Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
n57kYr8YQW.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_179c87a774e29d2b1a37a03f881953e6c2ac927_7522e4b5_523f2ff1-0f9d-47c7-a7f5-50d8a8328fc2\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_88e9c7714235511c882c5cf68cc356ed44bb976_7522e4b5_51f7a9c7-1823-4e38-9491-999216950cb2\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_88e9c7714235511c882c5cf68cc356ed44bb976_7522e4b5_9573f0f9-eb1a-4019-862f-b313d4edf902\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7846.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 18:10:55 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER78C4.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER78F4.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9F85.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 18:11:05 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA070.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA10E.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA11B.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 29 18:11:06 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA36E.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA3BD.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarCreate
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5212 -s 648
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarDestroy
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarFreeRec
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarCreate
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarDestroy
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarFreeRec
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeSetFocus
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeSetDirty
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeResize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkePaint2
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeKillFocus
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeIsDirty
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeInitialize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeGetCaretRect
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireMouseWheelEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireMouseEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyUpEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyPressEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyDownEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireContextMenuEvent
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFinalize
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeDestroyWebView
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeCreateWebView
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",dbkFCallWrapperAddr
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",__dbk_fcall_wrapper
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",TMethodImplementationIntercept
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarRecognize
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 640
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 640
|
There are 24 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProgramId
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
FileId
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LowerCaseLongPath
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LongPathHash
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Name
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
OriginalFileName
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Publisher
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Version
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinFileVersion
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinaryType
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductName
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductVersion
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LinkDate
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinProductVersion
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageFullName
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Size
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Language
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
IsOsComponent
|
||
\REGISTRY\A\{ed6599f2-ffa9-0b61-3fd9-34678d5fc355}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C00B8F8B0D2B
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C00B8F8B0D2B
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
444D000
|
direct allocation
|
page read and write
|
||
2ADF000
|
stack
|
page read and write
|
||
45E8000
|
direct allocation
|
page read and write
|
||
464D000
|
direct allocation
|
page read and write
|
||
449F000
|
direct allocation
|
page read and write
|
||
4730000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
518000
|
unkown
|
page read and write
|
||
2620000
|
heap
|
page read and write
|
||
46F8000
|
direct allocation
|
page read and write
|
||
4463000
|
direct allocation
|
page read and write
|
||
4D4F000
|
direct allocation
|
page read and write
|
||
4D93000
|
direct allocation
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
47FA000
|
direct allocation
|
page read and write
|
||
34EA000
|
heap
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
4D2A000
|
direct allocation
|
page read and write
|
||
44F0000
|
heap
|
page read and write
|
||
4C18000
|
direct allocation
|
page read and write
|
||
4C08000
|
direct allocation
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
2C71000
|
unkown
|
page read and write
|
||
46DF000
|
stack
|
page read and write
|
||
2D2A000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
4834000
|
direct allocation
|
page read and write
|
||
45FF000
|
direct allocation
|
page read and write
|
||
464C000
|
direct allocation
|
page read and write
|
||
46EC000
|
direct allocation
|
page read and write
|
||
474A000
|
direct allocation
|
page read and write
|
||
463D000
|
direct allocation
|
page read and write
|
||
4243000
|
direct allocation
|
page read and write
|
||
41FA000
|
direct allocation
|
page read and write
|
||
4C53000
|
direct allocation
|
page read and write
|
||
423C000
|
direct allocation
|
page read and write
|
||
4610000
|
heap
|
page read and write
|
||
513000
|
unkown
|
page write copy
|
||
2D20000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
44B4000
|
direct allocation
|
page read and write
|
||
469F000
|
stack
|
page read and write
|
||
270B000
|
stack
|
page read and write
|
||
26EE000
|
stack
|
page read and write
|
||
48EF000
|
direct allocation
|
page read and write
|
||
4808000
|
direct allocation
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
2A3B000
|
stack
|
page read and write
|
||
4B68000
|
direct allocation
|
page read and write
|
||
309C000
|
stack
|
page read and write
|
||
273A000
|
heap
|
page read and write
|
||
4581000
|
direct allocation
|
page read and write
|
||
4B5A000
|
direct allocation
|
page read and write
|
||
4793000
|
direct allocation
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
41F2000
|
direct allocation
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
4472000
|
direct allocation
|
page read and write
|
||
48D8000
|
direct allocation
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
27BC000
|
stack
|
page read and write
|
||
265B000
|
stack
|
page read and write
|
||
4614000
|
direct allocation
|
page read and write
|
||
423C000
|
direct allocation
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
463F000
|
direct allocation
|
page read and write
|
||
2C3C000
|
stack
|
page read and write
|
||
311A000
|
heap
|
page read and write
|
||
4B61000
|
direct allocation
|
page read and write
|
||
421F000
|
direct allocation
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
480F000
|
stack
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
1357000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
2EFA000
|
heap
|
page read and write
|
||
47A8000
|
direct allocation
|
page read and write
|
||
50F000
|
unkown
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
424A000
|
direct allocation
|
page read and write
|
||
4EA3000
|
direct allocation
|
page read and write
|
||
4D6C000
|
direct allocation
|
page read and write
|
||
4D48000
|
direct allocation
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
4522000
|
direct allocation
|
page read and write
|
||
2B60000
|
unkown
|
page readonly
|
||
28C0000
|
heap
|
page read and write
|
||
303C000
|
stack
|
page read and write
|
||
422D000
|
direct allocation
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
247C000
|
stack
|
page read and write
|
||
4820000
|
heap
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
4C0A000
|
direct allocation
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
2ADA000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
44D8000
|
direct allocation
|
page read and write
|
||
271B000
|
stack
|
page read and write
|
||
44A6000
|
direct allocation
|
page read and write
|
||
4258000
|
direct allocation
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
24BC000
|
stack
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
424A000
|
direct allocation
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
284E000
|
stack
|
page read and write
|
||
4900000
|
heap
|
page read and write
|
||
46CF000
|
direct allocation
|
page read and write
|
||
4654000
|
direct allocation
|
page read and write
|
||
4818000
|
direct allocation
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
4631000
|
direct allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
4768000
|
direct allocation
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
45A3000
|
direct allocation
|
page read and write
|
||
4D5D000
|
direct allocation
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
4612000
|
direct allocation
|
page read and write
|
||
4448000
|
direct allocation
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
4638000
|
direct allocation
|
page read and write
|
||
25BE000
|
stack
|
page read and write
|
||
44AD000
|
direct allocation
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
4868000
|
direct allocation
|
page read and write
|
||
2C3A000
|
heap
|
page read and write
|
||
2DE6000
|
direct allocation
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
421F000
|
direct allocation
|
page read and write
|
||
4C2F000
|
direct allocation
|
page read and write
|
||
443A000
|
direct allocation
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
2D3A000
|
heap
|
page read and write
|
||
5180000
|
heap
|
page read and write
|
||
46E4000
|
direct allocation
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
4BE2000
|
direct allocation
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
4491000
|
direct allocation
|
page read and write
|
||
4578000
|
direct allocation
|
page read and write
|
||
4C11000
|
direct allocation
|
page read and write
|
||
47E1000
|
direct allocation
|
page read and write
|
||
46E3000
|
direct allocation
|
page read and write
|
||
4818000
|
direct allocation
|
page read and write
|
||
4843000
|
direct allocation
|
page read and write
|
||
4466000
|
direct allocation
|
page read and write
|
||
4B3D000
|
direct allocation
|
page read and write
|
||
2B61000
|
unkown
|
page execute read
|
||
2DED000
|
direct allocation
|
page read and write
|
||
511000
|
unkown
|
page read and write
|
||
4E38000
|
direct allocation
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
4870000
|
heap
|
page read and write
|
||
2DD8000
|
direct allocation
|
page read and write
|
||
265E000
|
stack
|
page read and write
|
||
44C3000
|
direct allocation
|
page read and write
|
||
46A2000
|
direct allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
4586000
|
direct allocation
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
4811000
|
direct allocation
|
page read and write
|
||
4E0D000
|
direct allocation
|
page read and write
|
||
4EB8000
|
direct allocation
|
page read and write
|
||
4D68000
|
direct allocation
|
page read and write
|
||
520000
|
unkown
|
page write copy
|
||
4D7A000
|
direct allocation
|
page read and write
|
||
522000
|
unkown
|
page readonly
|
||
2CEF000
|
stack
|
page read and write
|
||
451F000
|
stack
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
478C000
|
direct allocation
|
page read and write
|
||
4621000
|
direct allocation
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
47DA000
|
direct allocation
|
page read and write
|
||
263F000
|
stack
|
page read and write
|
||
4D6F000
|
direct allocation
|
page read and write
|
||
477D000
|
direct allocation
|
page read and write
|
||
292C000
|
stack
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
4234000
|
direct allocation
|
page read and write
|
||
48F0000
|
heap
|
page read and write
|
||
4251000
|
direct allocation
|
page read and write
|
||
4201000
|
direct allocation
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
289B000
|
stack
|
page read and write
|
||
4C36000
|
direct allocation
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
2C70000
|
unkown
|
page write copy
|
||
460D000
|
direct allocation
|
page read and write
|
||
4B36000
|
direct allocation
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
4A6F000
|
stack
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
4226000
|
direct allocation
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
4DE1000
|
direct allocation
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
283C000
|
stack
|
page read and write
|
||
26DE000
|
stack
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
510000
|
unkown
|
page write copy
|
||
2C8A000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
458D000
|
direct allocation
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
4D22000
|
direct allocation
|
page read and write
|
||
4DDA000
|
direct allocation
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
25A0000
|
heap
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
4826000
|
direct allocation
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
4C33000
|
direct allocation
|
page read and write
|
||
459F000
|
direct allocation
|
page read and write
|
||
4531000
|
direct allocation
|
page read and write
|
||
456C000
|
direct allocation
|
page read and write
|
||
4251000
|
direct allocation
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
4C1D000
|
direct allocation
|
page read and write
|
||
4928000
|
direct allocation
|
page read and write
|
||
4913000
|
direct allocation
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
4AF0000
|
heap
|
page read and write
|
||
4708000
|
direct allocation
|
page read and write
|
||
4602000
|
direct allocation
|
page read and write
|
||
4432000
|
direct allocation
|
page read and write
|
||
2DC1000
|
direct allocation
|
page read and write
|
||
47B6000
|
direct allocation
|
page read and write
|
||
2C7F000
|
unkown
|
page read and write
|
||
47F2000
|
direct allocation
|
page read and write
|
||
275C000
|
stack
|
page read and write
|
||
4201000
|
direct allocation
|
page read and write
|
||
445F000
|
direct allocation
|
page read and write
|
||
4D64000
|
direct allocation
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
483D000
|
direct allocation
|
page read and write
|
||
4860000
|
heap
|
page read and write
|
||
2EDE000
|
stack
|
page read and write
|
||
4208000
|
direct allocation
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
4E86000
|
direct allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
247B000
|
stack
|
page read and write
|
||
2BEA000
|
heap
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
4C28000
|
direct allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
4552000
|
direct allocation
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
490C000
|
direct allocation
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
4844000
|
direct allocation
|
page read and write
|
||
26AF000
|
stack
|
page read and write
|
||
4646000
|
direct allocation
|
page read and write
|
||
4594000
|
direct allocation
|
page read and write
|
||
4538000
|
direct allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
45D8000
|
direct allocation
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
45D1000
|
direct allocation
|
page read and write
|
||
51D000
|
unkown
|
page read and write
|
||
29BF000
|
stack
|
page read and write
|
||
4C3D000
|
direct allocation
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
448A000
|
direct allocation
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
422D000
|
direct allocation
|
page read and write
|
||
4611000
|
direct allocation
|
page read and write
|
||
4201000
|
direct allocation
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
25FB000
|
stack
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
4621000
|
direct allocation
|
page read and write
|
||
44BC000
|
direct allocation
|
page read and write
|
||
288F000
|
stack
|
page read and write
|
||
4623000
|
direct allocation
|
page read and write
|
||
4208000
|
direct allocation
|
page read and write
|
||
277B000
|
stack
|
page read and write
|
||
4D58000
|
direct allocation
|
page read and write
|
||
4628000
|
direct allocation
|
page read and write
|
||
4D84000
|
direct allocation
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
4BF1000
|
direct allocation
|
page read and write
|
||
4421000
|
direct allocation
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
303B000
|
stack
|
page read and write
|
||
462A000
|
direct allocation
|
page read and write
|
||
4751000
|
direct allocation
|
page read and write
|
||
4636000
|
direct allocation
|
page read and write
|
||
29AB000
|
stack
|
page read and write
|
||
153F000
|
stack
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
47BD000
|
direct allocation
|
page read and write
|
||
45B8000
|
direct allocation
|
page read and write
|
||
47B2000
|
direct allocation
|
page read and write
|
||
4C0F000
|
direct allocation
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
2440000
|
heap
|
page read and write
|
||
4412000
|
direct allocation
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
4B0A000
|
direct allocation
|
page read and write
|
||
518000
|
unkown
|
page read and write
|
||
4226000
|
direct allocation
|
page read and write
|
||
2C75000
|
unkown
|
page write copy
|
||
48FD000
|
direct allocation
|
page read and write
|
||
469A000
|
direct allocation
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
4D9A000
|
direct allocation
|
page read and write
|
||
307C000
|
stack
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
463F000
|
direct allocation
|
page read and write
|
||
513000
|
unkown
|
page write copy
|
||
47C1000
|
direct allocation
|
page read and write
|
||
4588000
|
direct allocation
|
page read and write
|
||
44CA000
|
direct allocation
|
page read and write
|
||
4438000
|
direct allocation
|
page read and write
|
||
44D1000
|
direct allocation
|
page read and write
|
||
28DC000
|
stack
|
page read and write
|
||
2CAA000
|
heap
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
2C9C000
|
stack
|
page read and write
|
||
4380000
|
heap
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
4D4A000
|
direct allocation
|
page read and write
|
||
457A000
|
direct allocation
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
4E61000
|
direct allocation
|
page read and write
|
||
4DA1000
|
direct allocation
|
page read and write
|
||
4828000
|
direct allocation
|
page read and write
|
||
46D0000
|
heap
|
page read and write
|
||
4548000
|
direct allocation
|
page read and write
|
||
134F000
|
heap
|
page read and write
|
||
4E1C000
|
direct allocation
|
page read and write
|
||
305B000
|
stack
|
page read and write
|
||
462F000
|
direct allocation
|
page read and write
|
||
4D31000
|
direct allocation
|
page read and write
|
||
4218000
|
direct allocation
|
page read and write
|
||
4B11000
|
direct allocation
|
page read and write
|
||
4C24000
|
direct allocation
|
page read and write
|
||
4C16000
|
direct allocation
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
272F000
|
stack
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
4880000
|
heap
|
page read and write
|
||
2C8A000
|
heap
|
page read and write
|
||
4851000
|
direct allocation
|
page read and write
|
||
2F9C000
|
stack
|
page read and write
|
||
481F000
|
direct allocation
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
4258000
|
direct allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
258C000
|
stack
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
4E4B000
|
direct allocation
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
47B0000
|
heap
|
page read and write
|
||
270B000
|
stack
|
page read and write
|
||
480A000
|
direct allocation
|
page read and write
|
||
2DC8000
|
direct allocation
|
page read and write
|
||
465C000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
259C000
|
stack
|
page read and write
|
||
4921000
|
direct allocation
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3100000
|
heap
|
page read and write
|
||
2ECC000
|
stack
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
274C000
|
stack
|
page read and write
|
||
445C000
|
direct allocation
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
4782000
|
direct allocation
|
page read and write
|
||
4488000
|
direct allocation
|
page read and write
|
||
46B8000
|
direct allocation
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
482F000
|
direct allocation
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
4836000
|
direct allocation
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
4DA8000
|
direct allocation
|
page read and write
|
||
4BF8000
|
direct allocation
|
page read and write
|
||
461C000
|
direct allocation
|
page read and write
|
||
4598000
|
direct allocation
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
2F5B000
|
stack
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
2DFC000
|
direct allocation
|
page read and write
|
||
41F2000
|
direct allocation
|
page read and write
|
||
4E14000
|
direct allocation
|
page read and write
|
||
4D88000
|
direct allocation
|
page read and write
|
||
4861000
|
direct allocation
|
page read and write
|
||
10BE000
|
stack
|
page read and write
|
||
520000
|
unkown
|
page write copy
|
||
32AA000
|
heap
|
page read and write
|
||
4D42000
|
direct allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
4B53000
|
direct allocation
|
page read and write
|
||
45A6000
|
direct allocation
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
4E68000
|
direct allocation
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
4C2C000
|
direct allocation
|
page read and write
|
||
4BEA000
|
direct allocation
|
page read and write
|
||
4E5A000
|
direct allocation
|
page read and write
|
||
2C82000
|
unkown
|
page readonly
|
||
33CF000
|
stack
|
page read and write
|
||
45DA000
|
direct allocation
|
page read and write
|
||
4853000
|
direct allocation
|
page read and write
|
||
4E8D000
|
direct allocation
|
page read and write
|
||
4478000
|
direct allocation
|
page read and write
|
||
4858000
|
direct allocation
|
page read and write
|
||
27EC000
|
stack
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
25FB000
|
stack
|
page read and write
|
||
41FA000
|
direct allocation
|
page read and write
|
||
2B6F000
|
stack
|
page read and write
|
||
2E03000
|
direct allocation
|
page read and write
|
||
4D8C000
|
direct allocation
|
page read and write
|
||
45B4000
|
direct allocation
|
page read and write
|
||
4498000
|
direct allocation
|
page read and write
|
||
46B8000
|
direct allocation
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
51D000
|
unkown
|
page read and write
|
||
266A000
|
heap
|
page read and write
|
||
46A1000
|
direct allocation
|
page read and write
|
||
4D7D000
|
direct allocation
|
page read and write
|
||
4F7F000
|
stack
|
page read and write
|
||
2E8B000
|
stack
|
page read and write
|
||
46F1000
|
direct allocation
|
page read and write
|
||
48CA000
|
direct allocation
|
page read and write
|
||
4243000
|
direct allocation
|
page read and write
|
||
521000
|
unkown
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
2C80000
|
unkown
|
page write copy
|
||
328E000
|
stack
|
page read and write
|
||
4654000
|
direct allocation
|
page read and write
|
||
4E78000
|
direct allocation
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
46DC000
|
direct allocation
|
page read and write
|
||
2C5A000
|
heap
|
page read and write
|
||
46CD000
|
direct allocation
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
4C4C000
|
direct allocation
|
page read and write
|
||
4EAA000
|
direct allocation
|
page read and write
|
||
48BF000
|
stack
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
2DB2000
|
direct allocation
|
page read and write
|
||
422D000
|
direct allocation
|
page read and write
|
||
4692000
|
direct allocation
|
page read and write
|
||
4904000
|
direct allocation
|
page read and write
|
||
49B0000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
47A1000
|
direct allocation
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
482D000
|
direct allocation
|
page read and write
|
||
4784000
|
direct allocation
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
4E94000
|
direct allocation
|
page read and write
|
||
47BA000
|
direct allocation
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
47F4000
|
direct allocation
|
page read and write
|
||
4481000
|
direct allocation
|
page read and write
|
||
46BF000
|
direct allocation
|
page read and write
|
||
2530000
|
heap
|
page read and write
|
||
272A000
|
heap
|
page read and write
|
||
47E6000
|
direct allocation
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
4471000
|
direct allocation
|
page read and write
|
||
4CFF000
|
stack
|
page read and write
|
||
2A7C000
|
stack
|
page read and write
|
||
452A000
|
direct allocation
|
page read and write
|
||
2EDC000
|
stack
|
page read and write
|
||
522000
|
unkown
|
page readonly
|
||
484C000
|
direct allocation
|
page read and write
|
||
484A000
|
direct allocation
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
424A000
|
direct allocation
|
page read and write
|
||
465C000
|
direct allocation
|
page read and write
|
||
243B000
|
stack
|
page read and write
|
||
4458000
|
direct allocation
|
page read and write
|
||
4251000
|
direct allocation
|
page read and write
|
||
2E8B000
|
stack
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
4850000
|
heap
|
page read and write
|
||
45C3000
|
direct allocation
|
page read and write
|
||
421F000
|
direct allocation
|
page read and write
|
||
2ECC000
|
stack
|
page read and write
|
||
51F000
|
unkown
|
page read and write
|
||
45AA000
|
direct allocation
|
page read and write
|
||
47C8000
|
direct allocation
|
page read and write
|
||
2C84000
|
unkown
|
page readonly
|
||
2A6A000
|
heap
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
4D76000
|
direct allocation
|
page read and write
|
||
4C41000
|
direct allocation
|
page read and write
|
||
4D73000
|
direct allocation
|
page read and write
|
||
460A000
|
direct allocation
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
459C000
|
direct allocation
|
page read and write
|
||
2DBA000
|
direct allocation
|
page read and write
|
||
4C3A000
|
direct allocation
|
page read and write
|
||
271F000
|
stack
|
page read and write
|
||
4DCB000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
45BC000
|
direct allocation
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
4556000
|
direct allocation
|
page read and write
|
||
4776000
|
direct allocation
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
31CA000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
4646000
|
direct allocation
|
page read and write
|
||
47D8000
|
direct allocation
|
page read and write
|
||
2C7D000
|
unkown
|
page read and write
|
||
4483000
|
direct allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
483C000
|
direct allocation
|
page read and write
|
||
4218000
|
direct allocation
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
47D3000
|
direct allocation
|
page read and write
|
||
4606000
|
direct allocation
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
457A000
|
direct allocation
|
page read and write
|
||
2DFB000
|
stack
|
page read and write
|
||
48E8000
|
direct allocation
|
page read and write
|
||
2CBA000
|
heap
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
476F000
|
direct allocation
|
page read and write
|
||
46AA000
|
direct allocation
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
4791000
|
direct allocation
|
page read and write
|
||
46EA000
|
direct allocation
|
page read and write
|
||
4568000
|
direct allocation
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
46A8000
|
direct allocation
|
page read and write
|
||
4E2A000
|
direct allocation
|
page read and write
|
||
254B000
|
stack
|
page read and write
|
||
4801000
|
direct allocation
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
277B000
|
stack
|
page read and write
|
||
4742000
|
direct allocation
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
4446000
|
direct allocation
|
page read and write
|
||
29DC000
|
stack
|
page read and write
|
||
269E000
|
stack
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
21DC000
|
stack
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
4811000
|
direct allocation
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
4618000
|
direct allocation
|
page read and write
|
||
4818000
|
direct allocation
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
4A90000
|
heap
|
page read and write
|
||
47AF000
|
direct allocation
|
page read and write
|
||
2A3A000
|
heap
|
page read and write
|
||
4638000
|
direct allocation
|
page read and write
|
||
4DE8000
|
direct allocation
|
page read and write
|
||
41F2000
|
direct allocation
|
page read and write
|
||
2FBA000
|
heap
|
page read and write
|
||
28EB000
|
stack
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
4E23000
|
direct allocation
|
page read and write
|
||
4644000
|
direct allocation
|
page read and write
|
||
45D2000
|
direct allocation
|
page read and write
|
||
4EB1000
|
direct allocation
|
page read and write
|
||
4454000
|
direct allocation
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
2C81000
|
unkown
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
45F8000
|
direct allocation
|
page read and write
|
||
4628000
|
direct allocation
|
page read and write
|
||
283C000
|
stack
|
page read and write
|
||
48F6000
|
direct allocation
|
page read and write
|
||
4DFF000
|
direct allocation
|
page read and write
|
||
46D4000
|
direct allocation
|
page read and write
|
||
45B1000
|
direct allocation
|
page read and write
|
||
4E31000
|
direct allocation
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
134B000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
46B1000
|
direct allocation
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
45E1000
|
direct allocation
|
page read and write
|
||
46D6000
|
direct allocation
|
page read and write
|
||
29CE000
|
stack
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
4498000
|
direct allocation
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
4573000
|
direct allocation
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
46C6000
|
direct allocation
|
page read and write
|
||
4803000
|
direct allocation
|
page read and write
|
||
27BC000
|
stack
|
page read and write
|
||
4638000
|
direct allocation
|
page read and write
|
||
47C4000
|
direct allocation
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
4D38000
|
direct allocation
|
page read and write
|
||
446D000
|
direct allocation
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
4B28000
|
direct allocation
|
page read and write
|
||
4561000
|
direct allocation
|
page read and write
|
||
2DF4000
|
direct allocation
|
page read and write
|
||
2C6F000
|
unkown
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
455D000
|
direct allocation
|
page read and write
|
||
299B000
|
stack
|
page read and write
|
||
4DF8000
|
direct allocation
|
page read and write
|
||
4C02000
|
direct allocation
|
page read and write
|
||
F3C000
|
stack
|
page read and write
|
||
46C8000
|
direct allocation
|
page read and write
|
||
47ED000
|
direct allocation
|
page read and write
|
||
2A6A000
|
heap
|
page read and write
|
||
2DDF000
|
direct allocation
|
page read and write
|
||
446A000
|
direct allocation
|
page read and write
|
||
492F000
|
stack
|
page read and write
|
||
4D81000
|
direct allocation
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
E3C000
|
stack
|
page read and write
|
||
461A000
|
direct allocation
|
page read and write
|
||
4612000
|
direct allocation
|
page read and write
|
||
479A000
|
direct allocation
|
page read and write
|
||
4B4C000
|
direct allocation
|
page read and write
|
||
524000
|
unkown
|
page readonly
|
||
342A000
|
heap
|
page read and write
|
||
455A000
|
direct allocation
|
page read and write
|
||
480A000
|
direct allocation
|
page read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
4B02000
|
direct allocation
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
4572000
|
direct allocation
|
page read and write
|
||
4474000
|
direct allocation
|
page read and write
|
||
2E9B000
|
stack
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
4490000
|
heap
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
45CA000
|
direct allocation
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
46DD000
|
direct allocation
|
page read and write
|
||
524000
|
unkown
|
page readonly
|
||
2CAE000
|
stack
|
page read and write
|
||
4258000
|
direct allocation
|
page read and write
|
||
255B000
|
stack
|
page read and write
|
||
2C76000
|
unkown
|
page read and write
|
||
346A000
|
heap
|
page read and write
|
||
511000
|
unkown
|
page read and write
|
||
46F3000
|
direct allocation
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
47E8000
|
direct allocation
|
page read and write
|
||
457F000
|
direct allocation
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
4D56000
|
direct allocation
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
274C000
|
stack
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
4208000
|
direct allocation
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
26F0000
|
heap
|
page read and write
|
||
4B18000
|
direct allocation
|
page read and write
|
||
51F000
|
unkown
|
page read and write
|
||
41FA000
|
direct allocation
|
page read and write
|
||
4C44000
|
direct allocation
|
page read and write
|
||
447C000
|
direct allocation
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
47FC000
|
direct allocation
|
page read and write
|
||
2B3A000
|
heap
|
page read and write
|
||
27AB000
|
stack
|
page read and write
|
||
4234000
|
direct allocation
|
page read and write
|
||
4564000
|
direct allocation
|
page read and write
|
||
4701000
|
direct allocation
|
page read and write
|
||
287A000
|
heap
|
page read and write
|
||
4B44000
|
direct allocation
|
page read and write
|
||
423C000
|
direct allocation
|
page read and write
|
||
29EC000
|
stack
|
page read and write
|
||
29DB000
|
stack
|
page read and write
|
||
47DF000
|
direct allocation
|
page read and write
|
||
4226000
|
direct allocation
|
page read and write
|
||
269C000
|
stack
|
page read and write
|
||
4802000
|
direct allocation
|
page read and write
|
||
4218000
|
direct allocation
|
page read and write
|
||
498F000
|
stack
|
page read and write
|
||
447A000
|
direct allocation
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
46FA000
|
direct allocation
|
page read and write
|
||
4441000
|
direct allocation
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
45AD000
|
direct allocation
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
4798000
|
direct allocation
|
page read and write
|
||
48D1000
|
direct allocation
|
page read and write
|
||
4E06000
|
direct allocation
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
4653000
|
direct allocation
|
page read and write
|
||
2CEA000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
4758000
|
direct allocation
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
4E10000
|
heap
|
page read and write
|
||
4234000
|
direct allocation
|
page read and write
|
||
4C5A000
|
direct allocation
|
page read and write
|
||
464D000
|
direct allocation
|
page read and write
|
||
521000
|
unkown
|
page read and write
|
||
43DF000
|
stack
|
page read and write
|
||
443F000
|
direct allocation
|
page read and write
|
||
4428000
|
direct allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
50F000
|
unkown
|
page read and write
|
||
4E7F000
|
direct allocation
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
478A000
|
direct allocation
|
page read and write
|
||
510000
|
unkown
|
page write copy
|
||
4B2F000
|
direct allocation
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
4E9C000
|
direct allocation
|
page read and write
|
||
219B000
|
stack
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
441A000
|
direct allocation
|
page read and write
|
||
48C2000
|
direct allocation
|
page read and write
|
||
454F000
|
direct allocation
|
page read and write
|
||
485A000
|
direct allocation
|
page read and write
|
||
4243000
|
direct allocation
|
page read and write
|
||
461A000
|
direct allocation
|
page read and write
|
||
4628000
|
direct allocation
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
2C5B000
|
stack
|
page read and write
|
||
47CC000
|
direct allocation
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
4D51000
|
direct allocation
|
page read and write
|
||
47A8000
|
direct allocation
|
page read and write
|
||
491A000
|
direct allocation
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
There are 798 hidden memdumps, click here to show them.