Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\Desktop\cabal.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\update.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\down[1]
|
PNG image data, 15 x 15, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\errorPageStrings[1]
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HI1BCF07\background_gradient[1]
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HI1BCF07\httpErrorPagesScripts[1]
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\ErrorPageTemplate[1]
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\bullet[1]
|
PNG image data, 15 x 15, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\http_404_webOC[1]
|
HTML document, Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\info_48[1]
|
PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\resources.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\SevenZipSharp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\System.Windows.Interactivity.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\main.dat
|
data
|
dropped
|
||
C:\Users\user\Desktop\mainEX.dat
|
data
|
dropped
|
There are 7 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\Desktop\update.exe
|
"C:\Users\user\Desktop\update.exe" mmoparadox
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://foo/MainWindow.xamld
|
unknown
|
||
http://foo/bar/resources/fonts/segoewp-bold.ttf
|
unknown
|
||
http://194.233.88.151/ep33//web/kmnkNIANBDUIbudbnIA.php?t=28/09/2024%2019:01:53B&
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/segoewp-bold.ttfd
|
unknown
|
||
http://foo/Resources/Fonts/segoewpn-black.ttf
|
unknown
|
||
http://defaultcontainer/update;component/classes/webbrowseroverlaywf/webbrowseroverlay.xamld
|
unknown
|
||
http://defaultcontainer/update;component/classes/webbrowseroverlaywf/webbrowseroverlay.xaml
|
unknown
|
||
http://194.233.88.151/ep33//client/7z.dll
|
unknown
|
||
http://foo/bar/resources/fonts/segoewpn-bold.ttfd
|
unknown
|
||
http://foo/Resources/Fonts/segoewpn-bold.ttf
|
unknown
|
||
http://foo/Resources/Fonts/segoewpn-light.ttfd
|
unknown
|
||
http://foo/Resources/Images/cabal.pngd
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/segoewpn-black.ttf
|
unknown
|
||
http://foo/bar/resources/fonts/segoewpn-semibold.ttfd
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/calibrii.ttfd
|
unknown
|
||
http://foo/Resources/Fonts/calibri.ttfd
|
unknown
|
||
http://foo/bar/resources/fonts/segoewp-black.ttf
|
unknown
|
||
http://foo/bar/resources/fonts/calibriz.ttf
|
unknown
|
||
http://foo/Resources/Fonts/segoewpn-semilight.ttfd
|
unknown
|
||
http://foo/Resources/Fonts/calibriz.ttfd
|
unknown
|
||
http://foo/bar/resources/fonts/segoewpn.ttfd
|
unknown
|
||
http://foo/Resources/Fonts/segoewp-bold.ttf
|
unknown
|
||
http://foo/Resources/Fonts/segoewpn-semilight.ttf
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/segoewpn-black.ttfd
|
unknown
|
||
http://foo/Resources/Fonts/calibriz.ttf
|
unknown
|
||
http://194.233.88.151/ep33//client/System.Windows.Interactivity.dll
|
unknown
|
||
http://foo/Resources/Fonts/segoewpn-black.ttfd
|
unknown
|
||
http://foo/Resources/Fonts/segoewpn-light.ttf
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/segoewpn-light.ttfd
|
unknown
|
||
http://foo/Resources/Fonts/segoewp-semilight.ttf
|
unknown
|
||
http://194.233.88.151/ep33//web/kmnkNIANBDUIbudbnIA.phpt=28/09/2024
|
unknown
|
||
http://194.233.88.151/ep33//client/7z.dllP
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/segoewp-semibold.ttfd
|
unknown
|
||
http://foo/Resources/Fonts/calibrib.ttfd
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://194.233.88.151/ep33//client/SevenZipSharp.dllP
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/calibrii.ttf
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/segoewp-semilight.ttf
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/segoewp-semibold.ttf
|
unknown
|
||
http://foo/classes/webbrowseroverlaywf/webbrowseroverlay.xamld
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://194.233.88.151/ep33/
|
unknown
|
||
http://194.233.88.151/ep33//client/System.Windows.Interactivity.dllP
|
unknown
|
||
http://foo/bar/resources/fonts/segoewpn-bold.ttf
|
unknown
|
||
http://194.233.88.151/ep33/client/cabal.exe
|
unknown
|
||
http://sevenzipsharp.codeplex.com/WorkItem/List.aspx
|
unknown
|
||
http://defaultcontainer/cabal;component/favicon.icod
|
unknown
|
||
http://foo/Resources/Fonts/segoewp.ttfd
|
unknown
|
||
http://foo/Resources/Fonts/segoewp.ttf
|
unknown
|
||
http://foo/favicon.ico
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/segoewp-semilight.ttfd
|
unknown
|
||
http://foo/favicon.icod
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/segoewp.ttf
|
unknown
|
||
http://foo/bar/mainwindow.baml
|
unknown
|
||
http://defaultcontainer/Resources/Themes/Generic.xamld
|
unknown
|
||
http://foo/bar/resources/themes/generic.baml
|
unknown
|
||
http://194.233.88.151
|
unknown
|
||
http://defaultcontainer/MainWindow.xamld
|
unknown
|
||
http://foo/MainWindow.xaml
|
unknown
|
||
http://194.233.88
|
unknown
|
||
http://foo/bar/resources/fonts/segoewpn-black.ttfd
|
unknown
|
||
http://foo/bar/resources/fonts/segoewpn.ttf
|
unknown
|
||
http://defaultcontainer/cabal;component/favicon.ico
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/segoewpn-bold.ttfd
|
unknown
|
||
http://foo/bar/resources/fonts/calibri.ttfd
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://foo/classes/webbrowseroverlaywf/webbrowseroverlay.xaml
|
unknown
|
||
http://foo/Resources/Fonts/segoewp-black.ttf
|
unknown
|
||
http://foo/bar/classes/webbrowseroverlaywf/webbrowseroverlay.bamld
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/calibri.ttf
|
unknown
|
||
http://194.233.88.151/ep33//web/kmnkNIANBDUIbudbnIA.php?t=28/09/2024
|
unknown
|
||
http://foo/Resources/Fonts/segoewp-black.ttfd
|
unknown
|
||
http://foo/Resources/Fonts/calibri.ttf
|
unknown
|
||
http://foo/Resources/Themes/Generic.xaml
|
unknown
|
||
http://foo/bar/resources/fonts/segoewp-black.ttfd
|
unknown
|
||
http://foo/bar/resources/fonts/segoewp-semilight.ttf
|
unknown
|
||
http://foo/bar/resources/themes/generic.bamld
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/segoewpn-semilight.ttf
|
unknown
|
||
http://fontfabrik.comQ
|
unknown
|
||
http://foo/bar/resources/fonts/segoewpn-black.ttf
|
unknown
|
||
http://foo/bar/resources/fonts/segoewp-semibold.ttfd
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/calibrib.ttfd
|
unknown
|
||
http://foo/bar/favicon.ico
|
unknown
|
||
http://foo/bar/resources/fonts/segoewp-bold.ttfd
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/calibriz.ttfd
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/segoewpn-semibold.ttf
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/segoewpn-semilight.ttfd
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/segoewpn.ttfd
|
unknown
|
||
http://foo/Resources/Fonts/segoewpn-bold.ttfd
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/segoewp-black.ttfd
|
unknown
|
||
http://foo/Resources/Fonts/segoewpn-semibold.ttf
|
unknown
|
||
http://defaultcontainer/MainWindow.xaml
|
unknown
|
||
http://194.233.88.151/ep33//client/SevenZipSharp.dll
|
unknown
|
||
http://foo/bar/resources/fonts/calibri.ttf
|
unknown
|
||
http://foo/bar/resources/fonts/segoewpn-semilight.ttf
|
unknown
|
||
http://foo/bar/resources/fonts/calibrii.ttf
|
unknown
|
||
http://foo/bar/resources/images/cabal.png
|
unknown
|
||
http://194.233.88.151/ep33//client/update.exeP
|
unknown
|
||
http://foo/bar/resources/fonts/segoewpn-light.ttf
|
unknown
|
||
http://defaultcontainer/update;component/Resources/Fonts/calibriz.ttf
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
shadowman.dnse.hu
|
185.6.188.137
|
||
s4.gtsystems.hu
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
194.233.88.151
|
unknown
|
Germany
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASMANCS
|
FileDirectory
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D750000
|
trusted library allocation
|
page read and write
|
||
1507000
|
heap
|
page read and write
|
||
7F25F000
|
trusted library allocation
|
page execute read
|
||
6FBC000
|
stack
|
page read and write
|
||
686E000
|
heap
|
page read and write
|
||
D1D1000
|
heap
|
page read and write
|
||
7F1D5000
|
trusted library allocation
|
page execute read
|
||
7F9D000
|
stack
|
page read and write
|
||
C7CC000
|
stack
|
page read and write
|
||
1D29000
|
trusted library allocation
|
page read and write
|
||
7F1E7000
|
trusted library allocation
|
page execute read
|
||
E90000
|
unkown
|
page readonly
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
E5A2000
|
heap
|
page read and write
|
||
5EEE000
|
stack
|
page read and write
|
||
CD80000
|
trusted library allocation
|
page read and write
|
||
1820000
|
heap
|
page read and write
|
||
D7A0000
|
trusted library allocation
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
7F249000
|
trusted library allocation
|
page execute read
|
||
64F8000
|
heap
|
page read and write
|
||
CB58000
|
heap
|
page read and write
|
||
1D30000
|
trusted library allocation
|
page read and write
|
||
7F24B000
|
trusted library allocation
|
page execute read
|
||
CB10000
|
heap
|
page read and write
|
||
68C0000
|
heap
|
page read and write
|
||
D2A3000
|
heap
|
page read and write
|
||
E5A8000
|
heap
|
page read and write
|
||
7F267000
|
trusted library allocation
|
page execute read
|
||
C121000
|
heap
|
page read and write
|
||
1429000
|
unkown
|
page readonly
|
||
7F275000
|
trusted library allocation
|
page readonly
|
||
E6D0000
|
heap
|
page read and write
|
||
7F221000
|
trusted library allocation
|
page execute read
|
||
D270000
|
trusted library allocation
|
page read and write
|
||
6ADD000
|
stack
|
page read and write
|
||
6A20000
|
heap
|
page read and write
|
||
ECCD000
|
trusted library allocation
|
page read and write
|
||
DBBC000
|
stack
|
page read and write
|
||
CA7C000
|
heap
|
page read and write
|
||
EEF0000
|
trusted library allocation
|
page execute and read and write
|
||
3721000
|
trusted library allocation
|
page read and write
|
||
602C000
|
stack
|
page read and write
|
||
D1C8000
|
trusted library allocation
|
page read and write
|
||
7F26B000
|
trusted library allocation
|
page execute read
|
||
D208000
|
trusted library allocation
|
page read and write
|
||
33B9000
|
trusted library allocation
|
page read and write
|
||
3385000
|
trusted library allocation
|
page read and write
|
||
3399000
|
trusted library allocation
|
page read and write
|
||
7F22C000
|
trusted library allocation
|
page execute read
|
||
E4DC000
|
trusted library allocation
|
page read and write
|
||
D760000
|
trusted library allocation
|
page read and write
|
||
8874000
|
trusted library allocation
|
page read and write
|
||
D210000
|
trusted library allocation
|
page read and write
|
||
EF8F000
|
heap
|
page read and write
|
||
D1F4000
|
trusted library allocation
|
page read and write
|
||
1902000
|
heap
|
page read and write
|
||
1415000
|
heap
|
page read and write
|
||
2FD6000
|
trusted library allocation
|
page execute and read and write
|
||
D245000
|
heap
|
page read and write
|
||
5DC0000
|
heap
|
page read and write
|
||
D8BC000
|
stack
|
page read and write
|
||
D610000
|
trusted library allocation
|
page read and write
|
||
D1CA000
|
trusted library allocation
|
page read and write
|
||
64B4000
|
heap
|
page read and write
|
||
7F1DB000
|
trusted library allocation
|
page execute read
|
||
30C3000
|
heap
|
page execute and read and write
|
||
7F280000
|
trusted library allocation
|
page execute and read and write
|
||
E631000
|
heap
|
page read and write
|
||
E59B000
|
heap
|
page read and write
|
||
CD90000
|
trusted library allocation
|
page read and write
|
||
D87E000
|
heap
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
D1D2000
|
trusted library allocation
|
page read and write
|
||
5728000
|
trusted library allocation
|
page read and write
|
||
C4E0000
|
trusted library allocation
|
page read and write
|
||
D278000
|
heap
|
page read and write
|
||
3A1E000
|
trusted library allocation
|
page read and write
|
||
D27A000
|
heap
|
page read and write
|
||
6855000
|
heap
|
page read and write
|
||
D320000
|
trusted library allocation
|
page read and write
|
||
D1C0000
|
heap
|
page read and write
|
||
14B7000
|
stack
|
page read and write
|
||
6972000
|
heap
|
page read and write
|
||
64AF000
|
heap
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
1D47000
|
trusted library allocation
|
page execute and read and write
|
||
815E000
|
stack
|
page read and write
|
||
4221000
|
trusted library allocation
|
page read and write
|
||
39C6000
|
trusted library allocation
|
page read and write
|
||
69AF000
|
heap
|
page read and write
|
||
D25D000
|
heap
|
page read and write
|
||
CB4C000
|
heap
|
page read and write
|
||
D790000
|
trusted library allocation
|
page read and write
|
||
E669000
|
heap
|
page read and write
|
||
E526000
|
heap
|
page read and write
|
||
5EC0000
|
heap
|
page read and write
|
||
4792000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
9F70000
|
trusted library allocation
|
page read and write
|
||
62FE000
|
stack
|
page read and write
|
||
D1FB000
|
trusted library allocation
|
page read and write
|
||
D194000
|
heap
|
page read and write
|
||
7F238000
|
trusted library allocation
|
page readonly
|
||
D44E000
|
stack
|
page read and write
|
||
1908000
|
heap
|
page read and write
|
||
36C0000
|
trusted library allocation
|
page read and write
|
||
CB17000
|
heap
|
page read and write
|
||
CB12000
|
heap
|
page read and write
|
||
7F256000
|
trusted library allocation
|
page execute read
|
||
C242000
|
heap
|
page read and write
|
||
686A000
|
heap
|
page read and write
|
||
7F26A000
|
trusted library allocation
|
page execute read
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
7F1EB000
|
trusted library allocation
|
page execute read
|
||
E15E000
|
stack
|
page read and write
|
||
36D0000
|
heap
|
page execute and read and write
|
||
7F222000
|
trusted library allocation
|
page readonly
|
||
5D90000
|
heap
|
page read and write
|
||
FA8000
|
stack
|
page read and write
|
||
D1D8000
|
trusted library allocation
|
page read and write
|
||
5FEE000
|
stack
|
page read and write
|
||
CD50000
|
trusted library allocation
|
page read and write
|
||
C1D1000
|
heap
|
page read and write
|
||
6479000
|
heap
|
page read and write
|
||
D1F8000
|
trusted library allocation
|
page read and write
|
||
D846000
|
heap
|
page read and write
|
||
DABC000
|
stack
|
page read and write
|
||
E5B5000
|
heap
|
page read and write
|
||
657E000
|
stack
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
E5EB000
|
heap
|
page read and write
|
||
6B70000
|
trusted library allocation
|
page read and write
|
||
7F224000
|
trusted library allocation
|
page readonly
|
||
7F233000
|
trusted library allocation
|
page readonly
|
||
C975000
|
heap
|
page read and write
|
||
7F27A000
|
trusted library allocation
|
page execute read
|
||
4721000
|
trusted library allocation
|
page read and write
|
||
C979000
|
heap
|
page read and write
|
||
39F1000
|
trusted library allocation
|
page read and write
|
||
D113000
|
heap
|
page read and write
|
||
E97E000
|
stack
|
page read and write
|
||
D2A0000
|
heap
|
page read and write
|
||
E5C1000
|
heap
|
page read and write
|
||
15CE000
|
stack
|
page read and write
|
||
CD00000
|
trusted library allocation
|
page read and write
|
||
5F10000
|
heap
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
7F274000
|
trusted library allocation
|
page execute read
|
||
D243000
|
heap
|
page read and write
|
||
CB80000
|
trusted library allocation
|
page read and write
|
||
7F223000
|
trusted library allocation
|
page execute read
|
||
C2AB000
|
heap
|
page read and write
|
||
C123000
|
heap
|
page read and write
|
||
7F245000
|
trusted library allocation
|
page execute read
|
||
C4D0000
|
trusted library allocation
|
page read and write
|
||
5B4C000
|
heap
|
page read and write
|
||
C990000
|
heap
|
page read and write
|
||
1917000
|
heap
|
page read and write
|
||
E92000
|
unkown
|
page readonly
|
||
D23D000
|
heap
|
page read and write
|
||
9FC0000
|
trusted library allocation
|
page read and write
|
||
643E000
|
stack
|
page read and write
|
||
1930000
|
heap
|
page read and write
|
||
D6A0000
|
trusted library allocation
|
page read and write
|
||
CA10000
|
heap
|
page read and write
|
||
69AB000
|
heap
|
page read and write
|
||
C480000
|
trusted library allocation
|
page read and write
|
||
338A000
|
trusted library allocation
|
page read and write
|
||
C9FA000
|
heap
|
page read and write
|
||
E673000
|
heap
|
page read and write
|
||
61FE000
|
stack
|
page read and write
|
||
CD40000
|
trusted library allocation
|
page read and write
|
||
E5E7000
|
heap
|
page read and write
|
||
1D32000
|
trusted library allocation
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
6442000
|
heap
|
page read and write
|
||
7F237000
|
trusted library allocation
|
page execute read
|
||
7F27E000
|
trusted library allocation
|
page execute read
|
||
D202000
|
trusted library allocation
|
page read and write
|
||
6803000
|
heap
|
page read and write
|
||
C12A000
|
heap
|
page read and write
|
||
C4A0000
|
trusted library allocation
|
page read and write
|
||
E560000
|
heap
|
page read and write
|
||
D12A000
|
heap
|
page read and write
|
||
18EB000
|
heap
|
page read and write
|
||
67F6000
|
heap
|
page read and write
|
||
36AC000
|
stack
|
page read and write
|
||
C118000
|
heap
|
page read and write
|
||
CD30000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
7F1FF000
|
trusted library allocation
|
page execute read
|
||
C22B000
|
heap
|
page read and write
|
||
7F1ED000
|
trusted library allocation
|
page execute read
|
||
6490000
|
heap
|
page read and write
|
||
D700000
|
trusted library allocation
|
page read and write
|
||
C2F0000
|
trusted library allocation
|
page read and write
|
||
1D4B000
|
trusted library allocation
|
page execute and read and write
|
||
1541000
|
heap
|
page read and write
|
||
D27D000
|
heap
|
page read and write
|
||
C10F000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
7F243000
|
trusted library allocation
|
page execute read
|
||
E51C000
|
heap
|
page read and write
|
||
632C000
|
stack
|
page read and write
|
||
C977000
|
heap
|
page read and write
|
||
5890000
|
heap
|
page read and write
|
||
D1C7000
|
heap
|
page read and write
|
||
EF91000
|
heap
|
page read and write
|
||
1D00000
|
trusted library allocation
|
page read and write
|
||
C130000
|
heap
|
page read and write
|
||
7F26F000
|
trusted library allocation
|
page execute read
|
||
60DE000
|
stack
|
page read and write
|
||
E4D7000
|
trusted library allocation
|
page read and write
|
||
E01C000
|
stack
|
page read and write
|
||
67DF000
|
heap
|
page read and write
|
||
E040000
|
trusted library allocation
|
page read and write
|
||
C197000
|
heap
|
page read and write
|
||
A71F000
|
trusted library allocation
|
page read and write
|
||
E697000
|
heap
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
6494000
|
heap
|
page read and write
|
||
E589000
|
heap
|
page read and write
|
||
D2A4000
|
heap
|
page read and write
|
||
C6CE000
|
stack
|
page read and write
|
||
D24E000
|
heap
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
7F228000
|
trusted library allocation
|
page readonly
|
||
64DD000
|
heap
|
page read and write
|
||
680C000
|
heap
|
page read and write
|
||
339C000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
E304000
|
trusted library allocation
|
page read and write
|
||
6859000
|
heap
|
page read and write
|
||
EACB000
|
stack
|
page read and write
|
||
C9E6000
|
heap
|
page read and write
|
||
37D2000
|
trusted library allocation
|
page read and write
|
||
1D2D000
|
trusted library allocation
|
page execute and read and write
|
||
E663000
|
heap
|
page read and write
|
||
6A3C000
|
heap
|
page read and write
|
||
1CC0000
|
heap
|
page read and write
|
||
D300000
|
trusted library allocation
|
page read and write
|
||
D124000
|
heap
|
page read and write
|
||
C470000
|
trusted library allocation
|
page read and write
|
||
E6BB000
|
heap
|
page read and write
|
||
D660000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
D1C0000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
D350000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
33B1000
|
trusted library allocation
|
page read and write
|
||
7F269000
|
trusted library allocation
|
page execute read
|
||
CB1D000
|
heap
|
page read and write
|
||
7F1FB000
|
trusted library allocation
|
page execute read
|
||
C500000
|
trusted library allocation
|
page read and write
|
||
D140000
|
heap
|
page read and write
|
||
5EDE000
|
heap
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
7F241000
|
trusted library allocation
|
page execute read
|
||
C277000
|
heap
|
page read and write
|
||
D24C000
|
heap
|
page read and write
|
||
6A09000
|
heap
|
page read and write
|
||
E490000
|
trusted library allocation
|
page read and write
|
||
684D000
|
heap
|
page read and write
|
||
D84D000
|
heap
|
page read and write
|
||
6519000
|
heap
|
page read and write
|
||
D13E000
|
heap
|
page read and write
|
||
7F1E4000
|
trusted library allocation
|
page execute read
|
||
D282000
|
heap
|
page read and write
|
||
7F25A000
|
trusted library allocation
|
page execute read
|
||
7F239000
|
trusted library allocation
|
page execute read
|
||
7F265000
|
trusted library allocation
|
page execute read
|
||
CAB6000
|
heap
|
page read and write
|
||
C4C0000
|
trusted library allocation
|
page read and write
|
||
6EBD000
|
stack
|
page read and write
|
||
7F24E000
|
trusted library allocation
|
page execute read
|
||
C0CE000
|
heap
|
page read and write
|
||
7F236000
|
trusted library allocation
|
page readonly
|
||
D3ED000
|
stack
|
page read and write
|
||
37D8000
|
trusted library allocation
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
E59F000
|
heap
|
page read and write
|
||
D690000
|
trusted library allocation
|
page read and write
|
||
A474000
|
heap
|
page read and write
|
||
C68C000
|
stack
|
page read and write
|
||
7F1E9000
|
trusted library allocation
|
page execute read
|
||
D60C000
|
stack
|
page read and write
|
||
63FF000
|
stack
|
page read and write
|
||
C9AA000
|
heap
|
page read and write
|
||
7F213000
|
trusted library allocation
|
page execute read
|
||
D6B0000
|
trusted library allocation
|
page read and write
|
||
7F234000
|
trusted library allocation
|
page execute read
|
||
CA60000
|
heap
|
page read and write
|
||
64C2000
|
heap
|
page read and write
|
||
D17A000
|
trusted library allocation
|
page read and write
|
||
2FE7000
|
trusted library allocation
|
page execute and read and write
|
||
7F1F7000
|
trusted library allocation
|
page execute read
|
||
356E000
|
stack
|
page read and write
|
||
7F23F000
|
trusted library allocation
|
page execute read
|
||
5FC0000
|
trusted library allocation
|
page read and write
|
||
1920000
|
heap
|
page read and write
|
||
E521000
|
heap
|
page read and write
|
||
E51F000
|
heap
|
page read and write
|
||
18FE000
|
heap
|
page read and write
|
||
6890000
|
trusted library allocation
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
D620000
|
trusted library allocation
|
page read and write
|
||
C0B0000
|
heap
|
page read and write
|
||
7F272000
|
trusted library allocation
|
page execute read
|
||
33AE000
|
trusted library allocation
|
page read and write
|
||
7F26D000
|
trusted library allocation
|
page execute read
|
||
3396000
|
trusted library allocation
|
page read and write
|
||
2FEB000
|
trusted library allocation
|
page execute and read and write
|
||
5D74000
|
heap
|
page execute and read and write
|
||
E44E000
|
stack
|
page read and write
|
||
C2B0000
|
trusted library allocation
|
page read and write
|
||
7F1FD000
|
trusted library allocation
|
page execute read
|
||
D9BE000
|
stack
|
page read and write
|
||
D180000
|
trusted library allocation
|
page read and write
|
||
1513000
|
heap
|
page read and write
|
||
64FF000
|
heap
|
page read and write
|
||
D1D4000
|
trusted library allocation
|
page read and write
|
||
7F22F000
|
trusted library allocation
|
page execute read
|
||
69FF000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
5F14000
|
heap
|
page read and write
|
||
7F1F5000
|
trusted library allocation
|
page execute read
|
||
6A14000
|
heap
|
page read and write
|
||
37DB000
|
trusted library allocation
|
page read and write
|
||
F00000
|
unkown
|
page readonly
|
||
68AC000
|
heap
|
page read and write
|
||
CB21000
|
heap
|
page read and write
|
||
F18000
|
unkown
|
page readonly
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
E5AB000
|
heap
|
page read and write
|
||
3710000
|
heap
|
page read and write
|
||
7F26C000
|
trusted library allocation
|
page execute read
|
||
5B89000
|
heap
|
page read and write
|
||
66BB000
|
stack
|
page read and write
|
||
D640000
|
trusted library allocation
|
page read and write
|
||
C450000
|
trusted library allocation
|
page read and write
|
||
D370000
|
trusted library allocation
|
page read and write
|
||
C2C0000
|
trusted library allocation
|
page read and write
|
||
5F4D000
|
heap
|
page read and write
|
||
7F27D000
|
trusted library allocation
|
page readonly
|
||
E702000
|
heap
|
page read and write
|
||
C12C000
|
heap
|
page read and write
|
||
1D36000
|
trusted library allocation
|
page execute and read and write
|
||
E5FB000
|
heap
|
page read and write
|
||
7DE0000
|
heap
|
page read and write
|
||
CA8A000
|
heap
|
page read and write
|
||
69DC000
|
stack
|
page read and write
|
||
7F225000
|
trusted library allocation
|
page execute read
|
||
5B40000
|
heap
|
page read and write
|
||
D360000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
CA07000
|
heap
|
page read and write
|
||
D630000
|
trusted library allocation
|
page read and write
|
||
8260000
|
heap
|
page execute and read and write
|
||
15AF000
|
stack
|
page read and write
|
||
67FA000
|
heap
|
page read and write
|
||
C460000
|
trusted library allocation
|
page read and write
|
||
D98D000
|
stack
|
page read and write
|
||
6BBE000
|
stack
|
page read and write
|
||
1D40000
|
trusted library allocation
|
page read and write
|
||
D201000
|
heap
|
page read and write
|
||
6499000
|
heap
|
page read and write
|
||
6864000
|
heap
|
page read and write
|
||
6452000
|
heap
|
page read and write
|
||
D670000
|
trusted library allocation
|
page read and write
|
||
3393000
|
trusted library allocation
|
page read and write
|
||
7185000
|
trusted library allocation
|
page read and write
|
||
C58D000
|
stack
|
page read and write
|
||
D340000
|
trusted library allocation
|
page read and write
|
||
E5E3000
|
heap
|
page read and write
|
||
C90E000
|
stack
|
page read and write
|
||
7F266000
|
trusted library allocation
|
page execute read
|
||
E475000
|
trusted library allocation
|
page read and write
|
||
9FD0000
|
trusted library allocation
|
page read and write
|
||
C9C9000
|
heap
|
page read and write
|
||
E47E000
|
trusted library allocation
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
C235000
|
heap
|
page read and write
|
||
736C000
|
stack
|
page read and write
|
||
D19A000
|
heap
|
page read and write
|
||
D1BA000
|
trusted library allocation
|
page read and write
|
||
D280000
|
heap
|
page read and write
|
||
E4D3000
|
trusted library allocation
|
page read and write
|
||
D2C0000
|
trusted library allocation
|
page read and write
|
||
E53D000
|
heap
|
page read and write
|
||
64E3000
|
heap
|
page read and write
|
||
D1A8000
|
trusted library allocation
|
page read and write
|
||
D87E000
|
stack
|
page read and write
|
||
C16B000
|
heap
|
page read and write
|
||
E470000
|
trusted library allocation
|
page read and write
|
||
7F226000
|
trusted library allocation
|
page readonly
|
||
1861000
|
heap
|
page read and write
|
||
E55C000
|
heap
|
page read and write
|
||
3A02000
|
trusted library allocation
|
page read and write
|
||
1D20000
|
trusted library allocation
|
page read and write
|
||
7F23E000
|
trusted library allocation
|
page readonly
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
344B000
|
trusted library allocation
|
page read and write
|
||
E34E000
|
stack
|
page read and write
|
||
E2F6000
|
trusted library allocation
|
page read and write
|
||
E488000
|
trusted library allocation
|
page read and write
|
||
D59E000
|
stack
|
page read and write
|
||
C1A8000
|
heap
|
page read and write
|
||
30E6000
|
trusted library allocation
|
page read and write
|
||
D184000
|
trusted library allocation
|
page read and write
|
||
7F227000
|
trusted library allocation
|
page execute read
|
||
7F1EF000
|
trusted library allocation
|
page execute read
|
||
1D45000
|
trusted library allocation
|
page execute and read and write
|
||
64FB000
|
heap
|
page read and write
|
||
D295000
|
heap
|
page read and write
|
||
A476000
|
heap
|
page read and write
|
||
D188000
|
trusted library allocation
|
page read and write
|
||
5C6E000
|
stack
|
page read and write
|
||
6934000
|
heap
|
page read and write
|
||
E654000
|
heap
|
page read and write
|
||
7F231000
|
trusted library allocation
|
page execute read
|
||
A6A0000
|
heap
|
page read and write
|
||
7F23C000
|
trusted library allocation
|
page readonly
|
||
4252000
|
trusted library allocation
|
page read and write
|
||
3884000
|
trusted library allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
4751000
|
trusted library allocation
|
page read and write
|
||
6A05000
|
heap
|
page read and write
|
||
6A2B000
|
heap
|
page read and write
|
||
18DC000
|
heap
|
page read and write
|
||
D2E0000
|
trusted library allocation
|
page read and write
|
||
D2A7000
|
heap
|
page read and write
|
||
E4E1000
|
trusted library allocation
|
page read and write
|
||
59EF000
|
stack
|
page read and write
|
||
C11F000
|
heap
|
page read and write
|
||
A6F0000
|
trusted library allocation
|
page read and write
|
||
E031000
|
trusted library allocation
|
page read and write
|
||
D720000
|
trusted library allocation
|
page read and write
|
||
2FDA000
|
trusted library allocation
|
page execute and read and write
|
||
CCE0000
|
trusted library allocation
|
page read and write
|
||
A570000
|
heap
|
page execute and read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
E4DE000
|
trusted library allocation
|
page read and write
|
||
C970000
|
heap
|
page read and write
|
||
3841000
|
trusted library allocation
|
page read and write
|
||
1D60000
|
trusted library allocation
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
E4B0000
|
trusted library allocation
|
page execute
|
||
D6C0000
|
trusted library allocation
|
page read and write
|
||
3882000
|
trusted library allocation
|
page read and write
|
||
6D7B000
|
stack
|
page read and write
|
||
7F268000
|
trusted library allocation
|
page execute read
|
||
67C0000
|
trusted library allocation
|
page read and write
|
||
CCD0000
|
trusted library allocation
|
page read and write
|
||
C910000
|
trusted library allocation
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
D2D0000
|
trusted library allocation
|
page read and write
|
||
7F261000
|
trusted library allocation
|
page execute read
|
||
7F255000
|
trusted library allocation
|
page readonly
|
||
D24A000
|
heap
|
page read and write
|
||
39FF000
|
trusted library allocation
|
page read and write
|
||
E5A4000
|
heap
|
page read and write
|
||
E692000
|
heap
|
page read and write
|
||
E5AD000
|
heap
|
page read and write
|
||
3A1A000
|
trusted library allocation
|
page read and write
|
||
5EDB000
|
heap
|
page read and write
|
||
C43C000
|
stack
|
page read and write
|
||
D1A9000
|
heap
|
page read and write
|
||
2FBD000
|
trusted library allocation
|
page execute and read and write
|
||
D49E000
|
stack
|
page read and write
|
||
E644000
|
heap
|
page read and write
|
||
5D6E000
|
stack
|
page read and write
|
||
CD20000
|
trusted library allocation
|
page read and write
|
||
7DF0000
|
trusted library allocation
|
page read and write
|
||
7F251000
|
trusted library allocation
|
page execute read
|
||
726D000
|
stack
|
page read and write
|
||
D843000
|
heap
|
page read and write
|
||
D257000
|
heap
|
page read and write
|
||
642C000
|
stack
|
page read and write
|
||
68C2000
|
heap
|
page read and write
|
||
9FE0000
|
trusted library allocation
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
D135000
|
heap
|
page read and write
|
||
67B8000
|
stack
|
page read and write
|
||
E559000
|
heap
|
page read and write
|
||
67D0000
|
heap
|
page read and write
|
||
D26C000
|
heap
|
page read and write
|
||
D310000
|
trusted library allocation
|
page read and write
|
||
C4F0000
|
trusted library allocation
|
page read and write
|
||
CB70000
|
trusted library allocation
|
page read and write
|
||
E52A000
|
heap
|
page read and write
|
||
D6D0000
|
trusted library allocation
|
page read and write
|
||
7F263000
|
trusted library allocation
|
page execute read
|
||
D131000
|
heap
|
page read and write
|
||
3104000
|
heap
|
page read and write
|
||
3A2D000
|
trusted library allocation
|
page read and write
|
||
E68C000
|
heap
|
page read and write
|
||
A700000
|
trusted library allocation
|
page read and write
|
||
E483000
|
trusted library allocation
|
page read and write
|
||
C1C4000
|
heap
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page read and write
|
||
E65A000
|
heap
|
page read and write
|
||
3387000
|
trusted library allocation
|
page read and write
|
||
5EAE000
|
stack
|
page read and write
|
||
C1F1000
|
heap
|
page read and write
|
||
D740000
|
trusted library allocation
|
page read and write
|
||
A47F000
|
heap
|
page read and write
|
||
D1F1000
|
heap
|
page read and write
|
||
C19E000
|
heap
|
page read and write
|
||
CB68000
|
heap
|
page read and write
|
||
C4B0000
|
trusted library allocation
|
page read and write
|
||
18A3000
|
heap
|
page read and write
|
||
D11B000
|
heap
|
page read and write
|
||
7F27C000
|
trusted library allocation
|
page execute read
|
||
D2F3000
|
heap
|
page read and write
|
||
6A67000
|
heap
|
page read and write
|
||
7F258000
|
trusted library allocation
|
page execute read
|
||
E52F000
|
heap
|
page read and write
|
||
4231000
|
trusted library allocation
|
page read and write
|
||
D650000
|
trusted library allocation
|
page read and write
|
||
2FD2000
|
trusted library allocation
|
page read and write
|
||
3390000
|
trusted library allocation
|
page read and write
|
||
36B0000
|
trusted library allocation
|
page read and write
|
||
C80E000
|
stack
|
page read and write
|
||
1D80000
|
heap
|
page read and write
|
||
CB0E000
|
heap
|
page read and write
|
||
67C6000
|
heap
|
page read and write
|
||
CB6D000
|
heap
|
page read and write
|
||
809E000
|
stack
|
page read and write
|
||
58BE000
|
stack
|
page read and write
|
||
8892000
|
trusted library allocation
|
page read and write
|
||
C0EB000
|
heap
|
page read and write
|
||
17DE000
|
stack
|
page read and write
|
||
67C0000
|
heap
|
page read and write
|
||
667E000
|
stack
|
page read and write
|
||
7F1F1000
|
trusted library allocation
|
page execute read
|
||
7200000
|
trusted library allocation
|
page read and write
|
||
7F253000
|
trusted library allocation
|
page execute read
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
E2F4000
|
trusted library allocation
|
page read and write
|
||
5DB0000
|
heap
|
page read and write
|
||
E516000
|
heap
|
page read and write
|
||
1C4E000
|
stack
|
page read and write
|
||
37DE000
|
trusted library allocation
|
page read and write
|
||
2FB3000
|
trusted library allocation
|
page execute and read and write
|
||
1410000
|
heap
|
page read and write
|
||
39F7000
|
trusted library allocation
|
page read and write
|
||
CF90000
|
trusted library allocation
|
page read and write
|
||
6930000
|
heap
|
page read and write
|
||
D1A4000
|
trusted library allocation
|
page read and write
|
||
9F40000
|
trusted library allocation
|
page read and write
|
||
6E7C000
|
stack
|
page read and write
|
||
D11D000
|
heap
|
page read and write
|
||
7F1D1000
|
trusted library allocation
|
page execute read
|
||
D198000
|
heap
|
page read and write
|
||
2FB4000
|
trusted library allocation
|
page read and write
|
||
653F000
|
stack
|
page read and write
|
||
CD60000
|
trusted library allocation
|
page read and write
|
||
5D70000
|
heap
|
page execute and read and write
|
||
67E0000
|
trusted library allocation
|
page read and write
|
||
62AD000
|
stack
|
page read and write
|
||
7F264000
|
trusted library allocation
|
page execute read
|
||
68A7000
|
heap
|
page read and write
|
||
7F229000
|
trusted library allocation
|
page execute read
|
||
8322000
|
trusted library allocation
|
page read and write
|
||
C440000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
E4F2000
|
trusted library allocation
|
page read and write
|
||
D730000
|
trusted library allocation
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
7F23D000
|
trusted library allocation
|
page execute read
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
D2C2000
|
heap
|
page read and write
|
||
7F26E000
|
trusted library allocation
|
page execute read
|
||
2FE2000
|
trusted library allocation
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
657E000
|
stack
|
page read and write
|
||
39BF000
|
trusted library allocation
|
page read and write
|
||
30BD000
|
stack
|
page read and write
|
||
D1F6000
|
trusted library allocation
|
page read and write
|
||
5B96000
|
heap
|
page read and write
|
||
C988000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
6A3E000
|
heap
|
page read and write
|
||
674E000
|
stack
|
page read and write
|
||
5B30000
|
heap
|
page read and write
|
||
EA7E000
|
stack
|
page read and write
|
||
D1C3000
|
trusted library allocation
|
page read and write
|
||
9F60000
|
trusted library allocation
|
page read and write
|
||
E671000
|
heap
|
page read and write
|
||
67A0000
|
trusted library allocation
|
page read and write
|
||
C1D6000
|
heap
|
page read and write
|
||
73AE000
|
stack
|
page read and write
|
||
A680000
|
trusted library allocation
|
page read and write
|
||
68A0000
|
heap
|
page read and write
|
||
5EC2000
|
heap
|
page read and write
|
||
D185000
|
heap
|
page read and write
|
||
C183000
|
heap
|
page read and write
|
||
7F23B000
|
trusted library allocation
|
page execute read
|
||
D1D0000
|
trusted library allocation
|
page read and write
|
||
7F271000
|
trusted library allocation
|
page readonly
|
||
5F87000
|
heap
|
page read and write
|
||
F02000
|
unkown
|
page readonly
|
||
EBCE000
|
stack
|
page read and write
|
||
7F1E1000
|
trusted library allocation
|
page execute read
|
||
61AC000
|
stack
|
page read and write
|
||
E513000
|
heap
|
page read and write
|
||
5DB4000
|
heap
|
page read and write
|
||
C11D000
|
heap
|
page read and write
|
||
D241000
|
heap
|
page read and write
|
||
6849000
|
heap
|
page read and write
|
||
D16C000
|
trusted library allocation
|
page read and write
|
||
D6E0000
|
trusted library allocation
|
page read and write
|
||
C2D0000
|
heap
|
page read and write
|
||
6833000
|
heap
|
page read and write
|
||
D7BA000
|
heap
|
page read and write
|
||
1498000
|
heap
|
page read and write
|
||
D1BC000
|
trusted library allocation
|
page read and write
|
||
E594000
|
heap
|
page read and write
|
||
7F25C000
|
trusted library allocation
|
page execute read
|
||
C9A4000
|
heap
|
page read and write
|
||
E2FB000
|
trusted library allocation
|
page read and write
|
||
D710000
|
trusted library allocation
|
page read and write
|
||
D330000
|
trusted library allocation
|
page read and write
|
||
3030000
|
heap
|
page execute and read and write
|
||
667C000
|
stack
|
page read and write
|
||
E6B5000
|
heap
|
page read and write
|
||
7F1F9000
|
trusted library allocation
|
page execute read
|
||
670D000
|
stack
|
page read and write
|
||
6B1C000
|
stack
|
page read and write
|
||
1521000
|
heap
|
page read and write
|
||
E5D5000
|
heap
|
page read and write
|
||
D2AA000
|
heap
|
page read and write
|
||
5A2C000
|
stack
|
page read and write
|
||
67B0000
|
trusted library allocation
|
page read and write
|
||
D178000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
182E000
|
heap
|
page read and write
|
||
3382000
|
trusted library allocation
|
page read and write
|
||
67E6000
|
heap
|
page read and write
|
||
7F200000
|
trusted library allocation
|
page execute and read and write
|
||
DFCE000
|
stack
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
CD70000
|
trusted library allocation
|
page read and write
|
||
39F9000
|
trusted library allocation
|
page read and write
|
||
D1A0000
|
trusted library allocation
|
page read and write
|
||
337E000
|
trusted library allocation
|
page read and write
|
||
5F49000
|
heap
|
page read and write
|
||
145A000
|
heap
|
page read and write
|
||
7F230000
|
trusted library allocation
|
page readonly
|
||
C28F000
|
heap
|
page read and write
|
||
1D14000
|
trusted library allocation
|
page read and write
|
||
7F1DA000
|
trusted library allocation
|
page readonly
|
||
D12C000
|
heap
|
page read and write
|
||
E486000
|
trusted library allocation
|
page read and write
|
||
CD10000
|
trusted library allocation
|
page read and write
|
||
D198000
|
trusted library allocation
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
5ED4000
|
heap
|
page read and write
|
||
E29E000
|
stack
|
page read and write
|
||
3458000
|
trusted library allocation
|
page read and write
|
||
1D1D000
|
trusted library allocation
|
page execute and read and write
|
||
E66B000
|
heap
|
page read and write
|
||
E046000
|
trusted library allocation
|
page read and write
|
||
5FBC000
|
heap
|
page read and write
|
||
C190000
|
heap
|
page read and write
|
||
6887000
|
heap
|
page read and write
|
||
CCF0000
|
trusted library allocation
|
page read and write
|
||
64A5000
|
heap
|
page read and write
|
||
D2F0000
|
trusted library allocation
|
page read and write
|
||
64F3000
|
heap
|
page read and write
|
||
3A05000
|
trusted library allocation
|
page read and write
|
||
7F1D8000
|
trusted library allocation
|
page execute read
|
||
D121000
|
heap
|
page read and write
|
||
8720000
|
trusted library allocation
|
page read and write
|
||
5B28000
|
stack
|
page read and write
|
||
C203000
|
heap
|
page read and write
|
||
E599000
|
heap
|
page read and write
|
||
CB1B000
|
heap
|
page read and write
|
||
D12F000
|
heap
|
page read and write
|
||
7F276000
|
trusted library allocation
|
page execute read
|
||
D1EE000
|
trusted library allocation
|
page read and write
|
||
5F82000
|
heap
|
page read and write
|
||
C2E0000
|
trusted library allocation
|
page read and write
|
||
CA6E000
|
heap
|
page read and write
|
||
D1D6000
|
trusted library allocation
|
page read and write
|
||
16DE000
|
stack
|
page read and write
|
||
68BC000
|
heap
|
page read and write
|
||
7F247000
|
trusted library allocation
|
page execute read
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
7F211000
|
trusted library allocation
|
page execute read
|
||
E2EE000
|
stack
|
page read and write
|
||
7F1D3000
|
trusted library allocation
|
page execute read
|
||
2FC9000
|
trusted library allocation
|
page read and write
|
||
CB54000
|
heap
|
page read and write
|
||
696A000
|
heap
|
page read and write
|
||
39B5000
|
trusted library allocation
|
page read and write
|
||
EFCA000
|
heap
|
page read and write
|
||
696D000
|
heap
|
page read and write
|
||
D1CC000
|
trusted library allocation
|
page read and write
|
||
6A11000
|
heap
|
page read and write
|
||
151B000
|
heap
|
page read and write
|
||
E6B2000
|
heap
|
page read and write
|
||
E4D9000
|
trusted library allocation
|
page read and write
|
||
A8CC000
|
trusted library allocation
|
page read and write
|
||
CA2F000
|
heap
|
page read and write
|
||
D186000
|
trusted library allocation
|
page read and write
|
||
478D000
|
trusted library allocation
|
page read and write
|
||
D1E0000
|
trusted library allocation
|
page read and write
|
||
1A17000
|
heap
|
page read and write
|
||
A690000
|
trusted library allocation
|
page read and write
|
||
1912000
|
heap
|
page read and write
|
||
D1E8000
|
trusted library allocation
|
page read and write
|
||
D11F000
|
heap
|
page read and write
|
||
1A10000
|
heap
|
page read and write
|
||
C114000
|
heap
|
page read and write
|
||
68A1000
|
heap
|
page read and write
|
||
D28D000
|
heap
|
page read and write
|
||
7F270000
|
trusted library allocation
|
page execute read
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
CB51000
|
heap
|
page read and write
|
||
7F278000
|
trusted library allocation
|
page execute read
|
||
EF99000
|
heap
|
page read and write
|
||
E25E000
|
stack
|
page read and write
|
||
6534000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page execute and read and write
|
||
15D7000
|
heap
|
page read and write
|
||
35E4000
|
trusted library allocation
|
page read and write
|
||
CAFF000
|
heap
|
page read and write
|
||
D801000
|
heap
|
page read and write
|
||
CA3A000
|
heap
|
page read and write
|
||
5DAE000
|
stack
|
page read and write
|
||
64A9000
|
heap
|
page read and write
|
||
D680000
|
trusted library allocation
|
page read and write
|
||
7F1DD000
|
trusted library allocation
|
page execute read
|
||
E5F3000
|
heap
|
page read and write
|
||
1549000
|
heap
|
page read and write
|
||
1D13000
|
trusted library allocation
|
page execute and read and write
|
||
3221000
|
trusted library allocation
|
page read and write
|
||
C33E000
|
stack
|
page read and write
|
||
3010000
|
trusted library allocation
|
page execute and read and write
|
||
E034000
|
trusted library allocation
|
page read and write
|
||
D110000
|
heap
|
page read and write
|
||
E67B000
|
heap
|
page read and write
|
||
D128000
|
heap
|
page read and write
|
||
C216000
|
heap
|
page read and write
|
||
825E000
|
stack
|
page read and write
|
||
158E000
|
stack
|
page read and write
|
||
A6ED000
|
stack
|
page read and write
|
||
18D6000
|
heap
|
page read and write
|
||
E5F7000
|
heap
|
page read and write
|
||
68FB000
|
heap
|
page read and write
|
||
EF4D000
|
heap
|
page read and write
|
||
1D42000
|
trusted library allocation
|
page read and write
|
||
69E3000
|
heap
|
page read and write
|
||
150B000
|
heap
|
page read and write
|
||
D780000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
7F273000
|
trusted library allocation
|
page readonly
|
||
2FCD000
|
trusted library allocation
|
page execute and read and write
|
||
C116000
|
heap
|
page read and write
|
||
7F1F3000
|
trusted library allocation
|
page execute read
|
||
E5A6000
|
heap
|
page read and write
|
||
A470000
|
heap
|
page read and write
|
||
D2B0000
|
trusted library allocation
|
page read and write
|
||
1925000
|
heap
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
53BD000
|
stack
|
page read and write
|
||
E050000
|
heap
|
page read and write
|
||
649F000
|
heap
|
page read and write
|
||
C490000
|
trusted library allocation
|
page read and write
|
||
338D000
|
trusted library allocation
|
page read and write
|
||
5228000
|
trusted library allocation
|
page read and write
|
||
D1F1000
|
trusted library allocation
|
page read and write
|
||
6A50000
|
heap
|
page read and write
|
||
D1B0000
|
trusted library allocation
|
page read and write
|
||
1895000
|
heap
|
page read and write
|
||
6170000
|
trusted library allocation
|
page read and write
|
||
D6F0000
|
trusted library allocation
|
page read and write
|
||
143D000
|
heap
|
page read and write
|
||
74AE000
|
stack
|
page read and write
|
||
612B000
|
stack
|
page read and write
|
||
1491000
|
heap
|
page read and write
|
||
2FE5000
|
trusted library allocation
|
page execute and read and write
|
||
7F262000
|
trusted library allocation
|
page execute read
|
||
1D70000
|
trusted library allocation
|
page execute and read and write
|
||
EF06000
|
heap
|
page read and write
|
||
62EE000
|
stack
|
page read and write
|
There are 784 hidden memdumps, click here to show them.