Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
nZNmWqwnpr.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
MPEG-4 LOAS
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x0770f373, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_nZN_5c40899ed0f0541acc9ab16798f8d17fcf421773_56ac50ec_074e79e0\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_nZN_5c40899ed0f0541acc9ab16798f8d17fcf421773_56ac50ec_0d7e7db9\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER64B3.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon May 23 05:36:50 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER658D.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon May 23 05:36:51 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6996.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A70.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6BC9.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6D02.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\nZNmWqwnpr.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_FileTime
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_SystemTime
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PDQmdReNwGSs\ZxyxzMoIe.dll"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,DllRegisterServer
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7080 -s 336
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7088 -s 328
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://165.22.73.229/
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
https://165.22.73.229:8080/tem
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://165.22.73.229:8080/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
165.22.73.229
|
unknown
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProgramId
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
FileId
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LowerCaseLongPath
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LongPathHash
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Name
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Publisher
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Version
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinFileVersion
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinaryType
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductName
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductVersion
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LinkDate
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinProductVersion
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Size
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Language
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsPeFile
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsOsComponent
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C005C62C4D85
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C005C62C4D85
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
There are 23 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
180001000
|
direct allocation
|
page execute read
|
||
1E59C5C0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
1E59C5C0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
13E99710000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
13E99710000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
12D0000
|
direct allocation
|
page execute and read and write
|
||
B70000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
13E99710000
|
direct allocation
|
page execute and read and write
|
||
1E59C5C0000
|
direct allocation
|
page execute and read and write
|
||
2823F820000
|
heap
|
page read and write
|
||
24A18051000
|
heap
|
page read and write
|
||
736527B000
|
stack
|
page read and write
|
||
C6B697E000
|
stack
|
page read and write
|
||
24A13770000
|
trusted library allocation
|
page read and write
|
||
2823BD90000
|
heap
|
page read and write
|
||
24A18000000
|
heap
|
page read and write
|
||
1E59C5B0000
|
direct allocation
|
page execute and read and write
|
||
22E15D5A000
|
heap
|
page read and write
|
||
2075E066000
|
heap
|
page read and write
|
||
2217F620000
|
heap
|
page read and write
|
||
1E59DE70000
|
heap
|
page read and write
|
||
1E59C460000
|
heap
|
page read and write
|
||
24A17EE0000
|
trusted library allocation
|
page read and write
|
||
2075EB98000
|
heap
|
page read and write
|
||
2217F68F000
|
heap
|
page read and write
|
||
24A18102000
|
heap
|
page read and write
|
||
2075EB83000
|
heap
|
page read and write
|
||
22E15D42000
|
heap
|
page read and write
|
||
7FFA53290000
|
unkown
|
page readonly
|
||
22E14000000
|
trusted library allocation
|
page read and write
|
||
265A87F000
|
stack
|
page read and write
|
||
24A17ED0000
|
trusted library allocation
|
page read and write
|
||
22E15D72000
|
heap
|
page read and write
|
||
1E82C457000
|
heap
|
page read and write
|
||
2075E102000
|
heap
|
page read and write
|
||
6EE32FF000
|
stack
|
page read and write
|
||
22E10D3E000
|
heap
|
page read and write
|
||
7FFA53291000
|
unkown
|
page execute read
|
||
24A13000000
|
heap
|
page read and write
|
||
1566F590000
|
heap
|
page read and write
|
||
1E82C428000
|
heap
|
page read and write
|
||
24A17EE0000
|
remote allocation
|
page read and write
|
||
C64427F000
|
stack
|
page read and write
|
||
1E59C610000
|
heap
|
page read and write
|
||
2075F000000
|
heap
|
page read and write
|
||
2217F68F000
|
heap
|
page read and write
|
||
31DB000
|
stack
|
page read and write
|
||
265A5BF000
|
stack
|
page read and write
|
||
1566F688000
|
heap
|
page read and write
|
||
24A180A3000
|
heap
|
page read and write
|
||
32DD000
|
stack
|
page read and write
|
||
1566F613000
|
heap
|
page read and write
|
||
73B0277000
|
stack
|
page read and write
|
||
22CE464B000
|
heap
|
page read and write
|
||
1811F63C000
|
heap
|
page read and write
|
||
24A1263F000
|
heap
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
1811F708000
|
heap
|
page read and write
|
||
2217F600000
|
heap
|
page read and write
|
||
B8C689B000
|
stack
|
page read and write
|
||
2823BDC9000
|
heap
|
page read and write
|
||
2823BDD2000
|
heap
|
page read and write
|
||
13E99860000
|
remote allocation
|
page read and write
|
||
2823BD20000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
2075EB16000
|
heap
|
page read and write
|
||
7FFA532B2000
|
unkown
|
page readonly
|
||
7FFA532B2000
|
unkown
|
page readonly
|
||
F53295B000
|
stack
|
page read and write
|
||
6EE33FF000
|
stack
|
page read and write
|
||
24A13118000
|
heap
|
page read and write
|
||
2823BDC9000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
2075E064000
|
heap
|
page read and write
|
||
3A3D8FE000
|
stack
|
page read and write
|
||
2075E0C1000
|
heap
|
page read and write
|
||
2075DFA0000
|
trusted library allocation
|
page read and write
|
||
7FFA53290000
|
unkown
|
page readonly
|
||
2075EB96000
|
heap
|
page read and write
|
||
1E82CC02000
|
trusted library allocation
|
page read and write
|
||
2075E0AB000
|
heap
|
page read and write
|
||
1811F700000
|
heap
|
page read and write
|
||
1811F648000
|
heap
|
page read and write
|
||
2217F687000
|
heap
|
page read and write
|
||
22E15D59000
|
heap
|
page read and write
|
||
736577F000
|
stack
|
page read and write
|
||
D8325FE000
|
stack
|
page read and write
|
||
2217F8C0000
|
trusted library allocation
|
page read and write
|
||
22CE4613000
|
heap
|
page read and write
|
||
7FFA53290000
|
unkown
|
page readonly
|
||
4330FB000
|
stack
|
page read and write
|
||
22E10CE5000
|
heap
|
page read and write
|
||
24A18062000
|
heap
|
page read and write
|
||
22E10D28000
|
heap
|
page read and write
|
||
1811F613000
|
heap
|
page read and write
|
||
2075EB7A000
|
heap
|
page read and write
|
||
1566F661000
|
heap
|
page read and write
|
||
2075F002000
|
heap
|
page read and write
|
||
2075EB83000
|
heap
|
page read and write
|
||
2823EF13000
|
heap
|
page read and write
|
||
24A18100000
|
heap
|
page read and write
|
||
2217F8B9000
|
heap
|
page read and write
|
||
D83217E000
|
stack
|
page read and write
|
||
D8320FE000
|
stack
|
page read and write
|
||
29FC000
|
stack
|
page read and write
|
||
73AFE7C000
|
stack
|
page read and write
|
||
1566F702000
|
heap
|
page read and write
|
||
2075DF70000
|
heap
|
page read and write
|
||
24A1802F000
|
heap
|
page read and write
|
||
13E99700000
|
direct allocation
|
page execute and read and write
|
||
1E59C300000
|
unkown
|
page read and write
|
||
13E994C0000
|
heap
|
page read and write
|
||
24A17E70000
|
trusted library allocation
|
page read and write
|
||
6EE2E7E000
|
stack
|
page read and write
|
||
24A18088000
|
heap
|
page read and write
|
||
2075EB7D000
|
heap
|
page read and write
|
||
7FFA532BB000
|
unkown
|
page read and write
|
||
2217F8B0000
|
heap
|
page read and write
|
||
139C000
|
heap
|
page read and write
|
||
2075EB96000
|
heap
|
page read and write
|
||
2075F002000
|
heap
|
page read and write
|
||
24A180F1000
|
heap
|
page read and write
|
||
2075EBA5000
|
heap
|
page read and write
|
||
3A3D879000
|
stack
|
page read and write
|
||
24A17E50000
|
trusted library allocation
|
page read and write
|
||
2823EF10000
|
heap
|
page read and write
|
||
2075E059000
|
heap
|
page read and write
|
||
24A12714000
|
heap
|
page read and write
|
||
139C000
|
heap
|
page read and write
|
||
22E10D20000
|
heap
|
page read and write
|
||
22CE45F0000
|
trusted library allocation
|
page read and write
|
||
1E59C440000
|
heap
|
page read and write
|
||
2075EB87000
|
heap
|
page read and write
|
||
22E15D62000
|
heap
|
page read and write
|
||
2075E8D0000
|
remote allocation
|
page read and write
|
||
2075EB75000
|
heap
|
page read and write
|
||
13E9B150000
|
heap
|
page read and write
|
||
7FFA532BF000
|
unkown
|
page readonly
|
||
2075EB7D000
|
heap
|
page read and write
|
||
2075EB61000
|
heap
|
page read and write
|
||
2075EB76000
|
heap
|
page read and write
|
||
1566F700000
|
heap
|
page read and write
|
||
13E99875000
|
heap
|
page read and write
|
||
24A12692000
|
heap
|
page read and write
|
||
1811F64D000
|
heap
|
page read and write
|
||
1E82C500000
|
heap
|
page read and write
|
||
2075E05C000
|
heap
|
page read and write
|
||
265A53C000
|
stack
|
page read and write
|
||
2075EB1F000
|
heap
|
page read and write
|
||
22E10D66000
|
heap
|
page read and write
|
||
22E15D41000
|
heap
|
page read and write
|
||
13E99508000
|
heap
|
page read and write
|
||
24A180EE000
|
heap
|
page read and write
|
||
22CE464F000
|
heap
|
page read and write
|
||
D8326FA000
|
stack
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
2075EB50000
|
heap
|
page read and write
|
||
24A126A8000
|
heap
|
page read and write
|
||
22E127D0000
|
heap
|
page read and write
|
||
2075EB83000
|
heap
|
page read and write
|
||
22E15D72000
|
heap
|
page read and write
|
||
2B0B000
|
stack
|
page read and write
|
||
2075E04C000
|
heap
|
page read and write
|
||
24A17EA0000
|
trusted library allocation
|
page read and write
|
||
1E59DE30000
|
heap
|
page read and write
|
||
22E10D42000
|
heap
|
page read and write
|
||
2075E0F7000
|
heap
|
page read and write
|
||
2823BD95000
|
heap
|
page read and write
|
||
13E994C0000
|
heap
|
page read and write
|
||
13E99450000
|
heap
|
page read and write
|
||
2823BDBE000
|
heap
|
page read and write
|
||
24A126FB000
|
heap
|
page read and write
|
||
2075E0DF000
|
heap
|
page read and write
|
||
2075E058000
|
heap
|
page read and write
|
||
7365CFC000
|
stack
|
page read and write
|
||
22E15B20000
|
heap
|
page read and write
|
||
1E59C4A8000
|
heap
|
page read and write
|
||
22CE44F0000
|
heap
|
page read and write
|
||
2075F002000
|
heap
|
page read and write
|
||
2217FE70000
|
trusted library allocation
|
page read and write
|
||
432E7F000
|
stack
|
page read and write
|
||
24A17E90000
|
trusted library allocation
|
page read and write
|
||
24A17C70000
|
trusted library allocation
|
page read and write
|
||
24A13159000
|
heap
|
page read and write
|
||
2075E021000
|
heap
|
page read and write
|
||
2075E05D000
|
heap
|
page read and write
|
||
22CE4E02000
|
trusted library allocation
|
page read and write
|
||
1566F633000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
24A12E80000
|
trusted library allocation
|
page read and write
|
||
24A126FB000
|
heap
|
page read and write
|
||
2075E081000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page readonly
|
||
1E82C513000
|
heap
|
page read and write
|
||
1566FE90000
|
trusted library allocation
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
24A17EE0000
|
remote allocation
|
page read and write
|
||
D83207C000
|
stack
|
page read and write
|
||
1E59C4A0000
|
heap
|
page read and write
|
||
2C90000
|
remote allocation
|
page read and write
|
||
2075F002000
|
heap
|
page read and write
|
||
1E59C5B0000
|
direct allocation
|
page execute and read and write
|
||
24A17EC0000
|
trusted library allocation
|
page read and write
|
||
13E994E0000
|
heap
|
page read and write
|
||
2075E0B4000
|
heap
|
page read and write
|
||
6EE2FFF000
|
stack
|
page read and write
|
||
1566F65E000
|
heap
|
page read and write
|
||
2075EB76000
|
heap
|
page read and write
|
||
24A17D80000
|
trusted library allocation
|
page read and write
|
||
1811F64C000
|
heap
|
page read and write
|
||
1566F652000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
22E15D47000
|
heap
|
page read and write
|
||
2217F7A0000
|
trusted library allocation
|
page read and write
|
||
24A13158000
|
heap
|
page read and write
|
||
1E59C5F0000
|
heap
|
page readonly
|
||
15C5000
|
heap
|
page read and write
|
||
7FFA532BB000
|
unkown
|
page read and write
|
||
1811F3A0000
|
heap
|
page read and write
|
||
22E13FF3000
|
heap
|
page read and write
|
||
1E82C43C000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
2075E013000
|
heap
|
page read and write
|
||
1341000
|
heap
|
page read and write
|
||
2823BBC0000
|
heap
|
page read and write
|
||
2075EB87000
|
heap
|
page read and write
|
||
13E994E0000
|
heap
|
page read and write
|
||
736597B000
|
stack
|
page read and write
|
||
7FFA532BB000
|
unkown
|
page read and write
|
||
2075E029000
|
heap
|
page read and write
|
||
24A12FF3000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
2075EBB4000
|
heap
|
page read and write
|
||
13E99860000
|
remote allocation
|
page read and write
|
||
7FFA53291000
|
unkown
|
page execute read
|
||
2075EB94000
|
heap
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
7FFA532BB000
|
unkown
|
page read and write
|
||
24A18104000
|
heap
|
page read and write
|
||
2823BDB0000
|
heap
|
page read and write
|
||
1811F702000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
13E99740000
|
heap
|
page readonly
|
||
F50000
|
remote allocation
|
page read and write
|
||
1E59C4A0000
|
heap
|
page read and write
|
||
24A12702000
|
heap
|
page read and write
|
||
1E59DE70000
|
heap
|
page read and write
|
||
1E59C460000
|
heap
|
page read and write
|
||
13E99740000
|
heap
|
page readonly
|
||
13E1000
|
heap
|
page read and write
|
||
2075E8D0000
|
remote allocation
|
page read and write
|
||
B8C691E000
|
stack
|
page read and write
|
||
1E59DE00000
|
remote allocation
|
page read and write
|
||
1811F600000
|
heap
|
page read and write
|
||
1E59C615000
|
heap
|
page read and write
|
||
1341000
|
heap
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
24A12FF0000
|
trusted library allocation
|
page read and write
|
||
2075EB87000
|
heap
|
page read and write
|
||
73B047F000
|
stack
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
24A18103000
|
heap
|
page read and write
|
||
C6B677B000
|
stack
|
page read and write
|
||
1E82C2B0000
|
heap
|
page read and write
|
||
2075F002000
|
heap
|
page read and write
|
||
99AB97E000
|
stack
|
page read and write
|
||
2217F7BA000
|
trusted library allocation
|
page read and write
|
||
7FFA532B2000
|
unkown
|
page readonly
|
||
D83277E000
|
unkown
|
page read and write
|
||
2823BDC6000
|
heap
|
page read and write
|
||
1566F663000
|
heap
|
page read and write
|
||
24A13102000
|
heap
|
page read and write
|
||
1811F67A000
|
heap
|
page read and write
|
||
2075E081000
|
heap
|
page read and write
|
||
24A17D88000
|
trusted library allocation
|
page read and write
|
||
1E59C440000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
D8323FE000
|
stack
|
page read and write
|
||
1E82C3B0000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
1E59C460000
|
heap
|
page read and write
|
||
24A17DA4000
|
trusted library allocation
|
page read and write
|
||
1566F600000
|
heap
|
page read and write
|
||
1E59C300000
|
heap
|
page read and write
|
||
2075EB94000
|
heap
|
page read and write
|
||
24A1269D000
|
heap
|
page read and write
|
||
1E59C615000
|
heap
|
page read and write
|
||
1E59DE30000
|
heap
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
133A000
|
heap
|
page read and write
|
||
F50000
|
remote allocation
|
page read and write
|
||
1811F713000
|
heap
|
page read and write
|
||
7FFA53290000
|
unkown
|
page readonly
|
||
2075EBD7000
|
heap
|
page read and write
|
||
C644379000
|
stack
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
1E59C5B0000
|
direct allocation
|
page execute and read and write
|
||
24A12675000
|
heap
|
page read and write
|
||
1811F629000
|
heap
|
page read and write
|
||
265A53C000
|
stack
|
page read and write
|
||
265A87F000
|
stack
|
page read and write
|
||
2823BDB9000
|
heap
|
page read and write
|
||
22E10CE0000
|
heap
|
page read and write
|
||
2217F860000
|
trusted library allocation
|
page read and write
|
||
2823BD00000
|
heap
|
page read and write
|
||
265A53C000
|
stack
|
page read and write
|
||
2217F870000
|
trusted library allocation
|
page read and write
|
||
1E59C4A8000
|
heap
|
page read and write
|
||
2075EBB0000
|
heap
|
page read and write
|
||
1E82C413000
|
heap
|
page read and write
|
||
22E10D39000
|
heap
|
page read and write
|
||
2823F020000
|
trusted library allocation
|
page read and write
|
||
24A180FA000
|
heap
|
page read and write
|
||
2075E000000
|
heap
|
page read and write
|
||
C64447C000
|
stack
|
page read and write
|
||
2075EB94000
|
heap
|
page read and write
|
||
1566F5F0000
|
heap
|
page read and write
|
||
7C5000
|
stack
|
page read and write
|
||
2823BDD2000
|
heap
|
page read and write
|
||
22CE4629000
|
heap
|
page read and write
|
||
2217F4D0000
|
trusted library allocation
|
page read and write
|
||
22CE468A000
|
heap
|
page read and write
|
||
C6443FE000
|
stack
|
page read and write
|
||
2075E0EA000
|
heap
|
page read and write
|
||
13E99870000
|
heap
|
page read and write
|
||
2075E0EB000
|
heap
|
page read and write
|
||
24A17EB0000
|
trusted library allocation
|
page read and write
|
||
13E9B150000
|
heap
|
page read and write
|
||
22E15D72000
|
heap
|
page read and write
|
||
2217F648000
|
heap
|
page read and write
|
||
22E10D5D000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
24A13BF0000
|
trusted library allocation
|
page read and write
|
||
1566F63C000
|
heap
|
page read and write
|
||
24A12670000
|
heap
|
page read and write
|
||
13E9B1A0000
|
heap
|
page read and write
|
||
265A5BF000
|
stack
|
page read and write
|
||
24A12580000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
13E99508000
|
heap
|
page read and write
|
||
24A17BF0000
|
trusted library allocation
|
page read and write
|
||
1811F688000
|
heap
|
page read and write
|
||
22CE4651000
|
heap
|
page read and write
|
||
2075EBA2000
|
heap
|
page read and write
|
||
22E10D42000
|
heap
|
page read and write
|
||
3A3D67B000
|
stack
|
page read and write
|
||
1E59C5F0000
|
heap
|
page readonly
|
||
7FFA532BF000
|
unkown
|
page readonly
|
||
FE0000
|
heap
|
page readonly
|
||
13E99870000
|
heap
|
page read and write
|
||
99AB87C000
|
stack
|
page read and write
|
||
18002F000
|
direct allocation
|
page read and write
|
||
2075EB96000
|
heap
|
page read and write
|
||
24A12600000
|
heap
|
page read and write
|
||
24A18022000
|
heap
|
page read and write
|
||
22E10D4C000
|
heap
|
page read and write
|
||
2075EB81000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
2075E054000
|
heap
|
page read and write
|
||
24A12689000
|
heap
|
page read and write
|
||
13E99450000
|
unkown
|
page read and write
|
||
22E10D36000
|
heap
|
page read and write
|
||
22CE4702000
|
heap
|
page read and write
|
||
13E9B1A0000
|
heap
|
page read and write
|
||
7FFA53291000
|
unkown
|
page execute read
|
||
2075E05E000
|
heap
|
page read and write
|
||
22CE4708000
|
heap
|
page read and write
|
||
6EE2B9E000
|
stack
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
736567B000
|
stack
|
page read and write
|
||
22E15D47000
|
heap
|
page read and write
|
||
3A3D9FC000
|
stack
|
page read and write
|
||
24A180A1000
|
heap
|
page read and write
|
||
2217F8B5000
|
heap
|
page read and write
|
||
1811F66F000
|
heap
|
page read and write
|
||
2075EB96000
|
heap
|
page read and write
|
||
7FFA53291000
|
unkown
|
page execute read
|
||
B60000
|
direct allocation
|
page execute and read and write
|
||
1E59C4A0000
|
heap
|
page read and write
|
||
1811F649000
|
heap
|
page read and write
|
||
6EE2F7B000
|
stack
|
page read and write
|
||
2075E05A000
|
heap
|
page read and write
|
||
22100550000
|
trusted library allocation
|
page read and write
|
||
22E10B40000
|
heap
|
page read and write
|
||
2823D850000
|
heap
|
page read and write
|
||
1E82C402000
|
heap
|
page read and write
|
||
2075E05F000
|
heap
|
page read and write
|
||
1566F708000
|
heap
|
page read and write
|
||
7365477000
|
stack
|
page read and write
|
||
24A17EE0000
|
remote allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
24A17DC4000
|
trusted library allocation
|
page read and write
|
||
1E59C610000
|
heap
|
page read and write
|
||
1E82C240000
|
heap
|
page read and write
|
||
7FFA53290000
|
unkown
|
page readonly
|
||
1811F726000
|
heap
|
page read and write
|
||
24A13015000
|
heap
|
page read and write
|
||
2075E113000
|
heap
|
page read and write
|
||
2217F840000
|
trusted library allocation
|
page read and write
|
||
1CDFAA00000
|
heap
|
page read and write
|
||
2075E116000
|
heap
|
page read and write
|
||
24A17D8E000
|
trusted library allocation
|
page read and write
|
||
24A18210000
|
trusted library allocation
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
2075E108000
|
heap
|
page read and write
|
||
2075EB9E000
|
heap
|
page read and write
|
||
1E59DE00000
|
remote allocation
|
page read and write
|
||
736587B000
|
stack
|
page read and write
|
||
1811F647000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
22CE4480000
|
heap
|
page read and write
|
||
24A12726000
|
heap
|
page read and write
|
||
4333FD000
|
stack
|
page read and write
|
||
1E82C477000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
1566F713000
|
heap
|
page read and write
|
||
22E10D3D000
|
heap
|
page read and write
|
||
2075DF00000
|
heap
|
page read and write
|
||
2823BDCD000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
2823BDD8000
|
heap
|
page read and write
|
||
15670002000
|
trusted library allocation
|
page read and write
|
||
265A5BF000
|
stack
|
page read and write
|
||
7FFA532BF000
|
unkown
|
page readonly
|
||
C6B667B000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
24A125E0000
|
heap
|
page read and write
|
||
2217F640000
|
heap
|
page read and write
|
||
13E99508000
|
heap
|
page read and write
|
||
13E99700000
|
direct allocation
|
page execute and read and write
|
||
1CDFAA13000
|
heap
|
page read and write
|
||
73B017B000
|
stack
|
page read and write
|
||
7FFA532BF000
|
unkown
|
page readonly
|
||
24A13002000
|
heap
|
page read and write
|
||
99AB8FF000
|
stack
|
page read and write
|
||
22E10C80000
|
heap
|
page read and write
|
||
13E9B150000
|
heap
|
page read and write
|
||
13E9B1A0000
|
heap
|
page read and write
|
||
D2F000
|
stack
|
page read and write
|
||
7FFA532B2000
|
unkown
|
page readonly
|
||
1E59C4A8000
|
heap
|
page read and write
|
||
2075E08A000
|
heap
|
page read and write
|
||
2075F002000
|
heap
|
page read and write
|
||
6EE2B1B000
|
stack
|
page read and write
|
||
2075EB94000
|
heap
|
page read and write
|
||
2075F002000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
180000000
|
direct allocation
|
page read and write
|
||
2075E067000
|
heap
|
page read and write
|
||
2075EB7F000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page read and write
|
||
1811FE02000
|
trusted library allocation
|
page read and write
|
||
24A12570000
|
heap
|
page read and write
|
||
C643F2A000
|
stack
|
page read and write
|
||
24A180B6000
|
heap
|
page read and write
|
||
7FFA532BF000
|
unkown
|
page readonly
|
||
BBB000
|
heap
|
page read and write
|
||
432BBB000
|
stack
|
page read and write
|
||
24A12702000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
2075E03C000
|
heap
|
page read and write
|
||
24A13118000
|
heap
|
page read and write
|
||
2075EBA5000
|
heap
|
page read and write
|
||
2075EB73000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
C35000
|
heap
|
page read and write
|
||
24A18044000
|
heap
|
page read and write
|
||
2823BD9B000
|
heap
|
page read and write
|
||
1E82C250000
|
heap
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
2C90000
|
remote allocation
|
page read and write
|
||
22E15D37000
|
heap
|
page read and write
|
||
13E99700000
|
direct allocation
|
page execute and read and write
|
||
1390000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
C6442FF000
|
stack
|
page read and write
|
||
2823BDDC000
|
heap
|
page read and write
|
||
2075EBD7000
|
heap
|
page read and write
|
||
2075EB94000
|
heap
|
page read and write
|
||
2075EB94000
|
heap
|
page read and write
|
||
1CDFA7F0000
|
heap
|
page read and write
|
||
24A180B4000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
2217F790000
|
trusted library allocation
|
page read and write
|
||
2075EB96000
|
heap
|
page read and write
|
||
22E15D00000
|
heap
|
page read and write
|
||
1811F64B000
|
heap
|
page read and write
|
||
24A12679000
|
heap
|
page read and write
|
||
2075E062000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
2075EBBF000
|
heap
|
page read and write
|
||
C643FAE000
|
stack
|
page read and write
|
||
13E2000
|
heap
|
page read and write
|
||
99AB97E000
|
stack
|
page read and write
|
||
D8324F7000
|
stack
|
page read and write
|
||
2217F650000
|
heap
|
page read and write
|
||
2075EB96000
|
heap
|
page read and write
|
||
503D30D000
|
stack
|
page read and write
|
||
3A3D979000
|
stack
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
13E99500000
|
heap
|
page read and write
|
||
7FFA53291000
|
unkown
|
page execute read
|
||
C6B687B000
|
stack
|
page read and write
|
||
24A17DA0000
|
trusted library allocation
|
page read and write
|
||
2075EBB5000
|
heap
|
page read and write
|
||
2217F7B4000
|
trusted library allocation
|
page read and write
|
||
133D000
|
heap
|
page read and write
|
||
13E99500000
|
heap
|
page read and write
|
||
2075EBA2000
|
heap
|
page read and write
|
||
F532C7E000
|
stack
|
page read and write
|
||
7FFA53291000
|
unkown
|
page execute read
|
||
13E99870000
|
heap
|
page read and write
|
||
2075F020000
|
heap
|
page read and write
|
||
24A17DB0000
|
trusted library allocation
|
page read and write
|
||
22E10D48000
|
heap
|
page read and write
|
||
1E59DE70000
|
heap
|
page read and write
|
||
DAF000
|
stack
|
page read and write
|
||
1E82C502000
|
heap
|
page read and write
|
||
22E15D3E000
|
heap
|
page read and write
|
||
F2A000
|
stack
|
page read and write
|
||
73661FE000
|
stack
|
page read and write
|
||
22E13FF0000
|
heap
|
page read and write
|
||
22100556000
|
trusted library allocation
|
page read and write
|
||
24A180F6000
|
heap
|
page read and write
|
||
99AB87C000
|
stack
|
page read and write
|
||
2075EB00000
|
heap
|
page read and write
|
||
7FFA53290000
|
unkown
|
page readonly
|
||
2217F7B0000
|
trusted library allocation
|
page read and write
|
||
13E99450000
|
unkown
|
page read and write
|
||
22CE4602000
|
heap
|
page read and write
|
||
7FFA53290000
|
unkown
|
page readonly
|
||
22E14800000
|
heap
|
page read and write
|
||
24A17DA1000
|
trusted library allocation
|
page read and write
|
||
6EE31F7000
|
stack
|
page read and write
|
||
1E59C615000
|
heap
|
page read and write
|
||
13E99875000
|
heap
|
page read and write
|
||
2075EB94000
|
heap
|
page read and write
|
||
22E10CEB000
|
heap
|
page read and write
|
||
22CE4656000
|
heap
|
page read and write
|
||
24A17DC0000
|
trusted library allocation
|
page read and write
|
||
2217F800000
|
trusted library allocation
|
page read and write
|
||
2075EBA6000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
73AFEFE000
|
stack
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
D832878000
|
stack
|
page read and write
|
||
2075EB75000
|
heap
|
page read and write
|
||
99AB97E000
|
stack
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
7FFA532BF000
|
unkown
|
page readonly
|
||
33DF000
|
stack
|
page read and write
|
||
2823BDE1000
|
heap
|
page read and write
|
||
22E15C50000
|
heap
|
page read and write
|
||
B8C699E000
|
stack
|
page read and write
|
||
2217F7B6000
|
trusted library allocation
|
page read and write
|
||
D832378000
|
stack
|
page read and write
|
||
2075EBB4000
|
heap
|
page read and write
|
||
7FFA532BB000
|
unkown
|
page read and write
|
||
24A126AE000
|
heap
|
page read and write
|
||
34DF000
|
stack
|
page read and write
|
||
FD0000
|
direct allocation
|
page execute and read and write
|
||
24A12657000
|
heap
|
page read and write
|
||
24A17E50000
|
trusted library allocation
|
page read and write
|
||
1CDFAA0D000
|
heap
|
page read and write
|
||
22CE463C000
|
heap
|
page read and write
|
||
432EFF000
|
stack
|
page read and write
|
||
22E15D62000
|
heap
|
page read and write
|
||
7FFA532BB000
|
unkown
|
page read and write
|
||
24A180FC000
|
heap
|
page read and write
|
||
2075DF10000
|
heap
|
page read and write
|
||
736557D000
|
stack
|
page read and write
|
||
3A3D7F9000
|
stack
|
page read and write
|
||
1CDFA930000
|
heap
|
page read and write
|
||
1566F580000
|
heap
|
page read and write
|
||
22E10D51000
|
heap
|
page read and write
|
||
2075EB96000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
1E59C5F0000
|
heap
|
page readonly
|
||
24A1269F000
|
heap
|
page read and write
|
||
24A18102000
|
heap
|
page read and write
|
||
22CE4600000
|
heap
|
page read and write
|
||
7FFA532B2000
|
unkown
|
page readonly
|
||
1E59DE30000
|
heap
|
page read and write
|
||
6EE30FB000
|
stack
|
page read and write
|
||
7FFA532BF000
|
unkown
|
page readonly
|
||
13E994E0000
|
heap
|
page read and write
|
||
1E59C300000
|
unkown
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
7FFA532BF000
|
unkown
|
page readonly
|
||
22E10CA0000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
1811F390000
|
heap
|
page read and write
|
||
24A17D80000
|
trusted library allocation
|
page read and write
|
||
22E10D39000
|
heap
|
page read and write
|
||
22CE4490000
|
heap
|
page read and write
|
||
1E59C610000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
345B000
|
stack
|
page read and write
|
||
13E994C0000
|
heap
|
page read and write
|
||
24A17DB0000
|
trusted library allocation
|
page read and write
|
||
99AB8FF000
|
stack
|
page read and write
|
||
22CE4700000
|
heap
|
page read and write
|
||
13E9950E000
|
heap
|
page read and write
|
||
2075E0E8000
|
heap
|
page read and write
|
||
2075E0AA000
|
heap
|
page read and write
|
||
22E15D05000
|
heap
|
page read and write
|
||
7FFA532B2000
|
unkown
|
page readonly
|
||
F5329DD000
|
stack
|
page read and write
|
||
22E15C70000
|
heap
|
page read and write
|
||
13E9950E000
|
heap
|
page read and write
|
||
2075EBA5000
|
heap
|
page read and write
|
||
13E99500000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
2C90000
|
remote allocation
|
page read and write
|
||
24A12629000
|
heap
|
page read and write
|
||
2075E0C7000
|
heap
|
page read and write
|
||
24A13104000
|
heap
|
page read and write
|
||
13E99740000
|
heap
|
page readonly
|
||
24A12613000
|
heap
|
page read and write
|
||
99AB8FF000
|
stack
|
page read and write
|
||
C6B611B000
|
stack
|
page read and write
|
||
22E10D65000
|
heap
|
page read and write
|
||
24A13661000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
24A13680000
|
trusted library allocation
|
page read and write
|
||
24A17C60000
|
trusted library allocation
|
page read and write
|
||
22E10D4C000
|
heap
|
page read and write
|
||
24A13113000
|
heap
|
page read and write
|
||
1811F500000
|
trusted library allocation
|
page read and write
|
||
24A18102000
|
heap
|
page read and write
|
||
7FFA532BB000
|
unkown
|
page read and write
|
||
24A126AE000
|
heap
|
page read and write
|
||
2217F850000
|
heap
|
page readonly
|
||
7FFA532B2000
|
unkown
|
page readonly
|
||
24A17FD0000
|
trusted library allocation
|
page read and write
|
||
7365FFA000
|
stack
|
page read and write
|
||
1566F629000
|
heap
|
page read and write
|
||
2075E8D0000
|
remote allocation
|
page read and write
|
||
1566F660000
|
heap
|
page read and write
|
||
73B037E000
|
stack
|
page read and write
|
||
1811F400000
|
heap
|
page read and write
|
||
2823BDED000
|
heap
|
page read and write
|
||
7365EFA000
|
stack
|
page read and write
|
||
99AB87C000
|
stack
|
page read and write
|
||
1811F602000
|
heap
|
page read and write
|
||
24A18019000
|
heap
|
page read and write
|
||
24A1268B000
|
heap
|
page read and write
|
||
13E9950E000
|
heap
|
page read and write
|
||
1566F67D000
|
heap
|
page read and write
|
||
4332FF000
|
stack
|
page read and write
|
||
1E59C440000
|
heap
|
page read and write
|
||
2217F4C0000
|
heap
|
page read and write
|
||
4331F7000
|
stack
|
page read and write
|
||
1811F64F000
|
heap
|
page read and write
|
||
22CE4671000
|
heap
|
page read and write
|
||
7FFA53290000
|
unkown
|
page readonly
|
||
24A17E50000
|
trusted library allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
13E99875000
|
heap
|
page read and write
|
||
22E15D30000
|
heap
|
page read and write
|
||
7FFA532B2000
|
unkown
|
page readonly
|
||
2075F002000
|
heap
|
page read and write
|
||
7FFA532BB000
|
unkown
|
page read and write
|
||
2823BDCE000
|
heap
|
page read and write
|
||
2217F68F000
|
heap
|
page read and write
|
||
24A1268D000
|
heap
|
page read and write
|
||
7FFA53291000
|
unkown
|
page execute read
|
||
180000000
|
direct allocation
|
page read and write
|
||
22CE4713000
|
heap
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
73AFF7E000
|
stack
|
page read and write
|
||
2217F7B2000
|
trusted library allocation
|
page read and write
|
||
265A87F000
|
stack
|
page read and write
|
||
1E82C400000
|
heap
|
page read and write
|
||
24A180FE000
|
heap
|
page read and write
|
||
7FFA53291000
|
unkown
|
page execute read
|
||
2075EA02000
|
heap
|
page read and write
|
||
2823BDDC000
|
heap
|
page read and write
|
||
24A13100000
|
heap
|
page read and write
|
||
22CE4680000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
BB0000
|
heap
|
page read and write
|
||
2075F003000
|
heap
|
page read and write
|
||
1566F65C000
|
heap
|
page read and write
|
||
24A12707000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
There are 689 hidden memdumps, click here to show them.