Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Trojan.GenericKD.72873276.19236.26672.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Serbia Ice Hockey DB\Hokej.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Serbia Ice Hockey DB\Hokej.bak (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Serbia Ice Hockey DB\is-II59A.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Serbia Ice Hockey DB\is-M013U.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Serbia Ice Hockey DB\unins000.dat
|
InnoSetup Log Serbia Ice Hockey DB {14570A78-25CF-4C4B-86E4-D6DFFDA8C567}, version 0x418, 1725 bytes, 715575\37\user\37, C:\Program
Files (x86)\Serbia Ice Hockey D
|
dropped
|
||
C:\Program Files (x86)\Serbia Ice Hockey DB\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Serbia Ice Hockey DB.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Thu Jul 4 18:28:15 2024, mtime=Thu Jul 4 18:28:15 2024, atime=Sat Oct 9 21:27:46 2021, length=11867648, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Hokej.exe_ed8c2db47b15ea7944e86a01489d7427b20d989_2e3703da_cb4c3753-e089-4040-a9d0-f7d02581bc53\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA2EE.tmp.dmp
|
Mini DuMP crash report, 15 streams, Thu Jul 4 19:28:58 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA427.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA4F4.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-1DQS7.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-5F45V.tmp\SecuriteInfo.com.Trojan.GenericKD.72873276.19236.26672.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\Zapisnik_ONLine\LicenceSrpski.fr3
|
XML 1.0 document, Unicode text, UTF-8 text, with very long lines (437), with CRLF line terminators
|
dropped
|
||
C:\Users\user\Documents\Zapisnik_ONLine\libeay32.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\Zapisnik_ONLine\ssleay32.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
modified
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 8 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files (x86)\Serbia Ice Hockey DB\Hokej.exe
|
"C:\Program Files (x86)\Serbia Ice Hockey DB\Hokej.exe"
|
||
C:\Program Files (x86)\Serbia Ice Hockey DB\Hokej.exe
|
"C:\Program Files (x86)\Serbia Ice Hockey DB\Hokej.exe"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72873276.19236.26672.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72873276.19236.26672.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-5F45V.tmp\SecuriteInfo.com.Trojan.GenericKD.72873276.19236.26672.tmp
|
"C:\Users\user\AppData\Local\Temp\is-5F45V.tmp\SecuriteInfo.com.Trojan.GenericKD.72873276.19236.26672.tmp" /SL5="$20426,3939740,937984,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.72873276.19236.26672.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 1444
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.innosetup.com/
|
unknown
|
||
http://www.srbreferee.com/CheckNET.php
|
93.188.2.53
|
||
http://www.aiim.org/pdfa/ns/property#
|
unknown
|
||
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
http://www.fast-report.com
|
unknown
|
||
https://docs.nextcloud.com/server/latest/admin_manual/configuration_server/oauth2.html
|
unknown
|
||
http://srbija.livehockey.online
|
unknown
|
||
https://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-authenticating-requests.html
|
unknown
|
||
http://www.aiim.org/pdfa/ns/id/
|
unknown
|
||
http://www.openssl.org/V
|
unknown
|
||
http://srbija.livehockey.online/evaluation/index.php?SudijaID=
|
unknown
|
||
http://www.aiim.org/pdfa/ns/schema#
|
unknown
|
||
https://docs.nextcloud.com/server/latest/admin_manual/configuration_server/oauth2.htmltml
|
unknown
|
||
https://oauth.yandex.com/
|
unknown
|
||
http://www.aiim.org/pdfa/ns/extension/
|
unknown
|
||
http://kuwait.livehockey.online/evaluation/index.php?SudijaID=openU
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
||
http://www.remobjects.com/ps
|
unknown
|
||
http://www.url.com):
|
unknown
|
||
http://srbija.livehockey.online/OnlineRegistration/
|
unknown
|
||
http://fast-report.com)
|
unknown
|
||
https://oauth.yandex.com/03
|
unknown
|
||
http://srbija.livehockey.online/evaluation/i
|
unknown
|
There are 13 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ftpcluster.loopia.se
|
93.188.1.110
|
||
s682.loopia.se
|
93.188.1.8
|
||
www.srbreferee.com
|
93.188.2.53
|
||
s679.loopia.se
|
93.188.1.5
|
||
mysql679.loopia.se
|
unknown
|
||
mysql682.loopia.se
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
93.188.1.110
|
ftpcluster.loopia.se
|
Sweden
|
||
93.188.2.53
|
www.srbreferee.com
|
Sweden
|
||
93.188.1.8
|
s682.loopia.se
|
Sweden
|
||
93.188.1.5
|
s679.loopia.se
|
Sweden
|
||
79.101.0.33
|
unknown
|
Serbia
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
Inno Setup: Setup Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
Inno Setup: App Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
Inno Setup: Icon Group
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
Inno Setup: User
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
Inno Setup: Selected Tasks
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
Inno Setup: Deselected Tasks
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
Inno Setup: Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
MajorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
MinorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{14570A78-25CF-4C4B-86E4-D6DFFDA8C567}_is1
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SHLSDataBase
|
DBG1FSize
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
ProgramId
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
FileId
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
LowerCaseLongPath
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
LongPathHash
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
Name
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
OriginalFileName
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
Publisher
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
Version
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
BinFileVersion
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
BinaryType
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
ProductName
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
ProductVersion
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
LinkDate
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
BinProductVersion
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
AppxPackageFullName
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
Size
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
Language
|
||
\REGISTRY\A\{2bc6d700-2dae-25dc-c4bd-5b078b83a5be}\Root\InventoryApplicationFile\hokej.exe|9b46792fe9765c44
|
Usn
|
There are 36 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
9CF000
|
heap
|
page read and write
|
||
8810000
|
direct allocation
|
page read and write
|
||
6C62000
|
direct allocation
|
page read and write
|
||
7F90000
|
direct allocation
|
page read and write
|
||
A2F000
|
heap
|
page read and write
|
||
7F444000
|
direct allocation
|
page read and write
|
||
7EEF000
|
direct allocation
|
page read and write
|
||
2232000
|
heap
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
7F58D000
|
direct allocation
|
page read and write
|
||
8590000
|
direct allocation
|
page read and write
|
||
4735000
|
direct allocation
|
page read and write
|
||
3108000
|
direct allocation
|
page read and write
|
||
197F000
|
unkown
|
page read and write
|
||
7F4F9000
|
direct allocation
|
page read and write
|
||
3584000
|
direct allocation
|
page read and write
|
||
12EC000
|
heap
|
page read and write
|
||
38A5000
|
heap
|
page read and write
|
||
7230000
|
direct allocation
|
page read and write
|
||
6CD9000
|
direct allocation
|
page read and write
|
||
18BD000
|
unkown
|
page read and write
|
||
D66000
|
unkown
|
page read and write
|
||
63F8000
|
direct allocation
|
page read and write
|
||
1355000
|
heap
|
page read and write
|
||
1C0A000
|
unkown
|
page readonly
|
||
8838000
|
direct allocation
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
3DFD000
|
direct allocation
|
page read and write
|
||
3410000
|
direct allocation
|
page read and write
|
||
7F55A000
|
direct allocation
|
page read and write
|
||
2D28000
|
direct allocation
|
page read and write
|
||
86C1000
|
direct allocation
|
page read and write
|
||
38A1000
|
heap
|
page read and write
|
||
2378000
|
direct allocation
|
page read and write
|
||
18D6000
|
unkown
|
page read and write
|
||
BAF000
|
stack
|
page read and write
|
||
7F400000
|
direct allocation
|
page read and write
|
||
18D3000
|
unkown
|
page read and write
|
||
8CB0000
|
direct allocation
|
page read and write
|
||
7F49D000
|
direct allocation
|
page read and write
|
||
30DA000
|
direct allocation
|
page read and write
|
||
357A000
|
direct allocation
|
page read and write
|
||
18CC000
|
unkown
|
page read and write
|
||
7F589000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7F59F000
|
direct allocation
|
page read and write
|
||
22BA000
|
direct allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
84AD000
|
heap
|
page read and write
|
||
4731000
|
direct allocation
|
page read and write
|
||
1973000
|
unkown
|
page read and write
|
||
7F553000
|
direct allocation
|
page read and write
|
||
38FC000
|
heap
|
page read and write
|
||
2412000
|
direct allocation
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
7190000
|
direct allocation
|
page read and write
|
||
A29000
|
heap
|
page read and write
|
||
7F13B000
|
direct allocation
|
page read and write
|
||
7240000
|
direct allocation
|
page read and write
|
||
1337000
|
heap
|
page read and write
|
||
7F407000
|
direct allocation
|
page read and write
|
||
7F4A4000
|
direct allocation
|
page read and write
|
||
12F4000
|
heap
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
4390000
|
direct allocation
|
page read and write
|
||
1378000
|
heap
|
page read and write
|
||
7F198000
|
direct allocation
|
page read and write
|
||
38A1000
|
trusted library allocation
|
page read and write
|
||
3689000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
12D1000
|
heap
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
1C5A000
|
unkown
|
page readonly
|
||
134B000
|
heap
|
page read and write
|
||
6D4E000
|
trusted library allocation
|
page read and write
|
||
D85000
|
unkown
|
page readonly
|
||
6C83000
|
direct allocation
|
page read and write
|
||
24D8000
|
direct allocation
|
page read and write
|
||
222B000
|
heap
|
page read and write
|
||
21F5000
|
heap
|
page read and write
|
||
38F8000
|
heap
|
page read and write
|
||
2279000
|
direct allocation
|
page read and write
|
||
138B000
|
heap
|
page read and write
|
||
7F26000
|
direct allocation
|
page read and write
|
||
3420000
|
direct allocation
|
page read and write
|
||
9B8000
|
heap
|
page read and write
|
||
70E8000
|
direct allocation
|
page read and write
|
||
6BA9000
|
direct allocation
|
page read and write
|
||
C39000
|
heap
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
6AC0000
|
direct allocation
|
page read and write
|
||
135A000
|
heap
|
page read and write
|
||
D83000
|
unkown
|
page readonly
|
||
22B2000
|
direct allocation
|
page read and write
|
||
63FC000
|
direct allocation
|
page read and write
|
||
D61000
|
unkown
|
page read and write
|
||
8F80000
|
direct allocation
|
page read and write
|
||
1C6A000
|
unkown
|
page readonly
|
||
63CD000
|
direct allocation
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
DD1000
|
unkown
|
page execute read
|
||
7F48A000
|
direct allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
7262000
|
direct allocation
|
page read and write
|
||
D7B000
|
unkown
|
page read and write
|
||
3650000
|
heap
|
page read and write
|
||
21F9000
|
heap
|
page read and write
|
||
137C000
|
heap
|
page read and write
|
||
1C60000
|
unkown
|
page readonly
|
||
72E9000
|
direct allocation
|
page read and write
|
||
4B9000
|
unkown
|
page read and write
|
||
1363000
|
heap
|
page read and write
|
||
7F3DE000
|
direct allocation
|
page read and write
|
||
192D000
|
unkown
|
page read and write
|
||
1378000
|
heap
|
page read and write
|
||
3E2D000
|
direct allocation
|
page read and write
|
||
12FC000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
2363000
|
direct allocation
|
page read and write
|
||
451B000
|
stack
|
page read and write
|
||
226B000
|
heap
|
page read and write
|
||
7F4E1000
|
direct allocation
|
page read and write
|
||
65C7000
|
direct allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
77E0000
|
direct allocation
|
page read and write
|
||
1351000
|
heap
|
page read and write
|
||
7F1DA000
|
direct allocation
|
page read and write
|
||
3035000
|
direct allocation
|
page read and write
|
||
4B7000
|
unkown
|
page read and write
|
||
2260000
|
heap
|
page read and write
|
||
6A60000
|
direct allocation
|
page read and write
|
||
D7D000
|
unkown
|
page write copy
|
||
9355000
|
direct allocation
|
page read and write
|
||
38D4000
|
heap
|
page read and write
|
||
12EA000
|
heap
|
page read and write
|
||
4729000
|
direct allocation
|
page read and write
|
||
130F000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
9CA000
|
heap
|
page read and write
|
||
6345000
|
direct allocation
|
page read and write
|
||
8855000
|
direct allocation
|
page read and write
|
||
2419000
|
direct allocation
|
page read and write
|
||
2371000
|
direct allocation
|
page read and write
|
||
917F000
|
direct allocation
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
7220000
|
direct allocation
|
page read and write
|
||
633F000
|
direct allocation
|
page read and write
|
||
7F41C000
|
direct allocation
|
page read and write
|
||
7F17B000
|
direct allocation
|
page read and write
|
||
4488000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1362000
|
heap
|
page read and write
|
||
1977000
|
unkown
|
page read and write
|
||
313C000
|
direct allocation
|
page read and write
|
||
135D000
|
heap
|
page read and write
|
||
1316000
|
heap
|
page read and write
|
||
12CC000
|
heap
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
41D000
|
unkown
|
page execute read
|
||
A17000
|
heap
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
7F18A000
|
direct allocation
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
8BE6000
|
direct allocation
|
page read and write
|
||
21CE000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
7F476000
|
direct allocation
|
page read and write
|
||
2301000
|
direct allocation
|
page read and write
|
||
7F154000
|
direct allocation
|
page read and write
|
||
242E000
|
direct allocation
|
page read and write
|
||
A02000
|
heap
|
page read and write
|
||
7F3F1000
|
direct allocation
|
page read and write
|
||
635E000
|
direct allocation
|
page read and write
|
||
7F4FE000
|
direct allocation
|
page read and write
|
||
4590000
|
heap
|
page read and write
|
||
5E89000
|
direct allocation
|
page read and write
|
||
661E000
|
direct allocation
|
page read and write
|
||
4293000
|
heap
|
page read and write
|
||
132F000
|
heap
|
page read and write
|
||
7F403000
|
direct allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
1336000
|
heap
|
page read and write
|
||
7DF0000
|
direct allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
EF9000
|
unkown
|
page readonly
|
||
9FF000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
65F000
|
unkown
|
page read and write
|
||
4ABF000
|
stack
|
page read and write
|
||
7F157000
|
direct allocation
|
page read and write
|
||
2354000
|
direct allocation
|
page read and write
|
||
134B000
|
heap
|
page read and write
|
||
5EFE000
|
direct allocation
|
page read and write
|
||
2470000
|
direct allocation
|
page read and write
|
||
38C5000
|
heap
|
page read and write
|
||
4250000
|
direct allocation
|
page execute and read and write
|
||
277A000
|
heap
|
page read and write
|
||
7F4D6000
|
direct allocation
|
page read and write
|
||
7F4EF000
|
direct allocation
|
page read and write
|
||
2775000
|
heap
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
63DC000
|
direct allocation
|
page read and write
|
||
2311000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7F1A6000
|
direct allocation
|
page read and write
|
||
195E000
|
unkown
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
7F599000
|
direct allocation
|
page read and write
|
||
9ED000
|
heap
|
page read and write
|
||
49BE000
|
stack
|
page read and write
|
||
3B1F000
|
stack
|
page read and write
|
||
7F46F000
|
direct allocation
|
page read and write
|
||
681C000
|
direct allocation
|
page read and write
|
||
65D000
|
unkown
|
page write copy
|
||
5F1D000
|
direct allocation
|
page read and write
|
||
1316000
|
heap
|
page read and write
|
||
5E7F000
|
direct allocation
|
page read and write
|
||
3D90000
|
direct allocation
|
page read and write
|
||
4C4000
|
unkown
|
page readonly
|
||
4BFF000
|
stack
|
page read and write
|
||
3A1E000
|
stack
|
page read and write
|
||
9E1000
|
heap
|
page read and write
|
||
23E9000
|
direct allocation
|
page read and write
|
||
D42000
|
unkown
|
page write copy
|
||
1345000
|
heap
|
page read and write
|
||
196D000
|
unkown
|
page read and write
|
||
8899000
|
direct allocation
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
DD0000
|
unkown
|
page readonly
|
||
222B000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
132D000
|
heap
|
page read and write
|
||
1342000
|
heap
|
page read and write
|
||
5EEF000
|
direct allocation
|
page read and write
|
||
8067000
|
direct allocation
|
page read and write
|
||
4C50000
|
trusted library section
|
page read and write
|
||
4290000
|
heap
|
page read and write
|
||
3651000
|
heap
|
page read and write
|
||
38C2000
|
heap
|
page read and write
|
||
1341000
|
heap
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
197A000
|
unkown
|
page write copy
|
||
130F000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
6CE9000
|
direct allocation
|
page read and write
|
||
17D1000
|
unkown
|
page execute read
|
||
1363000
|
heap
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
1361000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
7F56E000
|
direct allocation
|
page read and write
|
||
135C000
|
heap
|
page read and write
|
||
22C8000
|
direct allocation
|
page read and write
|
||
658F000
|
direct allocation
|
page read and write
|
||
1341000
|
heap
|
page read and write
|
||
8490000
|
heap
|
page read and write
|
||
70F6000
|
direct allocation
|
page read and write
|
||
7F455000
|
direct allocation
|
page read and write
|
||
8E40000
|
direct allocation
|
page read and write
|
||
7F1C6000
|
direct allocation
|
page read and write
|
||
7F557000
|
direct allocation
|
page read and write
|
||
1347000
|
heap
|
page read and write
|
||
9DF000
|
heap
|
page read and write
|
||
24C1000
|
direct allocation
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
314C000
|
direct allocation
|
page read and write
|
||
7F4E8000
|
direct allocation
|
page read and write
|
||
9D7000
|
heap
|
page read and write
|
||
2227000
|
heap
|
page read and write
|
||
5F7A000
|
direct allocation
|
page read and write
|
||
2309000
|
direct allocation
|
page read and write
|
||
7F520000
|
direct allocation
|
page read and write
|
||
8350000
|
direct allocation
|
page read and write
|
||
7F577000
|
direct allocation
|
page read and write
|
||
24BA000
|
direct allocation
|
page read and write
|
||
D44000
|
unkown
|
page read and write
|
||
7F040000
|
direct allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
7F563000
|
direct allocation
|
page read and write
|
||
35AC000
|
stack
|
page read and write
|
||
2165000
|
heap
|
page read and write
|
||
9D4000
|
heap
|
page read and write
|
||
3850000
|
direct allocation
|
page read and write
|
||
809D000
|
direct allocation
|
page read and write
|
||
7F56A000
|
direct allocation
|
page read and write
|
||
12C8000
|
heap
|
page read and write
|
||
3750000
|
heap
|
page read and write
|
||
2458000
|
direct allocation
|
page read and write
|
||
137B000
|
heap
|
page read and write
|
||
72FD000
|
direct allocation
|
page read and write
|
||
7F3F7000
|
direct allocation
|
page read and write
|
||
45C0000
|
heap
|
page read and write
|
||
4230000
|
heap
|
page read and write
|
||
3900000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
7F594000
|
direct allocation
|
page read and write
|
||
7F3E8000
|
direct allocation
|
page read and write
|
||
5DEF000
|
stack
|
page read and write
|
||
7F1CB000
|
direct allocation
|
page read and write
|
||
18DB000
|
unkown
|
page read and write
|
||
6363000
|
direct allocation
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
7F582000
|
direct allocation
|
page read and write
|
||
4723000
|
direct allocation
|
page read and write
|
||
10EE000
|
stack
|
page read and write
|
||
5E20000
|
direct allocation
|
page execute and read and write
|
||
2219000
|
heap
|
page read and write
|
||
130A000
|
heap
|
page read and write
|
||
7F1D3000
|
direct allocation
|
page read and write
|
||
65C0000
|
direct allocation
|
page read and write
|
||
2261000
|
direct allocation
|
page read and write
|
||
23E0000
|
direct allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
1331000
|
heap
|
page read and write
|
||
38BE000
|
heap
|
page read and write
|
||
25C0000
|
direct allocation
|
page read and write
|
||
7F585000
|
direct allocation
|
page read and write
|
||
38C5000
|
heap
|
page read and write
|
||
47C7000
|
direct allocation
|
page read and write
|
||
1345000
|
heap
|
page read and write
|
||
8160000
|
direct allocation
|
page read and write
|
||
6840000
|
direct allocation
|
page read and write
|
||
4733000
|
direct allocation
|
page read and write
|
||
70D9000
|
direct allocation
|
page read and write
|
||
7F15B000
|
direct allocation
|
page read and write
|
||
38E1000
|
heap
|
page read and write
|
||
2C30000
|
direct allocation
|
page read and write
|
||
2436000
|
direct allocation
|
page read and write
|
||
6A78000
|
direct allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
9319000
|
direct allocation
|
page read and write
|
||
7F3D4000
|
direct allocation
|
page read and write
|
||
6C8F000
|
direct allocation
|
page read and write
|
||
6480000
|
direct allocation
|
page read and write
|
||
7F57C000
|
direct allocation
|
page read and write
|
||
46CD000
|
stack
|
page read and write
|
||
22AB000
|
direct allocation
|
page read and write
|
||
12F2000
|
heap
|
page read and write
|
||
7F3DA000
|
direct allocation
|
page read and write
|
||
194D000
|
unkown
|
page read and write
|
||
7EEB000
|
direct allocation
|
page read and write
|
||
1DBC000
|
stack
|
page read and write
|
||
7822000
|
direct allocation
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
880000
|
direct allocation
|
page execute and read and write
|
||
7F487000
|
direct allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
2338000
|
direct allocation
|
page read and write
|
||
3E54000
|
direct allocation
|
page read and write
|
||
9E5000
|
heap
|
page read and write
|
||
24ED000
|
direct allocation
|
page read and write
|
||
8A6000
|
heap
|
page read and write
|
||
22DF000
|
direct allocation
|
page read and write
|
||
471A000
|
direct allocation
|
page read and write
|
||
6BC6000
|
direct allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
2C9D000
|
direct allocation
|
page read and write
|
||
138E000
|
heap
|
page read and write
|
||
7259000
|
direct allocation
|
page read and write
|
||
70E0000
|
direct allocation
|
page read and write
|
||
63DF000
|
direct allocation
|
page read and write
|
||
A04000
|
heap
|
page read and write
|
||
2287000
|
direct allocation
|
page read and write
|
||
18BB000
|
unkown
|
page read and write
|
||
7F3E4000
|
direct allocation
|
page read and write
|
||
90F0000
|
direct allocation
|
page read and write
|
||
1302000
|
heap
|
page read and write
|
||
6320000
|
direct allocation
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
3900000
|
heap
|
page read and write
|
||
849F000
|
heap
|
page read and write
|
||
487E000
|
stack
|
page read and write
|
||
2503000
|
direct allocation
|
page read and write
|
||
7F3D0000
|
direct allocation
|
page read and write
|
||
5EF7000
|
direct allocation
|
page read and write
|
||
8A78000
|
direct allocation
|
page read and write
|
||
20F7000
|
stack
|
page read and write
|
||
84A6000
|
heap
|
page read and write
|
||
87C0000
|
direct allocation
|
page read and write
|
||
D49000
|
unkown
|
page read and write
|
||
132E000
|
heap
|
page read and write
|
||
1319000
|
heap
|
page read and write
|
||
472D000
|
direct allocation
|
page read and write
|
||
2483000
|
direct allocation
|
page read and write
|
||
6040000
|
trusted library allocation
|
page read and write
|
||
892C000
|
direct allocation
|
page read and write
|
||
7F47E000
|
direct allocation
|
page read and write
|
||
7A40000
|
direct allocation
|
page execute and read and write
|
||
22ED000
|
direct allocation
|
page read and write
|
||
191C000
|
unkown
|
page read and write
|
||
2346000
|
direct allocation
|
page read and write
|
||
67A6000
|
direct allocation
|
page read and write
|
||
38FC000
|
heap
|
page read and write
|
||
368D000
|
heap
|
page read and write
|
||
9174000
|
direct allocation
|
page read and write
|
||
8C5C000
|
direct allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
4C6000
|
unkown
|
page readonly
|
||
1333000
|
heap
|
page read and write
|
||
4409000
|
direct allocation
|
page read and write
|
||
20EF000
|
stack
|
page read and write
|
||
F50000
|
unkown
|
page readonly
|
||
A10000
|
heap
|
page read and write
|
||
4B7000
|
unkown
|
page write copy
|
||
135D000
|
heap
|
page read and write
|
||
2486000
|
direct allocation
|
page read and write
|
||
7F48E000
|
direct allocation
|
page read and write
|
||
5CEE000
|
stack
|
page read and write
|
||
1389000
|
heap
|
page read and write
|
||
2160000
|
heap
|
page read and write
|
||
78C8000
|
direct allocation
|
page read and write
|
||
355A000
|
direct allocation
|
page read and write
|
||
A1D000
|
heap
|
page read and write
|
||
193C000
|
unkown
|
page read and write
|
||
8210000
|
direct allocation
|
page read and write
|
||
62F0000
|
direct allocation
|
page read and write
|
||
12E1000
|
heap
|
page read and write
|
||
70FD000
|
direct allocation
|
page read and write
|
||
7F4CD000
|
direct allocation
|
page read and write
|
||
7F3EE000
|
direct allocation
|
page read and write
|
||
135C000
|
heap
|
page read and write
|
||
7F405000
|
direct allocation
|
page read and write
|
||
236A000
|
direct allocation
|
page read and write
|
||
8B60000
|
direct allocation
|
page read and write
|
||
78EB000
|
direct allocation
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
18F000
|
stack
|
page read and write
|
||
138E000
|
heap
|
page read and write
|
||
72D9000
|
direct allocation
|
page read and write
|
||
93000
|
stack
|
page read and write
|
||
8E53000
|
direct allocation
|
page read and write
|
||
315B000
|
direct allocation
|
page read and write
|
||
6360000
|
direct allocation
|
page read and write
|
||
9EC000
|
heap
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
1C54000
|
unkown
|
page readonly
|
||
1D2A000
|
unkown
|
page readonly
|
||
234D000
|
direct allocation
|
page read and write
|
||
66B000
|
unkown
|
page write copy
|
||
3120000
|
direct allocation
|
page read and write
|
||
1303000
|
heap
|
page read and write
|
||
634E000
|
direct allocation
|
page read and write
|
||
1270000
|
direct allocation
|
page execute and read and write
|
||
7260000
|
direct allocation
|
page read and write
|
||
134F000
|
heap
|
page read and write
|
||
3E0C000
|
direct allocation
|
page read and write
|
||
7F473000
|
direct allocation
|
page read and write
|
||
7237000
|
direct allocation
|
page read and write
|
||
1345000
|
heap
|
page read and write
|
||
12E1000
|
heap
|
page read and write
|
||
21FA000
|
heap
|
page read and write
|
||
24B2000
|
direct allocation
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
A0A000
|
heap
|
page read and write
|
||
4478000
|
direct allocation
|
page read and write
|
||
5F56000
|
direct allocation
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
1361000
|
heap
|
page read and write
|
||
A34000
|
heap
|
page read and write
|
||
2CC5000
|
direct allocation
|
page read and write
|
||
4499000
|
direct allocation
|
page read and write
|
||
7F432000
|
direct allocation
|
page read and write
|
||
6C00000
|
direct allocation
|
page read and write
|
||
D51000
|
unkown
|
page read and write
|
||
59EF000
|
stack
|
page read and write
|
||
5A60000
|
direct allocation
|
page execute and read and write
|
||
38C7000
|
heap
|
page read and write
|
||
389D000
|
stack
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
134F000
|
heap
|
page read and write
|
||
7F47C000
|
direct allocation
|
page read and write
|
||
1335000
|
heap
|
page read and write
|
||
D56000
|
unkown
|
page read and write
|
||
18BB000
|
unkown
|
page write copy
|
||
24DF000
|
direct allocation
|
page read and write
|
||
1323000
|
heap
|
page read and write
|
||
6350000
|
direct allocation
|
page read and write
|
||
7F508000
|
direct allocation
|
page read and write
|
||
25C0000
|
direct allocation
|
page read and write
|
||
1358000
|
heap
|
page read and write
|
||
7F1E2000
|
direct allocation
|
page read and write
|
||
5E99000
|
direct allocation
|
page read and write
|
||
786F000
|
direct allocation
|
page read and write
|
||
22C1000
|
direct allocation
|
page read and write
|
||
22E6000
|
direct allocation
|
page read and write
|
||
849D000
|
heap
|
page read and write
|
||
2494000
|
direct allocation
|
page read and write
|
||
12CB000
|
heap
|
page read and write
|
||
2296000
|
direct allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
21BB000
|
heap
|
page read and write
|
||
8BDF000
|
direct allocation
|
page read and write
|
||
58AE000
|
stack
|
page read and write
|
||
243D000
|
direct allocation
|
page read and write
|
||
5F15000
|
direct allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
2CAD000
|
direct allocation
|
page read and write
|
||
78F0000
|
direct allocation
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
24FC000
|
direct allocation
|
page read and write
|
||
86D0000
|
direct allocation
|
page read and write
|
||
8E78000
|
direct allocation
|
page read and write
|
||
6980000
|
direct allocation
|
page read and write
|
||
5F0E000
|
direct allocation
|
page read and write
|
||
9D1000
|
heap
|
page read and write
|
||
18D000
|
stack
|
page read and write
|
||
93000
|
stack
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
24F4000
|
direct allocation
|
page read and write
|
||
2120000
|
heap
|
page read and write
|
||
9290000
|
direct allocation
|
page read and write
|
||
7F188000
|
direct allocation
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
22CF000
|
direct allocation
|
page read and write
|
||
6552000
|
direct allocation
|
page read and write
|
||
1378000
|
heap
|
page read and write
|
||
1988000
|
unkown
|
page readonly
|
||
6938000
|
direct allocation
|
page read and write
|
||
5E87000
|
direct allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
7F19F000
|
direct allocation
|
page read and write
|
||
2427000
|
direct allocation
|
page read and write
|
||
1352000
|
heap
|
page read and write
|
||
7F1B5000
|
direct allocation
|
page read and write
|
||
132E000
|
heap
|
page read and write
|
||
12EB000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
72C1000
|
direct allocation
|
page read and write
|
||
472F000
|
direct allocation
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
1354000
|
heap
|
page read and write
|
||
7104000
|
direct allocation
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
7C80000
|
heap
|
page read and write
|
||
2180000
|
heap
|
page read and write
|
||
7F55E000
|
direct allocation
|
page read and write
|
||
81E000
|
stack
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
3410000
|
direct allocation
|
page read and write
|
||
4772000
|
direct allocation
|
page read and write
|
||
6411000
|
direct allocation
|
page read and write
|
||
918C000
|
direct allocation
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
2227000
|
heap
|
page read and write
|
||
1958000
|
unkown
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
A26000
|
heap
|
page read and write
|
||
84AA000
|
heap
|
page read and write
|
||
12C4000
|
heap
|
page read and write
|
||
12DE000
|
heap
|
page read and write
|
||
9F9000
|
heap
|
page read and write
|
||
2444000
|
direct allocation
|
page read and write
|
||
1306000
|
heap
|
page read and write
|
||
1378000
|
heap
|
page read and write
|
||
668000
|
unkown
|
page read and write
|
||
22D8000
|
direct allocation
|
page read and write
|
||
30CE000
|
direct allocation
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
1328000
|
heap
|
page read and write
|
||
38F3000
|
heap
|
page read and write
|
||
6700000
|
direct allocation
|
page read and write
|
||
7F440000
|
direct allocation
|
page read and write
|
||
2518000
|
direct allocation
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
9D9000
|
heap
|
page read and write
|
||
D42000
|
unkown
|
page read and write
|
||
7F4E5000
|
direct allocation
|
page read and write
|
||
250A000
|
direct allocation
|
page read and write
|
||
22FA000
|
direct allocation
|
page read and write
|
||
1378000
|
heap
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
5F05000
|
direct allocation
|
page read and write
|
||
7856000
|
direct allocation
|
page read and write
|
||
632F000
|
direct allocation
|
page read and write
|
||
1358000
|
heap
|
page read and write
|
||
148F000
|
stack
|
page read and write
|
||
244B000
|
direct allocation
|
page read and write
|
||
1329000
|
heap
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
7F49B000
|
direct allocation
|
page read and write
|
||
628000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
5F98000
|
direct allocation
|
page read and write
|
||
233F000
|
direct allocation
|
page read and write
|
||
7F572000
|
direct allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
672000
|
unkown
|
page readonly
|
||
7FBB0000
|
direct allocation
|
page read and write
|
||
576F000
|
stack
|
page read and write
|
||
2420000
|
direct allocation
|
page read and write
|
||
3E6B000
|
direct allocation
|
page read and write
|
||
7197000
|
direct allocation
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
1962000
|
unkown
|
page read and write
|
||
2328000
|
direct allocation
|
page read and write
|
||
229D000
|
direct allocation
|
page read and write
|
||
497F000
|
stack
|
page read and write
|
||
A82000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
235C000
|
direct allocation
|
page read and write
|
||
67CA000
|
direct allocation
|
page read and write
|
||
38C3000
|
heap
|
page read and write
|
||
248D000
|
direct allocation
|
page read and write
|
||
72BD000
|
direct allocation
|
page read and write
|
||
7F1AE000
|
direct allocation
|
page read and write
|
||
2321000
|
direct allocation
|
page read and write
|
||
84FB000
|
heap
|
page read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
38D5000
|
heap
|
page read and write
|
||
43FA000
|
direct allocation
|
page read and write
|
||
23F2000
|
direct allocation
|
page read and write
|
||
8231000
|
direct allocation
|
page read and write
|
||
114A000
|
heap
|
page read and write
|
||
12D8000
|
heap
|
page read and write
|
||
1986000
|
unkown
|
page readonly
|
||
5FA0000
|
heap
|
page read and write
|
||
A0A000
|
heap
|
page read and write
|
||
38D8000
|
heap
|
page read and write
|
||
3020000
|
direct allocation
|
page read and write
|
||
38AB000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7F483000
|
direct allocation
|
page read and write
|
||
2477000
|
direct allocation
|
page read and write
|
||
38A3000
|
heap
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
1145000
|
heap
|
page read and write
|
||
12EB000
|
heap
|
page read and write
|
||
472B000
|
direct allocation
|
page read and write
|
||
1302000
|
heap
|
page read and write
|
||
7DC0000
|
direct allocation
|
page execute and read and write
|
||
30D7000
|
direct allocation
|
page read and write
|
||
2188000
|
heap
|
page read and write
|
||
5FC0000
|
trusted library allocation
|
page read and write
|
||
8255000
|
direct allocation
|
page read and write
|
||
1C4E000
|
unkown
|
page readonly
|
||
134A000
|
heap
|
page read and write
|
||
7F409000
|
direct allocation
|
page read and write
|
||
7F43C000
|
direct allocation
|
page read and write
|
||
1345000
|
heap
|
page read and write
|
||
231A000
|
direct allocation
|
page read and write
|
||
24E6000
|
direct allocation
|
page read and write
|
||
7F190000
|
direct allocation
|
page read and write
|
||
7F13D000
|
direct allocation
|
page read and write
|
||
2D0A000
|
direct allocation
|
page read and write
|
||
C35000
|
heap
|
page read and write
|
||
18E0000
|
unkown
|
page read and write
|
||
38CD000
|
heap
|
page read and write
|
||
5E92000
|
direct allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
38A8000
|
heap
|
page read and write
|
||
72A3000
|
direct allocation
|
page read and write
|
||
18D0000
|
unkown
|
page read and write
|
||
21F4000
|
heap
|
page read and write
|
||
70C9000
|
direct allocation
|
page read and write
|
||
24AB000
|
direct allocation
|
page read and write
|
||
7F42F000
|
direct allocation
|
page read and write
|
||
18F6000
|
unkown
|
page read and write
|
||
1324000
|
heap
|
page read and write
|
||
135D000
|
heap
|
page read and write
|
||
70C0000
|
direct allocation
|
page read and write
|
||
A04000
|
heap
|
page read and write
|
||
4220000
|
heap
|
page read and write
|
||
7580000
|
heap
|
page read and write
|
||
38EF000
|
heap
|
page read and write
|
||
134B000
|
heap
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
8A7000
|
heap
|
page read and write
|
||
228E000
|
direct allocation
|
page read and write
|
||
2511000
|
direct allocation
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
38F2000
|
heap
|
page read and write
|
||
8D40000
|
direct allocation
|
page read and write
|
||
6D0D000
|
direct allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
1C49000
|
unkown
|
page readonly
|
||
21F7000
|
heap
|
page read and write
|
||
7F560000
|
direct allocation
|
page read and write
|
||
1298000
|
heap
|
page read and write
|
||
A1E000
|
heap
|
page read and write
|
||
A1F000
|
heap
|
page read and write
|
||
4C2000
|
unkown
|
page write copy
|
||
132E000
|
heap
|
page read and write
|
||
84A4000
|
heap
|
page read and write
|
||
7F417000
|
direct allocation
|
page read and write
|
||
5EA8000
|
direct allocation
|
page read and write
|
||
1361000
|
heap
|
page read and write
|
||
A23000
|
heap
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
7F3E2000
|
direct allocation
|
page read and write
|
||
1335000
|
heap
|
page read and write
|
||
2231000
|
heap
|
page read and write
|
||
245F000
|
direct allocation
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
22A4000
|
direct allocation
|
page read and write
|
||
C23000
|
heap
|
page read and write
|
||
787C000
|
direct allocation
|
page read and write
|
||
7F4F3000
|
direct allocation
|
page read and write
|
||
2CF4000
|
direct allocation
|
page read and write
|
||
7F175000
|
direct allocation
|
page read and write
|
||
137D000
|
heap
|
page read and write
|
||
3525000
|
direct allocation
|
page read and write
|
||
7F4CA000
|
direct allocation
|
page read and write
|
||
1353000
|
heap
|
page read and write
|
||
12C4000
|
heap
|
page read and write
|
||
655B000
|
direct allocation
|
page read and write
|
||
368C000
|
heap
|
page read and write
|
||
7F3FA000
|
direct allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
18C4000
|
unkown
|
page read and write
|
||
6450000
|
direct allocation
|
page read and write
|
||
644B000
|
direct allocation
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
4725000
|
direct allocation
|
page read and write
|
||
2468000
|
direct allocation
|
page read and write
|
||
72DC000
|
direct allocation
|
page read and write
|
||
D5B000
|
unkown
|
page read and write
|
||
1321000
|
heap
|
page read and write
|
||
130F000
|
heap
|
page read and write
|
||
A82000
|
heap
|
page read and write
|
||
138E000
|
heap
|
page read and write
|
||
21EA000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
7F4DC000
|
direct allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
1347000
|
heap
|
page read and write
|
||
12EC000
|
heap
|
page read and write
|
||
66D3000
|
direct allocation
|
page read and write
|
||
2280000
|
direct allocation
|
page read and write
|
||
915F000
|
direct allocation
|
page read and write
|
||
6920000
|
direct allocation
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
38BD000
|
heap
|
page read and write
|
||
9178000
|
direct allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
38D3000
|
heap
|
page read and write
|
||
7189000
|
direct allocation
|
page read and write
|
||
1938000
|
unkown
|
page read and write
|
||
249C000
|
direct allocation
|
page read and write
|
||
240A000
|
direct allocation
|
page read and write
|
||
4727000
|
direct allocation
|
page read and write
|
||
2130000
|
heap
|
page read and write
|
||
7F180000
|
direct allocation
|
page read and write
|
||
640B000
|
direct allocation
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
63E3000
|
direct allocation
|
page read and write
|
||
4737000
|
direct allocation
|
page read and write
|
||
66EA000
|
direct allocation
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
A06000
|
heap
|
page read and write
|
||
91D9000
|
direct allocation
|
page read and write
|
||
65D000
|
unkown
|
page read and write
|
||
6B92000
|
direct allocation
|
page read and write
|
||
303B000
|
direct allocation
|
page read and write
|
||
24C8000
|
direct allocation
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
7F566000
|
direct allocation
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
7F4C0000
|
direct allocation
|
page read and write
|
||
1339000
|
heap
|
page read and write
|
||
A26000
|
heap
|
page read and write
|
||
8CDE000
|
direct allocation
|
page read and write
|
||
8960000
|
direct allocation
|
page read and write
|
||
4DBF000
|
stack
|
page read and write
|
||
2C7A000
|
direct allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
659E000
|
direct allocation
|
page read and write
|
There are 771 hidden memdumps, click here to show them.