Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PumpBotPremium.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44
2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {7FFEF896-5843-4272-ACBA-A4977C267D92},
Number of Words: 2, Subject: PumpBotPremium, Author: Coinsw.app, Name of Creating Application: PumpBotPremium, Template: ;1033,
Comments: This installer database contains the logic and data required to install PumpBotPremium., Title: Installation Database,
Keywords: Installer, MSI, Database, Create Time/Date: Tue Mar 5 02:13:07 2024, Number of Pages: 200
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\BlockchainConnector.exe
|
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Cipher\_Salsa20.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Cipher\_raw_aes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Cipher\_raw_aesni.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Cipher\_raw_cbc.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Cipher\_raw_cfb.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Cipher\_raw_ctr.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Cipher\_raw_ecb.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Cipher\_raw_eksblowfish.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Cipher\_raw_ocb.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Cipher\_raw_ofb.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Hash\_BLAKE2s.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Hash\_MD5.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Hash\_SHA1.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Hash\_SHA256.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Hash\_ghash_clmul.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Hash\_ghash_portable.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Protocol\_scrypt.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Util\_cpuid_c.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\Crypto\Util\_strxor.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\PIL\_imaging.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\PIL\_imagingcms.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\PIL\_imagingft.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\PIL\_webp.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\PyQt5\QtCore.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\PyQt5\QtGui.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\PyQt5\QtWidgets.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\PyQt5\sip.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\_brotli.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\_cffi_backend.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\_elementtree.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\_sqlite3.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\_tkinter.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\charset_normalizer\md.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\charset_normalizer\md__mypyc.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\cryptography\hazmat\bindings\_rust.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\cv2\cv2.pyd
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\cv2\opencv_videoio_ffmpeg490_64.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\libcrypto-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\libssl-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\numpy\.libs\libopenblas.EL2C6PLE4ZYW3ECEVIV3OXXGRN2NRFM2.gfortran-win_amd64.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\numpy\core\_multiarray_tests.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\numpy\core\_multiarray_umath.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\numpy\fft\_pocketfft_internal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\numpy\linalg\_umath_linalg.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\numpy\random\_bounded_integers.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\numpy\random\_common.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\numpy\random\_generator.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\numpy\random\_mt19937.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\numpy\random\_pcg64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\numpy\random\_philox.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\numpy\random\_sfc64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\numpy\random\bit_generator.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\numpy\random\mtrand.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\psutil\_psutil_windows.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\pyexpat.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\python3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\python310.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\pythoncom310.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\pywintypes310.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\sqlite3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\tcl86t.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\tk86t.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\win32crypt.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Coinsw.app\PumpBotPremium\prerequisites\BlockchainConnector\BlockchainConnector.exe
|
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Coinsw.app\PumpBotPremium\prerequisites\aipackagechainer.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7B99.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7BF7.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7C27.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7C48.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7C87.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI7CB7.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI8554.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Config.Msi\5c7179.rbs
|
data
|
dropped
|
||
C:\Config.Msi\5c717b.rbs
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Xavier\Autofills\Chrome_Default_AFILLS.txt
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Xavier\Autofills\Edge_Default_AFILLS.txt
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Xavier\Caches\Chrome_Default_Local State
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Xavier\Caches\Chrome_Default_afills.db
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie
0x21, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Xavier\Caches\Chrome_Default_cookies.db
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8,
version-valid-for 11
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Xavier\Caches\Chrome_Default_pass.db
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie
0xb, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Xavier\Caches\Edge_Default_Local State
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Xavier\Caches\Edge_Default_afills.db
|
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie
0x24, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Xavier\Caches\Edge_Default_pass.db
|
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie
0xe, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Xavier\Chrome_Default_PASS.txt
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Xavier\Edge_Default_PASS.txt
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Xavier\Infos\Running_Softwares.txt
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Xavier\Screenshot.png
|
PNG image data, 1280 x 1024, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0qrgu5vq.u1l.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_en4screy.gl3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ivhwg00s.d1k.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l0mofyuw.m1b.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pkigec2k.hel.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s1qambow.qiw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_taia5r2k.wpj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tzpwwpp3.yb1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vtuhxin0.xow.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zbuebbkh.ghe.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\user_95030.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\certifi\cacert.pem
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\concrt140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\libffi-7.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\msvcp140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\msvcp140_1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\qt5core.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\qt5gui.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\qt5widgets.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\vcruntime140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\vcruntime140_1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Coinsw.app\PumpBotPremium\prerequisites\aipackagechainer.ini
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Coinsw.app\PumpBotPremium\prerequisites\file_deleter.ps1
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\5c7177.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44
2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {7FFEF896-5843-4272-ACBA-A4977C267D92},
Number of Words: 2, Subject: PumpBotPremium, Author: Coinsw.app, Name of Creating Application: PumpBotPremium, Template: ;1033,
Comments: This installer database contains the logic and data required to install PumpBotPremium., Title: Installation Database,
Keywords: Installer, MSI, Database, Create Time/Date: Tue Mar 5 02:13:07 2024, Number of Pages: 200
|
dropped
|
||
C:\Windows\Installer\5c717a.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44
2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {7FFEF896-5843-4272-ACBA-A4977C267D92},
Number of Words: 2, Subject: PumpBotPremium, Author: Coinsw.app, Name of Creating Application: PumpBotPremium, Template: ;1033,
Comments: This installer database contains the logic and data required to install PumpBotPremium., Title: Installation Database,
Keywords: Installer, MSI, Database, Create Time/Date: Tue Mar 5 02:13:07 2024, Number of Pages: 200
|
dropped
|
||
C:\Windows\Installer\MSI7D93.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSI8CB8.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\SourceHash{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07A7CCFBD28A674D95D3BF853C9007C6
|
data
|
dropped
|
||
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77003E887FC21E505B9E28CBA30E18ED_8ACE642DC0A43382FABA7AE806561A50
|
data
|
dropped
|
||
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\86844F70250DD8EF225D6B4178798C21_44AD5D0C299F1D4EE038B125B5E5863A
|
data
|
dropped
|
||
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94D97B1EC1F43DD6ED4FE7AB95E144BC_939EA6CA157B394821E4828989A41A02
|
data
|
dropped
|
||
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07A7CCFBD28A674D95D3BF853C9007C6
|
data
|
dropped
|
||
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77003E887FC21E505B9E28CBA30E18ED_8ACE642DC0A43382FABA7AE806561A50
|
data
|
dropped
|
||
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\86844F70250DD8EF225D6B4178798C21_44AD5D0C299F1D4EE038B125B5E5863A
|
data
|
dropped
|
||
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94D97B1EC1F43DD6ED4FE7AB95E144BC_939EA6CA157B394821E4828989A41A02
|
data
|
dropped
|
||
C:\Windows\SystemTemp\AI_D021.ps1
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF0D53DC9C7BBFC774.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF47F5555B91963625.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF50561FB6F2C930BB.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF5ABBBEBDCE86EACC.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF8CFE24CFB6B9F8D8.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF9E6F418B6A9C8200.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFA019D68DC125F497.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFA2D8E9CF71AD6417.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFB737F04A3758BF43.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFC308990B6750CFB8.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFD41682D5FD1F76DD.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFE626228802FF1ACE.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFF9A026285929888D.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFFB806C901D3CD508.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
There are 143 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\AppData\Roaming\Coinsw.app\PumpBotPremium\prerequisites\BlockchainConnector\BlockchainConnector.exe
|
"C:\Users\user\AppData\Roaming\Coinsw.app\PumpBotPremium\prerequisites\BlockchainConnector\BlockchainConnector.exe" /s
|
||
C:\Users\user\AppData\Local\Temp\onefile_7560_133747959131729392\BlockchainConnector.exe
|
"C:\Users\user\AppData\Roaming\Coinsw.app\PumpBotPremium\prerequisites\BlockchainConnector\BlockchainConnector.exe" /s
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\PumpBotPremium.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding B605B066270C5298BC361F916947E4D1
|
||
C:\Users\user\AppData\Roaming\Coinsw.app\PumpBotPremium\prerequisites\aipackagechainer.exe
|
"C:\Users\user\AppData\Roaming\Coinsw.app\PumpBotPremium\prerequisites\aipackagechainer.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "ver"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned
-Command "C:\Windows\SystemTemp\AI_D021.ps1 -paths 'C:\Users\user\AppData\Roaming\Coinsw.app\PumpBotPremium\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Coinsw.app\PumpBotPremium\prerequisites\aipackagechainer.exe','C:\Users\user\AppData\Roaming\Coinsw.app\PumpBotPremium','C:\Users\user\AppData\Roaming\Coinsw.app'
-retry_count 10"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 8 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.tinyvago.com/pip/x/requirements.php
|
167.99.214.194
|
||
https://onnx.ai/)
|
unknown
|
||
http://caffe.berkeleyvision.org/)
|
unknown
|
||
http://www.scipy.org/not/real/data.txt
|
unknown
|
||
https://github.com/opencv/opencv/issues/23152.
|
unknown
|
||
http://www.megginson.com/SAX/.
|
unknown
|
||
https://github.com/giampaolo/psutil/issues/875.
|
unknown
|
||
https://cloud.google.com/appengine/docs/standard/runtimes
|
unknown
|
||
http://torch.ch/)
|
unknown
|
||
https://web.archive.org/web/20090514091424/http://brighton-webs.co.uk:80/distributions/rayleigh.asp
|
unknown
|
||
https://web.archive.org/web/20170802060935/http://oss.sgi.com/projects/ogl-sample/registry/EXT/textu
|
unknown
|
||
https://github.com/opencv/opencv/issues/6293
|
unknown
|
||
https://github.com/opencv/opencv/issues/16739
|
unknown
|
||
http://goo.gl/zeJZl.
|
unknown
|
||
https://static.aminer.org/pdf/PDF/000/317/196/spatio_temporal_wiener_filtering_of_image_sequences_us
|
unknown
|
||
https://personal.math.ubc.ca/~cbm/aands/page_379.htm
|
unknown
|
||
https://github.com/torch/nn/blob/master/doc/module.md
|
unknown
|
||
https://streams.videolan.org/upload/
|
unknown
|
||
https://docs.python.org/X.Y/library/
|
unknown
|
||
https://docs.python.org/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://www.littlecms.com
|
unknown
|
||
https://tools.ietf.org/html/rfc3610
|
unknown
|
||
http://curl.haxx.se/rfc/cookie_spec.html
|
unknown
|
||
http://speleotrove.com/decimal/decarith.html
|
unknown
|
||
https://www.tensorflow.org/lite
|
unknown
|
||
http://www.gdal.org/ogr_formats.html).
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://arxiv.org/abs/1805.10941.
|
unknown
|
||
http://json.org
|
unknown
|
||
https://www.tensorflow.org/)
|
unknown
|
||
http://xml.python.org/entities/fragment-builder/internalz
|
unknown
|
||
http://httpbin.org/
|
unknown
|
||
http://docs.python.org/3/library/functools.html#functools.lru_cache.
|
unknown
|
||
https://exiv2.org/tags.html)
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://mathworld.wolfram.com/NegativeBinomialDistribution.html
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://www.itl.nist.gov/div898/software/dataplot/refman2/auxillar/powpdf.pdf
|
unknown
|
||
http://mail.python.org/pipermail/python-dev/2012-June/120787.html.
|
unknown
|
||
https://httpbin.org/
|
unknown
|
||
https://numpy.org/doc/stable/reference/random/index.html
|
unknown
|
||
http://www.cl.cam.ac.uk/~mgk25/iso-time.html
|
unknown
|
||
http://www.pcg-random.org/posts/developing-a-seed_seq-alternative.html
|
unknown
|
||
https://github.com/pypa/packagingz
|
unknown
|
||
https://metacpan.org/pod/distribution/Math-Cephes/lib/Math/Cephes.pod#i0:-Modified-Bessel-function-o
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://github.com/numpy/numpy/issues/4763
|
unknown
|
||
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
|
unknown
|
||
http://mathworld.wolfram.com/CauchyDistribution.html
|
unknown
|
||
https://brew.sh
|
unknown
|
||
http://tools.ietf.org/html/rfc6125#section-6.4.3
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://dashif.org/guidelines/trickmode
|
unknown
|
||
https://onnx.ai/
|
unknown
|
||
https://software.intel.com/openvino-toolkit)
|
unknown
|
||
http://caffe.berkeleyvision.org
|
unknown
|
||
https://askubuntu.com/questions/697397/python3-is-not-supporting-gtk-module
|
unknown
|
||
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
|
unknown
|
||
http://www.rfc-editor.org/info/rfc7253
|
unknown
|
||
https://github.com/pyca/cryptography/issues
|
unknown
|
||
https://web.archive.org/web/20080221202153/https://www.math.hmc.edu/~benjamin/papers/CombTrig.pdf
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
|
unknown
|
||
https://mahler:8092/site-updates.py
|
unknown
|
||
https://github.com/opencv/opencv/issues/21326cv::initOpenEXRD:
|
unknown
|
||
https://optimized-einsum.readthedocs.io/en/stable/
|
unknown
|
||
https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#https-proxy-error-http-proxy
|
unknown
|
||
https://pyperclip.readthedocs.io/en/latest/index.html#not-implemented-error
|
unknown
|
||
https://mouseinfo.readthedocs.io
|
unknown
|
||
https://www.cazabon.com
|
unknown
|
||
http://www.google.com/index.html
|
unknown
|
||
https://github.com/openvinotoolkit/open_model_zoo/blob/master/models/public/yolo-v2-tiny-tf/yolo-v2-
|
unknown
|
||
http://tip.tcl.tk/48)
|
unknown
|
||
https://github.com/python/cpython/blob/3.7/Objects/listsort.txt
|
unknown
|
||
http://pracrand.sourceforge.net/RNG_engines.txt
|
unknown
|
||
http://xml.org/sax/features/namespacesz.http://xml.org/sax/features/namespace-prefixesz
|
unknown
|
||
https://w3c.github.io/html/sec-forms.html#multipart-form-data
|
unknown
|
||
https://stat.ethz.ch/~stahel/lognormal/bioscience.pdf
|
unknown
|
||
https://github.com/opencv/opencv/issues/21326
|
unknown
|
||
http://www.iana.org/time-zones/repository/tz-link.html
|
unknown
|
||
https://docs.python.org/%d.%d/libraryNrMc
|
unknown
|
||
http://www.ipol.im/pub/algo/bcm_non_local_means_denoising
|
unknown
|
||
https://www.openblas.net/
|
unknown
|
||
http://code.activestate.com/recipes/577452-a-memoize-decorator-for-instance-methods/
|
unknown
|
||
https://www.python.org/
|
unknown
|
||
https://personal.math.ubc.ca/~cbm/aands/page_83.htm
|
unknown
|
||
https://www.python.org/dev/peps/pep-0205/
|
unknown
|
||
http://digitalassets.lib.berkeley.edu/sdtr/ucb/text/34.pdf
|
unknown
|
||
https://arxiv.org/abs/1704.04503
|
unknown
|
||
https://twitter.com/
|
unknown
|
||
https://stackoverflow.com/questions/4457745#4457745.
|
unknown
|
||
https://code.google.com/archive/p/casadebender/wikis/Win32IconImagePlugin.wiki
|
unknown
|
||
http://www.ipol.im/pub/algo/bcm_non_local_means_denoising/
|
unknown
|
||
http://www.pcg-random.org/
|
unknown
|
||
https://github.com/opencv/opencv/issues/20833.
|
unknown
|
||
https://github.com/pydata/bottleneck
|
unknown
|
||
http://www.iana.org/assignments/character-sets
|
unknown
|
||
https://people.eecs.berkeley.edu/~wkahan/ieee754status/IEEE754.PDF
|
unknown
|
||
http://google.com/mail/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
tinyvago.com
|
167.99.214.194
|
||
www.tinyvago.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
167.99.214.194
|
tinyvago.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\5c7179.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\5c7179.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6DB5160969F7E384196453C013ED49E7
|
534DCB62353D0A24C83418F80CAF53F4
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BF6FB7155C13AEE499C3201A92F68FBE
|
534DCB62353D0A24C83418F80CAF53F4
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B949A9FDB3C148A42A01073FFF5F9F01
|
534DCB62353D0A24C83418F80CAF53F4
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\Coinsw.app\PumpBotPremium\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\Coinsw.app\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Caphyon\Advanced Installer\Prereqs\{26BCD435-D353-42A0-8C43-818FC0FA354F}\1.0.0
|
BlockchainConnector
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Coinsw.app\PumpBotPremium
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Coinsw.app\PumpBotPremium
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\8C1673E38C1729C409FF3D2BF8D10659
|
534DCB62353D0A24C83418F80CAF53F4
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{26BCD435-D353-42A0-8C43-818FC0FA354F}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\534DCB62353D0A24C83418F80CAF53F4
|
MainFeature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\Features
|
MainFeature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\534DCB62353D0A24C83418F80CAF53F4
|
BlockchainConnector
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\Features
|
BlockchainConnector
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\534DCB62353D0A24C83418F80CAF53F4\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\534DCB62353D0A24C83418F80CAF53F4
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\534DCB62353D0A24C83418F80CAF53F4
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\534DCB62353D0A24C83418F80CAF53F4
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\534DCB62353D0A24C83418F80CAF53F4
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\534DCB62353D0A24C83418F80CAF53F4
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\534DCB62353D0A24C83418F80CAF53F4
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\534DCB62353D0A24C83418F80CAF53F4
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\534DCB62353D0A24C83418F80CAF53F4
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\534DCB62353D0A24C83418F80CAF53F4
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\8C1673E38C1729C409FF3D2BF8D10659
|
534DCB62353D0A24C83418F80CAF53F4
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\534DCB62353D0A24C83418F80CAF53F4\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\534DCB62353D0A24C83418F80CAF53F4\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\534DCB62353D0A24C83418F80CAF53F4
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\534DCB62353D0A24C83418F80CAF53F4\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\5c717b.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\5c717b.rbsLow
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_USERS.DEFAULT\InterbootContext
|
NULL
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer
|
TelemetrySalt
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\26\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2
|
Blob
|
There are 83 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FF7A34E8000
|
unkown
|
page readonly
|
||
7FF7A3361000
|
unkown
|
page execute read
|
||
4E0F000
|
trusted library allocation
|
page read and write
|
||
78B3000
|
trusted library allocation
|
page read and write
|
||
7395000
|
heap
|
page read and write
|
||
4AD0000
|
trusted library allocation
|
page read and write
|
||
329D000
|
heap
|
page read and write
|
||
19A0C93C000
|
heap
|
page read and write
|
||
520C000
|
trusted library allocation
|
page read and write
|
||
28D4000
|
heap
|
page read and write
|
||
3289E0E000
|
stack
|
page read and write
|
||
19A0C230000
|
heap
|
page read and write
|
||
7B21000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page execute and read and write
|
||
77EF000
|
heap
|
page read and write
|
||
2F0F000
|
unkown
|
page read and write
|
||
5556000
|
trusted library allocation
|
page read and write
|
||
19A0C8D3000
|
heap
|
page read and write
|
||
7FF664771000
|
unkown
|
page readonly
|
||
335A000
|
heap
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page execute and read and write
|
||
3320000
|
heap
|
page read and write
|
||
5311000
|
trusted library allocation
|
page read and write
|
||
19A0D68F000
|
heap
|
page read and write
|
||
4B7D000
|
trusted library allocation
|
page execute and read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
5C01000
|
trusted library allocation
|
page read and write
|
||
4AB2000
|
trusted library allocation
|
page read and write
|
||
92A4000
|
trusted library allocation
|
page read and write
|
||
76F0000
|
trusted library allocation
|
page read and write
|
||
742D000
|
heap
|
page read and write
|
||
19A0D68F000
|
heap
|
page read and write
|
||
7406000
|
heap
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
9A73000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
19A0C630000
|
direct allocation
|
page read and write
|
||
80C9000
|
trusted library allocation
|
page read and write
|
||
511A000
|
trusted library allocation
|
page read and write
|
||
5466000
|
trusted library allocation
|
page read and write
|
||
760D000
|
stack
|
page read and write
|
||
5485000
|
trusted library allocation
|
page read and write
|
||
19A09F7A000
|
heap
|
page read and write
|
||
2D9C000
|
stack
|
page read and write
|
||
7DD9000
|
trusted library allocation
|
page read and write
|
||
77B0000
|
trusted library allocation
|
page read and write
|
||
7DF0000
|
heap
|
page read and write
|
||
4BA5000
|
trusted library allocation
|
page execute and read and write
|
||
508E000
|
stack
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
719D000
|
stack
|
page read and write
|
||
78E2000
|
heap
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
7813000
|
heap
|
page read and write
|
||
7FF665186000
|
unkown
|
page readonly
|
||
19A09FCF000
|
heap
|
page read and write
|
||
5512000
|
trusted library allocation
|
page read and write
|
||
19A0D655000
|
heap
|
page read and write
|
||
8486000
|
heap
|
page read and write
|
||
72FD000
|
stack
|
page read and write
|
||
9280000
|
trusted library allocation
|
page read and write
|
||
82D0000
|
heap
|
page read and write
|
||
4BA2000
|
trusted library allocation
|
page read and write
|
||
51E3000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
heap
|
page read and write
|
||
739F000
|
stack
|
page read and write
|
||
19A0C236000
|
heap
|
page read and write
|
||
77F9000
|
heap
|
page read and write
|
||
2DE3000
|
trusted library allocation
|
page execute and read and write
|
||
77ED000
|
heap
|
page read and write
|
||
6DFD000
|
stack
|
page read and write
|
||
7639000
|
trusted library allocation
|
page read and write
|
||
8463000
|
heap
|
page read and write
|
||
19A0D733000
|
heap
|
page read and write
|
||
2D35000
|
heap
|
page read and write
|
||
7AE1000
|
trusted library allocation
|
page read and write
|
||
7699000
|
heap
|
page read and write
|
||
76E0000
|
heap
|
page read and write
|
||
50E0000
|
heap
|
page execute and read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
7ACD000
|
stack
|
page read and write
|
||
2D6000
|
unkown
|
page write copy
|
||
2A80000
|
heap
|
page read and write
|
||
D25000
|
heap
|
page read and write
|
||
75EC000
|
heap
|
page read and write
|
||
4650000
|
heap
|
page read and write
|
||
4B9A000
|
trusted library allocation
|
page execute and read and write
|
||
6CFE000
|
stack
|
page read and write
|
||
19A0BED4000
|
heap
|
page read and write
|
||
6F0B000
|
stack
|
page read and write
|
||
770E000
|
stack
|
page read and write
|
||
22D767AA000
|
heap
|
page read and write
|
||
19A0C2F1000
|
heap
|
page read and write
|
||
19A0CD30000
|
direct allocation
|
page read and write
|
||
19A0BF30000
|
direct allocation
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page execute and read and write
|
||
7B20000
|
trusted library allocation
|
page read and write
|
||
9284000
|
trusted library allocation
|
page read and write
|
||
19A0C9A0000
|
heap
|
page read and write
|
||
899D000
|
stack
|
page read and write
|
||
19A0D745000
|
heap
|
page read and write
|
||
7880000
|
trusted library allocation
|
page execute and read and write
|
||
22D768CE000
|
heap
|
page read and write
|
||
76CE000
|
stack
|
page read and write
|
||
774C000
|
heap
|
page read and write
|
||
2C98000
|
heap
|
page read and write
|
||
75D4000
|
heap
|
page read and write
|
||
19A0D5A3000
|
heap
|
page read and write
|
||
7940000
|
trusted library allocation
|
page read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
51F1000
|
trusted library allocation
|
page read and write
|
||
4EB3000
|
trusted library allocation
|
page read and write
|
||
19A0C274000
|
heap
|
page read and write
|
||
19A14548000
|
direct allocation
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
7368000
|
heap
|
page read and write
|
||
5005000
|
trusted library allocation
|
page read and write
|
||
7811000
|
heap
|
page read and write
|
||
78CC000
|
heap
|
page read and write
|
||
19A0CB64000
|
heap
|
page read and write
|
||
7820000
|
trusted library allocation
|
page execute and read and write
|
||
7491000
|
heap
|
page read and write
|
||
19A14051000
|
heap
|
page read and write
|
||
73C0000
|
heap
|
page read and write
|
||
501D000
|
trusted library allocation
|
page read and write
|
||
79C0000
|
trusted library allocation
|
page read and write
|
||
4B60000
|
trusted library allocation
|
page read and write
|
||
6119000
|
trusted library allocation
|
page read and write
|
||
7B15000
|
heap
|
page read and write
|
||
5035000
|
trusted library allocation
|
page read and write
|
||
93D000
|
stack
|
page read and write
|
||
4A70000
|
trusted library allocation
|
page read and write
|
||
5579000
|
trusted library allocation
|
page read and write
|
||
73B9000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
73B7000
|
stack
|
page read and write
|
||
4C63000
|
trusted library allocation
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
774D000
|
stack
|
page read and write
|
||
6FE0000
|
heap
|
page execute and read and write
|
||
7766000
|
trusted library allocation
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
55C5000
|
trusted library allocation
|
page read and write
|
||
19A0D765000
|
heap
|
page read and write
|
||
2B9C000
|
heap
|
page read and write
|
||
89DD000
|
stack
|
page read and write
|
||
78A8000
|
heap
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page read and write
|
||
4B50000
|
trusted library section
|
page read and write
|
||
758E000
|
stack
|
page read and write
|
||
22D76753000
|
heap
|
page read and write
|
||
D25000
|
heap
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
75A0000
|
heap
|
page execute and read and write
|
||
71CF000
|
stack
|
page read and write
|
||
558F000
|
trusted library allocation
|
page read and write
|
||
5191000
|
trusted library allocation
|
page read and write
|
||
19A0C243000
|
heap
|
page read and write
|
||
2DD9000
|
stack
|
page read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
210609B0000
|
heap
|
page read and write
|
||
7BF7000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
31DC000
|
heap
|
page read and write
|
||
47F0000
|
trusted library allocation
|
page read and write
|
||
5260000
|
trusted library allocation
|
page read and write
|
||
22D76A1F000
|
heap
|
page read and write
|
||
5CC9000
|
trusted library allocation
|
page read and write
|
||
33A6000
|
heap
|
page read and write
|
||
7860000
|
heap
|
page read and write
|
||
2D08000
|
heap
|
page read and write
|
||
22D78875000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
19A09FCF000
|
heap
|
page read and write
|
||
22D76913000
|
heap
|
page read and write
|
||
19A14284000
|
direct allocation
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
3286556000
|
stack
|
page read and write
|
||
19A0D446000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
4A8D000
|
trusted library allocation
|
page execute and read and write
|
||
72E0000
|
heap
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page execute and read and write
|
||
7E05000
|
trusted library allocation
|
page read and write
|
||
9275000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
49E8000
|
trusted library allocation
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
4FCA000
|
trusted library allocation
|
page read and write
|
||
19A0C280000
|
heap
|
page read and write
|
||
4A40000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
863E000
|
stack
|
page read and write
|
||
19A144C8000
|
direct allocation
|
page read and write
|
||
19A14370000
|
trusted library allocation
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
50D2000
|
trusted library allocation
|
page read and write
|
||
19A14490000
|
direct allocation
|
page read and write
|
||
74A3000
|
heap
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
22D767DB000
|
heap
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
7425000
|
heap
|
page read and write
|
||
741E000
|
stack
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
74D1000
|
heap
|
page read and write
|
||
19A0BE63000
|
heap
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page execute and read and write
|
||
211000
|
unkown
|
page execute read
|
||
2BEE000
|
heap
|
page read and write
|
||
6EAC000
|
stack
|
page read and write
|
||
7FF66476D000
|
unkown
|
page readonly
|
||
3310000
|
trusted library section
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
19A0D699000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library section
|
page read and write
|
||
7760000
|
trusted library allocation
|
page execute and read and write
|
||
D4E000
|
heap
|
page read and write
|
||
19A0C3F4000
|
heap
|
page read and write
|
||
33DD000
|
heap
|
page read and write
|
||
7818000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
51BB000
|
trusted library allocation
|
page read and write
|
||
3366000
|
heap
|
page read and write
|
||
8489000
|
heap
|
page read and write
|
||
7DFC000
|
heap
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
19A0CAF2000
|
heap
|
page read and write
|
||
315E000
|
stack
|
page read and write
|
||
19A0D6BF000
|
heap
|
page read and write
|
||
73AE000
|
heap
|
page read and write
|
||
78C0000
|
trusted library allocation
|
page read and write
|
||
47B9000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
heap
|
page read and write
|
||
7700000
|
heap
|
page read and write
|
||
87DE000
|
stack
|
page read and write
|
||
766E000
|
stack
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
5031000
|
trusted library allocation
|
page read and write
|
||
319E000
|
unkown
|
page read and write
|
||
73C0000
|
heap
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
7652000
|
heap
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
AFA000
|
stack
|
page read and write
|
||
22D78CC1000
|
heap
|
page read and write
|
||
19A0D397000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
7AFE000
|
stack
|
page read and write
|
||
7770000
|
trusted library allocation
|
page read and write
|
||
8422000
|
heap
|
page read and write
|
||
754E000
|
stack
|
page read and write
|
||
19A0BE7D000
|
heap
|
page read and write
|
||
517F000
|
trusted library allocation
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
32CA000
|
heap
|
page read and write
|
||
19A0CB58000
|
heap
|
page read and write
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
7B10000
|
trusted library allocation
|
page read and write
|
||
8370000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
19A0D3B7000
|
heap
|
page read and write
|
||
22D7897F000
|
heap
|
page read and write
|
||
19A0D394000
|
heap
|
page read and write
|
||
730A000
|
heap
|
page read and write
|
||
19A09F8E000
|
heap
|
page read and write
|
||
3039000
|
trusted library allocation
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
732A000
|
heap
|
page read and write
|
||
47AD000
|
trusted library allocation
|
page execute and read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
19A141B0000
|
direct allocation
|
page read and write
|
||
7C6D000
|
stack
|
page read and write
|
||
4A83000
|
trusted library allocation
|
page execute and read and write
|
||
2F48000
|
heap
|
page read and write
|
||
19A0C9A0000
|
heap
|
page read and write
|
||
19A0D6BF000
|
heap
|
page read and write
|
||
7CD0000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
19A0D670000
|
heap
|
page read and write
|
||
19A0D9F0000
|
direct allocation
|
page read and write
|
||
4A84000
|
trusted library allocation
|
page read and write
|
||
7851000
|
heap
|
page read and write
|
||
47D0000
|
trusted library allocation
|
page read and write
|
||
19A144A0000
|
direct allocation
|
page read and write
|
||
4F3C000
|
stack
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
70CD000
|
stack
|
page read and write
|
||
7FF7A3389000
|
unkown
|
page readonly
|
||
4DFE000
|
stack
|
page read and write
|
||
317D000
|
trusted library allocation
|
page read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
6FAB000
|
stack
|
page read and write
|
||
4FA2000
|
trusted library allocation
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page execute and read and write
|
||
338F000
|
stack
|
page read and write
|
||
3155000
|
heap
|
page read and write
|
||
19A09FCF000
|
heap
|
page read and write
|
||
4B40000
|
trusted library section
|
page read and write
|
||
324E000
|
heap
|
page read and write
|
||
7FF7A1560000
|
unkown
|
page readonly
|
||
7D6E000
|
stack
|
page read and write
|
||
6E9E000
|
stack
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
75CE000
|
stack
|
page read and write
|
||
19A0D39F000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
7FF667986000
|
unkown
|
page readonly
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
trusted library allocation
|
page read and write
|
||
7A30000
|
trusted library allocation
|
page read and write
|
||
786D000
|
stack
|
page read and write
|
||
19A0D1B0000
|
heap
|
page read and write
|
||
19A09F78000
|
heap
|
page read and write
|
||
19A0A145000
|
heap
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
6DEF000
|
stack
|
page read and write
|
||
19A0D676000
|
heap
|
page read and write
|
||
328949E000
|
stack
|
page read and write
|
||
19A0BECD000
|
heap
|
page read and write
|
||
7910000
|
trusted library allocation
|
page read and write
|
||
71DB000
|
stack
|
page read and write
|
||
50B9000
|
trusted library allocation
|
page read and write
|
||
19A0D675000
|
heap
|
page read and write
|
||
741A000
|
stack
|
page read and write
|
||
50D5000
|
heap
|
page execute and read and write
|
||
4A60000
|
trusted library section
|
page read and write
|
||
6D67000
|
stack
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
743E000
|
heap
|
page read and write
|
||
740C000
|
heap
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page read and write
|
||
739B000
|
heap
|
page read and write
|
||
731B000
|
stack
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
78B8000
|
heap
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
73C3000
|
heap
|
page read and write
|
||
77AE000
|
heap
|
page read and write
|
||
7440000
|
heap
|
page read and write
|
||
7630000
|
trusted library allocation
|
page read and write
|
||
19A0D3A9000
|
heap
|
page read and write
|
||
7420000
|
heap
|
page read and write
|
||
19A14380000
|
direct allocation
|
page read and write
|
||
4F77000
|
trusted library allocation
|
page read and write
|
||
869D000
|
stack
|
page read and write
|
||
19A14298000
|
direct allocation
|
page read and write
|
||
92AA000
|
trusted library allocation
|
page read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
19A0C246000
|
heap
|
page read and write
|
||
846E000
|
heap
|
page read and write
|
||
4C01000
|
trusted library allocation
|
page read and write
|
||
8075000
|
trusted library allocation
|
page read and write
|
||
19A0C130000
|
direct allocation
|
page read and write
|
||
5256000
|
trusted library allocation
|
page read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
7BBF000
|
stack
|
page read and write
|
||
19A0D68F000
|
heap
|
page read and write
|
||
70AE000
|
stack
|
page read and write
|
||
5262000
|
trusted library allocation
|
page read and write
|
||
50CF000
|
stack
|
page read and write
|
||
927A000
|
trusted library allocation
|
page read and write
|
||
71F1000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
19A0D679000
|
heap
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page execute and read and write
|
||
6E5E000
|
stack
|
page read and write
|
||
724E000
|
stack
|
page read and write
|
||
5545000
|
trusted library allocation
|
page read and write
|
||
7450000
|
heap
|
page execute and read and write
|
||
733A000
|
stack
|
page read and write
|
||
19A0D733000
|
heap
|
page read and write
|
||
3052000
|
trusted library allocation
|
page read and write
|
||
19A0CB6D000
|
heap
|
page read and write
|
||
19A0BE7F000
|
heap
|
page read and write
|
||
77D5000
|
heap
|
page read and write
|
||
19A0C9A0000
|
heap
|
page read and write
|
||
55A1000
|
trusted library allocation
|
page read and write
|
||
7FF7A2961000
|
unkown
|
page execute read
|
||
19A0BE30000
|
heap
|
page read and write
|
||
22D76A0D000
|
heap
|
page read and write
|
||
928C000
|
trusted library allocation
|
page read and write
|
||
5C09000
|
trusted library allocation
|
page read and write
|
||
5254000
|
trusted library allocation
|
page read and write
|
||
19A0D64F000
|
heap
|
page read and write
|
||
4DCE000
|
trusted library allocation
|
page read and write
|
||
5228000
|
trusted library allocation
|
page read and write
|
||
7FF666F86000
|
unkown
|
page readonly
|
||
61FA000
|
trusted library allocation
|
page read and write
|
||
7664000
|
heap
|
page read and write
|
||
7B00000
|
trusted library allocation
|
page read and write
|
||
AA4E38D000
|
stack
|
page read and write
|
||
7950000
|
trusted library allocation
|
page read and write
|
||
766C000
|
stack
|
page read and write
|
||
4E46000
|
trusted library allocation
|
page read and write
|
||
4FC9000
|
trusted library allocation
|
page read and write
|
||
7980000
|
trusted library allocation
|
page read and write
|
||
7760000
|
trusted library allocation
|
page read and write
|
||
6F4E000
|
stack
|
page read and write
|
||
2B08000
|
heap
|
page read and write
|
||
77A3000
|
heap
|
page read and write
|
||
7841000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
heap
|
page execute and read and write
|
||
19A0D74D000
|
heap
|
page read and write
|
||
4E35000
|
trusted library allocation
|
page read and write
|
||
72BE000
|
stack
|
page read and write
|
||
7930000
|
trusted library allocation
|
page read and write
|
||
7B3F000
|
stack
|
page read and write
|
||
8220000
|
trusted library allocation
|
page execute and read and write
|
||
739E000
|
stack
|
page read and write
|
||
2C0D000
|
unkown
|
page read and write
|
||
73A0000
|
trusted library allocation
|
page read and write
|
||
22D76A52000
|
heap
|
page read and write
|
||
782F000
|
heap
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page execute and read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
889D000
|
stack
|
page read and write
|
||
19A0D6BF000
|
heap
|
page read and write
|
||
743A000
|
stack
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
2F30000
|
trusted library section
|
page read and write
|
||
19A14360000
|
trusted library allocation
|
page read and write
|
||
6D201000
|
unkown
|
page execute read
|
||
702E000
|
stack
|
page read and write
|
||
19A09F91000
|
heap
|
page read and write
|
||
22D7684C000
|
heap
|
page read and write
|
||
3160000
|
trusted library allocation
|
page read and write
|
||
71AD000
|
stack
|
page read and write
|
||
55AC000
|
trusted library allocation
|
page read and write
|
||
19A0D584000
|
heap
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
5548000
|
trusted library allocation
|
page read and write
|
||
77C1000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
22D76901000
|
heap
|
page read and write
|
||
19A0BE5C000
|
heap
|
page read and write
|
||
7970000
|
heap
|
page read and write
|
||
7A8E000
|
stack
|
page read and write
|
||
6EEDB000
|
unkown
|
page readonly
|
||
2FE0000
|
heap
|
page read and write
|
||
19A0D0B0000
|
direct allocation
|
page read and write
|
||
6EE9000
|
stack
|
page read and write
|
||
999000
|
stack
|
page read and write
|
||
48BF000
|
stack
|
page read and write
|
||
19A144FC000
|
direct allocation
|
page read and write
|
||
6D200000
|
unkown
|
page readonly
|
||
D3B000
|
heap
|
page read and write
|
||
845A000
|
heap
|
page read and write
|
||
4C7C000
|
stack
|
page read and write
|
||
7449000
|
heap
|
page read and write
|
||
22D768DF000
|
heap
|
page read and write
|
||
19A0C938000
|
heap
|
page read and write
|
||
806F000
|
stack
|
page read and write
|
||
5005000
|
heap
|
page execute and read and write
|
||
19A0C830000
|
heap
|
page read and write
|
||
22D76A30000
|
heap
|
page read and write
|
||
50AF000
|
trusted library allocation
|
page read and write
|
||
19A14578000
|
direct allocation
|
page read and write
|
||
50F1000
|
trusted library allocation
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
47D2000
|
trusted library allocation
|
page read and write
|
||
7FF66476C000
|
unkown
|
page write copy
|
||
7B13000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
3055000
|
trusted library allocation
|
page execute and read and write
|
||
2DEF000
|
unkown
|
page read and write
|
||
7470000
|
trusted library allocation
|
page read and write
|
||
768D000
|
stack
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
2DE000
|
unkown
|
page readonly
|
||
789000
|
stack
|
page read and write
|
||
5259000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
79F0000
|
trusted library allocation
|
page read and write
|
||
6DBE000
|
stack
|
page read and write
|
||
70EE000
|
stack
|
page read and write
|
||
54E6000
|
trusted library allocation
|
page read and write
|
||
19A0D765000
|
heap
|
page read and write
|
||
19A0D395000
|
heap
|
page read and write
|
||
710D000
|
stack
|
page read and write
|
||
708B000
|
stack
|
page read and write
|
||
22D76743000
|
heap
|
page read and write
|
||
4E03000
|
trusted library allocation
|
page read and write
|
||
19A0D701000
|
heap
|
page read and write
|
||
19A0D419000
|
heap
|
page read and write
|
||
50EB000
|
trusted library allocation
|
page read and write
|
||
3040000
|
trusted library allocation
|
page read and write
|
||
7850000
|
trusted library allocation
|
page read and write
|
||
7FF664750000
|
unkown
|
page readonly
|
||
30F0000
|
heap
|
page read and write
|
||
7640000
|
trusted library allocation
|
page execute and read and write
|
||
19A0D2DB000
|
heap
|
page read and write
|
||
7B7D000
|
stack
|
page read and write
|
||
8A1E000
|
stack
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
76F0000
|
heap
|
page read and write
|
||
7DE0000
|
heap
|
page read and write
|
||
7DD1000
|
trusted library allocation
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
720E000
|
stack
|
page read and write
|
||
50AD000
|
trusted library allocation
|
page read and write
|
||
19A14EC0000
|
heap
|
page read and write
|
||
76D0000
|
trusted library allocation
|
page read and write
|
||
927D000
|
trusted library allocation
|
page read and write
|
||
19A09F7C000
|
heap
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page execute and read and write
|
||
74C000
|
stack
|
page read and write
|
||
19A0C9E2000
|
heap
|
page read and write
|
||
7D79000
|
trusted library allocation
|
page read and write
|
||
7BD0000
|
heap
|
page read and write
|
||
4EA4000
|
trusted library allocation
|
page read and write
|
||
21060A80000
|
heap
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
5271000
|
trusted library allocation
|
page read and write
|
||
7714000
|
heap
|
page read and write
|
||
7D70000
|
trusted library allocation
|
page read and write
|
||
77F1000
|
trusted library allocation
|
page read and write
|
||
19A0D485000
|
heap
|
page read and write
|
||
7AF5000
|
trusted library allocation
|
page read and write
|
||
19A0D74D000
|
heap
|
page read and write
|
||
19A0C530000
|
direct allocation
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
9B25000
|
trusted library allocation
|
page read and write
|
||
19A0D698000
|
heap
|
page read and write
|
||
7AF8000
|
heap
|
page read and write
|
||
86DE000
|
stack
|
page read and write
|
||
4E82000
|
trusted library allocation
|
page read and write
|
||
5339000
|
trusted library allocation
|
page read and write
|
||
7AC0000
|
heap
|
page read and write
|
||
45B0000
|
trusted library allocation
|
page read and write
|
||
7A81000
|
trusted library allocation
|
page read and write
|
||
45A9000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
7859000
|
trusted library allocation
|
page read and write
|
||
6FE5000
|
heap
|
page execute and read and write
|
||
7A80000
|
trusted library allocation
|
page read and write
|
||
871E000
|
stack
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
7FF666586000
|
unkown
|
page readonly
|
||
48F0000
|
heap
|
page read and write
|
||
19A14520000
|
direct allocation
|
page read and write
|
||
78C2000
|
heap
|
page read and write
|
||
7BBD000
|
stack
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
7FF7A337E000
|
unkown
|
page write copy
|
||
19A09FD8000
|
heap
|
page read and write
|
||
77D6000
|
heap
|
page read and write
|
||
4CA1000
|
trusted library allocation
|
page read and write
|
||
D22000
|
heap
|
page read and write
|
||
19A14AF7000
|
heap
|
page read and write
|
||
47D5000
|
trusted library allocation
|
page execute and read and write
|
||
7AE0000
|
trusted library allocation
|
page execute and read and write
|
||
6E3D000
|
stack
|
page read and write
|
||
7E05000
|
heap
|
page read and write
|
||
6DAE000
|
stack
|
page read and write
|
||
7FE0000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
509A000
|
trusted library allocation
|
page read and write
|
||
95C000
|
stack
|
page read and write
|
||
7FF665B86000
|
unkown
|
page readonly
|
||
762F000
|
stack
|
page read and write
|
||
82CE000
|
stack
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
3135000
|
heap
|
page read and write
|
||
2F7D000
|
stack
|
page read and write
|
||
770C000
|
heap
|
page read and write
|
||
875F000
|
stack
|
page read and write
|
||
7FF7A1560000
|
unkown
|
page readonly
|
||
19A09F7B000
|
heap
|
page read and write
|
||
19A09FB8000
|
heap
|
page read and write
|
||
2CBA000
|
heap
|
page read and write
|
||
19A0BC30000
|
direct allocation
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
5199000
|
trusted library allocation
|
page read and write
|
||
19A0A020000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
716E000
|
stack
|
page read and write
|
||
7FF664786000
|
unkown
|
page readonly
|
||
19A1455C000
|
direct allocation
|
page read and write
|
||
7890000
|
trusted library allocation
|
page read and write
|
||
6EECB000
|
unkown
|
page write copy
|
||
3288000
|
heap
|
page read and write
|
||
49E0000
|
trusted library allocation
|
page read and write
|
||
78C8000
|
heap
|
page read and write
|
||
19A0D26A000
|
heap
|
page read and write
|
||
33B2000
|
heap
|
page read and write
|
||
2DED000
|
trusted library allocation
|
page execute and read and write
|
||
19A0CA36000
|
heap
|
page read and write
|
||
7A4E000
|
stack
|
page read and write
|
||
5592000
|
trusted library allocation
|
page read and write
|
||
71FD000
|
stack
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
7DA0000
|
heap
|
page read and write
|
||
891E000
|
stack
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
7480000
|
trusted library allocation
|
page read and write
|
||
538A000
|
trusted library allocation
|
page read and write
|
||
7610000
|
trusted library allocation
|
page read and write
|
||
76E0000
|
trusted library allocation
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
76EE000
|
stack
|
page read and write
|
||
5554000
|
trusted library allocation
|
page read and write
|
||
4B98000
|
heap
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
7669000
|
heap
|
page read and write
|
||
80A0000
|
trusted library allocation
|
page read and write
|
||
4E21000
|
trusted library allocation
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page read and write
|
||
2DE000
|
unkown
|
page readonly
|
||
765F000
|
heap
|
page read and write
|
||
74B5000
|
heap
|
page read and write
|
||
19A0C237000
|
heap
|
page read and write
|
||
46FD000
|
stack
|
page read and write
|
||
19A0D66F000
|
heap
|
page read and write
|
||
7CAF000
|
stack
|
page read and write
|
||
551A000
|
trusted library allocation
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
19A0D2BD000
|
heap
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
7D2E000
|
stack
|
page read and write
|
||
7FF664783000
|
unkown
|
page write copy
|
||
19A0CB64000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
92A7000
|
trusted library allocation
|
page read and write
|
||
775C000
|
heap
|
page read and write
|
||
6C7D000
|
stack
|
page read and write
|
||
7490000
|
trusted library allocation
|
page read and write
|
||
8380000
|
heap
|
page read and write
|
||
7D80000
|
trusted library allocation
|
page read and write
|
||
72F9000
|
heap
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
7659000
|
heap
|
page read and write
|
||
4B89000
|
trusted library allocation
|
page read and write
|
||
7CE1000
|
trusted library allocation
|
page read and write
|
||
7452000
|
heap
|
page read and write
|
||
22D76A75000
|
heap
|
page read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
795F000
|
stack
|
page read and write
|
||
21060AA0000
|
heap
|
page read and write
|
||
8090000
|
heap
|
page read and write
|
||
47A3000
|
trusted library allocation
|
page execute and read and write
|
||
50C7000
|
trusted library allocation
|
page read and write
|
||
741F000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page execute and read and write
|
||
6CBE000
|
stack
|
page read and write
|
||
7750000
|
trusted library allocation
|
page read and write
|
||
7FF7A33C9000
|
unkown
|
page readonly
|
||
4EB3000
|
trusted library allocation
|
page read and write
|
||
80D0000
|
trusted library allocation
|
page read and write
|
||
19A0D37E000
|
heap
|
page read and write
|
||
78A0000
|
trusted library allocation
|
page read and write
|
||
210607CB000
|
heap
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page execute and read and write
|
||
22D78981000
|
heap
|
page read and write
|
||
4D1C000
|
trusted library allocation
|
page read and write
|
||
54F3000
|
trusted library allocation
|
page read and write
|
||
712E000
|
stack
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
19A09FD2000
|
heap
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
47A4000
|
trusted library allocation
|
page read and write
|
||
19A0C245000
|
heap
|
page read and write
|
||
7900000
|
heap
|
page execute and read and write
|
||
19A0D3AE000
|
heap
|
page read and write
|
||
4E3D000
|
trusted library allocation
|
page read and write
|
||
74B0000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
509C000
|
trusted library allocation
|
page read and write
|
||
22D7697B000
|
heap
|
page read and write
|
||
70AC000
|
stack
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
71F0000
|
heap
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page read and write
|
||
74AE000
|
heap
|
page read and write
|
||
74B2000
|
heap
|
page read and write
|
||
6E6B000
|
stack
|
page read and write
|
||
833E000
|
stack
|
page read and write
|
||
79A0000
|
trusted library allocation
|
page read and write
|
||
7435000
|
heap
|
page read and write
|
||
78B0000
|
trusted library allocation
|
page read and write
|
||
72BE000
|
stack
|
page read and write
|
||
4858000
|
trusted library allocation
|
page read and write
|
||
19A0BD30000
|
direct allocation
|
page read and write
|
||
841F000
|
heap
|
page read and write
|
||
55BC000
|
trusted library allocation
|
page read and write
|
||
3338000
|
heap
|
page read and write
|
||
706F000
|
stack
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
7FF664751000
|
unkown
|
page execute read
|
||
304A000
|
trusted library allocation
|
page execute and read and write
|
||
802E000
|
stack
|
page read and write
|
||
75E4000
|
heap
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
19A09FB9000
|
heap
|
page read and write
|
||
19A0CB5C000
|
heap
|
page read and write
|
||
5D0A000
|
trusted library allocation
|
page read and write
|
||
9A90000
|
trusted library allocation
|
page read and write
|
||
3117000
|
heap
|
page read and write
|
||
19A0D745000
|
heap
|
page read and write
|
||
8A61000
|
trusted library allocation
|
page read and write
|
||
19A0D722000
|
heap
|
page read and write
|
||
5E8C000
|
trusted library allocation
|
page read and write
|
||
6EEDA000
|
unkown
|
page read and write
|
||
2CDB000
|
stack
|
page read and write
|
||
4DC4000
|
trusted library allocation
|
page read and write
|
||
19A09FDB000
|
heap
|
page read and write
|
||
32D6000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
3023000
|
trusted library allocation
|
page execute and read and write
|
||
19A0D650000
|
heap
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
3326000
|
heap
|
page read and write
|
||
79A000
|
stack
|
page read and write
|
||
31DD000
|
unkown
|
page read and write
|
||
83CD000
|
heap
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
45C0000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4AE8000
|
heap
|
page read and write
|
||
88DC000
|
stack
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
7FF7A1561000
|
unkown
|
page execute read
|
||
22D7574D000
|
heap
|
page read and write
|
||
80C0000
|
trusted library allocation
|
page read and write
|
||
7443000
|
heap
|
page read and write
|
||
735E000
|
stack
|
page read and write
|
||
31B8000
|
heap
|
page read and write
|
||
77A0000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page execute and read and write
|
||
22D76A42000
|
heap
|
page read and write
|
||
4D3F000
|
stack
|
page read and write
|
||
4DB3000
|
trusted library allocation
|
page read and write
|
||
7DC1000
|
trusted library allocation
|
page read and write
|
||
55BA000
|
trusted library allocation
|
page read and write
|
||
19A0C8AF000
|
heap
|
page read and write
|
||
85FE000
|
stack
|
page read and write
|
||
5091000
|
trusted library allocation
|
page read and write
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
19A0C247000
|
heap
|
page read and write
|
||
5584000
|
trusted library allocation
|
page read and write
|
||
77D8000
|
heap
|
page read and write
|
||
7397000
|
heap
|
page read and write
|
||
2ACE000
|
unkown
|
page read and write
|
||
50A5000
|
trusted library allocation
|
page read and write
|
||
80B1000
|
trusted library allocation
|
page read and write
|
||
19A14528000
|
direct allocation
|
page read and write
|
||
2CC7000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
5598000
|
trusted library allocation
|
page read and write
|
||
4B60000
|
heap
|
page readonly
|
||
7597000
|
stack
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
3286EDD000
|
stack
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
4C90000
|
heap
|
page execute and read and write
|
||
505D000
|
stack
|
page read and write
|
||
19A14508000
|
direct allocation
|
page read and write
|
||
19A0D279000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
19A0D40B000
|
heap
|
page read and write
|
||
615B000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
712D000
|
stack
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
19A0DBE0000
|
direct allocation
|
page read and write
|
||
19A0C2DC000
|
heap
|
page read and write
|
||
8230000
|
trusted library allocation
|
page read and write
|
||
4850000
|
trusted library allocation
|
page read and write
|
||
19A0D3B1000
|
heap
|
page read and write
|
||
19A14580000
|
direct allocation
|
page read and write
|
||
768E000
|
stack
|
page read and write
|
||
7446000
|
heap
|
page read and write
|
||
7439000
|
heap
|
page read and write
|
||
7800000
|
trusted library allocation
|
page read and write
|
||
45BA000
|
trusted library allocation
|
page execute and read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
4B73000
|
trusted library allocation
|
page execute and read and write
|
||
77EA000
|
heap
|
page read and write
|
||
4A99000
|
trusted library allocation
|
page read and write
|
||
5C6A000
|
trusted library allocation
|
page read and write
|
||
19A0CE60000
|
direct allocation
|
page read and write
|
||
328784E000
|
stack
|
page read and write
|
||
73C8000
|
heap
|
page read and write
|
||
21060A70000
|
heap
|
page read and write
|
||
D08000
|
heap
|
page read and write
|
||
4870000
|
heap
|
page execute and read and write
|
||
19A13F40000
|
direct allocation
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
4FC8000
|
trusted library allocation
|
page read and write
|
||
76AE000
|
stack
|
page read and write
|
||
79E0000
|
trusted library allocation
|
page read and write
|
||
518F000
|
trusted library allocation
|
page read and write
|
||
762E000
|
stack
|
page read and write
|
||
938000
|
stack
|
page read and write
|
||
74AC000
|
heap
|
page read and write
|
||
19A0D426000
|
heap
|
page read and write
|
||
738E000
|
heap
|
page read and write
|
||
75C4000
|
heap
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
6D30000
|
heap
|
page execute and read and write
|
||
3130000
|
heap
|
page read and write
|
||
2CE9000
|
stack
|
page read and write
|
||
22D7614D000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
527B000
|
trusted library allocation
|
page read and write
|
||
19A13E40000
|
direct allocation
|
page read and write
|
||
85BE000
|
stack
|
page read and write
|
||
7180000
|
heap
|
page read and write
|
||
19A0C281000
|
heap
|
page read and write
|
||
7AF0000
|
heap
|
page read and write
|
||
727E000
|
stack
|
page read and write
|
||
782E000
|
stack
|
page read and write
|
||
3024000
|
trusted library allocation
|
page read and write
|
||
6D2D000
|
stack
|
page read and write
|
||
73DE000
|
stack
|
page read and write
|
||
4DEE000
|
trusted library allocation
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
2AE000
|
unkown
|
page readonly
|
||
19A0D749000
|
heap
|
page read and write
|
||
519B000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
6F6D000
|
stack
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
2B8E000
|
unkown
|
page read and write
|
||
828E000
|
stack
|
page read and write
|
||
737C000
|
stack
|
page read and write
|
||
6EF0000
|
heap
|
page read and write
|
||
19A14570000
|
direct allocation
|
page read and write
|
||
2D41000
|
heap
|
page read and write
|
||
45C5000
|
trusted library allocation
|
page execute and read and write
|
||
45E0000
|
trusted library allocation
|
page read and write
|
||
5188000
|
heap
|
page read and write
|
||
4FDE000
|
stack
|
page read and write
|
||
79B0000
|
trusted library allocation
|
page read and write
|
||
704D000
|
stack
|
page read and write
|
||
6D7D000
|
stack
|
page read and write
|
||
6E601000
|
unkown
|
page execute read
|
||
328A77E000
|
stack
|
page read and write
|
||
7FF7A1F61000
|
unkown
|
page execute read
|
||
7FF7A34E2000
|
unkown
|
page write copy
|
||
19A0A040000
|
heap
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
733E000
|
stack
|
page read and write
|
||
32881BE000
|
stack
|
page read and write
|
||
7990000
|
trusted library allocation
|
page read and write
|
||
22D7696A000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
73F7000
|
heap
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
4E10000
|
heap
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
2FE6000
|
heap
|
page read and write
|
||
22D7699D000
|
heap
|
page read and write
|
||
5524000
|
trusted library allocation
|
page read and write
|
||
72E9000
|
heap
|
page read and write
|
||
7DB0000
|
trusted library allocation
|
page read and write
|
||
31E9000
|
heap
|
page read and write
|
||
74B9000
|
heap
|
page read and write
|
||
19A0D749000
|
heap
|
page read and write
|
||
5180000
|
heap
|
page read and write
|
||
19A0D65B000
|
heap
|
page read and write
|
||
879E000
|
stack
|
page read and write
|
||
2D6000
|
unkown
|
page read and write
|
||
61B9000
|
trusted library allocation
|
page read and write
|
||
19A0BE61000
|
heap
|
page read and write
|
||
75EE000
|
stack
|
page read and write
|
||
791E000
|
stack
|
page read and write
|
||
9A83000
|
trusted library allocation
|
page read and write
|
||
22D77E75000
|
heap
|
page read and write
|
||
19A0D65B000
|
heap
|
page read and write
|
||
4E1F000
|
trusted library allocation
|
page read and write
|
||
929E000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
19A0CAB0000
|
heap
|
page read and write
|
||
22D769FD000
|
heap
|
page read and write
|
||
4E16000
|
trusted library allocation
|
page read and write
|
||
60F1000
|
trusted library allocation
|
page read and write
|
||
210607C0000
|
heap
|
page read and write
|
||
22D768F1000
|
heap
|
page read and write
|
||
22D767BB000
|
heap
|
page read and write
|
||
7790000
|
trusted library allocation
|
page read and write
|
||
7AA0000
|
trusted library allocation
|
page read and write
|
||
7883000
|
heap
|
page read and write
|
||
77FD000
|
heap
|
page read and write
|
||
342C000
|
heap
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
6F070000
|
unkown
|
page readonly
|
||
4B78000
|
trusted library allocation
|
page read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
19A0D1F8000
|
heap
|
page read and write
|
||
19A0D401000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page execute and read and write
|
||
2F10000
|
heap
|
page read and write
|
||
19A0D3A0000
|
heap
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
6FCC000
|
stack
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
76CF000
|
stack
|
page read and write
|
||
2DAE000
|
unkown
|
page read and write
|
||
7D6E000
|
stack
|
page read and write
|
||
D41000
|
heap
|
page read and write
|
||
47CA000
|
trusted library allocation
|
page execute and read and write
|
||
3258000
|
heap
|
page read and write
|
||
6EEC9000
|
unkown
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
4D31000
|
trusted library allocation
|
page read and write
|
||
19A0C3F4000
|
heap
|
page read and write
|
||
22D767AE000
|
heap
|
page read and write
|
||
7200000
|
heap
|
page read and write
|
||
19A0D6BF000
|
heap
|
page read and write
|
||
19A1457C000
|
direct allocation
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
2FE5000
|
heap
|
page read and write
|
||
5506000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7630000
|
trusted library allocation
|
page read and write
|
||
210607A0000
|
heap
|
page read and write
|
||
6F06D000
|
unkown
|
page write copy
|
||
2DDB000
|
stack
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
211000
|
unkown
|
page execute read
|
||
5181000
|
trusted library allocation
|
page read and write
|
||
19A09FBF000
|
heap
|
page read and write
|
||
6D35000
|
heap
|
page execute and read and write
|
||
73DD000
|
stack
|
page read and write
|
||
19A0DD20000
|
direct allocation
|
page read and write
|
||
19A0D3B6000
|
heap
|
page read and write
|
||
7AFE000
|
heap
|
page read and write
|
||
6E2D000
|
stack
|
page read and write
|
||
19A144D4000
|
direct allocation
|
page read and write
|
||
7870000
|
trusted library allocation
|
page read and write
|
||
2BC5000
|
heap
|
page read and write
|
||
33C5000
|
heap
|
page read and write
|
||
19A0CB6D000
|
heap
|
page read and write
|
||
19A0CC30000
|
direct allocation
|
page read and write
|
||
7BE0000
|
heap
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
76D0000
|
trusted library allocation
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
7460000
|
heap
|
page read and write
|
||
7774000
|
heap
|
page read and write
|
||
4CCC000
|
trusted library allocation
|
page read and write
|
||
5060000
|
trusted library allocation
|
page read and write
|
||
4A3C000
|
stack
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
7B10000
|
heap
|
page read and write
|
||
527D000
|
trusted library allocation
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
6C3C000
|
stack
|
page read and write
|
||
7B30000
|
trusted library allocation
|
page execute and read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
5057000
|
trusted library allocation
|
page read and write
|
||
511F000
|
stack
|
page read and write
|
||
7AD0000
|
trusted library allocation
|
page read and write
|
||
19A0C2F6000
|
heap
|
page read and write
|
||
5170000
|
heap
|
page execute and read and write
|
||
19A09F20000
|
heap
|
page read and write
|
||
767E000
|
heap
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
2DE4000
|
trusted library allocation
|
page read and write
|
||
19A0C730000
|
direct allocation
|
page read and write
|
||
7742000
|
heap
|
page read and write
|
||
4E18000
|
heap
|
page read and write
|
||
501C000
|
stack
|
page read and write
|
||
22D7679E000
|
heap
|
page read and write
|
||
2B36000
|
heap
|
page read and write
|
||
76A9000
|
stack
|
page read and write
|
||
92A1000
|
trusted library allocation
|
page read and write
|
||
19A0C8CF000
|
heap
|
page read and write
|
||
4840000
|
heap
|
page readonly
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
6F002000
|
unkown
|
page readonly
|
||
77EF000
|
stack
|
page read and write
|
||
50D0000
|
heap
|
page execute and read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
D3B000
|
heap
|
page read and write
|
||
881E000
|
stack
|
page read and write
|
||
19A0D6BF000
|
heap
|
page read and write
|
||
8442000
|
heap
|
page read and write
|
||
4640000
|
trusted library allocation
|
page execute and read and write
|
||
19A0D796000
|
heap
|
page read and write
|
||
19A0C2DB000
|
heap
|
page read and write
|
||
723B000
|
stack
|
page read and write
|
||
4E5D000
|
trusted library allocation
|
page read and write
|
||
4A95000
|
heap
|
page execute and read and write
|
||
19A09F5A000
|
heap
|
page read and write
|
||
7D2E000
|
stack
|
page read and write
|
||
4630000
|
heap
|
page readonly
|
||
5003000
|
trusted library allocation
|
page read and write
|
||
755D000
|
stack
|
page read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
45A0000
|
trusted library allocation
|
page read and write
|
||
70E6000
|
stack
|
page read and write
|
||
19A09F40000
|
heap
|
page read and write
|
||
19A0C3EC000
|
heap
|
page read and write
|
||
19A0BE5D000
|
heap
|
page read and write
|
||
21060990000
|
heap
|
page read and write
|
||
73D7000
|
heap
|
page read and write
|
||
19A0D3FA000
|
heap
|
page read and write
|
||
2D0F000
|
heap
|
page read and write
|
||
7A0E000
|
stack
|
page read and write
|
||
19A0C8BE000
|
heap
|
page read and write
|
||
72FE000
|
stack
|
page read and write
|
||
73FE000
|
stack
|
page read and write
|
||
4C6E000
|
stack
|
page read and write
|
||
22D74D4D000
|
heap
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
4AB5000
|
trusted library allocation
|
page execute and read and write
|
||
4C50000
|
heap
|
page readonly
|
||
302D000
|
trusted library allocation
|
page execute and read and write
|
||
700A000
|
stack
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
554C000
|
trusted library allocation
|
page read and write
|
||
7AF0000
|
trusted library allocation
|
page read and write
|
||
5207000
|
trusted library allocation
|
page read and write
|
||
508F000
|
trusted library allocation
|
page read and write
|
||
7720000
|
trusted library allocation
|
page read and write
|
||
19A0CA28000
|
heap
|
page read and write
|
||
6EDE000
|
stack
|
page read and write
|
||
19A09E30000
|
heap
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
4E53000
|
trusted library allocation
|
page read and write
|
||
19A1454C000
|
direct allocation
|
page read and write
|
||
7704000
|
heap
|
page read and write
|
||
3288B2E000
|
stack
|
page read and write
|
||
19A14498000
|
direct allocation
|
page read and write
|
||
19A0D2BD000
|
heap
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
8210000
|
heap
|
page read and write
|
||
5287000
|
trusted library allocation
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
19A141E0000
|
direct allocation
|
page read and write
|
||
5012000
|
trusted library allocation
|
page read and write
|
||
6ECD000
|
stack
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
54CA000
|
trusted library allocation
|
page read and write
|
||
75EE000
|
stack
|
page read and write
|
||
19A0C276000
|
heap
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
6191000
|
trusted library allocation
|
page read and write
|
||
19A09F5D000
|
heap
|
page read and write
|
||
51F3000
|
trusted library allocation
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
2DC0000
|
trusted library section
|
page read and write
|
||
22D76924000
|
heap
|
page read and write
|
||
22D77475000
|
heap
|
page read and write
|
||
22D7698C000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
71EB000
|
stack
|
page read and write
|
||
8A5D000
|
stack
|
page read and write
|
||
19A0BED9000
|
heap
|
page read and write
|
||
7750000
|
trusted library allocation
|
page read and write
|
||
45C2000
|
trusted library allocation
|
page read and write
|
||
48D0000
|
trusted library allocation
|
page read and write
|
||
504F000
|
stack
|
page read and write
|
||
AA4E7FE000
|
stack
|
page read and write
|
||
745E000
|
stack
|
page read and write
|
||
50D5000
|
trusted library allocation
|
page read and write
|
||
4AAA000
|
trusted library allocation
|
page execute and read and write
|
||
AA4E6FF000
|
unkown
|
page read and write
|
||
50A1000
|
trusted library allocation
|
page read and write
|
||
19A14564000
|
direct allocation
|
page read and write
|
||
19A0C430000
|
direct allocation
|
page read and write
|
||
2FD0000
|
trusted library section
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
3197000
|
heap
|
page read and write
|
||
19A0A140000
|
heap
|
page read and write
|
||
5CA1000
|
trusted library allocation
|
page read and write
|
||
19A0D68F000
|
heap
|
page read and write
|
||
4B74000
|
trusted library allocation
|
page read and write
|
||
30D0000
|
heap
|
page readonly
|
||
49EA000
|
trusted library allocation
|
page read and write
|
||
7A20000
|
heap
|
page execute and read and write
|
||
19A145E0000
|
heap
|
page read and write
|
||
22D76A64000
|
heap
|
page read and write
|
||
7980000
|
heap
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
7685000
|
heap
|
page read and write
|
||
19A09F9C000
|
heap
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
895E000
|
stack
|
page read and write
|
||
8145000
|
trusted library allocation
|
page read and write
|
||
7600000
|
heap
|
page read and write
|
||
77AE000
|
stack
|
page read and write
|
||
5249000
|
trusted library allocation
|
page read and write
|
||
772F000
|
stack
|
page read and write
|
||
526D000
|
trusted library allocation
|
page read and write
|
||
7B7E000
|
stack
|
page read and write
|
||
4E2A000
|
trusted library allocation
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
50EF000
|
trusted library allocation
|
page read and write
|
||
76A4000
|
heap
|
page read and write
|
||
19A13FC0000
|
direct allocation
|
page read and write
|
||
73B0000
|
heap
|
page execute and read and write
|
||
19A0A0E0000
|
unkown
|
page readonly
|
||
6DC01000
|
unkown
|
page execute read
|
||
556E000
|
trusted library allocation
|
page read and write
|
||
716A000
|
stack
|
page read and write
|
||
2CAC000
|
stack
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
4E92000
|
trusted library allocation
|
page read and write
|
||
72DD000
|
stack
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
885E000
|
stack
|
page read and write
|
||
5594000
|
trusted library allocation
|
page read and write
|
||
313C000
|
stack
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
7AD0000
|
trusted library allocation
|
page read and write
|
||
51AD000
|
trusted library allocation
|
page read and write
|
||
19A0CA6E000
|
heap
|
page read and write
|
||
7CC0000
|
heap
|
page read and write
|
||
2AE000
|
unkown
|
page readonly
|
||
6F06C000
|
unkown
|
page read and write
|
||
48C0000
|
trusted library allocation
|
page execute and read and write
|
||
19A0D67A000
|
heap
|
page read and write
|
||
7FF7A1561000
|
unkown
|
page execute read
|
There are 1142 hidden memdumps, click here to show them.