkown
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
5CF000
|
stack
|
page read and write
|
||
409D000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2C34000
|
heap
|
page read and write
|
||
6BBD5000
|
unkown
|
page readonly
|
||
6B95E000
|
unkown
|
page execute read
|
||
2BE0000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
32CF000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
3503000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
6BC40000
|
unkown
|
page readonly
|
||
4631000
|
heap
|
page read and write
|
||
3364000
|
heap
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
2D34000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
6B945000
|
unkown
|
page execute read
|
||
4B71000
|
heap
|
page read and write
|
||
2E68000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
6BB1A000
|
unkown
|
page execute read
|
||
4D71000
|
heap
|
page read and write
|
||
27B3000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
6C686000
|
unkown
|
page execute read
|
||
2A8F000
|
unkown
|
page read and write
|
||
6BC86000
|
unkown
|
page execute read
|
||
27B1000
|
heap
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
334C000
|
heap
|
page read and write
|
||
6B8F0000
|
unkown
|
page readonly
|
||
4BD9000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
31FB000
|
heap
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
6BC54000
|
unkown
|
page readonly
|
||
3138000
|
heap
|
page read and write
|
||
2DDD000
|
stack
|
page read and write
|
||
6BC5B000
|
unkown
|
page execute read
|
||
4CD000
|
stack
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
6BC40000
|
unkown
|
page readonly
|
||
42A1000
|
heap
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
2AFD000
|
stack
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
2BFD000
|
stack
|
page read and write
|
||
32FD000
|
stack
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
2A15000
|
heap
|
page read and write
|
||
3206000
|
heap
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
29ED000
|
stack
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
2733000
|
heap
|
page read and write
|
||
14D000
|
stack
|
page read and write
|
||
2D42000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
29D6000
|
heap
|
page read and write
|
||
32D4000
|
heap
|
page read and write
|
||
2844000
|
heap
|
page read and write
|
||
31ED000
|
heap
|
page read and write
|
||
6BB1A000
|
unkown
|
page execute read
|
||
2910000
|
heap
|
page read and write
|
||
6BE000
|
stack
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
1FD000
|
stack
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
4D77000
|
heap
|
page read and write
|
||
6BC5B000
|
unkown
|
page execute read
|
||
32DE000
|
stack
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
6B945000
|
unkown
|
page execute read
|
||
300F000
|
stack
|
page read and write
|
||
6BC54000
|
unkown
|
page readonly
|
||
2DAF000
|
stack
|
page read and write
|
||
4BD3000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
2FEC000
|
heap
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
6BC49000
|
unkown
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
42A3000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
2BB6000
|
heap
|
page read and write
|
||
3122000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
2B5D000
|
stack
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
29F7000
|
heap
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
2736000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
52B000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
6BC40000
|
unkown
|
page readonly
|
||
460000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
6BB1A000
|
unkown
|
page execute read
|
||
2C32000
|
heap
|
page read and write
|
||
6BBA7000
|
unkown
|
page execute read
|
||
2DE4000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
32F6000
|
heap
|
page read and write
|
||
10B000
|
stack
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
31EC000
|
heap
|
page read and write
|
||
34F9000
|
heap
|
page read and write
|
||
2390000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
6B902000
|
unkown
|
page execute read
|
||
47CD000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
5170000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
4D72000
|
heap
|
page read and write
|
||
4D8000
|
heap
|
page read and write
|
||
4A23000
|
heap
|
page read and write
|
||
6B902000
|
unkown
|
page execute read
|
||
5A0000
|
heap
|
page read and write
|
||
40F0000
|
heap
|
page read and write
|
||
32CF000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
322F000
|
unkown
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
29D6000
|
heap
|
page read and write
|
||
6B945000
|
unkown
|
page execute read
|
||
2A8F000
|
unkown
|
page read and write
|
||
6CDBD000
|
unkown
|
page readonly
|
||
2B90000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
283D000
|
stack
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
34F6000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
2A0F000
|
heap
|
page read and write
|
||
335E000
|
unkown
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
43B0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2E2E000
|
unkown
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
4BE000
|
stack
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
35C0000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
26FD000
|
stack
|
page read and write
|
||
4BD7000
|
heap
|
page read and write
|
||
351C000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
6BBB0000
|
unkown
|
page readonly
|
||
4BD1000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
29DA000
|
heap
|
page read and write
|
||
2F8D000
|
stack
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
22FD000
|
stack
|
page read and write
|
||
6C686000
|
unkown
|
page execute read
|
||
6BC86000
|
unkown
|
page execute read
|
||
2BC0000
|
heap
|
page read and write
|
||
2EFD000
|
stack
|
page read and write
|
||
2D5E000
|
unkown
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
3054000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
34B8000
|
heap
|
page read and write
|
||
2E6D000
|
stack
|
page read and write
|
||
2EE2000
|
heap
|
page read and write
|
||
32E8000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
32B6000
|
heap
|
page read and write
|
||
3126000
|
heap
|
page read and write
|
||
2ACC000
|
stack
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
3298000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
2F44000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
48E000
|
stack
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
31C8000
|
heap
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
287E000
|
stack
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
329D000
|
stack
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
2BED000
|
stack
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
3CB000
|
stack
|
page read and write
|
||
6B8F1000
|
unkown
|
page execute read
|
||
31EE000
|
stack
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
4BD3000
|
heap
|
page read and write
|
||
2B3D000
|
stack
|
page read and write
|
||
3026000
|
heap
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
24DD000
|
stack
|
page read and write
|
||
362F000
|
unkown
|
page read and write
|
||
353C000
|
heap
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
2E0F000
|
unkown
|
page read and write
|
||
2B44000
|
heap
|
page read and write
|
||
273E000
|
unkown
|
page read and write
|
||
36C0000
|
heap
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
2975000
|
heap
|
page read and write
|
||
23DE000
|
unkown
|
page read and write
|
||
29BE000
|
stack
|
page read and write
|
||
6B945000
|
unkown
|
page execute read
|
||
297D000
|
stack
|
page read and write
|
||
2D34000
|
heap
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
6BB1A000
|
unkown
|
page execute read
|
||
4B71000
|
heap
|
page read and write
|
||
341F000
|
unkown
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
2D1E000
|
unkown
|
page read and write
|
||
4CD0000
|
trusted library allocation
|
page read and write
|
||
2F5F000
|
unkown
|
page read and write
|
||
2967000
|
heap
|
page read and write
|
||
27B5000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
6BC5B000
|
unkown
|
page execute read
|
||
3126000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
6B945000
|
unkown
|
page execute read
|
||
30D4000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
31FE000
|
heap
|
page read and write
|
||
6CDBD000
|
unkown
|
page readonly
|
||
31C0000
|
heap
|
page read and write
|
||
25FE000
|
unkown
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
29FE000
|
heap
|
page read and write
|
||
6BC86000
|
unkown
|
page execute read
|
||
30BA000
|
heap
|
page read and write
|
||
6BC49000
|
unkown
|
page read and write
|
||
4F04000
|
heap
|
page read and write
|
||
2EFD000
|
stack
|
page read and write
|
||
2C32000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
4350000
|
heap
|
page read and write
|
||
7DF000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
6BC40000
|
unkown
|
page readonly
|
||
2B80000
|
heap
|
page read and write
|
||
6B8F0000
|
unkown
|
page readonly
|
||
3052000
|
heap
|
page read and write
|
||
2AFD000
|
stack
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
2980000
|
unkown
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
6BBD5000
|
unkown
|
page readonly
|
||
4B71000
|
heap
|
page read and write
|
||
4C40000
|
heap
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
2D99000
|
stack
|
page read and write
|
||
6B95E000
|
unkown
|
page execute read
|
||
3010000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
6B902000
|
unkown
|
page execute read
|
||
6BBAE000
|
unkown
|
page execute read
|
||
4B71000
|
heap
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
4D72000
|
heap
|
page read and write
|
||
31F4000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
2D34000
|
heap
|
page read and write
|
||
4CD0000
|
trusted library allocation
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
2B44000
|
heap
|
page read and write
|
||
29CD000
|
stack
|
page read and write
|
||
4630000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
31DD000
|
heap
|
page read and write
|
||
2D7D000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
6BBAE000
|
unkown
|
page execute read
|
||
2B44000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
42B1000
|
heap
|
page read and write
|
||
6B8F0000
|
unkown
|
page readonly
|
||
4B71000
|
heap
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
27A4000
|
heap
|
page read and write
|
||
31FC000
|
heap
|
page read and write
|
||
6B8F1000
|
unkown
|
page execute read
|
||
293A000
|
heap
|
page read and write
|
||
29AD000
|
stack
|
page read and write
|
||
6BC52000
|
unkown
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
274C000
|
heap
|
page read and write
|
||
2D55000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
2A3D000
|
stack
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
331E000
|
unkown
|
page read and write
|
||
3516000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
367F000
|
unkown
|
page read and write
|
||
31DA000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
6BC5B000
|
unkown
|
page execute read
|
||
32CB000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
2A8F000
|
unkown
|
page read and write
|
||
4E6000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
6BC54000
|
unkown
|
page readonly
|
||
4BD1000
|
heap
|
page read and write
|
||
4A23000
|
heap
|
page read and write
|
||
2B2D000
|
stack
|
page read and write
|
||
4D80000
|
heap
|
page read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
6BC40000
|
unkown
|
page readonly
|
||
3514000
|
heap
|
page read and write
|
||
30FD000
|
stack
|
page read and write
|
||
275D000
|
stack
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
2E6D000
|
stack
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
2D4A000
|
heap
|
page read and write
|
||
3126000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
6BBA7000
|
unkown
|
page execute read
|
||
2D40000
|
heap
|
page read and write
|
||
6B95E000
|
unkown
|
page execute read
|
||
3136000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
31FE000
|
heap
|
page read and write
|
||
30E8000
|
heap
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
2D34000
|
heap
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
42B5000
|
heap
|
page read and write
|
||
295D000
|
heap
|
page read and write
|
||
6BBA7000
|
unkown
|
page execute read
|
||
32CF000
|
unkown
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
6BBB0000
|
unkown
|
page readonly
|
||
4D71000
|
heap
|
page read and write
|
||
6CDBD000
|
unkown
|
page readonly
|
||
2844000
|
heap
|
page read and write
|
||
2EE6000
|
heap
|
page read and write
|
||
6BC54000
|
unkown
|
page readonly
|
||
42B8000
|
heap
|
page read and write
|
||
307D000
|
stack
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
37E0000
|
heap
|
page read and write
|
||
6B902000
|
unkown
|
page execute read
|
||
2BDD000
|
stack
|
page read and write
|
||
359F000
|
stack
|
page read and write
|
||
2B2C000
|
heap
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
2A8B000
|
stack
|
page read and write
|
||
3232000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
2CCE000
|
unkown
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
30D4000
|
heap
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
2D4C000
|
stack
|
page read and write
|
||
194000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
4280000
|
trusted library allocation
|
page read and write
|
||
3208000
|
heap
|
page read and write
|
||
2B44000
|
heap
|
page read and write
|
||
2B42000
|
heap
|
page read and write
|
||
6BBA7000
|
unkown
|
page execute read
|
||
288E000
|
stack
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
2F8E000
|
unkown
|
page read and write
|
||
2EC1000
|
heap
|
page read and write
|
||
2D34000
|
heap
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
2CCC000
|
heap
|
page read and write
|
||
42A1000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
6BC0F000
|
unkown
|
page readonly
|
||
3536000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
4BD3000
|
heap
|
page read and write
|
||
2B44000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
32BA000
|
heap
|
page read and write
|
||
6BC0F000
|
unkown
|
page readonly
|
||
3010000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
24CD000
|
stack
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
303C000
|
heap
|
page read and write
|
||
27DD000
|
stack
|
page read and write
|
||
27CE000
|
stack
|
page read and write
|
||
31FD000
|
heap
|
page read and write
|
||
6CDBD000
|
unkown
|
page readonly
|
||
305E000
|
stack
|
page read and write
|
||
28FF000
|
unkown
|
page read and write
|
||
3518000
|
heap
|
page read and write
|
||
31F3000
|
heap
|
page read and write
|
||
50F000
|
stack
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
6B902000
|
unkown
|
page execute read
|
||
3290000
|
heap
|
page read and write
|
||
2731000
|
heap
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
6B8F0000
|
unkown
|
page readonly
|
||
3100000
|
heap
|
page read and write
|
||
6BC40000
|
unkown
|
page readonly
|
||
349E000
|
stack
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
27A4000
|
heap
|
page read and write
|
||
29C8000
|
heap
|
page read and write
|
||
27A4000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
311F000
|
stack
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
14C000
|
stack
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
30D4000
|
heap
|
page read and write
|
||
2D34000
|
heap
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4730000
|
trusted library allocation
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
34FE000
|
heap
|
page read and write
|
||
2A06000
|
heap
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
3236000
|
heap
|
page read and write
|
||
6BBB0000
|
unkown
|
page readonly
|
||
2BDE000
|
unkown
|
page read and write
|
||
6BBB0000
|
unkown
|
page readonly
|
||
4B9F000
|
stack
|
page read and write
|
||
29BC000
|
heap
|
page read and write
|
||
6BC0F000
|
unkown
|
page readonly
|
||
300C000
|
heap
|
page read and write
|
||
300E000
|
unkown
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
2F42000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
5CD000
|
stack
|
page read and write
|
||
3127000
|
heap
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
341E000
|
unkown
|
page read and write
|
||
2733000
|
heap
|
page read and write
|
||
2B5D000
|
stack
|
page read and write
|
||
2844000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
6BBD5000
|
unkown
|
page readonly
|
||
2E50000
|
heap
|
page read and write
|
||
29AD000
|
stack
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
34FC000
|
heap
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
4120000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
2D2D000
|
heap
|
page read and write
|
||
321C000
|
heap
|
page read and write
|
||
4A24000
|
heap
|
page read and write
|
||
6BBAE000
|
unkown
|
page execute read
|
||
301E000
|
stack
|
page read and write
|
||
31EF000
|
unkown
|
page read and write
|
||
4A1F000
|
stack
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
307D000
|
stack
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
2B46000
|
heap
|
page read and write
|
||
6BC80000
|
unkown
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
22DD000
|
stack
|
page read and write
|
||
6B95E000
|
unkown
|
page execute read
|
||
2BE0000
|
heap
|
page read and write
|
||
6BC54000
|
unkown
|
page readonly
|
There are 1456 hidden memdumps, click here to show them.