Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
nZNmWqwnpr.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
MPEG-4 LOAS
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x9faf6271, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_nZN_29f1be1dcd9f4bc1837575d6948c7fc98cc15f_56ac50ec_19e9ffb8\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_nZN_29f1be1dcd9f4bc1837575d6948c7fc98cc15f_56ac50ec_19fdfbef\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREDB7.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon May 23 05:48:21 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF0E3.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon May 23 05:48:22 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF22C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF4BE.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF653.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF819.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 61480 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
|
modified
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_nZN_5c40899ed0f0541acc9ab16798f8d17fcf421773_56ac50ec_074e79e0\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_nZN_5c40899ed0f0541acc9ab16798f8d17fcf421773_56ac50ec_0d7e7db9\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER64B3.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon May 23 05:36:50 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER658D.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon May 23 05:36:51 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6996.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A70.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6BC9.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6D02.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
There are 15 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\nZNmWqwnpr.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_FileTime
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_SystemTime
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NhxQyxUKKifP\KOsPrJ.dll"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,DllRegisterServer
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PDQmdReNwGSs\ZxyxzMoIe.dll"
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 6392 -s 324
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 6400 -s 316
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7080 -s 336
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7088 -s 328
|
There are 16 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://165.22.73.229/
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.tiles.ditu.live.com/tiles/gen
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/logging.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
https://165.22.73.229:8080/tem
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
|
unknown
|
||
https://165.22.73.229:8080/Kr#
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Transit/Stops/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://165.22.73.229:8080/MF
|
unknown
|
||
https://%s.xboxlive.com
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/logging.ashx
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
https://165.22.73.229:8080/
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
||
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
|
unknown
|
||
https://165.22.73.229/eF
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
https://activity.windows.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Locations
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://165.22.73.229/iF
|
unknown
|
||
https://%s.dnet.xboxlive.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
There are 42 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
165.22.73.229
|
unknown
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProgramId
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
FileId
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LowerCaseLongPath
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LongPathHash
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Name
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Publisher
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Version
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinFileVersion
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinaryType
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductName
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductVersion
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LinkDate
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinProductVersion
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Size
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Language
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsPeFile
|
||
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsOsComponent
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018800453F4626F
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018800453F4626F
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
|
MonthID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProgramId
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
FileId
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LowerCaseLongPath
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LongPathHash
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Name
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Publisher
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Version
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinFileVersion
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinaryType
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductName
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductVersion
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LinkDate
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinProductVersion
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Size
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Language
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsPeFile
|
||
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsOsComponent
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C005C62C4D85
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C005C62C4D85
|
There are 45 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
171DB6C0000
|
direct allocation
|
page execute and read and write
|
||
1D0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
171DB6C0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
18D2A510000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
171DB6C0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
18D2A510000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
18D2A510000
|
direct allocation
|
page execute and read and write
|
||
E70000
|
direct allocation
|
page execute and read and write
|
||
227CCC3D000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
22A43DE4000
|
heap
|
page read and write
|
||
1DA9E4EE000
|
heap
|
page read and write
|
||
1FF80F72000
|
heap
|
page read and write
|
||
23F72500000
|
heap
|
page read and write
|
||
816797E000
|
stack
|
page read and write
|
||
CD1E7F8000
|
stack
|
page read and write
|
||
1DA9E4B2000
|
heap
|
page read and write
|
||
215BEB20000
|
heap
|
page read and write
|
||
1AF947F000
|
stack
|
page read and write
|
||
7FFC66ACF000
|
unkown
|
page readonly
|
||
CA0807E000
|
stack
|
page read and write
|
||
1DA99502000
|
heap
|
page read and write
|
||
23F72702000
|
heap
|
page read and write
|
||
1FF80F8E000
|
heap
|
page read and write
|
||
22FAEE50000
|
heap
|
page read and write
|
||
4F1000
|
heap
|
page read and write
|
||
7FFC66ACF000
|
unkown
|
page readonly
|
||
D986FF000
|
stack
|
page read and write
|
||
217E6237000
|
heap
|
page read and write
|
||
18AB4130000
|
heap
|
page read and write
|
||
18D2BEB0000
|
heap
|
page read and write
|
||
1FF80F18000
|
heap
|
page read and write
|
||
1FF80F74000
|
heap
|
page read and write
|
||
25354862000
|
heap
|
page read and write
|
||
18D2A540000
|
heap
|
page readonly
|
||
2FCEF4B000
|
stack
|
page read and write
|
||
1FF81420000
|
heap
|
page read and write
|
||
1DA9E4F9000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
1FF80648000
|
heap
|
page read and write
|
||
227CCC6A000
|
heap
|
page read and write
|
||
1FF80F9B000
|
heap
|
page read and write
|
||
217E7170000
|
trusted library allocation
|
page read and write
|
||
2FCF27E000
|
stack
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
2B40000
|
heap
|
page read and write
|
||
2FC7BFB000
|
stack
|
page read and write
|
||
23E4325C000
|
heap
|
page read and write
|
||
16A25602000
|
heap
|
page read and write
|
||
18D2BEB0000
|
heap
|
page read and write
|
||
18D2A397000
|
heap
|
page read and write
|
||
227CCC68000
|
heap
|
page read and write
|
||
2FCF37C000
|
stack
|
page read and write
|
||
18D2A580000
|
heap
|
page read and write
|
||
1DA9A090000
|
trusted library allocation
|
page read and write
|
||
25354900000
|
heap
|
page read and write
|
||
1FF8064B000
|
heap
|
page read and write
|
||
1DA9E4E4000
|
heap
|
page read and write
|
||
2816000
|
heap
|
page read and write
|
||
1FF806AA000
|
heap
|
page read and write
|
||
F2F000
|
stack
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
18D2A500000
|
direct allocation
|
page execute and read and write
|
||
1FF80716000
|
heap
|
page read and write
|
||
1FF80F71000
|
heap
|
page read and write
|
||
1AF927E000
|
stack
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
1450AF00000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
1450AE13000
|
heap
|
page read and write
|
||
22A43DDC000
|
heap
|
page read and write
|
||
A5A907C000
|
stack
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
1DA99C10000
|
trusted library allocation
|
page read and write
|
||
1DA9E4E4000
|
heap
|
page read and write
|
||
1DA9E4F9000
|
heap
|
page read and write
|
||
23F72656000
|
heap
|
page read and write
|
||
7FFC66AC2000
|
unkown
|
page readonly
|
||
CD1EC7B000
|
stack
|
page read and write
|
||
AC767C000
|
stack
|
page read and write
|
||
217E64C9000
|
heap
|
page read and write
|
||
18AB4253000
|
heap
|
page read and write
|
||
215BF512000
|
heap
|
page read and write
|
||
70E6FFA000
|
stack
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
2535483C000
|
heap
|
page read and write
|
||
274E000
|
heap
|
page read and write
|
||
1AF8E7E000
|
stack
|
page read and write
|
||
1FF80F73000
|
heap
|
page read and write
|
||
70E71FE000
|
stack
|
page read and write
|
||
22A43DDC000
|
heap
|
page read and write
|
||
171D9DD8000
|
heap
|
page read and write
|
||
171D9C50000
|
heap
|
page read and write
|
||
1DA99B10000
|
trusted library allocation
|
page read and write
|
||
227CCC48000
|
heap
|
page read and write
|
||
227CCB50000
|
heap
|
page read and write
|
||
1AF917C000
|
stack
|
page read and write
|
||
25354F40000
|
trusted library allocation
|
page read and write
|
||
227CCC47000
|
heap
|
page read and write
|
||
25354813000
|
heap
|
page read and write
|
||
227CCC13000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1FF80F72000
|
heap
|
page read and write
|
||
1AF8EFC000
|
stack
|
page read and write
|
||
451000
|
heap
|
page read and write
|
||
D983FD000
|
stack
|
page read and write
|
||
227CCC40000
|
heap
|
page read and write
|
||
171D9C50000
|
unkown
|
page read and write
|
||
18AB4A02000
|
trusted library allocation
|
page read and write
|
||
22A43DF9000
|
heap
|
page read and write
|
||
16A25702000
|
heap
|
page read and write
|
||
217E6490000
|
trusted library allocation
|
page read and write
|
||
18D2A397000
|
heap
|
page read and write
|
||
22FB2040000
|
heap
|
page read and write
|
||
217E627D000
|
heap
|
page read and write
|
||
1FF80F9F000
|
heap
|
page read and write
|
||
23E43970000
|
remote allocation
|
page read and write
|
||
D987FF000
|
stack
|
page read and write
|
||
1FF80F84000
|
heap
|
page read and write
|
||
23F7264F000
|
heap
|
page read and write
|
||
2FCF6FF000
|
stack
|
page read and write
|
||
23E43202000
|
heap
|
page read and write
|
||
1450AF24000
|
heap
|
page read and write
|
||
1DA98D02000
|
heap
|
page read and write
|
||
7FFC66AA1000
|
unkown
|
page execute read
|
||
18AB4313000
|
heap
|
page read and write
|
||
7FFC66ACF000
|
unkown
|
page readonly
|
||
180000000
|
direct allocation
|
page read and write
|
||
1FF806C0000
|
heap
|
page read and write
|
||
652A7DF000
|
stack
|
page read and write
|
||
217E627D000
|
heap
|
page read and write
|
||
18D2A250000
|
heap
|
page read and write
|
||
227CCC45000
|
heap
|
page read and write
|
||
1FF80E02000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page read and write
|
||
7FFC66AA1000
|
unkown
|
page execute read
|
||
7FFC66ACB000
|
unkown
|
page read and write
|
||
22FAEC30000
|
heap
|
page read and write
|
||
22FAEE4C000
|
heap
|
page read and write
|
||
285E000
|
heap
|
page read and write
|
||
23F72700000
|
heap
|
page read and write
|
||
1FF80F72000
|
heap
|
page read and write
|
||
1450AE28000
|
heap
|
page read and write
|
||
23F72613000
|
heap
|
page read and write
|
||
19EED4C0000
|
heap
|
page read and write
|
||
CA07EFE000
|
stack
|
page read and write
|
||
7FFC66AA0000
|
unkown
|
page readonly
|
||
1FF81400000
|
heap
|
page read and write
|
||
253547E0000
|
heap
|
page read and write
|
||
2FCF5F7000
|
stack
|
page read and write
|
||
18D2A585000
|
heap
|
page read and write
|
||
18AB4200000
|
heap
|
page read and write
|
||
CD1ED7D000
|
stack
|
page read and write
|
||
1450AE7A000
|
heap
|
page read and write
|
||
1FF80FB1000
|
heap
|
page read and write
|
||
1FF80F7A000
|
heap
|
page read and write
|
||
1FF80F7A000
|
heap
|
page read and write
|
||
1FF80FBE000
|
heap
|
page read and write
|
||
400000
|
heap
|
page readonly
|
||
27F0000
|
heap
|
page read and write
|
||
A5A937B000
|
stack
|
page read and write
|
||
CA0827D000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
D988FE000
|
stack
|
page read and write
|
||
19EED230000
|
heap
|
page read and write
|
||
A3BDCAB000
|
stack
|
page read and write
|
||
CA07F7F000
|
stack
|
page read and write
|
||
7FFC66AA1000
|
unkown
|
page execute read
|
||
462000
|
heap
|
page read and write
|
||
22A43DB0000
|
heap
|
page read and write
|
||
50CB0FE000
|
stack
|
page read and write
|
||
22A43DD6000
|
heap
|
page read and write
|
||
1FF80F9B000
|
heap
|
page read and write
|
||
1450AE5F000
|
heap
|
page read and write
|
||
1C0000
|
direct allocation
|
page execute and read and write
|
||
215BEC29000
|
heap
|
page read and write
|
||
18AB4308000
|
heap
|
page read and write
|
||
23E43229000
|
heap
|
page read and write
|
||
70E66F7000
|
stack
|
page read and write
|
||
CA0817E000
|
stack
|
page read and write
|
||
171D9F00000
|
heap
|
page read and write
|
||
1450AC30000
|
heap
|
page read and write
|
||
816787A000
|
stack
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
23E43970000
|
remote allocation
|
page read and write
|
||
2746000
|
heap
|
page read and write
|
||
1FF80F0A000
|
heap
|
page read and write
|
||
23F72675000
|
heap
|
page read and write
|
||
22FAEC4B000
|
heap
|
page read and write
|
||
23E43170000
|
heap
|
page read and write
|
||
25354860000
|
heap
|
page read and write
|
||
217E7120000
|
trusted library allocation
|
page read and write
|
||
1FF80713000
|
heap
|
page read and write
|
||
17DE5B20000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
1F7F000
|
stack
|
page read and write
|
||
2535485F000
|
heap
|
page read and write
|
||
227CCC4E000
|
heap
|
page read and write
|
||
23F72600000
|
heap
|
page read and write
|
||
2EE8EF9000
|
stack
|
page read and write
|
||
1DA98BE0000
|
trusted library allocation
|
page read and write
|
||
1FF80F86000
|
heap
|
page read and write
|
||
171D9C50000
|
unkown
|
page read and write
|
||
22FAEE3E000
|
heap
|
page read and write
|
||
227CCC00000
|
heap
|
page read and write
|
||
4FB000
|
heap
|
page read and write
|
||
18D2A585000
|
heap
|
page read and write
|
||
18D2A500000
|
direct allocation
|
page execute and read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
1FF806E8000
|
heap
|
page read and write
|
||
A5A917E000
|
stack
|
page read and write
|
||
22A44060000
|
heap
|
page read and write
|
||
1DA98C90000
|
heap
|
page read and write
|
||
22FB2950000
|
heap
|
page read and write
|
||
1F80000
|
heap
|
page read and write
|
||
18AB423C000
|
heap
|
page read and write
|
||
16A25600000
|
heap
|
page read and write
|
||
215BF539000
|
heap
|
page read and write
|
||
23F7268E000
|
heap
|
page read and write
|
||
25354829000
|
heap
|
page read and write
|
||
1DA98CFA000
|
heap
|
page read and write
|
||
17DE5980000
|
heap
|
page read and write
|
||
22A43DD2000
|
heap
|
page read and write
|
||
11A000
|
stack
|
page read and write
|
||
1FF80F72000
|
heap
|
page read and write
|
||
1FF80F00000
|
heap
|
page read and write
|
||
283E000
|
heap
|
page read and write
|
||
22A43DC6000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
1FF80F9B000
|
heap
|
page read and write
|
||
23E43213000
|
heap
|
page read and write
|
||
18D2A540000
|
heap
|
page readonly
|
||
2764000
|
heap
|
page read and write
|
||
22A43DC6000
|
heap
|
page read and write
|
||
2FCF47B000
|
stack
|
page read and write
|
||
1FF80647000
|
heap
|
page read and write
|
||
1043000
|
heap
|
page read and write
|
||
1FF80F89000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page readonly
|
||
1FF80F80000
|
heap
|
page read and write
|
||
50CACFE000
|
stack
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
171D9F05000
|
heap
|
page read and write
|
||
18D2A490000
|
heap
|
page read and write
|
||
105C000
|
heap
|
page read and write
|
||
2EE8B8D000
|
stack
|
page read and write
|
||
227CCBC0000
|
heap
|
page read and write
|
||
1FF80FAE000
|
heap
|
page read and write
|
||
2FCF4FF000
|
stack
|
page read and write
|
||
1FF80F87000
|
heap
|
page read and write
|
||
217E6275000
|
heap
|
page read and write
|
||
18D2A397000
|
heap
|
page read and write
|
||
171D9D90000
|
heap
|
page read and write
|
||
507000
|
heap
|
page read and write
|
||
19EED238000
|
heap
|
page read and write
|
||
1DA99500000
|
heap
|
page read and write
|
||
227CCC60000
|
heap
|
page read and write
|
||
FEB000
|
heap
|
page read and write
|
||
23F72708000
|
heap
|
page read and write
|
||
1450AC40000
|
heap
|
page read and write
|
||
2EE8FFE000
|
stack
|
page read and write
|
||
1DA9E300000
|
trusted library allocation
|
page read and write
|
||
70E68FB000
|
stack
|
page read and write
|
||
60000
|
heap
|
page read and write
|
||
70E62CC000
|
stack
|
page read and write
|
||
16A25E02000
|
trusted library allocation
|
page read and write
|
||
1DA9E670000
|
trusted library allocation
|
page read and write
|
||
1AF8FFC000
|
stack
|
page read and write
|
||
217E6400000
|
heap
|
page read and write
|
||
507000
|
heap
|
page read and write
|
||
18AB4140000
|
heap
|
page read and write
|
||
18D2A490000
|
heap
|
page read and write
|
||
1FF80F69000
|
heap
|
page read and write
|
||
1450AE80000
|
heap
|
page read and write
|
||
1FF80580000
|
heap
|
page read and write
|
||
1DA9E100000
|
trusted library allocation
|
page read and write
|
||
227CCC4F000
|
heap
|
page read and write
|
||
1DA99513000
|
heap
|
page read and write
|
||
1450AE65000
|
heap
|
page read and write
|
||
2FCF7FD000
|
stack
|
page read and write
|
||
1FF80650000
|
heap
|
page read and write
|
||
274E000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
1FF80F77000
|
heap
|
page read and write
|
||
22A43D90000
|
heap
|
page read and write
|
||
171DB6F0000
|
heap
|
page read and write
|
||
215BED13000
|
heap
|
page read and write
|
||
1FF80F23000
|
heap
|
page read and write
|
||
17DE5B2D000
|
heap
|
page read and write
|
||
171DB6F0000
|
heap
|
page read and write
|
||
D989FE000
|
stack
|
page read and write
|
||
652A7DF000
|
stack
|
page read and write
|
||
22A43DC1000
|
heap
|
page read and write
|
||
1DA98CA4000
|
heap
|
page read and write
|
||
2EE90FF000
|
stack
|
page read and write
|
||
1DA9E210000
|
trusted library allocation
|
page read and write
|
||
50B000
|
heap
|
page read and write
|
||
363DEFF000
|
stack
|
page read and write
|
||
1FF806EB000
|
heap
|
page read and write
|
||
264B000
|
stack
|
page read and write
|
||
1FF806B4000
|
heap
|
page read and write
|
||
1FF80708000
|
heap
|
page read and write
|
||
217E6210000
|
heap
|
page read and write
|
||
BF0207F000
|
stack
|
page read and write
|
||
7FFC66AA0000
|
unkown
|
page readonly
|
||
19EED25D000
|
heap
|
page read and write
|
||
1450AE69000
|
heap
|
page read and write
|
||
227CCC39000
|
heap
|
page read and write
|
||
1F90000
|
remote allocation
|
page read and write
|
||
1FF80F7F000
|
heap
|
page read and write
|
||
171D9D90000
|
heap
|
page read and write
|
||
1FF81402000
|
heap
|
page read and write
|
||
227CCC6C000
|
heap
|
page read and write
|
||
1450AE02000
|
heap
|
page read and write
|
||
A3BE07F000
|
stack
|
page read and write
|
||
7FFC66AC2000
|
unkown
|
page readonly
|
||
22A44065000
|
heap
|
page read and write
|
||
217E64B0000
|
trusted library allocation
|
page read and write
|
||
1FF80F48000
|
heap
|
page read and write
|
||
1DA9E370000
|
remote allocation
|
page read and write
|
||
18AB4260000
|
heap
|
page read and write
|
||
22FAEE37000
|
heap
|
page read and write
|
||
482000
|
heap
|
page read and write
|
||
4FB000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
171DB7C0000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
217E61A0000
|
heap
|
page read and write
|
||
215BECCE000
|
heap
|
page read and write
|
||
171D9F05000
|
heap
|
page read and write
|
||
26CE000
|
stack
|
page read and write
|
||
1F90000
|
remote allocation
|
page read and write
|
||
16A2565A000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
103F000
|
heap
|
page read and write
|
||
652AA7F000
|
stack
|
page read and write
|
||
CD1E6FE000
|
stack
|
page read and write
|
||
2535485C000
|
heap
|
page read and write
|
||
1FF80F97000
|
heap
|
page read and write
|
||
23F72E02000
|
trusted library allocation
|
page read and write
|
||
1FF80600000
|
heap
|
page read and write
|
||
2FC76EC000
|
stack
|
page read and write
|
||
CD1EB7F000
|
unkown
|
page read and write
|
||
2787000
|
heap
|
page read and write
|
||
81678FF000
|
stack
|
page read and write
|
||
2535485A000
|
heap
|
page read and write
|
||
1FF80688000
|
heap
|
page read and write
|
||
227CCC42000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
49E000
|
heap
|
page read and write
|
||
A5A957F000
|
stack
|
page read and write
|
||
7FFC66AC2000
|
unkown
|
page readonly
|
||
7FFC66AA0000
|
unkown
|
page readonly
|
||
1DA98C73000
|
heap
|
page read and write
|
||
D982FD000
|
stack
|
page read and write
|
||
22A43DF3000
|
heap
|
page read and write
|
||
1DA9E43E000
|
heap
|
page read and write
|
||
7FFC66AA1000
|
unkown
|
page execute read
|
||
462000
|
heap
|
page read and write
|
||
7FFC66ACF000
|
unkown
|
page readonly
|
||
7FFC66ACB000
|
unkown
|
page read and write
|
||
1FF80510000
|
heap
|
page read and write
|
||
227CCC49000
|
heap
|
page read and write
|
||
CD1E4FE000
|
stack
|
page read and write
|
||
1FF80667000
|
heap
|
page read and write
|
||
7FFC66ACF000
|
unkown
|
page readonly
|
||
215BEC13000
|
heap
|
page read and write
|
||
1FF80FAC000
|
heap
|
page read and write
|
||
A5A967F000
|
stack
|
page read and write
|
||
171D9DD0000
|
heap
|
page read and write
|
||
16A25629000
|
heap
|
page read and write
|
||
1DA98CA7000
|
heap
|
page read and write
|
||
1DA98D16000
|
heap
|
page read and write
|
||
22FB2150000
|
trusted library allocation
|
page read and write
|
||
1DA99B20000
|
trusted library allocation
|
page read and write
|
||
16A2566B000
|
heap
|
page read and write
|
||
217E627D000
|
heap
|
page read and write
|
||
1FF80F76000
|
heap
|
page read and write
|
||
1DA98B40000
|
heap
|
page read and write
|
||
1DA9E370000
|
remote allocation
|
page read and write
|
||
1DA99400000
|
heap
|
page read and write
|
||
CD1E57F000
|
stack
|
page read and write
|
||
4FB000
|
heap
|
page read and write
|
||
19EED150000
|
heap
|
page read and write
|
||
1FF80520000
|
heap
|
page read and write
|
||
1DA98C76000
|
heap
|
page read and write
|
||
298C000
|
stack
|
page read and write
|
||
1FF80F73000
|
heap
|
page read and write
|
||
1FF80F9D000
|
heap
|
page read and write
|
||
1DA9E462000
|
heap
|
page read and write
|
||
22A43D30000
|
heap
|
page read and write
|
||
7FFC66AA1000
|
unkown
|
page execute read
|
||
217E6ED0000
|
trusted library allocation
|
page read and write
|
||
1FF80F84000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
1FF80F78000
|
heap
|
page read and write
|
||
1DA98C9B000
|
heap
|
page read and write
|
||
290E000
|
stack
|
page read and write
|
||
7FFC66AA0000
|
unkown
|
page readonly
|
||
1FF80F7A000
|
heap
|
page read and write
|
||
18D2A250000
|
unkown
|
page read and write
|
||
4AC000
|
heap
|
page read and write
|
||
451000
|
heap
|
page read and write
|
||
1DA9E370000
|
remote allocation
|
page read and write
|
||
1FF806ED000
|
heap
|
page read and write
|
||
22FAED90000
|
heap
|
page read and write
|
||
16A25540000
|
heap
|
page read and write
|
||
105C000
|
heap
|
page read and write
|
||
22FAEE70000
|
heap
|
page read and write
|
||
1FF80F7A000
|
heap
|
page read and write
|
||
652AA7F000
|
stack
|
page read and write
|
||
227CCC2E000
|
heap
|
page read and write
|
||
274E000
|
heap
|
page read and write
|
||
1DA9E4FB000
|
heap
|
page read and write
|
||
1FF80F82000
|
heap
|
page read and write
|
||
AC76FE000
|
stack
|
page read and write
|
||
1FF81403000
|
heap
|
page read and write
|
||
1450AE40000
|
heap
|
page read and write
|
||
227CCC50000
|
heap
|
page read and write
|
||
171D9DB0000
|
heap
|
page read and write
|
||
171D9DD8000
|
heap
|
page read and write
|
||
1DA99402000
|
heap
|
page read and write
|
||
227CCC41000
|
heap
|
page read and write
|
||
227CCC85000
|
heap
|
page read and write
|
||
1DA9E4AB000
|
heap
|
page read and write
|
||
18D2BEB0000
|
heap
|
page read and write
|
||
27D1000
|
heap
|
page read and write
|
||
1FF80F8B000
|
heap
|
page read and write
|
||
26F7000
|
heap
|
page read and write
|
||
2816000
|
heap
|
page read and write
|
||
1DA99518000
|
heap
|
page read and write
|
||
1DA9E234000
|
trusted library allocation
|
page read and write
|
||
23F724A0000
|
heap
|
page read and write
|
||
22FAEE55000
|
heap
|
page read and write
|
||
227CCC56000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
25355002000
|
trusted library allocation
|
page read and write
|
||
363DB0B000
|
stack
|
page read and write
|
||
2FC7EFE000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
227CCC64000
|
heap
|
page read and write
|
||
215BF500000
|
heap
|
page read and write
|
||
1FF80F90000
|
heap
|
page read and write
|
||
227CCC65000
|
heap
|
page read and write
|
||
1AF907B000
|
stack
|
page read and write
|
||
19EF0700000
|
trusted library allocation
|
page read and write
|
||
A5A90FE000
|
stack
|
page read and write
|
||
1FF80FAD000
|
heap
|
page read and write
|
||
215BEC74000
|
heap
|
page read and write
|
||
1FF80702000
|
heap
|
page read and write
|
||
17DE5B33000
|
heap
|
page read and write
|
||
25354865000
|
heap
|
page read and write
|
||
1FF80629000
|
heap
|
page read and write
|
||
1450ACA0000
|
heap
|
page read and write
|
||
1DA98C57000
|
heap
|
page read and write
|
||
22A43DD7000
|
heap
|
page read and write
|
||
1FF80F9C000
|
heap
|
page read and write
|
||
171D9DB0000
|
heap
|
page read and write
|
||
670000
|
trusted library allocation
|
page read and write
|
||
217E64D0000
|
trusted library allocation
|
page read and write
|
||
23F72653000
|
heap
|
page read and write
|
||
227CCC3A000
|
heap
|
page read and write
|
||
652A7DF000
|
stack
|
page read and write
|
||
215BEC7C000
|
heap
|
page read and write
|
||
1FF80F75000
|
heap
|
page read and write
|
||
1450AE58000
|
heap
|
page read and write
|
||
1FF80F72000
|
heap
|
page read and write
|
||
273D000
|
heap
|
page read and write
|
||
AC76FE000
|
stack
|
page read and write
|
||
22FAEC45000
|
heap
|
page read and write
|
||
1FF80FB0000
|
heap
|
page read and write
|
||
171D9F00000
|
heap
|
page read and write
|
||
1FF80DA0000
|
remote allocation
|
page read and write
|
||
227CCC6E000
|
heap
|
page read and write
|
||
227CCC30000
|
heap
|
page read and write
|
||
1FF80657000
|
heap
|
page read and write
|
||
16A25675000
|
heap
|
page read and write
|
||
1081000
|
heap
|
page read and write
|
||
2000000
|
heap
|
page read and write
|
||
227CCC62000
|
heap
|
page read and write
|
||
227CD402000
|
trusted library allocation
|
page read and write
|
||
363DE7F000
|
stack
|
page read and write
|
||
16A25650000
|
heap
|
page read and write
|
||
1DA9E3F0000
|
trusted library allocation
|
page read and write
|
||
652A75C000
|
stack
|
page read and write
|
||
16A25613000
|
heap
|
page read and write
|
||
BF017BB000
|
stack
|
page read and write
|
||
1FF80F89000
|
heap
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
171DB7C0000
|
heap
|
page read and write
|
||
1FF81402000
|
heap
|
page read and write
|
||
26D1000
|
heap
|
page read and write
|
||
1DA9E2E0000
|
trusted library allocation
|
page read and write
|
||
1FF80F84000
|
heap
|
page read and write
|
||
F35000
|
heap
|
page read and write
|
||
1FF80FAD000
|
heap
|
page read and write
|
||
217E64C0000
|
heap
|
page read and write
|
||
2FCF8FE000
|
stack
|
page read and write
|
||
23E43180000
|
heap
|
page read and write
|
||
2FC7CFE000
|
stack
|
page read and write
|
||
2EE8F79000
|
stack
|
page read and write
|
||
23E43940000
|
trusted library allocation
|
page read and write
|
||
25354864000
|
heap
|
page read and write
|
||
22A43DF6000
|
heap
|
page read and write
|
||
2535485D000
|
heap
|
page read and write
|
||
1DA9E250000
|
trusted library allocation
|
page read and write
|
||
70E67F9000
|
stack
|
page read and write
|
||
18AB4202000
|
heap
|
page read and write
|
||
652AA7F000
|
stack
|
page read and write
|
||
1DA99415000
|
heap
|
page read and write
|
||
1DA98CA1000
|
heap
|
page read and write
|
||
215BEB90000
|
heap
|
page read and write
|
||
217E64C5000
|
heap
|
page read and write
|
||
1FF80F84000
|
heap
|
page read and write
|
||
22A43F80000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
1FF80F6E000
|
heap
|
page read and write
|
||
23F72629000
|
heap
|
page read and write
|
||
23F72649000
|
heap
|
page read and write
|
||
1DA9E231000
|
trusted library allocation
|
page read and write
|
||
1FF80649000
|
heap
|
page read and write
|
||
18D2A540000
|
heap
|
page readonly
|
||
1FF80651000
|
heap
|
page read and write
|
||
50CAD7E000
|
stack
|
page read and write
|
||
1FF80F18000
|
heap
|
page read and write
|
||
18AB4302000
|
heap
|
page read and write
|
||
1FF81402000
|
heap
|
page read and write
|
||
7FFC66AA0000
|
unkown
|
page readonly
|
||
7FFC66ACB000
|
unkown
|
page read and write
|
||
4FB000
|
heap
|
page read and write
|
||
2779000
|
heap
|
page read and write
|
||
488000
|
heap
|
page read and write
|
||
1FF80FAD000
|
heap
|
page read and write
|
||
481000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
227CCC7C000
|
heap
|
page read and write
|
||
1FF80F85000
|
heap
|
page read and write
|
||
1FF80F82000
|
heap
|
page read and write
|
||
652A75C000
|
stack
|
page read and write
|
||
19EED24A000
|
heap
|
page read and write
|
||
1DA9E370000
|
trusted library allocation
|
page read and write
|
||
1FF80FDC000
|
heap
|
page read and write
|
||
22FAEE5F000
|
heap
|
page read and write
|
||
1FF80653000
|
heap
|
page read and write
|
||
1FF806AA000
|
heap
|
page read and write
|
||
BF01D7B000
|
stack
|
page read and write
|
||
19EED276000
|
heap
|
page read and write
|
||
140000
|
remote allocation
|
page read and write
|
||
CA083FD000
|
stack
|
page read and write
|
||
1FF80FDD000
|
heap
|
page read and write
|
||
227CCC44000
|
heap
|
page read and write
|
||
1DA9E4E7000
|
heap
|
page read and write
|
||
507000
|
heap
|
page read and write
|
||
22FAED70000
|
heap
|
page read and write
|
||
1AF8D7F000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
1FF80F80000
|
heap
|
page read and write
|
||
217E7110000
|
trusted library allocation
|
page read and write
|
||
1DA9E4A1000
|
heap
|
page read and write
|
||
1FF80F6E000
|
heap
|
page read and write
|
||
18AB41D0000
|
trusted library allocation
|
page read and write
|
||
18D2BE80000
|
heap
|
page read and write
|
||
217E6230000
|
heap
|
page read and write
|
||
D97D2B000
|
stack
|
page read and write
|
||
446000
|
heap
|
page read and write
|
||
1DA98C3F000
|
heap
|
page read and write
|
||
4AC000
|
heap
|
page read and write
|
||
18D2A4B0000
|
heap
|
page read and write
|
||
227CCC4B000
|
heap
|
page read and write
|
||
1DA99559000
|
heap
|
page read and write
|
||
18D2A490000
|
heap
|
page read and write
|
||
1FF80654000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
227CCC46000
|
heap
|
page read and write
|
||
171D9F00000
|
heap
|
page read and write
|
||
1FF80F78000
|
heap
|
page read and write
|
||
2816000
|
heap
|
page read and write
|
||
23E43A02000
|
trusted library allocation
|
page read and write
|
||
1DA9E360000
|
trusted library allocation
|
page read and write
|
||
22FAEE5B000
|
heap
|
page read and write
|
||
25354770000
|
heap
|
page read and write
|
||
50CB1FE000
|
stack
|
page read and write
|
||
CA07B2B000
|
stack
|
page read and write
|
||
AC767C000
|
stack
|
page read and write
|
||
171DB700000
|
heap
|
page readonly
|
||
274E000
|
heap
|
page read and write
|
||
23E43240000
|
heap
|
page read and write
|
||
22FAEE30000
|
heap
|
page read and write
|
||
1DA9E230000
|
trusted library allocation
|
page read and write
|
||
1DA98C6E000
|
heap
|
page read and write
|
||
171D9DD0000
|
heap
|
page read and write
|
||
22FB08D0000
|
heap
|
page read and write
|
||
1FF80F88000
|
heap
|
page read and write
|
||
22A43DDC000
|
heap
|
page read and write
|
||
217E6241000
|
heap
|
page read and write
|
||
670000
|
trusted library allocation
|
page read and write
|
||
652A75C000
|
stack
|
page read and write
|
||
18D2BE80000
|
heap
|
page read and write
|
||
A3BDD2E000
|
stack
|
page read and write
|
||
1FF80DA0000
|
remote allocation
|
page read and write
|
||
19EED4CB000
|
heap
|
page read and write
|
||
1DA9E4DE000
|
heap
|
page read and write
|
||
1FF80F8B000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
227CCC61000
|
heap
|
page read and write
|
||
22A43DE4000
|
heap
|
page read and write
|
||
1FF80FA0000
|
heap
|
page read and write
|
||
1FF80F84000
|
heap
|
page read and write
|
||
1DA98C78000
|
heap
|
page read and write
|
||
227CCC7E000
|
heap
|
page read and write
|
||
19EED253000
|
heap
|
page read and write
|
||
1DA9E4D8000
|
heap
|
page read and write
|
||
D98AFE000
|
stack
|
page read and write
|
||
171D9DD8000
|
heap
|
page read and write
|
||
7FFC66ACB000
|
unkown
|
page read and write
|
||
1FF80F80000
|
heap
|
page read and write
|
||
2EE9079000
|
stack
|
page read and write
|
||
7FFC66AA1000
|
unkown
|
page execute read
|
||
18D2BE10000
|
remote allocation
|
page read and write
|
||
227CCC29000
|
heap
|
page read and write
|
||
1AF8BFC000
|
stack
|
page read and write
|
||
1DA99B03000
|
trusted library allocation
|
page read and write
|
||
50CAEFE000
|
stack
|
page read and write
|
||
481000
|
heap
|
page read and write
|
||
2535485B000
|
heap
|
page read and write
|
||
BF01C7F000
|
stack
|
page read and write
|
||
1FF80F8B000
|
heap
|
page read and write
|
||
23F72648000
|
heap
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
227CCC67000
|
heap
|
page read and write
|
||
19EED24F000
|
heap
|
page read and write
|
||
1DA9E320000
|
trusted library allocation
|
page read and write
|
||
227CCC31000
|
heap
|
page read and write
|
||
2EE8E7E000
|
stack
|
page read and write
|
||
23F7262C000
|
heap
|
page read and write
|
||
1FF80F86000
|
heap
|
page read and write
|
||
7FFC66AA1000
|
unkown
|
page execute read
|
||
171DB700000
|
heap
|
page readonly
|
||
171DB6B0000
|
direct allocation
|
page execute and read and write
|
||
22FAEE3A000
|
heap
|
page read and write
|
||
23E43970000
|
remote allocation
|
page read and write
|
||
19EED24A000
|
heap
|
page read and write
|
||
22FAEE55000
|
heap
|
page read and write
|
||
16A25713000
|
heap
|
page read and write
|
||
70E6EFA000
|
stack
|
page read and write
|
||
1FF8063C000
|
heap
|
page read and write
|
||
18AB4300000
|
heap
|
page read and write
|
||
1FF80F7F000
|
heap
|
page read and write
|
||
22FAEC40000
|
heap
|
page read and write
|
||
1FF80F8A000
|
heap
|
page read and write
|
||
217E6470000
|
trusted library allocation
|
page read and write
|
||
1026000
|
heap
|
page read and write
|
||
1FF81402000
|
heap
|
page read and write
|
||
16A25677000
|
heap
|
page read and write
|
||
16A255B0000
|
heap
|
page read and write
|
||
1DA98C13000
|
heap
|
page read and write
|
||
227CCC7B000
|
heap
|
page read and write
|
||
1DA9E400000
|
heap
|
page read and write
|
||
1DA98CFA000
|
heap
|
page read and write
|
||
25354800000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
70E6AFB000
|
stack
|
page read and write
|
||
7FFC66ACF000
|
unkown
|
page readonly
|
||
19EED259000
|
heap
|
page read and write
|
||
BF01BFB000
|
stack
|
page read and write
|
||
215BEC76000
|
heap
|
page read and write
|
||
1FF80FAC000
|
heap
|
page read and write
|
||
25354902000
|
heap
|
page read and write
|
||
1FF80F7A000
|
heap
|
page read and write
|
||
18D2A580000
|
heap
|
page read and write
|
||
23F72670000
|
heap
|
page read and write
|
||
1DA9E210000
|
trusted library allocation
|
page read and write
|
||
227CCBF0000
|
trusted library allocation
|
page read and write
|
||
215BED02000
|
heap
|
page read and write
|
||
1FF806D3000
|
heap
|
page read and write
|
||
215BEC3E000
|
heap
|
page read and write
|
||
23F72490000
|
heap
|
page read and write
|
||
25354886000
|
heap
|
page read and write
|
||
1FF80613000
|
heap
|
page read and write
|
||
18D2A390000
|
heap
|
page read and write
|
||
18AB4262000
|
heap
|
page read and write
|
||
19EED253000
|
heap
|
page read and write
|
||
363DB8E000
|
stack
|
page read and write
|
||
25354913000
|
heap
|
page read and write
|
||
227CCC31000
|
heap
|
page read and write
|
||
BF01F7D000
|
stack
|
page read and write
|
||
1DA98D07000
|
heap
|
page read and write
|
||
1FF80F81000
|
heap
|
page read and write
|
||
1DA9E21E000
|
trusted library allocation
|
page read and write
|
||
49E000
|
heap
|
page read and write
|
||
CD1EAFE000
|
stack
|
page read and write
|
||
7FFC66ACB000
|
unkown
|
page read and write
|
||
22FB2043000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
BF01E77000
|
stack
|
page read and write
|
||
19EED25D000
|
heap
|
page read and write
|
||
A3BDDAF000
|
stack
|
page read and write
|
||
1DA9E4E7000
|
heap
|
page read and write
|
||
1DA9E240000
|
trusted library allocation
|
page read and write
|
||
18D2A585000
|
heap
|
page read and write
|
||
1FF80F8A000
|
heap
|
page read and write
|
||
487000
|
heap
|
page read and write
|
||
50CAC7B000
|
stack
|
page read and write
|
||
217E6480000
|
trusted library allocation
|
page read and write
|
||
A5A927B000
|
stack
|
page read and write
|
||
18AB425E000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
AC767C000
|
stack
|
page read and write
|
||
1FF80F83000
|
heap
|
page read and write
|
||
18D2A580000
|
heap
|
page read and write
|
||
1450B602000
|
trusted library allocation
|
page read and write
|
||
1FF80F8A000
|
heap
|
page read and write
|
||
16A255E0000
|
trusted library allocation
|
page read and write
|
||
1FF80656000
|
heap
|
page read and write
|
||
18D2A390000
|
heap
|
page read and write
|
||
22FAEE64000
|
heap
|
page read and write
|
||
4AC000
|
heap
|
page read and write
|
||
AE6000
|
stack
|
page read and write
|
||
2FCEFCE000
|
stack
|
page read and write
|
||
1FF80FB0000
|
heap
|
page read and write
|
||
7FFC66ACB000
|
unkown
|
page read and write
|
||
18AB422A000
|
heap
|
page read and write
|
||
A5A9477000
|
stack
|
page read and write
|
||
1FF80F78000
|
heap
|
page read and write
|
||
1FF80F80000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
7FFC66AC2000
|
unkown
|
page readonly
|
||
171D9DD0000
|
heap
|
page read and write
|
||
1DA9E330000
|
trusted library allocation
|
page read and write
|
||
22FAEE77000
|
heap
|
page read and write
|
||
22FAEE4C000
|
heap
|
page read and write
|
||
1DA9E2E0000
|
trusted library allocation
|
page read and write
|
||
18D2A4B0000
|
heap
|
page read and write
|
||
24CD000
|
stack
|
page read and write
|
||
1FF80F91000
|
heap
|
page read and write
|
||
AC777F000
|
stack
|
page read and write
|
||
23F72C60000
|
trusted library allocation
|
page read and write
|
||
1F90000
|
remote allocation
|
page read and write
|
||
23F72713000
|
heap
|
page read and write
|
||
1FF80F8B000
|
heap
|
page read and write
|
||
23E43302000
|
heap
|
page read and write
|
||
1FF81403000
|
heap
|
page read and write
|
||
1DA99559000
|
heap
|
page read and write
|
||
50CAFFE000
|
stack
|
page read and write
|
||
1FF80F8A000
|
heap
|
page read and write
|
||
7FFC66AC2000
|
unkown
|
page readonly
|
||
CD1E8F7000
|
stack
|
page read and write
|
||
227CCC76000
|
heap
|
page read and write
|
||
22FAEE5F000
|
heap
|
page read and write
|
||
227CCC75000
|
heap
|
page read and write
|
||
1FF80F9C000
|
heap
|
page read and write
|
||
19EEEEC0000
|
heap
|
page read and write
|
||
215BECBD000
|
heap
|
page read and write
|
||
26F8000
|
heap
|
page read and write
|
||
81679F8000
|
stack
|
page read and write
|
||
1DA9E410000
|
heap
|
page read and write
|
||
227CCC63000
|
heap
|
page read and write
|
||
AC777F000
|
stack
|
page read and write
|
||
7FFC66ACF000
|
unkown
|
page readonly
|
||
2747000
|
heap
|
page read and write
|
||
44638FD000
|
stack
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
AC76FE000
|
stack
|
page read and write
|
||
1DA9E340000
|
trusted library allocation
|
page read and write
|
||
8167AFE000
|
stack
|
page read and write
|
||
1DA9E42E000
|
heap
|
page read and write
|
||
1DA98D02000
|
heap
|
page read and write
|
||
23F7264C000
|
heap
|
page read and write
|
||
16A2563F000
|
heap
|
page read and write
|
||
215BEB30000
|
heap
|
page read and write
|
||
418000
|
heap
|
page read and write
|
||
1FF80667000
|
heap
|
page read and write
|
||
1FF806FD000
|
heap
|
page read and write
|
||
215BF402000
|
heap
|
page read and write
|
||
6D5000
|
heap
|
page read and write
|
||
2EE8B0E000
|
stack
|
page read and write
|
||
1AF87EC000
|
stack
|
page read and write
|
||
BF01AFF000
|
stack
|
page read and write
|
||
1AF937D000
|
stack
|
page read and write
|
||
18D2A500000
|
direct allocation
|
page execute and read and write
|
||
CD1E9FC000
|
stack
|
page read and write
|
||
1DA98BB0000
|
heap
|
page read and write
|
||
1DA9E4F0000
|
heap
|
page read and write
|
||
7FFC66AA1000
|
unkown
|
page execute read
|
||
22FAEE51000
|
heap
|
page read and write
|
||
1450AF02000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
215BEC00000
|
heap
|
page read and write
|
||
1DA9E2E0000
|
trusted library allocation
|
page read and write
|
||
1FF80F6E000
|
heap
|
page read and write
|
||
2817000
|
heap
|
page read and write
|
||
227CCC78000
|
heap
|
page read and write
|
||
7FFC66AC2000
|
unkown
|
page readonly
|
||
19EED010000
|
heap
|
page read and write
|
||
1450AE00000
|
heap
|
page read and write
|
||
25354780000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
227CCD02000
|
heap
|
page read and write
|
||
16A25550000
|
heap
|
page read and write
|
||
1FF80F4F000
|
heap
|
page read and write
|
||
2FC7DFB000
|
stack
|
page read and write
|
||
1DA98C8A000
|
heap
|
page read and write
|
||
1FF80F89000
|
heap
|
page read and write
|
||
19EED262000
|
heap
|
page read and write
|
||
17DE5AC0000
|
heap
|
page read and write
|
||
E60000
|
direct allocation
|
page execute and read and write
|
||
1DA99518000
|
heap
|
page read and write
|
||
274B000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
23F72681000
|
heap
|
page read and write
|
||
7FFC66ACB000
|
unkown
|
page read and write
|
||
1FF80670000
|
heap
|
page read and write
|
||
18D2A250000
|
unkown
|
page read and write
|
||
1DA99504000
|
heap
|
page read and write
|
||
23F7263C000
|
heap
|
page read and write
|
||
1DA98C00000
|
heap
|
page read and write
|
||
1FF80FAD000
|
heap
|
page read and write
|
||
171DB760000
|
remote allocation
|
page read and write
|
||
447000
|
heap
|
page read and write
|
||
1FF806E0000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
18AB425A000
|
heap
|
page read and write
|
||
1DA9E240000
|
trusted library allocation
|
page read and write
|
||
18AB41A0000
|
heap
|
page read and write
|
||
244E000
|
stack
|
page read and write
|
||
23CC000
|
stack
|
page read and write
|
||
1DA9E254000
|
trusted library allocation
|
page read and write
|
||
171D9DB0000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
22FAEE77000
|
heap
|
page read and write
|
||
1FF806C7000
|
heap
|
page read and write
|
||
22A43DE4000
|
heap
|
page read and write
|
||
19EED26E000
|
heap
|
page read and write
|
||
171DB760000
|
remote allocation
|
page read and write
|
||
25CF000
|
stack
|
page read and write
|
||
8167A7E000
|
stack
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
1FF81402000
|
heap
|
page read and write
|
||
18D2A390000
|
heap
|
page read and write
|
||
1DA9E420000
|
heap
|
page read and write
|
||
1DA9E44B000
|
heap
|
page read and write
|
||
1DA9E0F0000
|
trusted library allocation
|
page read and write
|
||
7FFC66AA0000
|
unkown
|
page readonly
|
||
19EEECF3000
|
heap
|
page read and write
|
||
217E61B0000
|
trusted library allocation
|
page read and write
|
||
171DB7C0000
|
heap
|
page read and write
|
||
1FF80F72000
|
heap
|
page read and write
|
||
BF01A7F000
|
stack
|
page read and write
|
||
25354908000
|
heap
|
page read and write
|
||
D985FD000
|
stack
|
page read and write
|
||
7FFC66AA0000
|
unkown
|
page readonly
|
||
273D000
|
heap
|
page read and write
|
||
23E43200000
|
heap
|
page read and write
|
||
1FF805B0000
|
trusted library allocation
|
page read and write
|
||
171DB6B0000
|
direct allocation
|
page execute and read and write
|
||
140000
|
remote allocation
|
page read and write
|
||
18AB425C000
|
heap
|
page read and write
|
||
22A43DF7000
|
heap
|
page read and write
|
||
D9817A000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
22A43DBA000
|
heap
|
page read and write
|
||
1DA99B00000
|
trusted library allocation
|
page read and write
|
||
2717000
|
heap
|
page read and write
|
||
1DA98C29000
|
heap
|
page read and write
|
||
7FFC66AC2000
|
unkown
|
page readonly
|
||
1FF80F7A000
|
heap
|
page read and write
|
||
25354852000
|
heap
|
page read and write
|
||
1FF81419000
|
heap
|
page read and write
|
||
2EE8A8B000
|
stack
|
page read and write
|
||
171DB700000
|
heap
|
page readonly
|
||
274E000
|
heap
|
page read and write
|
||
19EED24E000
|
heap
|
page read and write
|
||
22A43DF9000
|
heap
|
page read and write
|
||
23E431E0000
|
heap
|
page read and write
|
||
CA082FF000
|
stack
|
page read and write
|
||
171DB6F0000
|
heap
|
page read and write
|
||
227CCB60000
|
heap
|
page read and write
|
||
1FF80F4B000
|
heap
|
page read and write
|
||
1FF80F09000
|
heap
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
8167B7C000
|
stack
|
page read and write
|
||
171DB6B0000
|
direct allocation
|
page execute and read and write
|
||
23F72651000
|
heap
|
page read and write
|
||
19EED170000
|
heap
|
page read and write
|
||
70E69FF000
|
stack
|
page read and write
|
||
CA07FFC000
|
stack
|
page read and write
|
||
CD1E47B000
|
stack
|
page read and write
|
||
215BECCB000
|
heap
|
page read and write
|
||
2777000
|
heap
|
page read and write
|
||
22A43DF4000
|
heap
|
page read and write
|
||
1FF80FAE000
|
heap
|
page read and write
|
||
1FF80F80000
|
heap
|
page read and write
|
||
CD1E67C000
|
stack
|
page read and write
|
||
18AB428C000
|
heap
|
page read and write
|
||
1FF80658000
|
heap
|
page read and write
|
||
1FF80F80000
|
heap
|
page read and write
|
||
217E7100000
|
heap
|
page readonly
|
||
7FFC66ACB000
|
unkown
|
page read and write
|
||
18AB4213000
|
heap
|
page read and write
|
||
2ADB000
|
stack
|
page read and write
|
||
171D9F05000
|
heap
|
page read and write
|
||
18D2A4B0000
|
heap
|
page read and write
|
||
25354868000
|
heap
|
page read and write
|
||
1DA9E350000
|
trusted library allocation
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
1FF8064E000
|
heap
|
page read and write
|
||
22FAEE52000
|
heap
|
page read and write
|
||
7FFC66AA0000
|
unkown
|
page readonly
|
||
507000
|
heap
|
page read and write
|
||
18D2BE80000
|
heap
|
page read and write
|
||
217E6275000
|
heap
|
page read and write
|
||
19EED4C5000
|
heap
|
page read and write
|
||
227CCC2D000
|
heap
|
page read and write
|
||
215BEBC0000
|
trusted library allocation
|
page read and write
|
||
25354879000
|
heap
|
page read and write
|
||
1DA98B50000
|
heap
|
page read and write
|
||
19EEECF0000
|
heap
|
page read and write
|
||
1DA9E218000
|
trusted library allocation
|
page read and write
|
||
2535484A000
|
heap
|
page read and write
|
||
1FF8064A000
|
heap
|
page read and write
|
||
19EED1E0000
|
heap
|
page read and write
|
||
18D2BE10000
|
remote allocation
|
page read and write
|
||
25354867000
|
heap
|
page read and write
|
||
7FFC66AC2000
|
unkown
|
page readonly
|
||
171D9D90000
|
heap
|
page read and write
|
||
AC777F000
|
stack
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
1FF8064D000
|
heap
|
page read and write
|
||
1FF80DA0000
|
remote allocation
|
page read and write
|
||
22A43DD4000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page read and write
|
||
1450ADA0000
|
trusted library allocation
|
page read and write
|
||
1FF81402000
|
heap
|
page read and write
|
||
22A43DF9000
|
heap
|
page read and write
|
||
274E000
|
heap
|
page read and write
|
||
7FFC66ACF000
|
unkown
|
page readonly
|
There are 938 hidden memdumps, click here to show them.