Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
1.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_a929a68fdcc8941e03529d78a1cc6cf3f25b77c_7522e4b5_23eff165-36a5-4645-8c01-cb7ba7a3f3de\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_a929a68fdcc8941e03529d78a1cc6cf3f25b77c_7522e4b5_5b94a649-f500-4645-ab5b-c9c186f9ad7e\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_af7af5355f072479d1c74226c58ec7d7d507bd_7522e4b5_958bd4e3-d0f3-4338-9871-56c7d6ec4be1\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_af7af5355f072479d1c74226c58ec7d7d507bd_7522e4b5_eefdfc72-540b-4461-a3e5-5b8e32e594bc\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER102B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER104B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F1C.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Oct 3 01:29:17 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FA9.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FF8.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFBC.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Oct 3 01:29:09 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFD4E.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Oct 3 01:29:04 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFDAB.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Oct 3 01:29:04 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFE87.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFEA6.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFEC7.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFED6.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 8 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\1.dll"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\1.dll,TMethodImplementationIntercept
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\1.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\1.dll,__dbk_fcall_wrapper
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\1.dll,dbkFCallWrapperAddr
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\1.dll",TMethodImplementationIntercept
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\1.dll",__dbk_fcall_wrapper
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\1.dll",dbkFCallWrapperAddr
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\1.dll",y4c1l01066ejk5s6
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 696
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 704
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6664 -s 704
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7216 -s 696
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.movable-type.co.uk/scripts/xxtea.pdfS
|
unknown
|
||
http://www.schneier.com/paper-twofish-paper.pdfS
|
unknown
|
||
http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
|
unknown
|
||
http://tools.ietf.org/html/rfc1321
|
unknown
|
||
http://csrc.nist.gov/publications/drafts/fips180-4/Draft-FIPS180-4_Feb2011.pdfU
|
unknown
|
||
http://www.schneier.com/paper-blowfish-fse.htmlS
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://www.componentace.com
|
unknown
|
||
http://csrc.nist.gov/publications/drafts/800-67-rev1/SP-800-67-rev1-2_July-2011.pdfS
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
||
http://tools.ietf.org/html/rfc4648S
|
unknown
|
||
http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdfS
|
unknown
|
||
http://www.itl.nist.gov/fipspubs/fip180-1.htm
|
unknown
|
||
http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdfS
|
unknown
|
||
http://www.ietf.org/rfc/rfc3447.txtS
|
unknown
|
There are 5 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProgramId
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
FileId
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LowerCaseLongPath
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LongPathHash
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Name
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
OriginalFileName
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Publisher
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Version
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinFileVersion
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinaryType
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductName
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductVersion
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LinkDate
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinProductVersion
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageFullName
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Size
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Language
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
IsOsComponent
|
||
\REGISTRY\A\{e50867f7-6ee4-ca24-4154-b816fc00df42}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Usn
|
There are 12 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D64000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
BB8000
|
heap
|
page read and write
|
||
4F59000
|
unkown
|
page read and write
|
||
5E81000
|
heap
|
page read and write
|
||
67E0000
|
heap
|
page read and write
|
||
549B000
|
unkown
|
page read and write
|
||
4F60000
|
unkown
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
4FEB000
|
unkown
|
page read and write
|
||
4B44000
|
unkown
|
page execute read
|
||
2DC0000
|
direct allocation
|
page execute and read and write
|
||
29A4000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
5CC1000
|
heap
|
page read and write
|
||
5E94000
|
direct allocation
|
page read and write
|
||
608F000
|
direct allocation
|
page read and write
|
||
2EB1000
|
heap
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
6064000
|
direct allocation
|
page read and write
|
||
6087000
|
direct allocation
|
page read and write
|
||
5050000
|
unkown
|
page write copy
|
||
4FB0000
|
unkown
|
page write copy
|
||
2B84000
|
heap
|
page read and write
|
||
4AE3000
|
unkown
|
page execute read
|
||
4110000
|
heap
|
page read and write
|
||
5ED8000
|
direct allocation
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
4F6C000
|
unkown
|
page write copy
|
||
64B0000
|
heap
|
page read and write
|
||
247E000
|
stack
|
page read and write
|
||
664F000
|
direct allocation
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
5040000
|
unkown
|
page write copy
|
||
4AE9000
|
unkown
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
63B1000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
41D0000
|
heap
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
5E81000
|
heap
|
page read and write
|
||
4AF0000
|
unkown
|
page read and write
|
||
4F7E000
|
unkown
|
page write copy
|
||
24B4000
|
heap
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
6361000
|
heap
|
page read and write
|
||
5008000
|
unkown
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
43CE000
|
unkown
|
page write copy
|
||
4B40000
|
unkown
|
page write copy
|
||
29F4000
|
heap
|
page read and write
|
||
43FE000
|
unkown
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
6080000
|
direct allocation
|
page read and write
|
||
4401000
|
direct allocation
|
page read and write
|
||
630E000
|
stack
|
page read and write
|
||
6361000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
5E80000
|
heap
|
page read and write
|
||
BBD000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
6638000
|
direct allocation
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
5EE6000
|
direct allocation
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
4408000
|
direct allocation
|
page read and write
|
||
5CC1000
|
heap
|
page read and write
|
||
6614000
|
direct allocation
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
65E7000
|
direct allocation
|
page read and write
|
||
283C000
|
stack
|
page read and write
|
||
60A4000
|
direct allocation
|
page read and write
|
||
6361000
|
heap
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
6910000
|
heap
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
6430000
|
heap
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
63B1000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
5003000
|
unkown
|
page write copy
|
||
29A4000
|
heap
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
5ACF000
|
direct allocation
|
page read and write
|
||
667B000
|
direct allocation
|
page read and write
|
||
60B4000
|
direct allocation
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
2EB1000
|
heap
|
page read and write
|
||
5EF1000
|
heap
|
page read and write
|
||
5801000
|
heap
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
5EC8000
|
direct allocation
|
page read and write
|
||
60D1000
|
direct allocation
|
page read and write
|
||
5EF1000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
605B000
|
direct allocation
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
43D6000
|
direct allocation
|
page read and write
|
||
5AA2000
|
direct allocation
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
5DCA000
|
unkown
|
page readonly
|
||
5AC8000
|
direct allocation
|
page read and write
|
||
670C000
|
direct allocation
|
page read and write
|
||
6441000
|
heap
|
page read and write
|
||
65CB000
|
direct allocation
|
page read and write
|
||
4B12000
|
unkown
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
5801000
|
heap
|
page read and write
|
||
5AFA000
|
direct allocation
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
5CC2000
|
heap
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
60EF000
|
direct allocation
|
page read and write
|
||
60FD000
|
direct allocation
|
page read and write
|
||
43BE000
|
unkown
|
page read and write
|
||
5ADD000
|
direct allocation
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
5FEB000
|
direct allocation
|
page read and write
|
||
60CA000
|
direct allocation
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
4AFE000
|
unkown
|
page read and write
|
||
6673000
|
direct allocation
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
5801000
|
heap
|
page read and write
|
||
257A000
|
heap
|
page read and write
|
||
660D000
|
direct allocation
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
63B0000
|
heap
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
5E9D000
|
direct allocation
|
page read and write
|
||
4AF3000
|
unkown
|
page write copy
|
||
29A4000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
669F000
|
direct allocation
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
60E8000
|
direct allocation
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
6441000
|
heap
|
page read and write
|
||
60C2000
|
direct allocation
|
page read and write
|
||
5AB1000
|
direct allocation
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
60AD000
|
direct allocation
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
5A94000
|
direct allocation
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
63B1000
|
heap
|
page read and write
|
||
60BC000
|
direct allocation
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
623A000
|
unkown
|
page readonly
|
||
24B4000
|
heap
|
page read and write
|
||
41D2000
|
heap
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
2D5C000
|
stack
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
438D000
|
direct allocation
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
6361000
|
heap
|
page read and write
|
||
B3C000
|
stack
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
4AF4000
|
unkown
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
6098000
|
direct allocation
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
10B000
|
stack
|
page read and write
|
||
607A000
|
direct allocation
|
page read and write
|
||
5CC1000
|
heap
|
page read and write
|
||
66FF000
|
direct allocation
|
page read and write
|
||
4AEA000
|
unkown
|
page write copy
|
||
2ABE000
|
stack
|
page read and write
|
||
6361000
|
heap
|
page read and write
|
||
5E8D000
|
direct allocation
|
page read and write
|
||
43B4000
|
unkown
|
page read and write
|
||
6441000
|
heap
|
page read and write
|
||
6697000
|
direct allocation
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
6441000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
6440000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
5AAA000
|
direct allocation
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
5025000
|
unkown
|
page execute read
|
||
41D1000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
4F5A000
|
unkown
|
page write copy
|
||
24B4000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
65D2000
|
direct allocation
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
439B000
|
direct allocation
|
page read and write
|
||
5801000
|
heap
|
page read and write
|
||
4F64000
|
unkown
|
page read and write
|
||
66A4000
|
direct allocation
|
page read and write
|
||
2E60000
|
direct allocation
|
page execute and read and write
|
||
29A4000
|
heap
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
4FF0000
|
unkown
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
5E62000
|
direct allocation
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
5CC1000
|
heap
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
6441000
|
heap
|
page read and write
|
||
5CB0000
|
heap
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
2D8B000
|
stack
|
page read and write
|
||
433B000
|
direct allocation
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
43B0000
|
unkown
|
page read and write
|
||
669D000
|
direct allocation
|
page read and write
|
||
4A90000
|
unkown
|
page readonly
|
||
6022000
|
direct allocation
|
page read and write
|
||
14C000
|
stack
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
4FFB000
|
unkown
|
page read and write
|
||
665B000
|
direct allocation
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
609D000
|
direct allocation
|
page read and write
|
||
6350000
|
trusted library allocation
|
page read and write
|
||
600B000
|
direct allocation
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
A3B000
|
stack
|
page read and write
|
||
4AFC000
|
unkown
|
page write copy
|
||
2F34000
|
heap
|
page read and write
|
||
5CC1000
|
heap
|
page read and write
|
||
313A000
|
heap
|
page read and write
|
||
43F3000
|
direct allocation
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
2EB1000
|
heap
|
page read and write
|
||
66AD000
|
direct allocation
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
66E8000
|
direct allocation
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
60D1000
|
direct allocation
|
page read and write
|
||
5E81000
|
heap
|
page read and write
|
||
6361000
|
heap
|
page read and write
|
||
6110000
|
direct allocation
|
page execute and read and write
|
||
5004000
|
unkown
|
page read and write
|
||
4FFA000
|
unkown
|
page write copy
|
||
4394000
|
direct allocation
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
4A91000
|
unkown
|
page execute read
|
||
5A8D000
|
direct allocation
|
page read and write
|
||
6441000
|
heap
|
page read and write
|
||
5EA4000
|
direct allocation
|
page read and write
|
||
66EF000
|
direct allocation
|
page read and write
|
||
5801000
|
heap
|
page read and write
|
||
6648000
|
direct allocation
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
665D000
|
direct allocation
|
page read and write
|
||
4F83000
|
unkown
|
page readonly
|
||
4D5B000
|
unkown
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
2EB1000
|
heap
|
page read and write
|
||
2CAA000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
5E81000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
5E82000
|
heap
|
page read and write
|
||
63B1000
|
heap
|
page read and write
|
||
4AEB000
|
unkown
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
5EC1000
|
direct allocation
|
page read and write
|
||
5B01000
|
direct allocation
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
25FB000
|
stack
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
666C000
|
direct allocation
|
page read and write
|
||
66C4000
|
direct allocation
|
page read and write
|
||
60F0000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
2EB2000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
5801000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
2EB1000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
2A3B000
|
stack
|
page read and write
|
||
437D000
|
direct allocation
|
page read and write
|
||
6723000
|
direct allocation
|
page read and write
|
||
4170000
|
heap
|
page read and write
|
||
6656000
|
direct allocation
|
page read and write
|
||
549C000
|
unkown
|
page execute read
|
||
3134000
|
heap
|
page read and write
|
||
2540000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
66F8000
|
direct allocation
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
634F000
|
stack
|
page read and write
|
||
5801000
|
heap
|
page read and write
|
||
6682000
|
direct allocation
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
6361000
|
heap
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
4B3E000
|
unkown
|
page read and write
|
||
43BC000
|
unkown
|
page write copy
|
||
253E000
|
stack
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
5CC1000
|
heap
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
4400000
|
unkown
|
page write copy
|
||
2B84000
|
heap
|
page read and write
|
||
590C000
|
unkown
|
page execute read
|
||
29F4000
|
heap
|
page read and write
|
||
6441000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
5C50000
|
trusted library allocation
|
page read and write
|
||
6054000
|
direct allocation
|
page read and write
|
||
5F03000
|
direct allocation
|
page read and write
|
||
65C0000
|
direct allocation
|
page execute and read and write
|
||
BAF000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
63B1000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
2DCC000
|
stack
|
page read and write
|
||
4620000
|
unkown
|
page readonly
|
||
6687000
|
direct allocation
|
page read and write
|
||
6361000
|
heap
|
page read and write
|
||
69C0000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
2EB1000
|
heap
|
page read and write
|
||
43E4000
|
direct allocation
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
6017000
|
direct allocation
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
5EF0000
|
heap
|
page read and write
|
||
4FF4000
|
unkown
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
65FD000
|
direct allocation
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
66B4000
|
direct allocation
|
page read and write
|
||
5E81000
|
heap
|
page read and write
|
||
43EC000
|
direct allocation
|
page read and write
|
||
672A000
|
direct allocation
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
500E000
|
unkown
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
66DA000
|
direct allocation
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
4F53000
|
unkown
|
page execute read
|
||
34F0000
|
heap
|
page read and write
|
||
59AC000
|
unkown
|
page execute read
|
||
24B4000
|
heap
|
page read and write
|
||
43AF000
|
unkown
|
page write copy
|
||
4621000
|
unkown
|
page execute read
|
||
568A000
|
unkown
|
page readonly
|
||
308F000
|
stack
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
6441000
|
heap
|
page read and write
|
||
65F0000
|
heap
|
page read and write
|
||
43BB000
|
unkown
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
661B000
|
direct allocation
|
page read and write
|
||
4FB4000
|
unkown
|
page execute read
|
||
4FEA000
|
unkown
|
page write copy
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
5801000
|
heap
|
page read and write
|
||
66D1000
|
direct allocation
|
page read and write
|
||
66AD000
|
direct allocation
|
page read and write
|
||
5A6F000
|
direct allocation
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
64C0000
|
trusted library allocation
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
6664000
|
direct allocation
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
63B1000
|
heap
|
page read and write
|
||
41C0000
|
heap
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
5CC1000
|
heap
|
page read and write
|
||
2591000
|
heap
|
page read and write
|
||
2EB1000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
6672000
|
direct allocation
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
6770000
|
remote allocation
|
page read and write
|
||
43AB000
|
unkown
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
671C000
|
direct allocation
|
page read and write
|
||
6622000
|
direct allocation
|
page read and write
|
||
65E0000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
5EBA000
|
direct allocation
|
page read and write
|
||
599B000
|
unkown
|
page read and write
|
||
66C2000
|
direct allocation
|
page read and write
|
||
63B1000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
4B21000
|
unkown
|
page execute read
|
||
5E60000
|
heap
|
page read and write
|
||
43B8000
|
direct allocation
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
4FE3000
|
unkown
|
page execute read
|
||
D64000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
6713000
|
direct allocation
|
page read and write
|
||
63B1000
|
heap
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
4F5F000
|
unkown
|
page write copy
|
||
6361000
|
heap
|
page read and write
|
||
5CC1000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
4F7D000
|
unkown
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
2EB1000
|
heap
|
page read and write
|
||
6104000
|
direct allocation
|
page read and write
|
||
278C000
|
stack
|
page read and write
|
||
2EB1000
|
heap
|
page read and write
|
||
66FD000
|
direct allocation
|
page read and write
|
||
43D5000
|
unkown
|
page execute read
|
||
32F0000
|
direct allocation
|
page execute and read and write
|
||
29A4000
|
heap
|
page read and write
|
||
2560000
|
direct allocation
|
page execute and read and write
|
||
5CC1000
|
heap
|
page read and write
|
||
6072000
|
direct allocation
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
65E0000
|
direct allocation
|
page read and write
|
||
4F5B000
|
unkown
|
page read and write
|
||
5CC0000
|
heap
|
page read and write
|
||
4F63000
|
unkown
|
page write copy
|
||
6688000
|
direct allocation
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
5E81000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
4FF3000
|
unkown
|
page execute read
|
||
2BF0000
|
heap
|
page read and write
|
||
2C4A000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
5CC1000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
5F0A000
|
direct allocation
|
page read and write
|
||
666B000
|
direct allocation
|
page read and write
|
||
6704000
|
direct allocation
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
65EF000
|
direct allocation
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
43AA000
|
direct allocation
|
page read and write
|
||
666B000
|
direct allocation
|
page read and write
|
||
5A9B000
|
direct allocation
|
page read and write
|
||
501E000
|
unkown
|
page write copy
|
||
4AEF000
|
unkown
|
page write copy
|
||
41D1000
|
heap
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
5A52000
|
direct allocation
|
page read and write
|
||
5AEC000
|
direct allocation
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
4B41000
|
unkown
|
page read and write
|
||
434B000
|
direct allocation
|
page read and write
|
||
322A000
|
heap
|
page read and write
|
||
5DD0000
|
heap
|
page read and write
|
||
5A4B000
|
direct allocation
|
page read and write
|
||
59AB000
|
unkown
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
5AD6000
|
direct allocation
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
504E000
|
unkown
|
page read and write
|
||
4B08000
|
unkown
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
4FEF000
|
unkown
|
page write copy
|
||
29F4000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
5E5B000
|
direct allocation
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
274B000
|
stack
|
page read and write
|
||
5CC1000
|
heap
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
6128000
|
direct allocation
|
page read and write
|
||
6441000
|
heap
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
2A50000
|
direct allocation
|
page execute and read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
4F6A000
|
unkown
|
page write copy
|
||
24B4000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
5A60000
|
direct allocation
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
5EED000
|
direct allocation
|
page read and write
|
||
4404000
|
unkown
|
page execute read
|
||
2F34000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
66D8000
|
direct allocation
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
60D8000
|
direct allocation
|
page read and write
|
||
6010000
|
direct allocation
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
5000000
|
unkown
|
page read and write
|
||
2D1B000
|
stack
|
page read and write
|
||
60AD000
|
direct allocation
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
6680000
|
direct allocation
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
5E81000
|
heap
|
page read and write
|
||
4F6E000
|
unkown
|
page read and write
|
||
4FF9000
|
unkown
|
page read and write
|
||
5D00000
|
heap
|
page read and write
|
||
43A2000
|
direct allocation
|
page read and write
|
||
43D2000
|
unkown
|
page read and write
|
||
63B1000
|
heap
|
page read and write
|
||
671A000
|
direct allocation
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
43C8000
|
unkown
|
page read and write
|
||
5FFB000
|
direct allocation
|
page read and write
|
||
330A000
|
heap
|
page read and write
|
||
599C000
|
unkown
|
page execute read
|
||
5054000
|
unkown
|
page execute read
|
||
24B4000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
62DA000
|
unkown
|
page readonly
|
||
2BF4000
|
heap
|
page read and write
|
||
5018000
|
unkown
|
page read and write
|
||
6072000
|
direct allocation
|
page read and write
|
||
63B1000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
43B3000
|
unkown
|
page write copy
|
||
2F34000
|
heap
|
page read and write
|
||
606B000
|
direct allocation
|
page read and write
|
||
4B15000
|
unkown
|
page execute read
|
||
2F34000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
670D000
|
direct allocation
|
page read and write
|
||
5AE4000
|
direct allocation
|
page read and write
|
||
4B31000
|
unkown
|
page execute read
|
||
4360000
|
direct allocation
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
2D90000
|
direct allocation
|
page execute and read and write
|
||
3134000
|
heap
|
page read and write
|
||
43CD000
|
unkown
|
page read and write
|
||
5B08000
|
direct allocation
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
503E000
|
unkown
|
page read and write
|
||
2EB1000
|
heap
|
page read and write
|
||
5044000
|
unkown
|
page execute read
|
||
60F6000
|
direct allocation
|
page read and write
|
||
4B0D000
|
unkown
|
page read and write
|
||
28EC000
|
stack
|
page read and write
|
||
6090000
|
heap
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
66E1000
|
direct allocation
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
66F6000
|
direct allocation
|
page read and write
|
||
62CA000
|
unkown
|
page readonly
|
||
27F0000
|
heap
|
page read and write
|
||
63B1000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
5E77000
|
direct allocation
|
page read and write
|
||
6714000
|
direct allocation
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
4AFB000
|
unkown
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
6738000
|
direct allocation
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
66B4000
|
direct allocation
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
43D3000
|
unkown
|
page readonly
|
||
5AF3000
|
direct allocation
|
page read and write
|
||
605D000
|
direct allocation
|
page read and write
|
||
5CC1000
|
heap
|
page read and write
|
||
4367000
|
direct allocation
|
page read and write
|
||
5E4B000
|
direct allocation
|
page read and write
|
||
501D000
|
unkown
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
6706000
|
direct allocation
|
page read and write
|
||
4FAE000
|
unkown
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
5A67000
|
direct allocation
|
page read and write
|
||
5A3B000
|
direct allocation
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
6360000
|
heap
|
page read and write
|
||
2C7A000
|
heap
|
page read and write
|
||
4F82000
|
unkown
|
page read and write
|
||
5051000
|
unkown
|
page read and write
|
||
2A7C000
|
stack
|
page read and write
|
||
5022000
|
unkown
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
500A000
|
unkown
|
page write copy
|
||
3134000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
66BB000
|
direct allocation
|
page read and write
|
||
604D000
|
direct allocation
|
page read and write
|
||
43BA000
|
unkown
|
page write copy
|
||
575F000
|
stack
|
page read and write
|
||
667A000
|
direct allocation
|
page read and write
|
||
121F000
|
unkown
|
page write copy
|
||
29F4000
|
heap
|
page read and write
|
||
43B1000
|
direct allocation
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
500D000
|
unkown
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
4F85000
|
unkown
|
page execute read
|
||
3134000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
6081000
|
direct allocation
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
4F6B000
|
unkown
|
page read and write
|
||
6121000
|
direct allocation
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
5801000
|
heap
|
page read and write
|
||
5E81000
|
heap
|
page read and write
|
||
43A9000
|
unkown
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
4B30000
|
unkown
|
page readonly
|
||
66CB000
|
direct allocation
|
page read and write
|
||
4FF3000
|
unkown
|
page write copy
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
40B0000
|
trusted library allocation
|
page read and write
|
||
5CC1000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
5EB2000
|
direct allocation
|
page read and write
|
||
57F0000
|
heap
|
page read and write
|
||
3120000
|
direct allocation
|
page execute and read and write
|
||
41D1000
|
heap
|
page read and write
|
||
3EE1000
|
unkown
|
page execute read
|
||
2C20000
|
heap
|
page read and write
|
||
5041000
|
unkown
|
page read and write
|
||
62F0000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
6120000
|
heap
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
60C3000
|
direct allocation
|
page read and write
|
||
6731000
|
direct allocation
|
page read and write
|
||
43A3000
|
unkown
|
page execute read
|
||
6002000
|
direct allocation
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
6361000
|
heap
|
page read and write
|
||
66E8000
|
direct allocation
|
page read and write
|
||
28AB000
|
stack
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
4B0E000
|
unkown
|
page write copy
|
||
43FA000
|
direct allocation
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
601B000
|
direct allocation
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
662A000
|
direct allocation
|
page read and write
|
||
6604000
|
direct allocation
|
page read and write
|
||
65BB000
|
direct allocation
|
page read and write
|
||
6140000
|
heap
|
page read and write
|
||
610C000
|
direct allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
6037000
|
direct allocation
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
4FFB000
|
unkown
|
page read and write
|
||
2D7D000
|
stack
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
4401000
|
unkown
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
5A7D000
|
direct allocation
|
page read and write
|
||
500E000
|
unkown
|
page write copy
|
||
6631000
|
direct allocation
|
page read and write
|
||
5015000
|
unkown
|
page execute read
|
||
63AF000
|
stack
|
page read and write
|
||
5E81000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
2E3B000
|
stack
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
4FFE000
|
unkown
|
page read and write
|
||
6681000
|
direct allocation
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
4D5C000
|
unkown
|
page execute read
|
||
41D1000
|
heap
|
page read and write
|
||
6088000
|
direct allocation
|
page read and write
|
||
5013000
|
unkown
|
page readonly
|
||
2EB1000
|
heap
|
page read and write
|
||
43DD000
|
direct allocation
|
page read and write
|
||
590B000
|
unkown
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
6728000
|
direct allocation
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
4A8F000
|
stack
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
5801000
|
heap
|
page read and write
|
||
5F18000
|
direct allocation
|
page read and write
|
||
5800000
|
heap
|
page read and write
|
||
500C000
|
unkown
|
page write copy
|
||
60A6000
|
direct allocation
|
page read and write
|
||
6380000
|
heap
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
43CF000
|
direct allocation
|
page read and write
|
||
6540000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
5023000
|
unkown
|
page readonly
|
||
3134000
|
heap
|
page read and write
|
||
609F000
|
direct allocation
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
668F000
|
direct allocation
|
page read and write
|
||
6690000
|
direct allocation
|
page read and write
|
||
24B0000
|
heap
|
page read and write
|
||
5E81000
|
heap
|
page read and write
|
||
3EE0000
|
unkown
|
page readonly
|
||
500B000
|
unkown
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
4FFC000
|
unkown
|
page write copy
|
||
41D1000
|
heap
|
page read and write
|
||
5E70000
|
direct allocation
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
66BD000
|
direct allocation
|
page read and write
|
||
4FFA000
|
unkown
|
page write copy
|
||
41D1000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
59C0000
|
heap
|
page read and write
|
||
4B20000
|
unkown
|
page readonly
|
||
24B4000
|
heap
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
606B000
|
direct allocation
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
5F11000
|
direct allocation
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
5EF4000
|
direct allocation
|
page read and write
|
||
5E81000
|
heap
|
page read and write
|
||
29A4000
|
heap
|
page read and write
|
||
43C8000
|
direct allocation
|
page read and write
|
||
2EB1000
|
heap
|
page read and write
|
||
41D1000
|
heap
|
page read and write
|
||
2BF5000
|
heap
|
page read and write
|
||
4F78000
|
unkown
|
page read and write
|
||
5EDF000
|
direct allocation
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
4352000
|
direct allocation
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
43AA000
|
unkown
|
page write copy
|
||
60CA000
|
direct allocation
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
6361000
|
heap
|
page read and write
|
||
5801000
|
heap
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
6441000
|
heap
|
page read and write
|
||
2E7C000
|
stack
|
page read and write
|
||
2EB1000
|
heap
|
page read and write
|
||
5A84000
|
direct allocation
|
page read and write
|
||
5E81000
|
heap
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
4FE9000
|
unkown
|
page read and write
|
||
4FB1000
|
unkown
|
page read and write
|
||
5EFC000
|
direct allocation
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
66D2000
|
direct allocation
|
page read and write
|
||
611A000
|
direct allocation
|
page read and write
|
||
5012000
|
unkown
|
page read and write
|
||
60D8000
|
direct allocation
|
page read and write
|
||
60BB000
|
direct allocation
|
page read and write
|
||
4B13000
|
unkown
|
page readonly
|
||
4AFA000
|
unkown
|
page write copy
|
||
5E81000
|
heap
|
page read and write
|
||
5AB8000
|
direct allocation
|
page read and write
|
||
6441000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
6721000
|
direct allocation
|
page read and write
|
||
6030000
|
direct allocation
|
page read and write
|
||
60B4000
|
direct allocation
|
page read and write
|
||
66CA000
|
direct allocation
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
24FF000
|
stack
|
page read and write
|
||
4FFF000
|
unkown
|
page write copy
|
||
2B1A000
|
heap
|
page read and write
|
||
29F4000
|
heap
|
page read and write
|
||
5EAB000
|
direct allocation
|
page read and write
|
||
6113000
|
direct allocation
|
page read and write
|
||
5EE0000
|
heap
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
There are 878 hidden memdumps, click here to show them.