Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
MIpuuSiSZ4.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
MPEG-4 LOAS
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x9fe2e37f, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_MIp_773949b15a9dc27bfcd3f791ccbc8dda8da3511_ceeedb37_0e0d5ce9\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_MIp_aa8bb9fdf8d32e2840ca8df43968d536d04b9a9_ceeedb37_07895910\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER31C2.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Jul 22 21:11:02 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3A8C.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Jul 22 21:11:04 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3DB9.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3FAE.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43B4.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4675.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 61712 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
|
modified
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_MIp_773949b15a9dc27bfcd3f791ccbc8dda8da3511_ceeedb37_116bd172\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_MIp_aa8bb9fdf8d32e2840ca8df43968d536d04b9a9_ceeedb37_1a1fcd1c\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER940B.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Jul 22 20:58:11 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9FD2.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Jul 22 20:58:12 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB4E2.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB764.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB89A.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBB5A.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBE49.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC0F8.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC28F.tmp.txt
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC6A7.tmp.txt
|
data
|
dropped
|
There are 19 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\MIpuuSiSZ4.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddStroke
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddWordsToWordList
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AdviseInkChange
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GAjjZRZVj\QFdWkQKkPokX.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZcjkHmdxs\qpwRIIkrlFzB.dll"
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FmCnbLJkOlaRytmc\QMbXoKRooU.dll"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\YbTPHZsAWIZFUi\eAeQcUPg.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 6776 -s 324
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 6792 -s 328
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k WerSvcGroup
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 484 -p 6160 -ip 6160
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 516 -p 3896 -ip 3896
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 6160 -s 336
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 3896 -s 328
|
There are 21 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://174.138.33.49:7080/x
|
unknown
|
||
https://174.138.33.49/T
|
unknown
|
||
https://174.138.33.49:7080/tem
|
unknown
|
||
https://174.138.33.49:7080/944
|
unknown
|
||
https://174.138.33.49/7
|
unknown
|
||
https://174.138.33.49:7080/temy
|
unknown
|
||
https://174.138.33.49:7080/Numv
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.tiles.ditu.live.com/tiles/gen
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/logging.ashx
|
unknown
|
||
https://174.138.33.49/
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
https://174.138.33.49:7080/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
|
unknown
|
||
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://%s.xboxlive.com
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/logging.ashx
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
||
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
|
unknown
|
||
https://%s.xboxlive.come
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
https://activity.windows.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Locations
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://%s.dnet.xboxlive.com
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing
|
unknown
|
There are 45 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
174.138.33.49
|
unknown
|
United States
|
||
248.6.0.0
|
unknown
|
Reserved
|
||
20.7.0.0
|
unknown
|
United States
|
||
101.69.85.108
|
unknown
|
China
|
||
176.6.0.0
|
unknown
|
Germany
|
||
144.1.49.1
|
unknown
|
unknown
|
||
80.7.0.0
|
unknown
|
United Kingdom
|
||
64.7.0.0
|
unknown
|
United States
|
||
24.7.0.0
|
unknown
|
United States
|
||
112.7.0.0
|
unknown
|
China
|
||
4.7.0.0
|
unknown
|
United States
|
||
208.9.0.0
|
unknown
|
United States
|
||
232.6.0.0
|
unknown
|
Reserved
|
||
96.7.0.0
|
unknown
|
United States
|
||
204.6.0.0
|
unknown
|
United States
|
||
172.6.0.0
|
unknown
|
United States
|
||
100.7.0.0
|
unknown
|
United States
|
||
180.6.0.0
|
unknown
|
Japan
|
||
84.7.0.0
|
unknown
|
France
|
||
200.18.0.0
|
unknown
|
Brazil
|
||
136.6.0.0
|
unknown
|
United States
|
||
236.6.0.0
|
unknown
|
Reserved
|
||
68.7.0.0
|
unknown
|
United States
|
||
116.7.0.0
|
unknown
|
China
|
||
8.7.0.0
|
unknown
|
United States
|
||
82.10.0.0
|
unknown
|
United Kingdom
|
||
32.7.0.0
|
unknown
|
United States
|
||
128.7.0.0
|
unknown
|
Germany
|
||
192.168.2.7
|
unknown
|
unknown
|
||
108.7.0.0
|
unknown
|
United States
|
||
92.7.0.0
|
unknown
|
United Kingdom
|
||
244.6.0.0
|
unknown
|
Reserved
|
||
240.69.242.0
|
unknown
|
Reserved
|
||
184.6.0.0
|
unknown
|
United States
|
||
192.6.0.0
|
unknown
|
United States
|
||
64.6.0.0
|
unknown
|
United States
|
||
214.112.3.0
|
unknown
|
United States
|
||
76.7.0.0
|
unknown
|
United States
|
||
240.6.0.0
|
unknown
|
Reserved
|
||
243.112.3.0
|
unknown
|
Reserved
|
||
200.6.0.0
|
unknown
|
Ecuador
|
||
241.112.3.0
|
unknown
|
Reserved
|
||
124.7.0.0
|
unknown
|
India
|
||
16.7.0.0
|
unknown
|
United States
|
||
36.7.0.0
|
unknown
|
China
|
||
244.26.0.0
|
unknown
|
Reserved
|
||
192.168.2.1
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
There are 38 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProgramId
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
FileId
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LowerCaseLongPath
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LongPathHash
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Name
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Publisher
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Version
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinFileVersion
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinaryType
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductName
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductVersion
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LinkDate
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinProductVersion
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Size
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Language
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsPeFile
|
||
\REGISTRY\A\{eb3fd99b-4bb8-ff03-929a-4fdd979037b6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsOsComponent
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018800453F4626F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018800453F4626F
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
|
MonthID
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProgramId
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
FileId
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LowerCaseLongPath
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LongPathHash
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Name
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Publisher
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Version
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinFileVersion
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinaryType
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductName
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductVersion
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LinkDate
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinProductVersion
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Size
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Language
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsPeFile
|
||
\REGISTRY\A\{0ce580c3-9356-6b11-5fcc-934541472052}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsOsComponent
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
00180008F3870B0F
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
00180008F3870B0F
|
There are 46 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
15738060000
|
direct allocation
|
page execute and read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
20000071000
|
direct allocation
|
page execute read
|
||
2D11000
|
direct allocation
|
page execute read
|
||
22FC4510000
|
direct allocation
|
page execute and read and write
|
||
20000010000
|
direct allocation
|
page execute and read and write
|
||
14980010000
|
direct allocation
|
page execute and read and write
|
||
22FC4510000
|
direct allocation
|
page execute and read and write
|
||
2061000
|
direct allocation
|
page execute read
|
||
14980071000
|
direct allocation
|
page execute read
|
||
22FC4571000
|
direct allocation
|
page execute read
|
||
1A029F41000
|
direct allocation
|
page execute read
|
||
2CB0000
|
direct allocation
|
page execute and read and write
|
||
22FC4510000
|
direct allocation
|
page execute and read and write
|
||
22FC4571000
|
direct allocation
|
page execute read
|
||
14980010000
|
direct allocation
|
page execute and read and write
|
||
22FC4571000
|
direct allocation
|
page execute read
|
||
1298000
|
heap
|
page read and write
|
||
15739971000
|
direct allocation
|
page execute read
|
||
14980010000
|
direct allocation
|
page execute and read and write
|
||
14980071000
|
direct allocation
|
page execute read
|
||
14980071000
|
direct allocation
|
page execute read
|
||
1A029EE0000
|
direct allocation
|
page execute and read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
180070000
|
unkown
|
page read and write
|
||
298A279A000
|
heap
|
page read and write
|
||
20000070000
|
direct allocation
|
page read and write
|
||
298A2777000
|
heap
|
page read and write
|
||
6BF000
|
stack
|
page read and write
|
||
136C000
|
heap
|
page read and write
|
||
2413A2E8000
|
heap
|
page read and write
|
||
1E2624F0000
|
heap
|
page read and write
|
||
C8D817C000
|
stack
|
page read and write
|
||
180073000
|
unkown
|
page readonly
|
||
298A2773000
|
heap
|
page read and write
|
||
149F08F0000
|
heap
|
page read and write
|
||
298A2777000
|
heap
|
page read and write
|
||
2D0F6590000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
1321000
|
heap
|
page read and write
|
||
730000
|
remote allocation
|
page read and write
|
||
1573999E000
|
direct allocation
|
page read and write
|
||
2413A460000
|
trusted library allocation
|
page read and write
|
||
C8D7D0B000
|
stack
|
page read and write
|
||
351D000
|
heap
|
page read and write
|
||
298A1E4B000
|
heap
|
page read and write
|
||
298A2C00000
|
heap
|
page read and write
|
||
298A278E000
|
heap
|
page read and write
|
||
1800D5000
|
unkown
|
page readonly
|
||
1B1E9829000
|
heap
|
page read and write
|
||
3621000
|
heap
|
page read and write
|
||
C8D867F000
|
unkown
|
page read and write
|
||
2060000
|
direct allocation
|
page read and write
|
||
298A27BC000
|
heap
|
page read and write
|
||
298A2782000
|
heap
|
page read and write
|
||
2A20C151000
|
heap
|
page read and write
|
||
5D00000
|
heap
|
page read and write
|
||
17603802000
|
heap
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
180073000
|
unkown
|
page readonly
|
||
17603828000
|
heap
|
page read and write
|
||
298A27D1000
|
heap
|
page read and write
|
||
1E262613000
|
heap
|
page read and write
|
||
24134D07000
|
heap
|
page read and write
|
||
1F39DB20000
|
trusted library allocation
|
page read and write
|
||
149F08F0000
|
heap
|
page read and write
|
||
298A27AB000
|
heap
|
page read and write
|
||
C8D7D8F000
|
stack
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
24134AC0000
|
heap
|
page read and write
|
||
C9B45FB000
|
stack
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
298A1E88000
|
heap
|
page read and write
|
||
24134C13000
|
heap
|
page read and write
|
||
F82696E000
|
stack
|
page read and write
|
||
D9294BC000
|
stack
|
page read and write
|
||
20000000000
|
direct allocation
|
page execute and read and write
|
||
2D970859000
|
heap
|
page read and write
|
||
180070000
|
unkown
|
page read and write
|
||
1B1EA002000
|
trusted library allocation
|
page read and write
|
||
298A27BB000
|
heap
|
page read and write
|
||
F826F7E000
|
stack
|
page read and write
|
||
2413A40E000
|
trusted library allocation
|
page read and write
|
||
1F39E8D0000
|
trusted library allocation
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
298A2781000
|
heap
|
page read and write
|
||
1A029ED0000
|
direct allocation
|
page execute and read and write
|
||
1D4A7A02000
|
trusted library allocation
|
page read and write
|
||
2413A190000
|
trusted library allocation
|
page read and write
|
||
2D9707D0000
|
trusted library allocation
|
page read and write
|
||
298A277E000
|
heap
|
page read and write
|
||
CE8B7F000
|
stack
|
page read and write
|
||
2A20C18D000
|
heap
|
page read and write
|
||
22FC4310000
|
heap
|
page readonly
|
||
180000000
|
unkown
|
page readonly
|
||
E73D3FB000
|
stack
|
page read and write
|
||
CE8E7E000
|
stack
|
page read and write
|
||
149F0AD0000
|
heap
|
page read and write
|
||
1D254443000
|
heap
|
page read and write
|
||
298A2783000
|
heap
|
page read and write
|
||
298A2798000
|
heap
|
page read and write
|
||
95D54FA000
|
stack
|
page read and write
|
||
15738106000
|
heap
|
page read and write
|
||
298A1E56000
|
heap
|
page read and write
|
||
1F39DB90000
|
heap
|
page read and write
|
||
180073000
|
unkown
|
page readonly
|
||
3535000
|
heap
|
page read and write
|
||
2007A1D0000
|
heap
|
page read and write
|
||
1D254447000
|
heap
|
page read and write
|
||
2413A4A0000
|
trusted library allocation
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
2D0F66BE000
|
heap
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
548E000
|
stack
|
page read and write
|
||
22FC459D000
|
direct allocation
|
page readonly
|
||
C9B38BB000
|
stack
|
page read and write
|
||
2413A408000
|
trusted library allocation
|
page read and write
|
||
298A2782000
|
heap
|
page read and write
|
||
B7D67AC000
|
stack
|
page read and write
|
||
B986FE000
|
stack
|
page read and write
|
||
2D970829000
|
heap
|
page read and write
|
||
2242003C000
|
heap
|
page read and write
|
||
298A271F000
|
heap
|
page read and write
|
||
828000
|
heap
|
page read and write
|
||
22FC5E70000
|
remote allocation
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
298A278E000
|
heap
|
page read and write
|
||
298A277D000
|
heap
|
page read and write
|
||
298A27AB000
|
heap
|
page read and write
|
||
2413A4C0000
|
trusted library allocation
|
page read and write
|
||
CEE55FD000
|
stack
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
17603770000
|
heap
|
page read and write
|
||
2413A080000
|
trusted library allocation
|
page read and write
|
||
3534000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
1E26265B000
|
heap
|
page read and write
|
||
1D254C02000
|
trusted library allocation
|
page read and write
|
||
2D0F6F00000
|
heap
|
page read and write
|
||
24134C7C000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
298A1E4D000
|
heap
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
298A2798000
|
heap
|
page read and write
|
||
298A278E000
|
heap
|
page read and write
|
||
2413A000000
|
trusted library allocation
|
page read and write
|
||
2DA0000
|
remote allocation
|
page read and write
|
||
298A2C19000
|
heap
|
page read and write
|
||
298A279A000
|
heap
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
22FC42B0000
|
heap
|
page read and write
|
||
2D0F66C8000
|
heap
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
17603864000
|
heap
|
page read and write
|
||
298A2786000
|
heap
|
page read and write
|
||
137C000
|
heap
|
page read and write
|
||
22FC4220000
|
unkown
|
page read and write
|
||
2A7887D000
|
stack
|
page read and write
|
||
298A1E00000
|
heap
|
page read and write
|
||
298A2786000
|
heap
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
C8D84F7000
|
stack
|
page read and write
|
||
298A1E51000
|
heap
|
page read and write
|
||
24134BF0000
|
trusted library allocation
|
page read and write
|
||
138D000
|
heap
|
page read and write
|
||
24134C8C000
|
heap
|
page read and write
|
||
3F835FB000
|
stack
|
page read and write
|
||
2C5000
|
stack
|
page read and write
|
||
298A277E000
|
heap
|
page read and write
|
||
2413A421000
|
trusted library allocation
|
page read and write
|
||
2D970875000
|
heap
|
page read and write
|
||
298A277F000
|
heap
|
page read and write
|
||
2D970E02000
|
trusted library allocation
|
page read and write
|
||
24134CFE000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
1D254429000
|
heap
|
page read and write
|
||
298A2721000
|
heap
|
page read and write
|
||
2413A400000
|
trusted library allocation
|
page read and write
|
||
D9295BF000
|
stack
|
page read and write
|
||
298A278E000
|
heap
|
page read and write
|
||
1D4A7230000
|
heap
|
page read and write
|
||
24134C26000
|
heap
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
1D4A7500000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
1D4A7508000
|
heap
|
page read and write
|
||
24134CFE000
|
heap
|
page read and write
|
||
1D254413000
|
heap
|
page read and write
|
||
149F08D0000
|
heap
|
page read and write
|
||
1B1E9802000
|
heap
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
2A20C164000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
95D50EB000
|
stack
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
2D0F6713000
|
heap
|
page read and write
|
||
298A2781000
|
heap
|
page read and write
|
||
2809AFE000
|
stack
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
351D000
|
heap
|
page read and write
|
||
298A1E4E000
|
heap
|
page read and write
|
||
298A1F13000
|
heap
|
page read and write
|
||
298A279D000
|
heap
|
page read and write
|
||
1D4A7990000
|
trusted library allocation
|
page read and write
|
||
298A277D000
|
heap
|
page read and write
|
||
354D000
|
heap
|
page read and write
|
||
22FC4347000
|
heap
|
page read and write
|
||
1498009D000
|
direct allocation
|
page readonly
|
||
2D3D000
|
direct allocation
|
page readonly
|
||
24135504000
|
heap
|
page read and write
|
||
298A27AB000
|
heap
|
page read and write
|
||
1D254445000
|
heap
|
page read and write
|
||
2A20C166000
|
heap
|
page read and write
|
||
298A2C02000
|
heap
|
page read and write
|
||
18005D000
|
unkown
|
page readonly
|
||
298A278B000
|
heap
|
page read and write
|
||
298A1E3C000
|
heap
|
page read and write
|
||
1D4A7429000
|
heap
|
page read and write
|
||
112C27C000
|
stack
|
page read and write
|
||
298A2711000
|
heap
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
157380E4000
|
heap
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
298A279C000
|
heap
|
page read and write
|
||
1D254508000
|
heap
|
page read and write
|
||
2413A213000
|
heap
|
page read and write
|
||
2413A070000
|
trusted library allocation
|
page read and write
|
||
2413A2F9000
|
heap
|
page read and write
|
||
22FC5DBB000
|
heap
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
298A1E29000
|
heap
|
page read and write
|
||
298A277E000
|
heap
|
page read and write
|
||
132F000
|
heap
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
352A000
|
heap
|
page read and write
|
||
17603760000
|
heap
|
page read and write
|
||
298A2782000
|
heap
|
page read and write
|
||
C8D877A000
|
stack
|
page read and write
|
||
149F0AD5000
|
heap
|
page read and write
|
||
24135402000
|
heap
|
page read and write
|
||
298A2782000
|
heap
|
page read and write
|
||
34A1000
|
heap
|
page read and write
|
||
1498009F000
|
direct allocation
|
page readonly
|
||
298A1EA5000
|
heap
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
180073000
|
unkown
|
page readonly
|
||
24134C8F000
|
heap
|
page read and write
|
||
2D3F000
|
direct allocation
|
page readonly
|
||
298A2700000
|
heap
|
page read and write
|
||
2A20C171000
|
heap
|
page read and write
|
||
1D254240000
|
heap
|
page read and write
|
||
298A27C1000
|
heap
|
page read and write
|
||
D03FBDE000
|
stack
|
page read and write
|
||
298A277F000
|
heap
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
298A2788000
|
heap
|
page read and write
|
||
22FC4340000
|
heap
|
page read and write
|
||
22FC5F70000
|
heap
|
page read and write
|
||
298A2789000
|
heap
|
page read and write
|
||
22420051000
|
heap
|
page read and write
|
||
18005D000
|
unkown
|
page readonly
|
||
2D970813000
|
heap
|
page read and write
|
||
112C37F000
|
stack
|
page read and write
|
||
D92953F000
|
stack
|
page read and write
|
||
149801F0000
|
remote allocation
|
page read and write
|
||
298A278D000
|
heap
|
page read and write
|
||
E73DC7F000
|
stack
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
2D97086A000
|
heap
|
page read and write
|
||
3F832FE000
|
stack
|
page read and write
|
||
2007A5F5000
|
heap
|
page read and write
|
||
298A277E000
|
heap
|
page read and write
|
||
1D254400000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
368F000
|
heap
|
page read and write
|
||
F8269EE000
|
stack
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
1B1E97B0000
|
remote allocation
|
page read and write
|
||
298A277E000
|
heap
|
page read and write
|
||
22FC4570000
|
direct allocation
|
page read and write
|
||
2413A200000
|
heap
|
page read and write
|
||
2007A5F0000
|
heap
|
page read and write
|
||
95D51EE000
|
stack
|
page read and write
|
||
298A277F000
|
heap
|
page read and write
|
||
3562000
|
heap
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
1F39DAB0000
|
heap
|
page read and write
|
||
17603913000
|
heap
|
page read and write
|
||
1B1E9857000
|
heap
|
page read and write
|
||
1A029DB8000
|
heap
|
page read and write
|
||
24135518000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
1498009D000
|
direct allocation
|
page readonly
|
||
2DD0000
|
heap
|
page read and write
|
||
1A029D60000
|
heap
|
page read and write
|
||
2241FEB0000
|
heap
|
page read and write
|
||
2D970862000
|
heap
|
page read and write
|
||
298A1C40000
|
heap
|
page read and write
|
||
73E967E000
|
stack
|
page read and write
|
||
1E262560000
|
heap
|
page read and write
|
||
298A27BB000
|
heap
|
page read and write
|
||
298A2779000
|
heap
|
page read and write
|
||
CEE5AFF000
|
stack
|
page read and write
|
||
D03FF78000
|
stack
|
page read and write
|
||
C8D887C000
|
stack
|
page read and write
|
||
298A2780000
|
heap
|
page read and write
|
||
180073000
|
unkown
|
page readonly
|
||
298A1C50000
|
heap
|
page read and write
|
||
2D0F65C0000
|
trusted library allocation
|
page read and write
|
||
26DB000
|
stack
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
1A029FA0000
|
heap
|
page readonly
|
||
22FC459F000
|
direct allocation
|
page readonly
|
||
2A20C140000
|
heap
|
page read and write
|
||
F826D7E000
|
stack
|
page read and write
|
||
298A27CF000
|
heap
|
page read and write
|
||
298A1E53000
|
heap
|
page read and write
|
||
2D0F6702000
|
heap
|
page read and write
|
||
149F08F0000
|
heap
|
page read and write
|
||
2D0F6688000
|
heap
|
page read and write
|
||
298A2782000
|
heap
|
page read and write
|
||
2D3E000
|
direct allocation
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
CE8D7B000
|
stack
|
page read and write
|
||
298A278C000
|
heap
|
page read and write
|
||
15738030000
|
heap
|
page read and write
|
||
FD0000
|
remote allocation
|
page read and write
|
||
1760387F000
|
heap
|
page read and write
|
||
298A2C02000
|
heap
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
298A1EEA000
|
heap
|
page read and write
|
||
D9294BC000
|
stack
|
page read and write
|
||
298A27CC000
|
heap
|
page read and write
|
||
22FC4347000
|
heap
|
page read and write
|
||
28097AC000
|
stack
|
page read and write
|
||
298A1E54000
|
heap
|
page read and write
|
||
B7D6A7F000
|
stack
|
page read and write
|
||
1F39E6A0000
|
trusted library allocation
|
page read and write
|
||
14980007000
|
heap
|
page read and write
|
||
298A278F000
|
heap
|
page read and write
|
||
1250000
|
direct allocation
|
page execute and read and write
|
||
1A029F6F000
|
direct allocation
|
page readonly
|
||
180073000
|
unkown
|
page readonly
|
||
298A2786000
|
heap
|
page read and write
|
||
298A2760000
|
heap
|
page read and write
|
||
149F0960000
|
heap
|
page read and write
|
||
18005D000
|
unkown
|
page readonly
|
||
2D0F66CF000
|
heap
|
page read and write
|
||
1D254502000
|
heap
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
1D4A7400000
|
heap
|
page read and write
|
||
2413A2AA000
|
heap
|
page read and write
|
||
1F39DBDC000
|
heap
|
page read and write
|
||
210000
|
heap
|
page read and write
|
||
298A279A000
|
heap
|
page read and write
|
||
2D970842000
|
heap
|
page read and write
|
||
D03FEFF000
|
stack
|
page read and write
|
||
D9294BC000
|
stack
|
page read and write
|
||
3640000
|
heap
|
page read and write
|
||
24135518000
|
heap
|
page read and write
|
||
1D25445C000
|
heap
|
page read and write
|
||
298A1EEC000
|
heap
|
page read and write
|
||
298A1EC1000
|
heap
|
page read and write
|
||
1F39DA90000
|
heap
|
page read and write
|
||
22420060000
|
heap
|
page read and write
|
||
2413A4D0000
|
trusted library allocation
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
298A27A1000
|
heap
|
page read and write
|
||
CEE56FF000
|
stack
|
page read and write
|
||
298A277B000
|
heap
|
page read and write
|
||
2D97087B000
|
heap
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
298A24D0000
|
remote allocation
|
page read and write
|
||
298A27AB000
|
heap
|
page read and write
|
||
B61000
|
heap
|
page read and write
|
||
351D000
|
heap
|
page read and write
|
||
1F39DDB9000
|
heap
|
page read and write
|
||
149800D0000
|
heap
|
page readonly
|
||
1F39DBD4000
|
heap
|
page read and write
|
||
2413A230000
|
heap
|
page read and write
|
||
14980070000
|
direct allocation
|
page read and write
|
||
2242005B000
|
heap
|
page read and write
|
||
2D97083D000
|
heap
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
1D4A744C000
|
heap
|
page read and write
|
||
2413A2FF000
|
heap
|
page read and write
|
||
17604002000
|
trusted library allocation
|
page read and write
|
||
1B1E983D000
|
heap
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
2DA0000
|
remote allocation
|
page read and write
|
||
22FC459F000
|
direct allocation
|
page readonly
|
||
868000
|
heap
|
page read and write
|
||
180073000
|
unkown
|
page readonly
|
||
E73D67E000
|
stack
|
page read and write
|
||
1D254465000
|
heap
|
page read and write
|
||
D9295BF000
|
stack
|
page read and write
|
||
1D4A744A000
|
heap
|
page read and write
|
||
15738138000
|
heap
|
page read and write
|
||
34C7000
|
heap
|
page read and write
|
||
1800D5000
|
unkown
|
page readonly
|
||
C8D81FE000
|
stack
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
298A278D000
|
heap
|
page read and write
|
||
298A277B000
|
heap
|
page read and write
|
||
705000
|
heap
|
page read and write
|
||
1E262600000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
1573999F000
|
direct allocation
|
page readonly
|
||
1D25444A000
|
heap
|
page read and write
|
||
298A277E000
|
heap
|
page read and write
|
||
149F08D0000
|
heap
|
page read and write
|
||
22FC459D000
|
direct allocation
|
page readonly
|
||
1760385D000
|
heap
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
2D97086D000
|
heap
|
page read and write
|
||
265F000
|
stack
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
298A2773000
|
heap
|
page read and write
|
||
3F8327B000
|
stack
|
page read and write
|
||
132F000
|
heap
|
page read and write
|
||
1D4A748F000
|
heap
|
page read and write
|
||
22420100000
|
heap
|
page read and write
|
||
2A20C167000
|
heap
|
page read and write
|
||
1F39DDB0000
|
heap
|
page read and write
|
||
180070000
|
unkown
|
page read and write
|
||
2D97085C000
|
heap
|
page read and write
|
||
22420670000
|
trusted library allocation
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
298A2773000
|
heap
|
page read and write
|
||
2241FEA0000
|
heap
|
page read and write
|
||
298A2C44000
|
heap
|
page read and write
|
||
18005D000
|
unkown
|
page readonly
|
||
298A2782000
|
heap
|
page read and write
|
||
1F39DB98000
|
heap
|
page read and write
|
||
298A278C000
|
heap
|
page read and write
|
||
1D4A7457000
|
heap
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
B46000
|
heap
|
page read and write
|
||
F82707F000
|
stack
|
page read and write
|
||
298A278E000
|
heap
|
page read and write
|
||
298A277E000
|
heap
|
page read and write
|
||
1F39DDC0000
|
trusted library allocation
|
page read and write
|
||
112C27C000
|
stack
|
page read and write
|
||
B9816B000
|
stack
|
page read and write
|
||
2413A24E000
|
heap
|
page read and write
|
||
22420000000
|
heap
|
page read and write
|
||
95D56FF000
|
stack
|
page read and write
|
||
1A029FD5000
|
heap
|
page read and write
|
||
18005D000
|
unkown
|
page readonly
|
||
200000D0000
|
heap
|
page readonly
|
||
298A278B000
|
heap
|
page read and write
|
||
298A2760000
|
heap
|
page read and write
|
||
1D4A7471000
|
heap
|
page read and write
|
||
D03FFFF000
|
stack
|
page read and write
|
||
C9B3EF9000
|
stack
|
page read and write
|
||
95D5479000
|
stack
|
page read and write
|
||
298A2C02000
|
heap
|
page read and write
|
||
1D254230000
|
heap
|
page read and write
|
||
2413A2B5000
|
heap
|
page read and write
|
||
2242005C000
|
heap
|
page read and write
|
||
1F39DDB5000
|
heap
|
page read and write
|
||
22FC4570000
|
direct allocation
|
page read and write
|
||
298A279F000
|
heap
|
page read and write
|
||
180070000
|
unkown
|
page read and write
|
||
350D000
|
heap
|
page read and write
|
||
2413A1A0000
|
trusted library allocation
|
page read and write
|
||
1D25443C000
|
heap
|
page read and write
|
||
298A2786000
|
heap
|
page read and write
|
||
112C27C000
|
stack
|
page read and write
|
||
180070000
|
unkown
|
page read and write
|
||
2A20C156000
|
heap
|
page read and write
|
||
24134CA1000
|
heap
|
page read and write
|
||
95D567E000
|
stack
|
page read and write
|
||
298A278E000
|
heap
|
page read and write
|
||
1D254458000
|
heap
|
page read and write
|
||
CEE58FF000
|
stack
|
page read and write
|
||
14980290000
|
heap
|
page read and write
|
||
6C0000
|
direct allocation
|
page execute and read and write
|
||
298A278D000
|
heap
|
page read and write
|
||
149800D0000
|
heap
|
page readonly
|
||
2413A224000
|
heap
|
page read and write
|
||
2D970863000
|
heap
|
page read and write
|
||
2D97082E000
|
heap
|
page read and write
|
||
17603868000
|
heap
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
24134D02000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
1A029F40000
|
direct allocation
|
page read and write
|
||
298A2789000
|
heap
|
page read and write
|
||
C8D85FF000
|
stack
|
page read and write
|
||
149800D0000
|
heap
|
page readonly
|
||
95D55F9000
|
stack
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
22FC4605000
|
heap
|
page read and write
|
||
180073000
|
unkown
|
page readonly
|
||
2D970865000
|
heap
|
page read and write
|
||
22FC5F70000
|
heap
|
page read and write
|
||
298A2783000
|
heap
|
page read and write
|
||
298A277D000
|
heap
|
page read and write
|
||
E73DA7E000
|
stack
|
page read and write
|
||
B98AFF000
|
stack
|
page read and write
|
||
2413A190000
|
trusted library allocation
|
page read and write
|
||
2413A2B3000
|
heap
|
page read and write
|
||
2413A4F0000
|
remote allocation
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
24134BD1000
|
trusted library allocation
|
page read and write
|
||
2413A259000
|
heap
|
page read and write
|
||
298A278E000
|
heap
|
page read and write
|
||
15739B78000
|
heap
|
page read and write
|
||
298A1E4A000
|
heap
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
24134B30000
|
heap
|
page read and write
|
||
2463000
|
heap
|
page read and write
|
||
B7D6AFE000
|
stack
|
page read and write
|
||
1D4A744F000
|
heap
|
page read and write
|
||
22FC42B0000
|
heap
|
page read and write
|
||
1F39DD60000
|
trusted library allocation
|
page read and write
|
||
2413A470000
|
trusted library allocation
|
page read and write
|
||
112C37F000
|
stack
|
page read and write
|
||
24134C95000
|
heap
|
page read and write
|
||
298A2C02000
|
heap
|
page read and write
|
||
1573999D000
|
direct allocation
|
page readonly
|
||
1B1E97B0000
|
remote allocation
|
page read and write
|
||
298A27C1000
|
heap
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
2809A7E000
|
stack
|
page read and write
|
||
298A2784000
|
heap
|
page read and write
|
||
1D4A743C000
|
heap
|
page read and write
|
||
1B1E96F0000
|
heap
|
page read and write
|
||
1498009F000
|
direct allocation
|
page readonly
|
||
1E262602000
|
heap
|
page read and write
|
||
298A27AD000
|
heap
|
page read and write
|
||
2D970884000
|
heap
|
page read and write
|
||
2D97082D000
|
heap
|
page read and write
|
||
1D2543A0000
|
trusted library allocation
|
page read and write
|
||
1E262590000
|
trusted library allocation
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
298A277E000
|
heap
|
page read and write
|
||
1F39DB30000
|
trusted library allocation
|
page read and write
|
||
298A2782000
|
heap
|
page read and write
|
||
2D0F6600000
|
heap
|
page read and write
|
||
CEE52FF000
|
stack
|
page read and write
|
||
2A20C18C000
|
heap
|
page read and write
|
||
14980290000
|
heap
|
page read and write
|
||
1F39DBDC000
|
heap
|
page read and write
|
||
22420057000
|
heap
|
page read and write
|
||
298A2C02000
|
heap
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
2D0F66DE000
|
heap
|
page read and write
|
||
298A2C02000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
1B1E9813000
|
heap
|
page read and write
|
||
1D25444D000
|
heap
|
page read and write
|
||
1A029D80000
|
heap
|
page read and write
|
||
149F0AD0000
|
heap
|
page read and write
|
||
298A2C02000
|
heap
|
page read and write
|
||
B9867B000
|
stack
|
page read and write
|
||
1E262629000
|
heap
|
page read and write
|
||
298A2781000
|
heap
|
page read and write
|
||
CEE53FC000
|
stack
|
page read and write
|
||
1D254465000
|
heap
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
2D970861000
|
heap
|
page read and write
|
||
2007A270000
|
heap
|
page read and write
|
||
1573FAD6000
|
heap
|
page read and write
|
||
22420802000
|
trusted library allocation
|
page read and write
|
||
2D970600000
|
heap
|
page read and write
|
||
2A7847C000
|
stack
|
page read and write
|
||
2A20C183000
|
heap
|
page read and write
|
||
C8D807E000
|
stack
|
page read and write
|
||
1F39D960000
|
trusted library allocation
|
page read and write
|
||
24134C79000
|
heap
|
page read and write
|
||
22FC4600000
|
heap
|
page read and write
|
||
3666000
|
heap
|
page read and write
|
||
2242005E000
|
heap
|
page read and write
|
||
112C2FF000
|
stack
|
page read and write
|
||
3F836F7000
|
stack
|
page read and write
|
||
818D000
|
heap
|
page read and write
|
||
1E262713000
|
heap
|
page read and write
|
||
298A2792000
|
heap
|
page read and write
|
||
73E99F7000
|
stack
|
page read and write
|
||
298A277B000
|
heap
|
page read and write
|
||
15738000000
|
heap
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
298A277B000
|
heap
|
page read and write
|
||
2D970902000
|
heap
|
page read and write
|
||
18005D000
|
unkown
|
page readonly
|
||
157380D0000
|
heap
|
page read and write
|
||
368F000
|
heap
|
page read and write
|
||
2D970874000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
22FC4600000
|
heap
|
page read and write
|
||
12D3000
|
heap
|
page read and write
|
||
1F39DBDC000
|
heap
|
page read and write
|
||
180070000
|
unkown
|
page read and write
|
||
24135500000
|
heap
|
page read and write
|
||
2413A460000
|
trusted library allocation
|
page read and write
|
||
2413A5D0000
|
trusted library allocation
|
page read and write
|
||
2413A30D000
|
heap
|
page read and write
|
||
298A2786000
|
heap
|
page read and write
|
||
298A1F02000
|
heap
|
page read and write
|
||
D92953F000
|
stack
|
page read and write
|
||
149F0AD5000
|
heap
|
page read and write
|
||
298A2777000
|
heap
|
page read and write
|
||
1760387B000
|
heap
|
page read and write
|
||
2D0F6641000
|
heap
|
page read and write
|
||
298A1EB1000
|
heap
|
page read and write
|
||
24134AD0000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
24135400000
|
heap
|
page read and write
|
||
298A27AB000
|
heap
|
page read and write
|
||
298A2798000
|
heap
|
page read and write
|
||
2D970864000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
149F0790000
|
heap
|
page read and write
|
||
22FC4300000
|
direct allocation
|
page execute and read and write
|
||
22FC4340000
|
heap
|
page read and write
|
||
1A029C20000
|
heap
|
page read and write
|
||
1573811D000
|
heap
|
page read and write
|
||
C9B47FF000
|
stack
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
1D4A7502000
|
heap
|
page read and write
|
||
2D0F6520000
|
heap
|
page read and write
|
||
1F39DDA0000
|
trusted library allocation
|
page read and write
|
||
22FC4570000
|
direct allocation
|
page read and write
|
||
1E262702000
|
heap
|
page read and write
|
||
1498009D000
|
direct allocation
|
page readonly
|
||
6E0000
|
trusted library allocation
|
page read and write
|
||
22420113000
|
heap
|
page read and write
|
||
149F0AD0000
|
heap
|
page read and write
|
||
298A1E48000
|
heap
|
page read and write
|
||
2413A460000
|
trusted library allocation
|
page read and write
|
||
2A20C156000
|
heap
|
page read and write
|
||
2413A1C0000
|
trusted library allocation
|
page read and write
|
||
298A2774000
|
heap
|
page read and write
|
||
14980070000
|
direct allocation
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
1376000
|
heap
|
page read and write
|
||
2413A21E000
|
heap
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
2D970832000
|
heap
|
page read and write
|
||
298A279A000
|
heap
|
page read and write
|
||
22FC459F000
|
direct allocation
|
page readonly
|
||
298A278B000
|
heap
|
page read and write
|
||
2D970858000
|
heap
|
page read and write
|
||
298A2784000
|
heap
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
CEE59FF000
|
stack
|
page read and write
|
||
73E98FF000
|
stack
|
page read and write
|
||
298A27D9000
|
heap
|
page read and write
|
||
1E262500000
|
heap
|
page read and write
|
||
298A277D000
|
heap
|
page read and write
|
||
B988FF000
|
stack
|
page read and write
|
||
298A279F000
|
heap
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
1498009F000
|
direct allocation
|
page readonly
|
||
149F08D0000
|
heap
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
2242005F000
|
heap
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
2A20C14B000
|
heap
|
page read and write
|
||
1A029DB0000
|
heap
|
page read and write
|
||
298A2782000
|
heap
|
page read and write
|
||
298A277E000
|
heap
|
page read and write
|
||
112C2FF000
|
stack
|
page read and write
|
||
12E2000
|
heap
|
page read and write
|
||
2413A30B000
|
heap
|
page read and write
|
||
22FC4300000
|
direct allocation
|
page execute and read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
3FA9CFE000
|
stack
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
C9B40FD000
|
stack
|
page read and write
|
||
24134C58000
|
heap
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
3FA99FF000
|
stack
|
page read and write
|
||
157380DD000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
E73D57F000
|
stack
|
page read and write
|
||
180073000
|
unkown
|
page readonly
|
||
1F39E8B0000
|
heap
|
page readonly
|
||
2A20C090000
|
heap
|
page read and write
|
||
C8D83F9000
|
stack
|
page read and write
|
||
298A277B000
|
heap
|
page read and write
|
||
180070000
|
unkown
|
page read and write
|
||
137C000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
73E9AFE000
|
stack
|
page read and write
|
||
14980000000
|
direct allocation
|
page execute and read and write
|
||
E73CF9B000
|
stack
|
page read and write
|
||
2D97084E000
|
heap
|
page read and write
|
||
1A0316EC000
|
heap
|
page read and write
|
||
1E262640000
|
heap
|
page read and write
|
||
2413A4F0000
|
remote allocation
|
page read and write
|
||
298A1EF9000
|
heap
|
page read and write
|
||
149F0968000
|
heap
|
page read and write
|
||
137C000
|
heap
|
page read and write
|
||
22FC4290000
|
heap
|
page read and write
|
||
180070000
|
unkown
|
page read and write
|
||
1800D5000
|
unkown
|
page readonly
|
||
95D516F000
|
stack
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
298A2795000
|
heap
|
page read and write
|
||
298A27AD000
|
heap
|
page read and write
|
||
3666000
|
heap
|
page read and write
|
||
2413A1D4000
|
trusted library allocation
|
page read and write
|
||
2A7877F000
|
stack
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
298A278E000
|
heap
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
17603902000
|
heap
|
page read and write
|
||
1D4A7456000
|
heap
|
page read and write
|
||
298A279A000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
18005D000
|
unkown
|
page readonly
|
||
2413A266000
|
heap
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
350D000
|
heap
|
page read and write
|
||
298A2791000
|
heap
|
page read and write
|
||
298A27A1000
|
heap
|
page read and write
|
||
24135502000
|
heap
|
page read and write
|
||
298A278E000
|
heap
|
page read and write
|
||
137C000
|
heap
|
page read and write
|
||
2A784FE000
|
stack
|
page read and write
|
||
CEE517B000
|
stack
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
2D970860000
|
heap
|
page read and write
|
||
14985F65000
|
heap
|
page read and write
|
||
149F0968000
|
heap
|
page read and write
|
||
298A2602000
|
heap
|
page read and write
|
||
1B1E9780000
|
trusted library allocation
|
page read and write
|
||
17603800000
|
heap
|
page read and write
|
||
298A2782000
|
heap
|
page read and write
|
||
22FC4340000
|
heap
|
page read and write
|
||
1A029FD0000
|
heap
|
page read and write
|
||
15737EC0000
|
heap
|
page read and write
|
||
2413A304000
|
heap
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
298A1E70000
|
heap
|
page read and write
|
||
149F0AD5000
|
heap
|
page read and write
|
||
2D970840000
|
heap
|
page read and write
|
||
351D000
|
heap
|
page read and write
|
||
298A2788000
|
heap
|
page read and write
|
||
353C000
|
heap
|
page read and write
|
||
298A2782000
|
heap
|
page read and write
|
||
2A20C183000
|
heap
|
page read and write
|
||
C9B3CF7000
|
stack
|
page read and write
|
||
22420074000
|
heap
|
page read and write
|
||
DEC000
|
heap
|
page read and write
|
||
298A1DB0000
|
trusted library allocation
|
page read and write
|
||
22FC4220000
|
heap
|
page read and write
|
||
3521000
|
heap
|
page read and write
|
||
1B1E9902000
|
heap
|
page read and write
|
||
18005D000
|
unkown
|
page readonly
|
||
73E93AD000
|
stack
|
page read and write
|
||
112C37F000
|
stack
|
page read and write
|
||
298A2782000
|
heap
|
page read and write
|
||
2D97085A000
|
heap
|
page read and write
|
||
2413A610000
|
trusted library allocation
|
page read and write
|
||
2D0F6613000
|
heap
|
page read and write
|
||
24134D16000
|
heap
|
page read and write
|
||
2D0F6629000
|
heap
|
page read and write
|
||
298A279A000
|
heap
|
page read and write
|
||
2D97086B000
|
heap
|
page read and write
|
||
341B000
|
stack
|
page read and write
|
||
1D4A7513000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
2241FF10000
|
heap
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
298A2785000
|
heap
|
page read and write
|
||
353E000
|
heap
|
page read and write
|
||
2D0F6530000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
2D970832000
|
heap
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
298A277E000
|
heap
|
page read and write
|
||
2A20C183000
|
heap
|
page read and write
|
||
298A27A1000
|
heap
|
page read and write
|
||
298A1E47000
|
heap
|
page read and write
|
||
15738108000
|
heap
|
page read and write
|
||
C9B3FFF000
|
stack
|
page read and write
|
||
1E262E02000
|
trusted library allocation
|
page read and write
|
||
18005D000
|
unkown
|
page readonly
|
||
2007A140000
|
heap
|
page read and write
|
||
FD0000
|
remote allocation
|
page read and write
|
||
22FC4310000
|
heap
|
page readonly
|
||
24134C73000
|
heap
|
page read and write
|
||
D03FE7E000
|
stack
|
page read and write
|
||
298A2752000
|
heap
|
page read and write
|
||
2000000F000
|
heap
|
page read and write
|
||
24134CAE000
|
heap
|
page read and write
|
||
1D4A747D000
|
heap
|
page read and write
|
||
24134C00000
|
heap
|
page read and write
|
||
1800D5000
|
unkown
|
page readonly
|
||
22420029000
|
heap
|
page read and write
|
||
2A786FD000
|
stack
|
page read and write
|
||
E73D87B000
|
stack
|
page read and write
|
||
22FC4347000
|
heap
|
page read and write
|
||
17603813000
|
heap
|
page read and write
|
||
2D970846000
|
heap
|
page read and write
|
||
3F837FF000
|
stack
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
298A2778000
|
heap
|
page read and write
|
||
208D000
|
direct allocation
|
page readonly
|
||
298A2781000
|
heap
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
22FC4600000
|
heap
|
page read and write
|
||
298A1E50000
|
heap
|
page read and write
|
||
2D970844000
|
heap
|
page read and write
|
||
22420102000
|
heap
|
page read and write
|
||
25DC000
|
stack
|
page read and write
|
||
70A000
|
stack
|
page read and write
|
||
298A277F000
|
heap
|
page read and write
|
||
1D4A748C000
|
heap
|
page read and write
|
||
298A277B000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
298A1F08000
|
heap
|
page read and write
|
||
3667000
|
heap
|
page read and write
|
||
298A277F000
|
heap
|
page read and write
|
||
298A2750000
|
heap
|
page read and write
|
||
15739B65000
|
heap
|
page read and write
|
||
298A1EB6000
|
heap
|
page read and write
|
||
3534000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
3FA9AFF000
|
stack
|
page read and write
|
||
E73D7FC000
|
stack
|
page read and write
|
||
2413A1A0000
|
trusted library allocation
|
page read and write
|
||
3553000
|
heap
|
page read and write
|
||
298A2C02000
|
heap
|
page read and write
|
||
1B1E96E0000
|
heap
|
page read and write
|
||
2413A306000
|
heap
|
page read and write
|
||
321C000
|
stack
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
22FC4220000
|
unkown
|
page read and write
|
||
1800D5000
|
unkown
|
page readonly
|
||
73E987B000
|
stack
|
page read and write
|
||
298A2785000
|
heap
|
page read and write
|
||
298A278F000
|
heap
|
page read and write
|
||
1D254489000
|
heap
|
page read and write
|
||
C8D82F7000
|
stack
|
page read and write
|
||
2DA0000
|
remote allocation
|
page read and write
|
||
298A1EE4000
|
heap
|
page read and write
|
||
2D970841000
|
heap
|
page read and write
|
||
814000
|
heap
|
page read and write
|
||
298A2782000
|
heap
|
page read and write
|
||
2D970831000
|
heap
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
1D254500000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
8D4D000
|
heap
|
page read and write
|
||
24134D02000
|
heap
|
page read and write
|
||
298A278E000
|
heap
|
page read and write
|
||
2413A4F0000
|
remote allocation
|
page read and write
|
||
22FC4290000
|
heap
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
B989FD000
|
stack
|
page read and write
|
||
21BE000
|
stack
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
C9B3DFF000
|
stack
|
page read and write
|
||
298A279F000
|
heap
|
page read and write
|
||
1D2542A0000
|
heap
|
page read and write
|
||
298A24D0000
|
remote allocation
|
page read and write
|
||
298A278E000
|
heap
|
page read and write
|
||
14980290000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
2413B000000
|
heap
|
page read and write
|
||
241353F0000
|
trusted library allocation
|
page read and write
|
||
24135415000
|
heap
|
page read and write
|
||
149F0790000
|
unkown
|
page read and write
|
||
2D970845000
|
heap
|
page read and write
|
||
2413A30C000
|
heap
|
page read and write
|
||
862000
|
heap
|
page read and write
|
||
B9847E000
|
stack
|
page read and write
|
||
2D97087A000
|
heap
|
page read and write
|
||
2A20C192000
|
heap
|
page read and write
|
||
22420013000
|
heap
|
page read and write
|
||
2413A302000
|
heap
|
page read and write
|
||
298A2783000
|
heap
|
page read and write
|
||
22FC4605000
|
heap
|
page read and write
|
||
2A20C162000
|
heap
|
page read and write
|
||
353E000
|
heap
|
page read and write
|
||
14980000000
|
direct allocation
|
page execute and read and write
|
||
3F834FF000
|
stack
|
page read and write
|
||
298A278C000
|
heap
|
page read and write
|
||
2A20C4E5000
|
heap
|
page read and write
|
||
298A277E000
|
heap
|
page read and write
|
||
24134BF3000
|
trusted library allocation
|
page read and write
|
||
1E262677000
|
heap
|
page read and write
|
||
24135BE0000
|
trusted library allocation
|
page read and write
|
||
22FC42B0000
|
heap
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
180001000
|
unkown
|
page execute read
|
||
298A278A000
|
heap
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
15739970000
|
direct allocation
|
page read and write
|
||
2D0F6671000
|
heap
|
page read and write
|
||
2D97087D000
|
heap
|
page read and write
|
||
2000009F000
|
direct allocation
|
page readonly
|
||
CEE4D7B000
|
stack
|
page read and write
|
||
2413A302000
|
heap
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
298A2C03000
|
heap
|
page read and write
|
||
F826E7E000
|
stack
|
page read and write
|
||
2A785FE000
|
stack
|
page read and write
|
||
298A2777000
|
heap
|
page read and write
|
||
298A2786000
|
heap
|
page read and write
|
||
298A2786000
|
heap
|
page read and write
|
||
17603840000
|
heap
|
page read and write
|
||
1B1E97B0000
|
remote allocation
|
page read and write
|
||
222F000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
298A2785000
|
heap
|
page read and write
|
||
1800D5000
|
unkown
|
page readonly
|
||
298A2781000
|
heap
|
page read and write
|
||
FAA000
|
stack
|
page read and write
|
||
73E932B000
|
stack
|
page read and write
|
||
1A02B78E000
|
heap
|
page read and write
|
||
20000120000
|
heap
|
page read and write
|
||
149801F0000
|
remote allocation
|
page read and write
|
||
298A279A000
|
heap
|
page read and write
|
||
17603900000
|
heap
|
page read and write
|
||
1F39E920000
|
trusted library allocation
|
page read and write
|
||
D03FB5A000
|
stack
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
2D970849000
|
heap
|
page read and write
|
||
149F0960000
|
heap
|
page read and write
|
||
298A278E000
|
heap
|
page read and write
|
||
2A77FCB000
|
stack
|
page read and write
|
||
1321000
|
heap
|
page read and write
|
||
2D9705A0000
|
heap
|
page read and write
|
||
22420108000
|
heap
|
page read and write
|
||
2D97086F000
|
heap
|
page read and write
|
||
22FCBD19000
|
heap
|
page read and write
|
||
D04007C000
|
stack
|
page read and write
|
||
CEE57FF000
|
stack
|
page read and write
|
||
1800D5000
|
unkown
|
page readonly
|
||
22FC4605000
|
heap
|
page read and write
|
||
22420062000
|
heap
|
page read and write
|
||
1505000
|
heap
|
page read and write
|
||
298A2779000
|
heap
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
298A1EC7000
|
heap
|
page read and write
|
||
1F39DBFF000
|
heap
|
page read and write
|
||
2A20C171000
|
heap
|
page read and write
|
||
73E9BFD000
|
stack
|
page read and write
|
||
298A27AB000
|
heap
|
page read and write
|
||
15739B60000
|
heap
|
page read and write
|
||
22420081000
|
heap
|
page read and write
|
||
298A27A1000
|
heap
|
page read and write
|
||
1F39DBF4000
|
heap
|
page read and write
|
||
14980070000
|
direct allocation
|
page read and write
|
||
2D970857000
|
heap
|
page read and write
|
||
2007A1B0000
|
heap
|
page read and write
|
||
112C2FF000
|
stack
|
page read and write
|
||
20005F6D000
|
heap
|
page read and write
|
||
730000
|
remote allocation
|
page read and write
|
||
2D970800000
|
heap
|
page read and write
|
||
298A1E49000
|
heap
|
page read and write
|
||
24134C29000
|
heap
|
page read and write
|
||
149F0968000
|
heap
|
page read and write
|
||
2D970590000
|
heap
|
page read and write
|
||
298A2786000
|
heap
|
page read and write
|
||
329B000
|
stack
|
page read and write
|
||
1D254465000
|
heap
|
page read and write
|
||
14980000000
|
direct allocation
|
page execute and read and write
|
||
298A1E13000
|
heap
|
page read and write
|
||
B981EE000
|
stack
|
page read and write
|
||
298A274E000
|
heap
|
page read and write
|
||
298A1F16000
|
heap
|
page read and write
|
||
138D000
|
heap
|
page read and write
|
||
208E000
|
direct allocation
|
page read and write
|
||
3FA9BFE000
|
stack
|
page read and write
|
||
298A276E000
|
heap
|
page read and write
|
||
3F838FF000
|
stack
|
page read and write
|
||
1D4A7452000
|
heap
|
page read and write
|
||
208F000
|
direct allocation
|
page readonly
|
||
298A277E000
|
heap
|
page read and write
|
||
2D0F66E0000
|
heap
|
page read and write
|
||
2413A30A000
|
heap
|
page read and write
|
||
2A20C110000
|
heap
|
page read and write
|
||
1F39E8C0000
|
trusted library allocation
|
page read and write
|
||
298A2C03000
|
heap
|
page read and write
|
||
213E000
|
stack
|
page read and write
|
||
95D557E000
|
stack
|
page read and write
|
||
180070000
|
unkown
|
page read and write
|
||
1F39D950000
|
heap
|
page read and write
|
||
2A20C4E0000
|
heap
|
page read and write
|
||
2413A2BD000
|
heap
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
2D970879000
|
heap
|
page read and write
|
||
157399D0000
|
trusted library allocation
|
page read and write
|
||
2007A278000
|
heap
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
E73D6FC000
|
stack
|
page read and write
|
||
24136000000
|
trusted library allocation
|
page read and write
|
||
22FC5F70000
|
heap
|
page read and write
|
||
298A278E000
|
heap
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
2D970868000
|
heap
|
page read and write
|
||
2413A1D0000
|
trusted library allocation
|
page read and write
|
||
2A20C191000
|
heap
|
page read and write
|
||
B35000
|
heap
|
page read and write
|
||
24135513000
|
heap
|
page read and write
|
||
298A2C20000
|
heap
|
page read and write
|
||
351A000
|
heap
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
2242005A000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
1A029F6D000
|
direct allocation
|
page readonly
|
||
176037D0000
|
heap
|
page read and write
|
||
298A277B000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page readonly
|
||
22FC4300000
|
direct allocation
|
page execute and read and write
|
||
3542000
|
heap
|
page read and write
|
||
2413A300000
|
heap
|
page read and write
|
||
3FA98F8000
|
stack
|
page read and write
|
||
1573810A000
|
heap
|
page read and write
|
||
22FC5E70000
|
remote allocation
|
page read and write
|
||
298A1EAC000
|
heap
|
page read and write
|
||
2A789FE000
|
stack
|
page read and write
|
||
D9295BF000
|
stack
|
page read and write
|
||
298A2786000
|
heap
|
page read and write
|
||
298A277E000
|
heap
|
page read and write
|
||
1D25446D000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page readonly
|
||
1A02B840000
|
heap
|
page read and write
|
||
3F8337E000
|
stack
|
page read and write
|
||
F8268EB000
|
stack
|
page read and write
|
||
22FC459D000
|
direct allocation
|
page readonly
|
||
298A277D000
|
heap
|
page read and write
|
||
2413A4B0000
|
trusted library allocation
|
page read and write
|
||
2D97083A000
|
heap
|
page read and write
|
||
1573A070000
|
heap
|
page read and write
|
||
15738050000
|
direct allocation
|
page execute and read and write
|
||
2D97087E000
|
heap
|
page read and write
|
||
298A277B000
|
heap
|
page read and write
|
||
2000009D000
|
direct allocation
|
page readonly
|
||
24134B60000
|
trusted library allocation
|
page read and write
|
||
298A2786000
|
heap
|
page read and write
|
||
E73D97C000
|
stack
|
page read and write
|
||
B2F000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
298A277E000
|
heap
|
page read and write
|
||
868000
|
heap
|
page read and write
|
||
298A24D0000
|
remote allocation
|
page read and write
|
||
298A2778000
|
heap
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
298A2786000
|
heap
|
page read and write
|
||
149F0790000
|
unkown
|
page read and write
|
||
2DEF000
|
heap
|
page read and write
|
||
353E000
|
heap
|
page read and write
|
||
3551000
|
heap
|
page read and write
|
||
157380C0000
|
trusted library allocation
|
page read and write
|
||
298A2790000
|
heap
|
page read and write
|
||
2A20C171000
|
heap
|
page read and write
|
||
1D254513000
|
heap
|
page read and write
|
||
2413A2A7000
|
heap
|
page read and write
|
||
1D4A71C0000
|
heap
|
page read and write
|
||
C9B41FB000
|
stack
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
1F39DD80000
|
unclassified section
|
page read and write
|
||
1B1E9750000
|
heap
|
page read and write
|
||
2D0F6F12000
|
heap
|
page read and write
|
||
B18000
|
heap
|
page read and write
|
||
298A279A000
|
heap
|
page read and write
|
||
34E7000
|
heap
|
page read and write
|
||
CE872B000
|
stack
|
page read and write
|
||
1D4A7483000
|
heap
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
298A278E000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
298A1CB0000
|
heap
|
page read and write
|
||
1D254458000
|
heap
|
page read and write
|
||
D92953F000
|
stack
|
page read and write
|
||
2413A241000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
298A278B000
|
heap
|
page read and write
|
||
1D4A7488000
|
heap
|
page read and write
|
||
298A2729000
|
heap
|
page read and write
|
||
298A2786000
|
heap
|
page read and write
|
||
2D97085F000
|
heap
|
page read and write
|
||
E73DB7D000
|
stack
|
page read and write
|
||
770000
|
trusted library allocation
|
page read and write
|
||
1D4A7413000
|
heap
|
page read and write
|
||
24134C3D000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
1D4A7454000
|
heap
|
page read and write
|
||
298A277E000
|
heap
|
page read and write
|
||
22FC4310000
|
heap
|
page readonly
|
||
180000000
|
unkown
|
page readonly
|
||
298A2782000
|
heap
|
page read and write
|
||
149F0960000
|
heap
|
page read and write
|
||
1800D5000
|
unkown
|
page readonly
|
||
17603856000
|
heap
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
298A278D000
|
heap
|
page read and write
|
||
1E262669000
|
heap
|
page read and write
|
||
CE8C7B000
|
stack
|
page read and write
|
||
36AE000
|
heap
|
page read and write
|
||
B987F7000
|
stack
|
page read and write
|
||
2D0F6E02000
|
heap
|
page read and write
|
||
1D25445A000
|
heap
|
page read and write
|
||
298A2782000
|
heap
|
page read and write
|
||
1B1E9800000
|
heap
|
page read and write
|
||
298A2760000
|
heap
|
page read and write
|
||
1D4A71D0000
|
heap
|
page read and write
|
||
1800D5000
|
unkown
|
page readonly
|
||
2413A424000
|
trusted library allocation
|
page read and write
|
||
298A277C000
|
heap
|
page read and write
|
||
298A278E000
|
heap
|
page read and write
|
||
298A277A000
|
heap
|
page read and write
|
||
22FC4290000
|
heap
|
page read and write
|
||
2413A1C0000
|
trusted library allocation
|
page read and write
|
||
2A20C0F0000
|
heap
|
page read and write
|
||
17603F30000
|
trusted library allocation
|
page read and write
|
There are 1124 hidden memdumps, click here to show them.