Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
BJp3aUvrt9.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_13ec5c98984773435626ad7d5b7558cb4938ccf_7cac0383_1985ef9c\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_61eae61638761e2a39674020347ca413fb22393_7cac0383_19cdd4c1\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_b75bd23440526356a090f9cb45508f9dce6e86_7cac0383_1ada168d\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1046.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB04.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue May 17 18:00:35 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCD7E.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue May 17 18:00:19 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD06D.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD1D5.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE1F0.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue May 17 18:00:25 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE56C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE732.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE8F.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
There are 3 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\BJp3aUvrt9.dll",#1
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\BJp3aUvrt9.dll"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\BJp3aUvrt9.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6424 -s 388
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6424 -s 396
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6424 -s 424
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.189.151.28/
|
unknown
|
||
http://185.189.151.28/drew/Gno4E_2Fz/JYCqWA_2FqMmY1RZwoiB/wugIArNn94bFR0HD9u1/3DvnzuRELDO66MgbIMgnTX
|
unknown
|
||
http://185.189.151.70/?
|
unknown
|
||
http://185.189.151.70/
|
unknown
|
||
http://185.18
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.189.151.70
|
unknown
|
Switzerland
|
||
185.189.151.28
|
unknown
|
Switzerland
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018800453F4626F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
There are 1 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
51A8000
|
heap
|
page read and write
|
||
51A8000
|
heap
|
page read and write
|
||
51A8000
|
heap
|
page read and write
|
||
51A8000
|
heap
|
page read and write
|
||
51A8000
|
heap
|
page read and write
|
||
51A8000
|
heap
|
page read and write
|
||
51A8000
|
heap
|
page read and write
|
||
51A8000
|
heap
|
page read and write
|
||
51A8000
|
heap
|
page read and write
|
||
49C9000
|
heap
|
page read and write
|
||
5FD4DFD000
|
stack
|
page read and write
|
||
21E9AB93000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
1BE57493000
|
trusted library allocation
|
page read and write
|
||
21E9A2C1000
|
heap
|
page read and write
|
||
1BE5B908000
|
trusted library allocation
|
page read and write
|
||
6C0D6AB000
|
stack
|
page read and write
|
||
1B6027A0000
|
heap
|
page read and write
|
||
250947B000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
1F2DBC51000
|
heap
|
page read and write
|
||
21E9A090000
|
heap
|
page read and write
|
||
1BE5B950000
|
trusted library allocation
|
page read and write
|
||
25A8AC60000
|
heap
|
page read and write
|
||
6C0DC7B000
|
stack
|
page read and write
|
||
5DC000
|
stack
|
page read and write
|
||
1FCB767E000
|
heap
|
page read and write
|
||
A60337C000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
25A8AF08000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1BE55F70000
|
heap
|
page read and write
|
||
21E9AB95000
|
heap
|
page read and write
|
||
21E9B002000
|
heap
|
page read and write
|
||
21E9ABBD000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
21E9ABDB000
|
heap
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
21E9A261000
|
heap
|
page read and write
|
||
1CE0826F000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1CE0824B000
|
heap
|
page read and write
|
||
21E9ABCF000
|
heap
|
page read and write
|
||
1EDD4B20000
|
heap
|
page read and write
|
||
A603A7F000
|
stack
|
page read and write
|
||
25A8ACC0000
|
heap
|
page read and write
|
||
1BE5B656000
|
heap
|
page read and write
|
||
21E9A213000
|
heap
|
page read and write
|
||
1BE56114000
|
heap
|
page read and write
|
||
1FCB7602000
|
heap
|
page read and write
|
||
1B602AE0000
|
heap
|
page read and write
|
||
1BE56076000
|
heap
|
page read and write
|
||
204923D5000
|
heap
|
page read and write
|
||
1CE08230000
|
heap
|
page read and write
|
||
20492090000
|
heap
|
page read and write
|
||
D81CDFF000
|
stack
|
page read and write
|
||
1FCB7708000
|
heap
|
page read and write
|
||
21E9A030000
|
heap
|
page read and write
|
||
21E9B002000
|
heap
|
page read and write
|
||
1F8716F0000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1F8726B0000
|
trusted library allocation
|
page read and write
|
||
4DD000
|
stack
|
page read and write
|
||
6C0D7AE000
|
stack
|
page read and write
|
||
8F3000
|
unkown
|
page readonly
|
||
1BE56902000
|
heap
|
page read and write
|
||
21E9A313000
|
heap
|
page read and write
|
||
85F000
|
unkown
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1BE5603F000
|
heap
|
page read and write
|
||
1B602AC8000
|
heap
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
5FD4B7E000
|
stack
|
page read and write
|
||
25A8AE02000
|
heap
|
page read and write
|
||
6C0DB7E000
|
stack
|
page read and write
|
||
1FCB7700000
|
heap
|
page read and write
|
||
21E9A2E1000
|
heap
|
page read and write
|
||
1BE56095000
|
heap
|
page read and write
|
||
1F871AF9000
|
heap
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
24F0000
|
remote allocation
|
page read and write
|
||
85B000
|
unkown
|
page execute read
|
||
21E9AB8E000
|
heap
|
page read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
960000
|
direct allocation
|
page read and write
|
||
21E9AB82000
|
heap
|
page read and write
|
||
1BE56913000
|
heap
|
page read and write
|
||
2314029B000
|
heap
|
page read and write
|
||
21E9A8B0000
|
remote allocation
|
page read and write
|
||
85B000
|
unkown
|
page execute read
|
||
1F872640000
|
heap
|
page readonly
|
||
840000
|
trusted library allocation
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
25A8AE00000
|
heap
|
page read and write
|
||
204920B2000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1BE5B6ED000
|
heap
|
page read and write
|
||
11AC000
|
stack
|
page read and write
|
||
1BE5B6F5000
|
heap
|
page read and write
|
||
85B000
|
unkown
|
page execute read
|
||
24F0000
|
remote allocation
|
page read and write
|
||
D0FB1F8000
|
stack
|
page read and write
|
||
1B602A88000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
21E9ABA6000
|
heap
|
page read and write
|
||
64970DB000
|
stack
|
page read and write
|
||
1CE08A02000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
1F8718D0000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1FCB7C60000
|
trusted library allocation
|
page read and write
|
||
1F871910000
|
heap
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
24D0000
|
remote allocation
|
page read and write
|
||
21E9AB86000
|
heap
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
1CE08247000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
21E9B002000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
25A8AE51000
|
heap
|
page read and write
|
||
1BE5B970000
|
trusted library allocation
|
page read and write
|
||
5FD4BFE000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
867000
|
unkown
|
page write copy
|
||
1FCB766F000
|
heap
|
page read and write
|
||
1EDD4C3E000
|
heap
|
page read and write
|
||
85F000
|
unkown
|
page read and write
|
||
21E9AB95000
|
heap
|
page read and write
|
||
B3A66FB000
|
stack
|
page read and write
|
||
9FD000
|
stack
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
23140308000
|
heap
|
page read and write
|
||
427AD7E000
|
stack
|
page read and write
|
||
21E9AB71000
|
heap
|
page read and write
|
||
1BE5B910000
|
trusted library allocation
|
page read and write
|
||
A60377F000
|
stack
|
page read and write
|
||
21E9AB50000
|
heap
|
page read and write
|
||
4B9F000
|
stack
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
1CE081A0000
|
trusted library allocation
|
page read and write
|
||
21E9A200000
|
heap
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
1B602A00000
|
heap
|
page read and write
|
||
85B000
|
unkown
|
page execute read
|
||
21E9ABB9000
|
heap
|
page read and write
|
||
1CE08302000
|
heap
|
page read and write
|
||
1BE5B520000
|
trusted library allocation
|
page read and write
|
||
B3A618B000
|
stack
|
page read and write
|
||
21360813000
|
heap
|
page read and write
|
||
23140264000
|
heap
|
page read and write
|
||
1EDD4C41000
|
heap
|
page read and write
|
||
1CE0823A000
|
heap
|
page read and write
|
||
8F1000
|
unkown
|
page execute read
|
||
A2B000
|
heap
|
page read and write
|
||
1BE5B6F8000
|
heap
|
page read and write
|
||
867000
|
unkown
|
page write copy
|
||
23140290000
|
heap
|
page read and write
|
||
1CE08244000
|
heap
|
page read and write
|
||
21E9AB71000
|
heap
|
page read and write
|
||
4DD000
|
stack
|
page read and write
|
||
D81CCF7000
|
stack
|
page read and write
|
||
1CE08229000
|
heap
|
page read and write
|
||
250907B000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
21E9ABCF000
|
heap
|
page read and write
|
||
1F871AF5000
|
heap
|
page read and write
|
||
8B2000
|
unkown
|
page readonly
|
||
A20000
|
heap
|
page read and write
|
||
21E9ABB9000
|
heap
|
page read and write
|
||
D0FB47E000
|
unkown
|
page read and write
|
||
1F2DBC75000
|
heap
|
page read and write
|
||
1F871820000
|
heap
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
A60327F000
|
stack
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
25A8AE65000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
21E9A2F9000
|
heap
|
page read and write
|
||
1F2DB9F0000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
4DD000
|
stack
|
page read and write
|
||
1EDD4C59000
|
heap
|
page read and write
|
||
204920A1000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
21E9A2D4000
|
heap
|
page read and write
|
||
21E9AA02000
|
heap
|
page read and write
|
||
10087E000
|
stack
|
page read and write
|
||
1BE56000000
|
heap
|
page read and write
|
||
21E9A2AB000
|
heap
|
page read and write
|
||
1BE5606E000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1BE56073000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
21E9AB90000
|
heap
|
page read and write
|
||
1BE5B550000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1BE5B623000
|
heap
|
page read and write
|
||
1BE5608B000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
21E9AB86000
|
heap
|
page read and write
|
||
21E9B000000
|
heap
|
page read and write
|
||
1B602A6F000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
85D000
|
unkown
|
page readonly
|
||
1F871967000
|
heap
|
page read and write
|
||
204920D5000
|
heap
|
page read and write
|
||
1F2DBD00000
|
heap
|
page read and write
|
||
21E9AB95000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
21E9B021000
|
heap
|
page read and write
|
||
D81C8FE000
|
stack
|
page read and write
|
||
1B603132000
|
heap
|
page read and write
|
||
6C0D72E000
|
stack
|
page read and write
|
||
5FD46DB000
|
stack
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
1BE57490000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
A88000
|
heap
|
page read and write
|
||
1BE5B4B0000
|
trusted library allocation
|
page read and write
|
||
4DD000
|
stack
|
page read and write
|
||
D81CA7B000
|
stack
|
page read and write
|
||
21E9AB95000
|
heap
|
page read and write
|
||
8F5000
|
unkown
|
page read and write
|
||
23140130000
|
heap
|
page read and write
|
||
1CE08267000
|
heap
|
page read and write
|
||
D81C97E000
|
stack
|
page read and write
|
||
B3A67FE000
|
stack
|
page read and write
|
||
23140A02000
|
trusted library allocation
|
page read and write
|
||
1BE5B6F3000
|
heap
|
page read and write
|
||
D0FAFF8000
|
stack
|
page read and write
|
||
64971DE000
|
stack
|
page read and write
|
||
A60387E000
|
stack
|
page read and write
|
||
10F9000
|
unclassified section
|
page readonly
|
||
C30000
|
direct allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1BE55FE0000
|
heap
|
page read and write
|
||
21E9AB95000
|
heap
|
page read and write
|
||
1F2DBA60000
|
heap
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
D81CBFE000
|
stack
|
page read and write
|
||
5FD4E7E000
|
stack
|
page read and write
|
||
85D000
|
unkown
|
page readonly
|
||
25A8AE54000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
109C000
|
stack
|
page read and write
|
||
B02AAF8000
|
stack
|
page read and write
|
||
1CE0822D000
|
heap
|
page read and write
|
||
1CE08030000
|
heap
|
page read and write
|
||
1B603002000
|
heap
|
page read and write
|
||
1EDD4C00000
|
heap
|
page read and write
|
||
68C000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1BE56904000
|
heap
|
page read and write
|
||
1FCB7627000
|
heap
|
page read and write
|
||
100CFF000
|
stack
|
page read and write
|
||
213606E0000
|
heap
|
page read and write
|
||
C2670FE000
|
stack
|
page read and write
|
||
1CE0825F000
|
heap
|
page read and write
|
||
8B2000
|
unkown
|
page readonly
|
||
5DC000
|
stack
|
page read and write
|
||
1BE5B960000
|
trusted library allocation
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1EDD4C02000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
85D000
|
unkown
|
page readonly
|
||
1F871AE0000
|
trusted library allocation
|
page read and write
|
||
851000
|
unkown
|
page execute read
|
||
1CE08261000
|
heap
|
page read and write
|
||
1B602790000
|
heap
|
page read and write
|
||
1F871840000
|
heap
|
page read and write
|
||
1FCB7600000
|
heap
|
page read and write
|
||
25A8AE60000
|
heap
|
page read and write
|
||
850000
|
unkown
|
page readonly
|
||
5DC000
|
stack
|
page read and write
|
||
D0FAEFE000
|
stack
|
page read and write
|
||
B02A7BE000
|
stack
|
page read and write
|
||
24D0000
|
remote allocation
|
page read and write
|
||
1F8718C0000
|
trusted library allocation
|
page read and write
|
||
1EDD4BC0000
|
trusted library allocation
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
250937A000
|
stack
|
page read and write
|
||
1BE560B2000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
25A8AF00000
|
heap
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
21E9ABBD000
|
heap
|
page read and write
|
||
1F2DBB60000
|
trusted library allocation
|
page read and write
|
||
25A8ADC0000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
21E9A23C000
|
heap
|
page read and write
|
||
21E9AB1E000
|
heap
|
page read and write
|
||
D1F000
|
stack
|
page read and write
|
||
21E9A8B0000
|
remote allocation
|
page read and write
|
||
1FCB764E000
|
heap
|
page read and write
|
||
1BE56057000
|
heap
|
page read and write
|
||
64974FB000
|
stack
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
21E9AB87000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
1BE5BAB0000
|
trusted library allocation
|
page read and write
|
||
1FCB7500000
|
heap
|
page read and write
|
||
851000
|
unkown
|
page execute read
|
||
21E9B002000
|
heap
|
page read and write
|
||
2314025E000
|
heap
|
page read and write
|
||
21E9A229000
|
heap
|
page read and write
|
||
10F0000
|
unclassified section
|
page read and write
|
||
B3A68FF000
|
stack
|
page read and write
|
||
21360829000
|
heap
|
page read and write
|
||
1BE5B910000
|
trusted library allocation
|
page read and write
|
||
427AE7E000
|
stack
|
page read and write
|
||
4DD000
|
stack
|
page read and write
|
||
204920CD000
|
heap
|
page read and write
|
||
851000
|
unkown
|
page execute read
|
||
23140254000
|
heap
|
page read and write
|
||
204920B7000
|
heap
|
page read and write
|
||
D0FACFE000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
2049209B000
|
heap
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
1F2DC402000
|
trusted library allocation
|
page read and write
|
||
21E9AB95000
|
heap
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
1EDD4C65000
|
heap
|
page read and write
|
||
1004FC000
|
stack
|
page read and write
|
||
1009FD000
|
stack
|
page read and write
|
||
2136083D000
|
heap
|
page read and write
|
||
21360E70000
|
remote allocation
|
page read and write
|
||
C266E7E000
|
stack
|
page read and write
|
||
1BE5608E000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
4650000
|
heap
|
page read and write
|
||
1B602ABD000
|
heap
|
page read and write
|
||
23140302000
|
heap
|
page read and write
|
||
1BE5B90E000
|
trusted library allocation
|
page read and write
|
||
851000
|
unkown
|
page execute read
|
||
850000
|
unkown
|
page readonly
|
||
A60367F000
|
stack
|
page read and write
|
||
21E9AB00000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1F871B00000
|
trusted library allocation
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
21E9AB68000
|
heap
|
page read and write
|
||
21E9ABA6000
|
heap
|
page read and write
|
||
1B602B13000
|
heap
|
page read and write
|
||
D81CEFF000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1EDD4B90000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1BE56102000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1BE560FE000
|
heap
|
page read and write
|
||
1F2DBC79000
|
heap
|
page read and write
|
||
21E9B002000
|
heap
|
page read and write
|
||
4A48000
|
heap
|
page read and write
|
||
6497777000
|
stack
|
page read and write
|
||
21E9ABAE000
|
heap
|
page read and write
|
||
2508AFB000
|
stack
|
page read and write
|
||
23140120000
|
heap
|
page read and write
|
||
1BE5B930000
|
trusted library allocation
|
page read and write
|
||
85D000
|
unkown
|
page readonly
|
||
C30000
|
direct allocation
|
page read and write
|
||
1FCB7613000
|
heap
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
51AB000
|
heap
|
page read and write
|
||
1BE56740000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1CE0822E000
|
heap
|
page read and write
|
||
D1F000
|
stack
|
page read and write
|
||
10FA000
|
unclassified section
|
page read and write
|
||
100AFE000
|
stack
|
page read and write
|
||
1CE0826D000
|
heap
|
page read and write
|
||
21E9A25D000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
25A8B602000
|
trusted library allocation
|
page read and write
|
||
D81CB7B000
|
stack
|
page read and write
|
||
1F872660000
|
trusted library allocation
|
page read and write
|
||
1EDD4D13000
|
heap
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
24F0000
|
remote allocation
|
page read and write
|
||
1BE56802000
|
heap
|
page read and write
|
||
1FCB7490000
|
heap
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
21E9ABAF000
|
heap
|
page read and write
|
||
21E9A316000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
1BE5B530000
|
trusted library allocation
|
page read and write
|
||
25A8AE13000
|
heap
|
page read and write
|
||
C2672FF000
|
stack
|
page read and write
|
||
1F2DBC00000
|
heap
|
page read and write
|
||
D0FAC7B000
|
stack
|
page read and write
|
||
1B6029D0000
|
trusted library allocation
|
page read and write
|
||
21E9B002000
|
heap
|
page read and write
|
||
20492040000
|
heap
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
1BE5B924000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
213607E0000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
250927E000
|
stack
|
page read and write
|
||
21E9ABAB000
|
heap
|
page read and write
|
||
1BE560BC000
|
heap
|
page read and write
|
||
1B602A44000
|
heap
|
page read and write
|
||
1EDD4C75000
|
heap
|
page read and write
|
||
1BE56918000
|
heap
|
page read and write
|
||
25A8AE53000
|
heap
|
page read and write
|
||
20491FE0000
|
heap
|
page read and write
|
||
85D000
|
unkown
|
page readonly
|
||
D0FB2FF000
|
stack
|
page read and write
|
||
1F872650000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
23140229000
|
heap
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1CE08255000
|
heap
|
page read and write
|
||
8D0000
|
direct allocation
|
page execute and read and write
|
||
1BE5B9A0000
|
remote allocation
|
page read and write
|
||
2509179000
|
stack
|
page read and write
|
||
9A3000
|
direct allocation
|
page read and write
|
||
21E9A2B0000
|
heap
|
page read and write
|
||
1F871AF0000
|
heap
|
page read and write
|
||
A60357D000
|
stack
|
page read and write
|
||
851000
|
unkown
|
page execute read
|
||
1BE5B700000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
D1F000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
23140200000
|
heap
|
page read and write
|
||
21E9B01A000
|
heap
|
page read and write
|
||
204923D0000
|
heap
|
page read and write
|
||
21E9A25A000
|
heap
|
page read and write
|
||
1CE080A0000
|
heap
|
page read and write
|
||
8B2000
|
unkown
|
page readonly
|
||
1BE56918000
|
heap
|
page read and write
|
||
21E9A2A4000
|
heap
|
page read and write
|
||
25A8AC50000
|
heap
|
page read and write
|
||
4DD000
|
stack
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
21E9AB86000
|
heap
|
page read and write
|
||
21E9ABB8000
|
heap
|
page read and write
|
||
21E9AB8E000
|
heap
|
page read and write
|
||
1F2DBC02000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
21E9AB90000
|
heap
|
page read and write
|
||
1CE08263000
|
heap
|
page read and write
|
||
2314028A000
|
heap
|
page read and write
|
||
867000
|
unkown
|
page write copy
|
||
1EDD4C13000
|
heap
|
page read and write
|
||
21E9ABA8000
|
heap
|
page read and write
|
||
1B602ACE000
|
heap
|
page read and write
|
||
1BE5B9A0000
|
remote allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
21E9A2EA000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
800000
|
trusted library allocation
|
page read and write
|
||
1F87195F000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1CE0824E000
|
heap
|
page read and write
|
||
10F1000
|
unclassified section
|
page execute read
|
||
C2671FE000
|
stack
|
page read and write
|
||
1CE08040000
|
heap
|
page read and write
|
||
5DC000
|
stack
|
page read and write
|
||
D0FB3F7000
|
stack
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
25A8AF02000
|
heap
|
page read and write
|
||
21E9AB99000
|
heap
|
page read and write
|
||
23140213000
|
heap
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
25A8AF13000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
25A8AE7B000
|
heap
|
page read and write
|
||
D1F000
|
stack
|
page read and write
|
||
1CE0824F000
|
heap
|
page read and write
|
||
1F871918000
|
heap
|
page read and write
|
||
867000
|
unkown
|
page write copy
|
||
6C0DAFB000
|
stack
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
1BE5B702000
|
heap
|
page read and write
|
||
21360800000
|
heap
|
page read and write
|
||
1BE5B540000
|
trusted library allocation
|
page read and write
|
||
C47000
|
heap
|
page read and write
|
||
1BE5B662000
|
heap
|
page read and write
|
||
4C1A000
|
stack
|
page read and write
|
||
1CE08213000
|
heap
|
page read and write
|
||
1BE5B617000
|
heap
|
page read and write
|
||
867000
|
unkown
|
page write copy
|
||
C30000
|
direct allocation
|
page read and write
|
||
1BE5B600000
|
heap
|
page read and write
|
||
23140300000
|
heap
|
page read and write
|
||
21E9A8B0000
|
remote allocation
|
page read and write
|
||
A60317B000
|
stack
|
page read and write
|
||
204920A6000
|
heap
|
page read and write
|
||
6CB000
|
stack
|
page read and write
|
||
204920CE000
|
heap
|
page read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
6C0DD77000
|
stack
|
page read and write
|
||
1B602800000
|
heap
|
page read and write
|
||
1CE0823D000
|
heap
|
page read and write
|
||
1BE56959000
|
heap
|
page read and write
|
||
5DC000
|
stack
|
page read and write
|
||
1CE0827E000
|
heap
|
page read and write
|
||
10007B000
|
stack
|
page read and write
|
||
851000
|
unkown
|
page execute read
|
||
25A8AE2A000
|
heap
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
21360902000
|
heap
|
page read and write
|
||
1B602A13000
|
heap
|
page read and write
|
||
1BE574A0000
|
trusted library allocation
|
page read and write
|
||
21E9ABAA000
|
heap
|
page read and write
|
||
8B2000
|
unkown
|
page readonly
|
||
21E9AB90000
|
heap
|
page read and write
|
||
1F2DBD13000
|
heap
|
page read and write
|
||
21E9AB95000
|
heap
|
page read and write
|
||
1008FB000
|
stack
|
page read and write
|
||
649787F000
|
stack
|
page read and write
|
||
4DD000
|
stack
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
4BDD000
|
stack
|
page read and write
|
||
21360670000
|
heap
|
page read and write
|
||
24F0000
|
remote allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1FCB74A0000
|
heap
|
page read and write
|
||
1001FE000
|
stack
|
page read and write
|
||
1BE5B6FB000
|
heap
|
page read and write
|
||
1FCB7653000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1FCB768C000
|
heap
|
page read and write
|
||
1BE56FF0000
|
trusted library allocation
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
1BE5B580000
|
trusted library allocation
|
page read and write
|
||
1BE56029000
|
heap
|
page read and write
|
||
649767E000
|
stack
|
page read and write
|
||
427AEF9000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
21E9AB99000
|
heap
|
page read and write
|
||
21E9A190000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1F2DBD02000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
C266BEE000
|
stack
|
page read and write
|
||
1BE5B6DC000
|
heap
|
page read and write
|
||
21E9AB95000
|
heap
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
21E9AB25000
|
heap
|
page read and write
|
||
21E9AB1C000
|
heap
|
page read and write
|
||
25A8AE5A000
|
heap
|
page read and write
|
||
21E9B018000
|
heap
|
page read and write
|
||
1EDD4C6F000
|
heap
|
page read and write
|
||
1BE560A1000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
D1F000
|
stack
|
page read and write
|
||
1CE0827B000
|
heap
|
page read and write
|
||
5DC000
|
stack
|
page read and write
|
||
1F87195F000
|
heap
|
page read and write
|
||
1F871967000
|
heap
|
page read and write
|
||
850000
|
unkown
|
page readonly
|
||
C30000
|
direct allocation
|
page read and write
|
||
204920B4000
|
heap
|
page read and write
|
||
21E9A25E000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
21E9ABB5000
|
heap
|
page read and write
|
||
1CE0826B000
|
heap
|
page read and write
|
||
427ADF9000
|
stack
|
page read and write
|
||
1CE08239000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
85B000
|
unkown
|
page execute read
|
||
21E9A302000
|
heap
|
page read and write
|
||
21E9B002000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
21360E70000
|
remote allocation
|
page read and write
|
||
25A8AE85000
|
heap
|
page read and write
|
||
21E9AB99000
|
heap
|
page read and write
|
||
20492060000
|
heap
|
page read and write
|
||
21E9AB95000
|
heap
|
page read and write
|
||
850000
|
unkown
|
page readonly
|
||
470000
|
unkown
|
page read and write
|
||
B02AB7E000
|
stack
|
page read and write
|
||
1CE08240000
|
heap
|
page read and write
|
||
100BFC000
|
stack
|
page read and write
|
||
1F8716E0000
|
heap
|
page read and write
|
||
1CE08242000
|
heap
|
page read and write
|
||
21E9ABDE000
|
heap
|
page read and write
|
||
21E9AB97000
|
heap
|
page read and write
|
||
1EDD4B30000
|
heap
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
851000
|
unkown
|
page execute read
|
||
21361002000
|
trusted library allocation
|
page read and write
|
||
1CE08248000
|
heap
|
page read and write
|
||
204920C1000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
10DC000
|
stack
|
page read and write
|
||
2314023C000
|
heap
|
page read and write
|
||
1EDD4C53000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1F2DBC40000
|
heap
|
page read and write
|
||
1F872430000
|
trusted library allocation
|
page read and write
|
||
21E9A2C7000
|
heap
|
page read and write
|
||
10FC000
|
unclassified section
|
page readonly
|
||
21E9A264000
|
heap
|
page read and write
|
||
1BE5B9A0000
|
remote allocation
|
page read and write
|
||
1BE5B921000
|
trusted library allocation
|
page read and write
|
||
21360E70000
|
remote allocation
|
page read and write
|
||
1BE5B570000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
21E9AB82000
|
heap
|
page read and write
|
||
1FCB7648000
|
heap
|
page read and write
|
||
1BE5B64C000
|
heap
|
page read and write
|
||
21E9A308000
|
heap
|
page read and write
|
||
1EDD4C29000
|
heap
|
page read and write
|
||
85F000
|
unkown
|
page read and write
|
||
21E9AB5D000
|
heap
|
page read and write
|
||
21E9AB90000
|
heap
|
page read and write
|
||
21E9AB97000
|
heap
|
page read and write
|
||
1F87195F000
|
heap
|
page read and write
|
||
85D000
|
unkown
|
page readonly
|
||
1BE5B584000
|
trusted library allocation
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
1EDD5402000
|
trusted library allocation
|
page read and write
|
||
B3A69FB000
|
stack
|
page read and write
|
||
B02AA7E000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
1F2DBC70000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
1F2DBC13000
|
heap
|
page read and write
|
||
1BE5B62E000
|
heap
|
page read and write
|
||
1BE56102000
|
heap
|
page read and write
|
||
64975FB000
|
stack
|
page read and write
|
||
21360680000
|
heap
|
page read and write
|
||
1FCB7629000
|
heap
|
page read and write
|
||
1BE5B63F000
|
heap
|
page read and write
|
||
204920C1000
|
heap
|
page read and write
|
||
1BE5B4A0000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1BE5B6D6000
|
heap
|
page read and write
|
||
850000
|
unkown
|
page readonly
|
||
649797F000
|
stack
|
page read and write
|
||
1B602A29000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1F8718B0000
|
trusted library allocation
|
page read and write
|
||
51AB000
|
heap
|
page read and write
|
||
21E9A2EC000
|
heap
|
page read and write
|
||
1BE5BA90000
|
trusted library allocation
|
page read and write
|
||
1CE08241000
|
heap
|
page read and write
|
||
1FCB763C000
|
heap
|
page read and write
|
||
21E9A256000
|
heap
|
page read and write
|
||
1CE08284000
|
heap
|
page read and write
|
||
21E9ABD0000
|
heap
|
page read and write
|
||
1BE55F80000
|
heap
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
21E9AB9D000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1BE5B6A2000
|
heap
|
page read and write
|
||
21E9AB94000
|
heap
|
page read and write
|
||
C266FFE000
|
stack
|
page read and write
|
||
6C0DE7E000
|
stack
|
page read and write
|
||
1BE5B540000
|
trusted library allocation
|
page read and write
|
||
8F6000
|
unkown
|
page readonly
|
||
C30000
|
direct allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
85F000
|
unkown
|
page read and write
|
||
1BE5B900000
|
trusted library allocation
|
page read and write
|
||
D81C87B000
|
stack
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
2136085C000
|
heap
|
page read and write
|
||
A602D5B000
|
stack
|
page read and write
|
||
85D000
|
unkown
|
page readonly
|
||
1BE56815000
|
heap
|
page read and write
|
||
21E9AB71000
|
heap
|
page read and write
|
||
8B2000
|
unkown
|
page readonly
|
||
1006FE000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1CE08269000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
427A9EC000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
21360824000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
21E9ABC0000
|
heap
|
page read and write
|
||
1B602B02000
|
heap
|
page read and write
|
||
1CE08249000
|
heap
|
page read and write
|
||
85B000
|
unkown
|
page execute read
|
||
1F2DBA00000
|
heap
|
page read and write
|
||
6C0DF7F000
|
stack
|
page read and write
|
||
85F000
|
unkown
|
page read and write
|
||
1BE5B550000
|
trusted library allocation
|
page read and write
|
||
1BE5B910000
|
trusted library allocation
|
page read and write
|
||
1FCB7713000
|
heap
|
page read and write
|
||
C266B6C000
|
stack
|
page read and write
|
||
1BE56959000
|
heap
|
page read and write
|
||
D1F000
|
stack
|
page read and write
|
||
1BE560FE000
|
heap
|
page read and write
|
||
D0FAD7E000
|
stack
|
page read and write
|
||
1EDD4C5B000
|
heap
|
page read and write
|
||
1FCB764C000
|
heap
|
page read and write
|
||
85F000
|
unkown
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
B02A73F000
|
stack
|
page read and write
|
||
21E9B021000
|
heap
|
page read and write
|
||
204920C1000
|
heap
|
page read and write
|
||
1FCB7702000
|
heap
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
B02A6BA000
|
stack
|
page read and write
|
||
1CE0824D000
|
heap
|
page read and write
|
||
21360802000
|
heap
|
page read and write
|
||
1BE5B6A4000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1BE56013000
|
heap
|
page read and write
|
||
1FCB7E02000
|
trusted library allocation
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
204920B6000
|
heap
|
page read and write
|
||
1CE08262000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
25A8AE8C000
|
heap
|
page read and write
|
||
5DC000
|
stack
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
1F2DBC28000
|
heap
|
page read and write
|
||
2508EF8000
|
stack
|
page read and write
|
||
850000
|
unkown
|
page readonly
|
||
C30000
|
direct allocation
|
page read and write
|
||
204920A6000
|
heap
|
page read and write
|
||
867000
|
unkown
|
page write copy
|
||
250997E000
|
stack
|
page read and write
|
||
1CE08200000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
649715E000
|
stack
|
page read and write
|
||
850000
|
unkown
|
page readonly
|
||
21E9A020000
|
heap
|
page read and write
|
||
21E9AB95000
|
heap
|
page read and write
|
||
1CE08264000
|
heap
|
page read and write
|
||
B02ABFC000
|
stack
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
116E000
|
stack
|
page read and write
|
||
D0FB0F7000
|
stack
|
page read and write
|
||
21E9AB75000
|
heap
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
8B2000
|
unkown
|
page readonly
|
||
1CE08245000
|
heap
|
page read and write
|
||
1CE08260000
|
heap
|
page read and write
|
||
1BE5B980000
|
trusted library allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
D1F000
|
stack
|
page read and write
|
||
85B000
|
unkown
|
page execute read
|
||
8C0000
|
heap
|
page read and write
|
||
1CE08246000
|
heap
|
page read and write
|
||
21E9A2E9000
|
heap
|
page read and write
|
||
1BE56107000
|
heap
|
page read and write
|
||
8B2000
|
unkown
|
page readonly
|
||
5FD4F7D000
|
stack
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
10077C000
|
stack
|
page read and write
|
||
867000
|
unkown
|
page write copy
|
||
23140249000
|
heap
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
C30000
|
direct allocation
|
page read and write
|
||
1BE56900000
|
heap
|
page read and write
|
||
25A8AE3C000
|
heap
|
page read and write
|
||
21E9AB99000
|
heap
|
page read and write
|
||
1BE5B570000
|
trusted library allocation
|
page read and write
|
||
A76000
|
heap
|
page read and write
|
||
1BE56800000
|
heap
|
page read and write
|
||
23140313000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
85F000
|
unkown
|
page read and write
|
||
21E9A28B000
|
heap
|
page read and write
|
||
21E9A2B5000
|
heap
|
page read and write
|
||
1EDD4D02000
|
heap
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
25A8AE59000
|
heap
|
page read and write
|
||
21E9ABB8000
|
heap
|
page read and write
|
||
1B603100000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
23140190000
|
heap
|
page read and write
|
||
21E9AB97000
|
heap
|
page read and write
|
||
A60397F000
|
stack
|
page read and write
|
||
5FD4A7C000
|
stack
|
page read and write
|
||
231401C0000
|
trusted library allocation
|
page read and write
|
There are 807 hidden memdumps, click here to show them.