Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
555.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_555.exe_73a2317c9b18c06fb4572ea77cd525ee3f28dbd_69550887_1ab655c1\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3D28.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Mar 22 22:53:11 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER497D.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4E21.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\555.exe
|
"C:\Users\user\Desktop\555.exe"
|
||
C:\Users\user\Desktop\555.exe
|
C:\Users\user\Desktop\555.exe
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6444 -s 1228
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://dersed.com/freebl3.dll
|
unknown
|
||
http://dersed.com/freebl3.dllyD
|
unknown
|
||
http://dersed.com/nss3.dllv
|
unknown
|
||
http://dersed.com/vcruntime140.dllbg
|
unknown
|
||
http://dersed.com/288
|
unknown
|
||
http://dersed.com/vcruntime140.dll
|
unknown
|
||
http://dersed.com/softokn3.dllUD
|
unknown
|
||
http://dersed.com/vcruntime140.dll_i
|
unknown
|
||
http://dersed.com/msvcp140.dllGD
|
unknown
|
||
http://dersed.com/softokn3.dllmb
|
unknown
|
||
http://dersed.com/msvcp140.dll
|
unknown
|
||
http://dersed.com/nss3.dll
|
unknown
|
||
http://dersed.com/mozglue.dll
|
unknown
|
||
http://dersed.com/softokn3.dllLD
|
unknown
|
||
http://dersed.com/mozglue.dllkD
|
unknown
|
||
http://dersed.com/nss3.dllcom/freebl3.dll
|
unknown
|
||
http://ip-api.com/line/
|
unknown
|
||
http://dersed.com/softokn3.dll
|
unknown
|
||
http://dersed.com/vcruntime140.dllGc
|
unknown
|
There are 9 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
dersed.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
ProgramId
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
FileId
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
LowerCaseLongPath
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
LongPathHash
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
Name
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
Publisher
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
Version
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
BinFileVersion
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
BinaryType
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
ProductName
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
ProductVersion
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
LinkDate
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
BinProductVersion
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
Size
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
Language
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
IsPeFile
|
||
\REGISTRY\A\{40ba1780-48b2-23c2-f33b-4b3db04d953e}\Root\InventoryApplicationFile\555.exe|3b679044
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
00184006417502B9
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
47B2000
|
trusted library allocation
|
page read and write
|
||
48A5000
|
trusted library allocation
|
page read and write
|
||
474000
|
unkown
|
page readonly
|
||
474000
|
unkown
|
page readonly
|
||
474000
|
unkown
|
page readonly
|
||
4B5B000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page read and write
|
||
466000
|
unkown
|
page readonly
|
||
1572F040000
|
heap
|
page read and write
|
||
4869000
|
trusted library allocation
|
page read and write
|
||
1572F05A000
|
heap
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
1CEDF518000
|
heap
|
page read and write
|
||
1CEE41D0000
|
trusted library allocation
|
page read and write
|
||
1CEE4330000
|
remote allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
1572F057000
|
heap
|
page read and write
|
||
1CEE4210000
|
trusted library allocation
|
page read and write
|
||
6DD000
|
heap
|
page read and write
|
||
846000
|
heap
|
page read and write
|
||
21066D89000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page write copy
|
||
7E7000
|
heap
|
page read and write
|
||
EC272F7000
|
stack
|
page read and write
|
||
24FE000
|
stack
|
page read and write
|
||
21066DA5000
|
heap
|
page read and write
|
||
7E7000
|
heap
|
page read and write
|
||
846000
|
heap
|
page read and write
|
||
22ACD7E000
|
stack
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
1CEE44E6000
|
heap
|
page read and write
|
||
1CEDEC00000
|
heap
|
page read and write
|
||
21066DD3000
|
heap
|
page read and write
|
||
1CEDF559000
|
heap
|
page read and write
|
||
1F046629000
|
heap
|
page read and write
|
||
489000
|
unkown
|
page read and write
|
||
1572EF30000
|
heap
|
page read and write
|
||
2D69B7F000
|
stack
|
page read and write
|
||
BAAC77F000
|
stack
|
page read and write
|
||
1CEDEC29000
|
heap
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
19F71EB0000
|
trusted library allocation
|
page read and write
|
||
BDF000
|
stack
|
page read and write
|
||
C70A87E000
|
stack
|
page read and write
|
||
EC274FE000
|
stack
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
1CEE4330000
|
remote allocation
|
page read and write
|
||
2D696FE000
|
stack
|
page read and write
|
||
4878000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
21066D83000
|
heap
|
page read and write
|
||
21066D9B000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page write copy
|
||
1CEE0001000
|
trusted library allocation
|
page read and write
|
||
2021D6DF000
|
heap
|
page read and write
|
||
739000
|
heap
|
page read and write
|
||
13203690000
|
heap
|
page read and write
|
||
1CEDF415000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
21066D8C000
|
heap
|
page read and write
|
||
1CEE44F2000
|
heap
|
page read and write
|
||
4850B7E000
|
stack
|
page read and write
|
||
1CEE42F0000
|
trusted library allocation
|
page read and write
|
||
1CEE41F0000
|
trusted library allocation
|
page read and write
|
||
1CEE4200000
|
trusted library allocation
|
page read and write
|
||
210662EB000
|
heap
|
page read and write
|
||
210662A9000
|
heap
|
page read and write
|
||
1CEDF513000
|
heap
|
page read and write
|
||
1CEE4214000
|
trusted library allocation
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
846000
|
heap
|
page read and write
|
||
21066D81000
|
heap
|
page read and write
|
||
EC26F7E000
|
stack
|
page read and write
|
||
1CEE4330000
|
trusted library allocation
|
page read and write
|
||
132035C0000
|
trusted library allocation
|
page read and write
|
||
1CEDF3C0000
|
trusted library section
|
page readonly
|
||
2D698FB000
|
stack
|
page read and write
|
||
228F7360000
|
heap
|
page read and write
|
||
A50D4FD000
|
stack
|
page read and write
|
||
1CEDECFA000
|
heap
|
page read and write
|
||
1572F058000
|
heap
|
page read and write
|
||
21D97041000
|
heap
|
page read and write
|
||
3050000
|
remote allocation
|
page read and write
|
||
21066180000
|
trusted library allocation
|
page read and write
|
||
21066D73000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
2106624A000
|
heap
|
page read and write
|
||
2021D713000
|
heap
|
page read and write
|
||
19F7042A000
|
heap
|
page read and write
|
||
466000
|
unkown
|
page readonly
|
||
23426645000
|
heap
|
page read and write
|
||
BAAC87F000
|
stack
|
page read and write
|
||
228F7413000
|
heap
|
page read and write
|
||
2342667E000
|
heap
|
page read and write
|
||
706000
|
heap
|
page read and write
|
||
BAABDCE000
|
stack
|
page read and write
|
||
193737C000
|
stack
|
page read and write
|
||
1CEDEA30000
|
heap
|
page read and write
|
||
1CEDEC71000
|
heap
|
page read and write
|
||
21066D7C000
|
heap
|
page read and write
|
||
4850000
|
trusted library allocation
|
page read and write
|
||
1F046600000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
23426656000
|
heap
|
page read and write
|
||
2CBD000
|
stack
|
page read and write
|
||
EC271FE000
|
stack
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
1CEE4400000
|
heap
|
page read and write
|
||
6AC000
|
heap
|
page read and write
|
||
21066D9C000
|
heap
|
page read and write
|
||
193717E000
|
stack
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
1CEE4200000
|
trusted library allocation
|
page read and write
|
||
1CEDF3B0000
|
trusted library section
|
page readonly
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
2384EAC5000
|
heap
|
page read and write
|
||
2384E931000
|
heap
|
page read and write
|
||
4770000
|
direct allocation
|
page execute and read and write
|
||
1572F07B000
|
heap
|
page read and write
|
||
670000
|
trusted library allocation
|
page read and write
|
||
C70A6FE000
|
stack
|
page read and write
|
||
2106624C000
|
heap
|
page read and write
|
||
42AEBFE000
|
stack
|
page read and write
|
||
487E000
|
trusted library allocation
|
page read and write
|
||
4948000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
193767C000
|
stack
|
page read and write
|
||
4950000
|
trusted library allocation
|
page read and write
|
||
660000
|
trusted library allocation
|
page read and write
|
||
228F745A000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
4884000
|
trusted library allocation
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
1CEDED13000
|
heap
|
page read and write
|
||
21066D5B000
|
heap
|
page read and write
|
||
210661F0000
|
remote allocation
|
page read and write
|
||
72E000
|
stack
|
page read and write
|
||
21066D8A000
|
heap
|
page read and write
|
||
1572F000000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
2384E936000
|
heap
|
page read and write
|
||
21D97100000
|
heap
|
page read and write
|
||
23426653000
|
heap
|
page read and write
|
||
21066DB2000
|
heap
|
page read and write
|
||
2342663C000
|
heap
|
page read and write
|
||
1CEE4502000
|
heap
|
page read and write
|
||
21066D94000
|
heap
|
page read and write
|
||
6373EFB000
|
stack
|
page read and write
|
||
E335C7F000
|
stack
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
2530000
|
heap
|
page read and write
|
||
487B000
|
trusted library allocation
|
page read and write
|
||
451000
|
unkown
|
page readonly
|
||
5E5000
|
heap
|
page read and write
|
||
210662ED000
|
heap
|
page read and write
|
||
466000
|
unkown
|
page readonly
|
||
1572F013000
|
heap
|
page read and write
|
||
72E000
|
stack
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
1CEDEB40000
|
trusted library section
|
page read and write
|
||
ADF000
|
stack
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
A50CFFB000
|
stack
|
page read and write
|
||
47B0000
|
direct allocation
|
page execute and read and write
|
||
1CEDE9C0000
|
heap
|
page read and write
|
||
21D97028000
|
heap
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
21066D8B000
|
heap
|
page read and write
|
||
6E4000
|
heap
|
page read and write
|
||
2E100855000
|
heap
|
page read and write
|
||
2106625B000
|
heap
|
page read and write
|
||
BAAC6FF000
|
stack
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
491B000
|
trusted library allocation
|
page read and write
|
||
21066D50000
|
heap
|
page read and write
|
||
C70A97D000
|
stack
|
page read and write
|
||
1572F066000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
722000
|
heap
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
4896000
|
trusted library allocation
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
1572F002000
|
heap
|
page read and write
|
||
21D96F00000
|
trusted library allocation
|
page read and write
|
||
E33617F000
|
stack
|
page read and write
|
||
21D96DA0000
|
heap
|
page read and write
|
||
13203700000
|
heap
|
page read and write
|
||
21066D89000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
47B0000
|
direct allocation
|
page execute and read and write
|
||
13203665000
|
heap
|
page read and write
|
||
24BE000
|
stack
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
22AD177000
|
stack
|
page read and write
|
||
A50D1FC000
|
stack
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2EFB000
|
stack
|
page read and write
|
||
2021D6C8000
|
heap
|
page read and write
|
||
BAAC27C000
|
stack
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
21066C02000
|
heap
|
page read and write
|
||
1CEE41DE000
|
trusted library allocation
|
page read and write
|
||
489000
|
unkown
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
21D97802000
|
trusted library allocation
|
page read and write
|
||
21066D81000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page write copy
|
||
1572F045000
|
heap
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
9DF000
|
stack
|
page read and write
|
||
19F70513000
|
heap
|
page read and write
|
||
2D693FC000
|
stack
|
page read and write
|
||
21066D7F000
|
heap
|
page read and write
|
||
A50D9FE000
|
stack
|
page read and write
|
||
1CEE44DE000
|
heap
|
page read and write
|
||
21066D81000
|
heap
|
page read and write
|
||
2342668A000
|
heap
|
page read and write
|
||
1CEDEC8F000
|
heap
|
page read and write
|
||
1CEDEC8A000
|
heap
|
page read and write
|
||
1CEDED26000
|
heap
|
page read and write
|
||
451000
|
unkown
|
page readonly
|
||
2021D5D0000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1572F044000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
1CEDF518000
|
heap
|
page read and write
|
||
756000
|
heap
|
page read and write
|
||
451000
|
unkown
|
page readonly
|
||
1572F07E000
|
heap
|
page read and write
|
||
21067262000
|
heap
|
page read and write
|
||
19F703A0000
|
trusted library allocation
|
page read and write
|
||
451000
|
unkown
|
page readonly
|
||
21066D93000
|
heap
|
page read and write
|
||
21066D89000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
21D96D90000
|
heap
|
page read and write
|
||
228F7502000
|
heap
|
page read and write
|
||
2106624B000
|
heap
|
page read and write
|
||
21066271000
|
heap
|
page read and write
|
||
BAAC7FF000
|
stack
|
page read and write
|
||
24FE000
|
stack
|
page read and write
|
||
21D97013000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
1CEE4429000
|
heap
|
page read and write
|
||
4875000
|
trusted library allocation
|
page read and write
|
||
19F7044A000
|
heap
|
page read and write
|
||
1572F07A000
|
heap
|
page read and write
|
||
2D69C7F000
|
stack
|
page read and write
|
||
21066D89000
|
heap
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
486C000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
21066D85000
|
heap
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
23426629000
|
heap
|
page read and write
|
||
210662B3000
|
heap
|
page read and write
|
||
985DE7B000
|
stack
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
A50D0FF000
|
stack
|
page read and write
|
||
2DBA000
|
stack
|
page read and write
|
||
1CEDF3F0000
|
trusted library section
|
page readonly
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
1CEE41F4000
|
trusted library allocation
|
page read and write
|
||
1572F05E000
|
heap
|
page read and write
|
||
2384E962000
|
heap
|
page read and write
|
||
21066DB2000
|
heap
|
page read and write
|
||
13203590000
|
heap
|
page read and write
|
||
19F7045A000
|
heap
|
page read and write
|
||
2F00000
|
trusted library section
|
page readonly
|
||
13203530000
|
heap
|
page read and write
|
||
2E10084A000
|
heap
|
page read and write
|
||
747000
|
heap
|
page read and write
|
||
21D97002000
|
heap
|
page read and write
|
||
1F046560000
|
trusted library allocation
|
page read and write
|
||
615000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page write copy
|
||
19F7044A000
|
heap
|
page read and write
|
||
BAAC5FE000
|
stack
|
page read and write
|
||
1CEDF3D0000
|
trusted library section
|
page readonly
|
||
2021D6CF000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
C70AAFD000
|
stack
|
page read and write
|
||
1F0464D0000
|
heap
|
page read and write
|
||
2021D686000
|
heap
|
page read and write
|
||
985E37E000
|
stack
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
1572FA02000
|
trusted library allocation
|
page read and write
|
||
E33607C000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
1CEE42A0000
|
trusted library allocation
|
page read and write
|
||
21067202000
|
heap
|
page read and write
|
||
42AE7BF000
|
stack
|
page read and write
|
||
6CF000
|
heap
|
page read and write
|
||
72E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
13204002000
|
trusted library allocation
|
page read and write
|
||
1CEE4310000
|
trusted library allocation
|
page read and write
|
||
1CEDEB30000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
21066D8F000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
210661F0000
|
remote allocation
|
page read and write
|
||
1F046590000
|
remote allocation
|
page read and write
|
||
2790000
|
trusted library allocation
|
page read and write
|
||
2384E943000
|
heap
|
page read and write
|
||
1CEDF701000
|
trusted library allocation
|
page read and write
|
||
23426550000
|
trusted library allocation
|
page read and write
|
||
BAAC177000
|
stack
|
page read and write
|
||
42AEAFF000
|
stack
|
page read and write
|
||
1F04663D000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
74D000
|
heap
|
page read and write
|
||
1572F062000
|
heap
|
page read and write
|
||
2021D600000
|
heap
|
page read and write
|
||
4850E7E000
|
stack
|
page read and write
|
||
22AC94E000
|
stack
|
page read and write
|
||
21066D8A000
|
heap
|
page read and write
|
||
2E100800000
|
heap
|
page read and write
|
||
2384E951000
|
heap
|
page read and write
|
||
2E100813000
|
heap
|
page read and write
|
||
A50D3FE000
|
stack
|
page read and write
|
||
1CEDFBE0000
|
trusted library allocation
|
page read and write
|
||
19F70402000
|
heap
|
page read and write
|
||
47B0000
|
direct allocation
|
page execute and read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
1CEDF3A0000
|
trusted library section
|
page readonly
|
||
3040000
|
trusted library allocation
|
page read and write
|
||
4866000
|
trusted library allocation
|
page read and write
|
||
3050000
|
remote allocation
|
page read and write
|
||
210660F0000
|
heap
|
page read and write
|
||
4887000
|
trusted library allocation
|
page read and write
|
||
E33627E000
|
stack
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
2530000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1CEDECA2000
|
heap
|
page read and write
|
||
47B0000
|
direct allocation
|
page execute and read and write
|
||
2384E92B000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
3040000
|
trusted library allocation
|
page read and write
|
||
2D69A77000
|
stack
|
page read and write
|
||
1CEDF502000
|
heap
|
page read and write
|
||
590000
|
trusted library allocation
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
19F70466000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6373CFE000
|
stack
|
page read and write
|
||
1572F102000
|
heap
|
page read and write
|
||
2E100908000
|
heap
|
page read and write
|
||
2DFD000
|
stack
|
page read and write
|
||
21066213000
|
heap
|
page read and write
|
||
A50D6FF000
|
stack
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6E9000
|
heap
|
page read and write
|
||
63739BB000
|
stack
|
page read and write
|
||
1572F083000
|
heap
|
page read and write
|
||
21066D23000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
1CEDF402000
|
heap
|
page read and write
|
||
222C000
|
stack
|
page read and write
|
||
47B0000
|
direct allocation
|
page execute and read and write
|
||
210661F0000
|
remote allocation
|
page read and write
|
||
19F703F0000
|
remote allocation
|
page read and write
|
||
ADF000
|
stack
|
page read and write
|
||
19F70459000
|
heap
|
page read and write
|
||
21066D8B000
|
heap
|
page read and write
|
||
21066D82000
|
heap
|
page read and write
|
||
228F7C70000
|
trusted library allocation
|
page read and write
|
||
21066DCD000
|
heap
|
page read and write
|
||
BAAC67E000
|
stack
|
page read and write
|
||
485068B000
|
stack
|
page read and write
|
||
615000
|
heap
|
page read and write
|
||
6DA000
|
heap
|
page read and write
|
||
19F70449000
|
heap
|
page read and write
|
||
1572F046000
|
heap
|
page read and write
|
||
2384E942000
|
heap
|
page read and write
|
||
1F04665C000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
826000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
985E27B000
|
stack
|
page read and write
|
||
23426691000
|
heap
|
page read and write
|
||
228F7467000
|
heap
|
page read and write
|
||
23426600000
|
heap
|
page read and write
|
||
1572F061000
|
heap
|
page read and write
|
||
1CEDEC56000
|
heap
|
page read and write
|
||
228F7E02000
|
trusted library allocation
|
page read and write
|
||
21066D81000
|
heap
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
21066253000
|
heap
|
page read and write
|
||
826000
|
heap
|
page read and write
|
||
C70A9FF000
|
stack
|
page read and write
|
||
193727E000
|
stack
|
page read and write
|
||
BAABD4B000
|
stack
|
page read and write
|
||
1CEE44A2000
|
heap
|
page read and write
|
||
42AEC7C000
|
stack
|
page read and write
|
||
1572F029000
|
heap
|
page read and write
|
||
47B0000
|
direct allocation
|
page execute and read and write
|
||
21066D8F000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
E335F7B000
|
stack
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
21066229000
|
heap
|
page read and write
|
||
21066D59000
|
heap
|
page read and write
|
||
2E10088B000
|
heap
|
page read and write
|
||
1572EF40000
|
heap
|
page read and write
|
||
21066D8C000
|
heap
|
page read and write
|
||
2F41000
|
heap
|
page read and write
|
||
21066D93000
|
heap
|
page read and write
|
||
EC2717B000
|
stack
|
page read and write
|
||
6373C7E000
|
stack
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
1572F077000
|
heap
|
page read and write
|
||
234263F0000
|
heap
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
21066D94000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
210660E0000
|
heap
|
page read and write
|
||
455F000
|
stack
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
2384E945000
|
heap
|
page read and write
|
||
21066D81000
|
heap
|
page read and write
|
||
210662C0000
|
heap
|
page read and write
|
||
BAACC7E000
|
stack
|
page read and write
|
||
1CEDEC13000
|
heap
|
page read and write
|
||
2D697FC000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
21066D8F000
|
heap
|
page read and write
|
||
21066DB5000
|
heap
|
page read and write
|
||
21066D8D000
|
heap
|
page read and write
|
||
21D97113000
|
heap
|
page read and write
|
||
72C000
|
heap
|
page read and write
|
||
615000
|
heap
|
page read and write
|
||
2E100871000
|
heap
|
page read and write
|
||
2E10084E000
|
heap
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
24BE000
|
stack
|
page read and write
|
||
ADF000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2021D641000
|
heap
|
page read and write
|
||
23426657000
|
heap
|
page read and write
|
||
1CEE0030000
|
trusted library allocation
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
21066D81000
|
heap
|
page read and write
|
||
21066DAB000
|
heap
|
page read and write
|
||
2384E942000
|
heap
|
page read and write
|
||
1CEE4410000
|
heap
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
21D96E00000
|
heap
|
page read and write
|
||
2021E132000
|
heap
|
page read and write
|
||
1F0464C0000
|
heap
|
page read and write
|
||
1CEE4320000
|
trusted library allocation
|
page read and write
|
||
19F703C0000
|
trusted library allocation
|
page read and write
|
||
1CEE44A0000
|
heap
|
page read and write
|
||
1572F03B000
|
heap
|
page read and write
|
||
21066D92000
|
heap
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
74A000
|
heap
|
page read and write
|
||
13203713000
|
heap
|
page read and write
|
||
21067202000
|
heap
|
page read and write
|
||
9DF000
|
stack
|
page read and write
|
||
1CEDEC6C000
|
heap
|
page read and write
|
||
C70A5FE000
|
stack
|
page read and write
|
||
1572F042000
|
heap
|
page read and write
|
||
1F046590000
|
remote allocation
|
page read and write
|
||
47B0000
|
direct allocation
|
page execute and read and write
|
||
466000
|
unkown
|
page readonly
|
||
28E0000
|
heap
|
page read and write
|
||
2384E967000
|
heap
|
page read and write
|
||
13203520000
|
heap
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
21D9706D000
|
heap
|
page read and write
|
||
21066D00000
|
heap
|
page read and write
|
||
EC273FE000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
753000
|
heap
|
page read and write
|
||
2384E951000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
42AE73A000
|
stack
|
page read and write
|
||
2E10083C000
|
heap
|
page read and write
|
||
6373FF7000
|
stack
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
2021E100000
|
heap
|
page read and write
|
||
2384E966000
|
heap
|
page read and write
|
||
E335AFC000
|
stack
|
page read and write
|
||
48F000
|
unkown
|
page readonly
|
||
193707F000
|
stack
|
page read and write
|
||
1320367D000
|
heap
|
page read and write
|
||
1F046530000
|
heap
|
page read and write
|
||
E33637E000
|
stack
|
page read and write
|
||
21066D77000
|
heap
|
page read and write
|
||
EC26E7B000
|
stack
|
page read and write
|
||
47B0000
|
direct allocation
|
page execute and read and write
|
||
21066D93000
|
heap
|
page read and write
|
||
4893000
|
trusted library allocation
|
page read and write
|
||
1CEDEC76000
|
heap
|
page read and write
|
||
21067200000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
C70A47B000
|
stack
|
page read and write
|
||
6BB000
|
heap
|
page read and write
|
||
2CBD000
|
stack
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
590000
|
trusted library allocation
|
page read and write
|
||
2021D66E000
|
heap
|
page read and write
|
||
1F046590000
|
remote allocation
|
page read and write
|
||
1CEE40B0000
|
trusted library allocation
|
page read and write
|
||
BAAC47F000
|
stack
|
page read and write
|
||
2106624F000
|
heap
|
page read and write
|
||
1CEDF400000
|
heap
|
page read and write
|
||
193747C000
|
stack
|
page read and write
|
||
4872000
|
trusted library allocation
|
page read and write
|
||
284E000
|
stack
|
page read and write
|
||
2384E947000
|
heap
|
page read and write
|
||
21067202000
|
heap
|
page read and write
|
||
985E47E000
|
stack
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
47B0000
|
direct allocation
|
page execute and read and write
|
||
21066D81000
|
heap
|
page read and write
|
||
E335D7F000
|
stack
|
page read and write
|
||
C70A77E000
|
stack
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
48F000
|
unkown
|
page readonly
|
||
2E100902000
|
heap
|
page read and write
|
||
2DFD000
|
stack
|
page read and write
|
||
7E7000
|
heap
|
page read and write
|
||
1CEDEC3D000
|
heap
|
page read and write
|
||
A50D2FF000
|
stack
|
page read and write
|
||
486F000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
13203600000
|
heap
|
page read and write
|
||
466000
|
unkown
|
page readonly
|
||
21067203000
|
heap
|
page read and write
|
||
466000
|
unkown
|
page readonly
|
||
712000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
21066DB3000
|
heap
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
2D6997F000
|
stack
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
A50CB9B000
|
stack
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
21066D81000
|
heap
|
page read and write
|
||
EC2707B000
|
stack
|
page read and write
|
||
19F703F0000
|
remote allocation
|
page read and write
|
||
13203629000
|
heap
|
page read and write
|
||
228F7370000
|
heap
|
page read and write
|
||
13203655000
|
heap
|
page read and write
|
||
1CEDECAB000
|
heap
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
1CEE41D8000
|
trusted library allocation
|
page read and write
|
||
228F7477000
|
heap
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
228F7427000
|
heap
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
19F7045A000
|
heap
|
page read and write
|
||
1CEE4300000
|
trusted library allocation
|
page read and write
|
||
210662FC000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
21D97053000
|
heap
|
page read and write
|
||
23426658000
|
heap
|
page read and write
|
||
19F70300000
|
heap
|
page read and write
|
||
22AD07F000
|
stack
|
page read and write
|
||
21066256000
|
heap
|
page read and write
|
||
21D97102000
|
heap
|
page read and write
|
||
42AEB78000
|
stack
|
page read and write
|
||
1CEE443A000
|
heap
|
page read and write
|
||
2DBA000
|
stack
|
page read and write
|
||
2106624E000
|
heap
|
page read and write
|
||
E335DFC000
|
stack
|
page read and write
|
||
2106721A000
|
heap
|
page read and write
|
||
1F046613000
|
heap
|
page read and write
|
||
2E100829000
|
heap
|
page read and write
|
||
228F7450000
|
heap
|
page read and write
|
||
21066313000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
21066D4E000
|
heap
|
page read and write
|
||
460000
|
unkown
|
page write copy
|
||
63741FF000
|
stack
|
page read and write
|
||
21066302000
|
heap
|
page read and write
|
||
47B0000
|
direct allocation
|
page execute and read and write
|
||
2021D6DD000
|
heap
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
590000
|
trusted library allocation
|
page read and write
|
||
1CEDF559000
|
heap
|
page read and write
|
||
1320368B000
|
heap
|
page read and write
|
||
19F70502000
|
heap
|
page read and write
|
||
1CEDED02000
|
heap
|
page read and write
|
||
489F000
|
trusted library allocation
|
page read and write
|
||
2384E961000
|
heap
|
page read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
1CEE4030000
|
trusted library allocation
|
page read and write
|
||
1CEDEC9A000
|
heap
|
page read and write
|
||
21067202000
|
heap
|
page read and write
|
||
1572F063000
|
heap
|
page read and write
|
||
21066D18000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
488A000
|
trusted library allocation
|
page read and write
|
||
2E100850000
|
heap
|
page read and write
|
||
1CEE4447000
|
heap
|
page read and write
|
||
2E100900000
|
heap
|
page read and write
|
||
42AEA7F000
|
stack
|
page read and write
|
||
2D6967E000
|
stack
|
page read and write
|
||
6BF000
|
heap
|
page read and write
|
||
BAAC97A000
|
stack
|
page read and write
|
||
465F000
|
stack
|
page read and write
|
||
228F7475000
|
heap
|
page read and write
|
||
1572F03D000
|
heap
|
page read and write
|
||
BDF000
|
stack
|
page read and write
|
||
1CEE41F1000
|
trusted library allocation
|
page read and write
|
||
48F000
|
unkown
|
page readonly
|
||
21066226000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
2E100866000
|
heap
|
page read and write
|
||
21066D71000
|
heap
|
page read and write
|
||
23426708000
|
heap
|
page read and write
|
||
21066D95000
|
heap
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
BDF000
|
stack
|
page read and write
|
||
1572F060000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
2DBA000
|
stack
|
page read and write
|
||
193757E000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
1CEE42E0000
|
trusted library allocation
|
page read and write
|
||
21066D83000
|
heap
|
page read and write
|
||
1CEE4500000
|
heap
|
page read and write
|
||
19F72002000
|
trusted library allocation
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
2384E942000
|
heap
|
page read and write
|
||
210662C7000
|
heap
|
page read and write
|
||
485078E000
|
stack
|
page read and write
|
||
22ACE78000
|
stack
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
1CEE41D0000
|
trusted library allocation
|
page read and write
|
||
23426450000
|
heap
|
page read and write
|
||
228F7473000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
2021D6BE000
|
heap
|
page read and write
|
||
2E100860000
|
heap
|
page read and write
|
||
4912000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
47B0000
|
direct allocation
|
page execute and read and write
|
||
297F000
|
stack
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
445F000
|
stack
|
page read and write
|
||
23426671000
|
heap
|
page read and write
|
||
21066DA4000
|
heap
|
page read and write
|
||
4850C7E000
|
stack
|
page read and write
|
||
1CEDF3E0000
|
trusted library section
|
page readonly
|
||
2230000
|
heap
|
page read and write
|
||
47B0000
|
direct allocation
|
page execute and read and write
|
||
19F70400000
|
heap
|
page read and write
|
||
2F00000
|
trusted library section
|
page readonly
|
||
617000
|
heap
|
page read and write
|
||
4850D7E000
|
stack
|
page read and write
|
||
1572F04E000
|
heap
|
page read and write
|
||
47B0000
|
direct allocation
|
page execute and read and write
|
||
A50D8FF000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
A50D7FF000
|
stack
|
page read and write
|
||
2530000
|
heap
|
page read and write
|
||
1572F064000
|
heap
|
page read and write
|
||
21066DA0000
|
heap
|
page read and write
|
||
2364000
|
heap
|
page read and write
|
||
19F70370000
|
heap
|
page read and write
|
||
1320365E000
|
heap
|
page read and write
|
||
21067202000
|
heap
|
page read and write
|
||
2E1006F0000
|
heap
|
page read and write
|
||
2106625A000
|
heap
|
page read and write
|
||
19F70518000
|
heap
|
page read and write
|
||
1572F05D000
|
heap
|
page read and write
|
||
1CEE44EC000
|
heap
|
page read and write
|
||
21066D5E000
|
heap
|
page read and write
|
||
210662EE000
|
heap
|
page read and write
|
||
22AC8CC000
|
stack
|
page read and write
|
||
48F000
|
unkown
|
page readonly
|
||
1572F032000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
21066D92000
|
heap
|
page read and write
|
||
228F7513000
|
heap
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
2384E8A0000
|
heap
|
page read and write
|
||
2342664B000
|
heap
|
page read and write
|
||
2F00000
|
trusted library section
|
page readonly
|
||
488D000
|
trusted library allocation
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
21066D7B000
|
heap
|
page read and write
|
||
2E100913000
|
heap
|
page read and write
|
||
13203676000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
228F73D0000
|
heap
|
page read and write
|
||
2EFB000
|
stack
|
page read and write
|
||
63740FF000
|
stack
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
19F70310000
|
heap
|
page read and write
|
||
21066D71000
|
heap
|
page read and write
|
||
489C000
|
trusted library allocation
|
page read and write
|
||
21066D89000
|
heap
|
page read and write
|
||
A50D5FE000
|
stack
|
page read and write
|
||
4670000
|
heap
|
page read and write
|
||
1572F048000
|
heap
|
page read and write
|
||
2021D702000
|
heap
|
page read and write
|
||
3040000
|
trusted library allocation
|
page read and write
|
||
485070E000
|
stack
|
page read and write
|
||
1F046702000
|
heap
|
page read and write
|
||
BAACA7C000
|
stack
|
page read and write
|
||
21066DA4000
|
heap
|
page read and write
|
||
4773000
|
direct allocation
|
page execute and read and write
|
||
21066308000
|
heap
|
page read and write
|
||
2021D629000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
688000
|
heap
|
page read and write
|
||
21066150000
|
heap
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
21066D91000
|
heap
|
page read and write
|
||
1CEE0020000
|
trusted library allocation
|
page read and write
|
||
23426702000
|
heap
|
page read and write
|
||
1320363C000
|
heap
|
page read and write
|
||
2E100760000
|
heap
|
page read and write
|
||
19F703F0000
|
remote allocation
|
page read and write
|
||
1F047002000
|
trusted library allocation
|
page read and write
|
||
2021D613000
|
heap
|
page read and write
|
||
19F70413000
|
heap
|
page read and write
|
||
2E100790000
|
trusted library allocation
|
page read and write
|
||
2E101202000
|
trusted library allocation
|
page read and write
|
||
19F70475000
|
heap
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
451000
|
unkown
|
page readonly
|
||
23426E02000
|
trusted library allocation
|
page read and write
|
||
1CEE44AB000
|
heap
|
page read and write
|
||
24FE000
|
stack
|
page read and write
|
||
228F7400000
|
heap
|
page read and write
|
||
1F046602000
|
heap
|
page read and write
|
||
21067203000
|
heap
|
page read and write
|
||
1CEE4505000
|
heap
|
page read and write
|
||
21066DA5000
|
heap
|
page read and write
|
||
228F7402000
|
heap
|
page read and write
|
||
228F7441000
|
heap
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
21066316000
|
heap
|
page read and write
|
||
2E100700000
|
heap
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
1CEE4330000
|
remote allocation
|
page read and write
|
||
21066DAB000
|
heap
|
page read and write
|
||
985E17B000
|
stack
|
page read and write
|
||
210662E2000
|
heap
|
page read and write
|
||
23426713000
|
heap
|
page read and write
|
||
2EFB000
|
stack
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
1CEE441B000
|
heap
|
page read and write
|
||
21066255000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
24BE000
|
stack
|
page read and write
|
||
2384EAC0000
|
heap
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
A4F000
|
stack
|
page read and write
|
||
21066D94000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
13203708000
|
heap
|
page read and write
|
||
21066258000
|
heap
|
page read and write
|
||
2384E750000
|
heap
|
page read and write
|
||
4899000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
E3356BB000
|
stack
|
page read and write
|
||
1320364A000
|
heap
|
page read and write
|
||
1936ABB000
|
stack
|
page read and write
|
||
19F7048B000
|
heap
|
page read and write
|
||
21066D87000
|
heap
|
page read and write
|
||
21066D8B000
|
heap
|
page read and write
|
||
2021D5A0000
|
heap
|
page read and write
|
||
22ACF77000
|
stack
|
page read and write
|
||
13203660000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
21067202000
|
heap
|
page read and write
|
||
21066282000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
BAAC37A000
|
stack
|
page read and write
|
||
21067202000
|
heap
|
page read and write
|
||
1572F069000
|
heap
|
page read and write
|
||
21066D71000
|
heap
|
page read and write
|
||
1CEE4502000
|
heap
|
page read and write
|
||
21066D9A000
|
heap
|
page read and write
|
||
2384E951000
|
heap
|
page read and write
|
||
1CEDE9D0000
|
heap
|
page read and write
|
||
21D97079000
|
heap
|
page read and write
|
||
759000
|
heap
|
page read and write
|
||
22AC9CE000
|
stack
|
page read and write
|
||
1572EFD0000
|
trusted library allocation
|
page read and write
|
||
6F1000
|
heap
|
page read and write
|
||
2021D530000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
550000
|
trusted library allocation
|
page read and write
|
||
2DFD000
|
stack
|
page read and write
|
||
21066D75000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
22AD2FB000
|
stack
|
page read and write
|
||
21066D7B000
|
heap
|
page read and write
|
||
21066D7B000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
13203613000
|
heap
|
page read and write
|
||
297F000
|
stack
|
page read and write
|
||
E335EFA000
|
stack
|
page read and write
|
||
297F000
|
stack
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
19F70500000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
1CEE0023000
|
trusted library allocation
|
page read and write
|
||
2238000
|
heap
|
page read and write
|
||
2021E002000
|
heap
|
page read and write
|
||
2021D666000
|
heap
|
page read and write
|
||
228F7456000
|
heap
|
page read and write
|
||
1CEE4460000
|
heap
|
page read and write
|
||
21066200000
|
heap
|
page read and write
|
||
2021D540000
|
heap
|
page read and write
|
||
2106623C000
|
heap
|
page read and write
|
||
489000
|
unkown
|
page read and write
|
||
2384E948000
|
heap
|
page read and write
|
||
13203702000
|
heap
|
page read and write
|
||
1CEE4040000
|
trusted library allocation
|
page read and write
|
||
606000
|
heap
|
page read and write
|
||
744000
|
heap
|
page read and write
|
||
21066D8F000
|
heap
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
2384E880000
|
heap
|
page read and write
|
||
451000
|
unkown
|
page readonly
|
||
47B0000
|
direct allocation
|
page execute and read and write
|
||
76E000
|
stack
|
page read and write
|
||
21067221000
|
heap
|
page read and write
|
||
19F7043D000
|
heap
|
page read and write
|
||
4660000
|
heap
|
page read and write
|
||
21066D8D000
|
heap
|
page read and write
|
||
1572F059000
|
heap
|
page read and write
|
||
2342664D000
|
heap
|
page read and write
|
||
23426688000
|
heap
|
page read and write
|
||
21066D8D000
|
heap
|
page read and write
|
||
9DF000
|
stack
|
page read and write
|
||
21D97000000
|
heap
|
page read and write
|
||
21066D5D000
|
heap
|
page read and write
|
||
21066252000
|
heap
|
page read and write
|
||
23426650000
|
heap
|
page read and write
|
||
2E100866000
|
heap
|
page read and write
|
||
23426700000
|
heap
|
page read and write
|
||
1CEE44FC000
|
heap
|
page read and write
|
||
234263E0000
|
heap
|
page read and write
|
||
1572F041000
|
heap
|
page read and write
|
||
1CEE44FE000
|
heap
|
page read and write
|
||
1572F067000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
23426613000
|
heap
|
page read and write
|
||
4881000
|
trusted library allocation
|
page read and write
|
||
21066D89000
|
heap
|
page read and write
|
||
1CEDF500000
|
heap
|
page read and write
|
||
1572F05C000
|
heap
|
page read and write
|
||
2384E936000
|
heap
|
page read and write
|
||
741000
|
heap
|
page read and write
|
||
2CBD000
|
stack
|
page read and write
|
||
826000
|
heap
|
page read and write
|
||
22AD1FF000
|
unkown
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
233E000
|
stack
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
EC26EFE000
|
stack
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
BAAC57B000
|
stack
|
page read and write
|
||
1CEE40C0000
|
trusted library allocation
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
C70ABFD000
|
stack
|
page read and write
|
||
2E100860000
|
heap
|
page read and write
|
||
4840000
|
direct allocation
|
page execute and read and write
|
||
1320365A000
|
heap
|
page read and write
|
||
1CEDEC73000
|
heap
|
page read and write
|
||
1572EFA0000
|
heap
|
page read and write
|
||
2384E920000
|
heap
|
page read and write
|
||
19F71E70000
|
trusted library allocation
|
page read and write
|
There are 883 hidden memdumps, click here to show them.