Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
DeskTimeSetup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\DeskTime\DeskTime.exe (copy)
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\DeskTime\CrashReporter.NET.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\DeskTime\es\CrashReporter.NET.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\DeskTime\es\DeskTime.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\DeskTime\es\is-5PQBT.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\DeskTime\es\is-PKMHG.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\DeskTime\is-COTMF.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\DeskTime\is-NHIFB.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\DeskTime\is-PVMFV.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\DeskTime\lv\DeskTime.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\DeskTime\lv\is-9GV88.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\DeskTime\unins000.dat
|
InnoSetup Log DeskTime, version 0x418, 53694 bytes, 609290\37\user\37, C:\Users\user\AppData\Local\DeskTime\376
|
dropped
|
||
C:\Users\user\AppData\Local\DeskTime\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\DeskTime\unins000.msg
|
InnoSetup messages, version 6.0.0, 261 messages (UTF-16), Cancel installation
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DeskTime.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-1DNPB.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-1DNPB.tmp\idp.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-1DNPB.tmp\isxdl.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-T4572.tmp\DeskTimeSetup.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\DeskTime\DeskTime.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Jan 15 16:28:03 2025, mtime=Wed Jan 15 16:28:04 2025, atime=Thu Dec 19 14:59:10 2024, length=2364664, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\DeskTime\Uninstall DeskTime.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Jan 15 16:28:03 2025, mtime=Wed Jan 15 16:28:03 2025, atime=Wed Jan 15 16:27:53 2025, length=3231992, window=hide
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\AppData\Local\DeskTime\DeskTime.exe
|
"C:\Users\user\AppData\Local\DeskTime\DeskTime.exe"
|
||
C:\Users\user\AppData\Local\DeskTime\DeskTime.exe
|
"C:\Users\user\AppData\Local\DeskTime\DeskTime.exe"
|
||
C:\Users\user\AppData\Local\DeskTime\DeskTime.exe
|
"C:\Users\user\AppData\Local\DeskTime\DeskTime.exe"
|
||
C:\Users\user\Desktop\DeskTimeSetup.exe
|
"C:\Users\user\Desktop\DeskTimeSetup.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-T4572.tmp\DeskTimeSetup.tmp
|
"C:\Users\user\AppData\Local\Temp\is-T4572.tmp\DeskTimeSetup.tmp" /SL5="$10462,1981594,885248,C:\Users\user\Desktop\DeskTimeSetup.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
https://in.desktime.com/api/v3/json/ping
|
139.59.93.85
|
||
https://desktime.com/updates/win/version/?json=true¤t=1.3.668(
|
unknown
|
||
https://www.drdump.com/servicesTU
|
unknown
|
||
https://desktime.com/updates/win/update/
|
unknown
|
||
http://schemas.datacontract.org/2004/07/
|
unknown
|
||
https://www.drdump.com/services
|
unknown
|
||
http://twitter.com
|
unknown
|
||
http://schemas.datacontract.org/2004/07/DeskTime
|
unknown
|
||
https://local.desktime.com
|
unknown
|
||
http://google.com
|
unknown
|
||
https://desktime.com/updates/win/version/?json=true¤t=1.3.668WS
|
unknown
|
||
https://www.telerik.com/blogs/winforms-scaling-at-large-dpi-settings-is-it-even-possible
|
unknown
|
||
https://www.drdump.com/services/IdolSoftware.DoctorDump.CrashReporterGate.CrashReporterReportUploade
|
unknown
|
||
https://www.drdump.com/servicesT
|
unknown
|
||
https://drdump.com/Service/CrashReporterReportUploader.svcQCrashReporterDotNET.Properties.Resources
|
unknown
|
||
http://desktime.com
|
unknown
|
||
https://in.desktime.com
|
unknown
|
||
https://www.drdump.com/servicesX
|
unknown
|
||
https://us.desktime.com
|
unknown
|
||
https://www.remobjects.com/ps
|
unknown
|
||
https://desktime.com/updates/win/version/?json=true¤t=1.3.668
|
104.22.9.120
|
||
http://desktime.comd
|
unknown
|
||
https://www.innosetup.com/
|
unknown
|
||
https://desktime.com/updates/win/version/?json=true¤t=1.3.668y
|
unknown
|
||
http://www.istool.org/
|
unknown
|
||
https://desktime.com/https://in.desktime.com
|
unknown
|
||
http://linkedin.com
|
unknown
|
||
http://bitbucket.org/mitrich_k/inno-download-plugin
|
unknown
|
||
https://desktime.com/api/v3/json/ping
|
104.22.9.120
|
||
https://us.desktime.com/api/v3/json/ping
|
68.183.17.53
|
||
https://desktime.comD
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://mitrichsoftware.wordpress.comB
|
unknown
|
||
https://desktime.com
|
unknown
|
||
http://drdump.com/Service/CrashReporterReportUploader.svcY
|
unknown
|
||
http://drdump.com/Service/CrashReporterReportUploader.svc
|
unknown
|
There are 27 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
us.desktime.com
|
68.183.17.53
|
||
in.desktime.com
|
139.59.93.85
|
||
desktime.com
|
104.22.9.120
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.22.9.120
|
desktime.com
|
United States
|
||
68.183.17.53
|
us.desktime.com
|
United States
|
||
139.59.93.85
|
in.desktime.com
|
Singapore
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\DeskTime, SIA\DeskTime\1.3
|
silent
|
||
HKEY_CURRENT_USER\SOFTWARE\DeskTime, SIA\DeskTime\1.3
|
msi
|
||
HKEY_CURRENT_USER\SOFTWARE\DeskTime, SIA\DeskTime\1.3
|
authProvider
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
DeskTime
|
||
HKEY_CURRENT_USER_Classes\desktime
|
NULL
|
||
HKEY_CURRENT_USER_Classes\desktime
|
URL Protocol
|
||
HKEY_CURRENT_USER_Classes\desktime\DefaultIcon
|
NULL
|
||
HKEY_CURRENT_USER_Classes\desktime\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
Inno Setup: Setup Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
Inno Setup: App Path
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
InstallLocation
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
Inno Setup: Icon Group
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
Inno Setup: User
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
Inno Setup: Selected Tasks
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
Inno Setup: Deselected Tasks
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
Inno Setup: Language
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
DisplayIcon
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
QuietUninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
InstallDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
MajorVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
MinorVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
VersionMajor
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
VersionMinor
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
|
EstimatedSize
|
||
HKEY_CURRENT_USER\SOFTWARE\DeskTime, SIA\DeskTime\1.3
|
lastRun
|
||
HKEY_CURRENT_USER\SOFTWARE\DeskTime, SIA\DeskTime\1.3
|
version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASMANCS
|
FileDirectory
|
There are 42 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
57D2000
|
trusted library allocation
|
page read and write
|
||
22DB000
|
direct allocation
|
page read and write
|
||
227C000
|
direct allocation
|
page read and write
|
||
6200000
|
trusted library allocation
|
page execute and read and write
|
||
A3B000
|
heap
|
page read and write
|
||
1615000
|
heap
|
page read and write
|
||
7FB30000
|
direct allocation
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
2387000
|
direct allocation
|
page read and write
|
||
23FF000
|
direct allocation
|
page read and write
|
||
5C0E000
|
stack
|
page read and write
|
||
9ABE000
|
stack
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
6251000
|
heap
|
page read and write
|
||
4AED000
|
stack
|
page read and write
|
||
A2C2000
|
heap
|
page read and write
|
||
22C4000
|
direct allocation
|
page read and write
|
||
A270000
|
heap
|
page read and write
|
||
5901000
|
trusted library allocation
|
page read and write
|
||
30CC000
|
trusted library allocation
|
page read and write
|
||
57E8000
|
trusted library allocation
|
page read and write
|
||
2B3B000
|
trusted library allocation
|
page read and write
|
||
A0D000
|
heap
|
page read and write
|
||
236A000
|
direct allocation
|
page read and write
|
||
7930000
|
trusted library section
|
page read and write
|
||
3B1F000
|
stack
|
page read and write
|
||
29E7000
|
trusted library allocation
|
page read and write
|
||
29D7000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
stack
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
4C2000
|
unkown
|
page write copy
|
||
2354000
|
direct allocation
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
15B4000
|
heap
|
page read and write
|
||
6210000
|
trusted library allocation
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
2371000
|
direct allocation
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
2951000
|
trusted library allocation
|
page read and write
|
||
18A4000
|
trusted library allocation
|
page read and write
|
||
5912000
|
trusted library allocation
|
page read and write
|
||
29EB000
|
trusted library allocation
|
page read and write
|
||
29D3000
|
trusted library allocation
|
page read and write
|
||
16AF000
|
heap
|
page read and write
|
||
2458000
|
direct allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
4F4D000
|
stack
|
page read and write
|
||
34A0000
|
direct allocation
|
page read and write
|
||
2424000
|
direct allocation
|
page read and write
|
||
A2B9000
|
heap
|
page read and write
|
||
4958000
|
trusted library allocation
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
36A0000
|
heap
|
page read and write
|
||
2B1E000
|
trusted library allocation
|
page read and write
|
||
7537000
|
direct allocation
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
248A000
|
direct allocation
|
page read and write
|
||
1840000
|
trusted library allocation
|
page read and write
|
||
29CC000
|
trusted library allocation
|
page read and write
|
||
A04000
|
heap
|
page read and write
|
||
595E000
|
stack
|
page read and write
|
||
2BED000
|
trusted library allocation
|
page read and write
|
||
2A14000
|
trusted library allocation
|
page read and write
|
||
A2D4000
|
heap
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
23FC000
|
direct allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
7E8E000
|
stack
|
page read and write
|
||
754D000
|
direct allocation
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
6023000
|
heap
|
page read and write
|
||
239C000
|
direct allocation
|
page read and write
|
||
7620000
|
direct allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
23DB000
|
direct allocation
|
page read and write
|
||
165A000
|
heap
|
page read and write
|
||
F6D000
|
stack
|
page read and write
|
||
4E74000
|
trusted library allocation
|
page read and write
|
||
A42000
|
heap
|
page read and write
|
||
2A1C000
|
trusted library allocation
|
page read and write
|
||
36D5000
|
heap
|
page read and write
|
||
2EA3000
|
trusted library allocation
|
page read and write
|
||
7566000
|
direct allocation
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
2B0D000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
5906000
|
trusted library allocation
|
page read and write
|
||
36D0000
|
heap
|
page read and write
|
||
5970000
|
trusted library allocation
|
page read and write
|
||
39DF000
|
stack
|
page read and write
|
||
58E4000
|
trusted library allocation
|
page read and write
|
||
178F000
|
stack
|
page read and write
|
||
22AE000
|
direct allocation
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
11B8000
|
stack
|
page read and write
|
||
37E1000
|
heap
|
page read and write
|
||
5B5E000
|
stack
|
page read and write
|
||
716000
|
stack
|
page read and write
|
||
6225000
|
heap
|
page read and write
|
||
39D8000
|
trusted library allocation
|
page read and write
|
||
A490000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page execute and read and write
|
||
3270000
|
trusted library allocation
|
page read and write
|
||
3761000
|
heap
|
page read and write
|
||
5802000
|
trusted library allocation
|
page read and write
|
||
1860000
|
trusted library allocation
|
page execute and read and write
|
||
A5DE000
|
stack
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
1610000
|
trusted library allocation
|
page read and write
|
||
7DD000
|
stack
|
page read and write
|
||
1102000
|
trusted library allocation
|
page read and write
|
||
3761000
|
heap
|
page read and write
|
||
CDF000
|
heap
|
page read and write
|
||
34D8000
|
direct allocation
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
164F000
|
heap
|
page read and write
|
||
1790000
|
heap
|
page read and write
|
||
5E50000
|
heap
|
page execute and read and write
|
||
E1D000
|
trusted library allocation
|
page execute and read and write
|
||
5C9E000
|
stack
|
page read and write
|
||
94BE000
|
stack
|
page read and write
|
||
5B1E000
|
stack
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page execute and read and write
|
||
2680000
|
heap
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
2466000
|
direct allocation
|
page read and write
|
||
532C000
|
stack
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
A480000
|
trusted library allocation
|
page read and write
|
||
B7DD000
|
stack
|
page read and write
|
||
7CCE000
|
stack
|
page read and write
|
||
9160000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
stack
|
page read and write
|
||
A2D7000
|
heap
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
A70E000
|
stack
|
page read and write
|
||
586E000
|
stack
|
page read and write
|
||
58F8000
|
trusted library allocation
|
page read and write
|
||
6D9000
|
unkown
|
page write copy
|
||
303E000
|
stack
|
page read and write
|
||
5FE0000
|
heap
|
page read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
3490000
|
direct allocation
|
page read and write
|
||
987D000
|
stack
|
page read and write
|
||
2A24000
|
trusted library allocation
|
page read and write
|
||
590D000
|
trusted library allocation
|
page read and write
|
||
A29C000
|
heap
|
page read and write
|
||
4404000
|
trusted library allocation
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
7C8E000
|
stack
|
page read and write
|
||
7330000
|
heap
|
page read and write
|
||
2D65000
|
trusted library allocation
|
page read and write
|
||
1603000
|
trusted library allocation
|
page execute and read and write
|
||
6220000
|
heap
|
page read and write
|
||
1830000
|
trusted library allocation
|
page execute and read and write
|
||
1604000
|
trusted library allocation
|
page read and write
|
||
C4A000
|
heap
|
page read and write
|
||
5ACF000
|
stack
|
page read and write
|
||
E6D000
|
stack
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
3761000
|
heap
|
page read and write
|
||
A13E000
|
stack
|
page read and write
|
||
E04000
|
trusted library allocation
|
page read and write
|
||
A84C000
|
stack
|
page read and write
|
||
2EEB000
|
trusted library allocation
|
page read and write
|
||
2B58000
|
trusted library allocation
|
page read and write
|
||
1668000
|
heap
|
page read and write
|
||
625F000
|
heap
|
page read and write
|
||
2B21000
|
trusted library allocation
|
page read and write
|
||
A38000
|
heap
|
page read and write
|
||
C38000
|
heap
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
2B11000
|
trusted library allocation
|
page read and write
|
||
58AA000
|
unkown
|
page readonly
|
||
FF4A0000
|
trusted library allocation
|
page execute and read and write
|
||
2B42000
|
trusted library allocation
|
page read and write
|
||
B8E0000
|
trusted library allocation
|
page execute and read and write
|
||
A960000
|
trusted library allocation
|
page read and write
|
||
4F93000
|
heap
|
page read and write
|
||
6C9000
|
unkown
|
page read and write
|
||
95FE000
|
stack
|
page read and write
|
||
A240000
|
heap
|
page read and write
|
||
B920000
|
trusted library allocation
|
page read and write
|
||
155E000
|
stack
|
page read and write
|
||
755C000
|
direct allocation
|
page read and write
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
53CD000
|
stack
|
page read and write
|
||
10BB000
|
stack
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
2B54000
|
trusted library allocation
|
page read and write
|
||
A22000
|
heap
|
page read and write
|
||
C3A0000
|
trusted library allocation
|
page execute and read and write
|
||
39D2000
|
trusted library allocation
|
page read and write
|
||
5F85000
|
heap
|
page read and write
|
||
A474000
|
trusted library allocation
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
1565000
|
heap
|
page read and write
|
||
2474000
|
direct allocation
|
page read and write
|
||
1820000
|
trusted library allocation
|
page read and write
|
||
9B20000
|
heap
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
242B000
|
direct allocation
|
page read and write
|
||
226E000
|
direct allocation
|
page read and write
|
||
733E000
|
heap
|
page read and write
|
||
6C7000
|
unkown
|
page read and write
|
||
23E2000
|
direct allocation
|
page read and write
|
||
23AB000
|
direct allocation
|
page read and write
|
||
322D000
|
stack
|
page read and write
|
||
7541000
|
direct allocation
|
page read and write
|
||
6230000
|
heap
|
page read and write
|
||
1699000
|
heap
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
1850000
|
heap
|
page read and write
|
||
17D4000
|
trusted library allocation
|
page read and write
|
||
18B0000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
5F81000
|
heap
|
page read and write
|
||
A08000
|
heap
|
page read and write
|
||
243A000
|
direct allocation
|
page read and write
|
||
5F70000
|
heap
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page read and write
|
||
B20000
|
direct allocation
|
page execute and read and write
|
||
5F7D000
|
heap
|
page read and write
|
||
4C4000
|
unkown
|
page readonly
|
||
9B000
|
stack
|
page read and write
|
||
A22000
|
heap
|
page read and write
|
||
5900000
|
trusted library allocation
|
page read and write
|
||
230A000
|
direct allocation
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
98F000
|
stack
|
page read and write
|
||
58F7000
|
trusted library allocation
|
page read and write
|
||
7A10000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5F3B000
|
stack
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
2B52000
|
trusted library allocation
|
page read and write
|
||
240D000
|
direct allocation
|
page read and write
|
||
58F1000
|
trusted library allocation
|
page read and write
|
||
9150000
|
trusted library allocation
|
page execute and read and write
|
||
A26B000
|
heap
|
page read and write
|
||
5909000
|
trusted library allocation
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
heap
|
page read and write
|
||
2406000
|
direct allocation
|
page read and write
|
||
17D3000
|
trusted library allocation
|
page execute and read and write
|
||
B1E000
|
stack
|
page read and write
|
||
2346000
|
direct allocation
|
page read and write
|
||
2730000
|
trusted library allocation
|
page read and write
|
||
2E6D000
|
trusted library allocation
|
page read and write
|
||
2338000
|
direct allocation
|
page read and write
|
||
5B0E000
|
stack
|
page read and write
|
||
18C0000
|
heap
|
page read and write
|
||
7552000
|
trusted library allocation
|
page read and write
|
||
2328000
|
direct allocation
|
page read and write
|
||
2C7B000
|
trusted library allocation
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
2363000
|
direct allocation
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
4C6000
|
unkown
|
page readonly
|
||
97F000
|
stack
|
page read and write
|
||
5D8E000
|
stack
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
3761000
|
heap
|
page read and write
|
||
A94C000
|
stack
|
page read and write
|
||
3038000
|
trusted library allocation
|
page read and write
|
||
A482000
|
trusted library allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
559D000
|
stack
|
page read and write
|
||
7ED0000
|
heap
|
page read and write
|
||
5810000
|
trusted library allocation
|
page read and write
|
||
5DA0000
|
heap
|
page execute and read and write
|
||
1820000
|
trusted library allocation
|
page read and write
|
||
180B000
|
trusted library allocation
|
page execute and read and write
|
||
6264000
|
heap
|
page read and write
|
||
1606000
|
heap
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
2498000
|
direct allocation
|
page read and write
|
||
22BD000
|
direct allocation
|
page read and write
|
||
4B7000
|
unkown
|
page read and write
|
||
5EAE000
|
stack
|
page read and write
|
||
96FE000
|
stack
|
page read and write
|
||
4294000
|
trusted library allocation
|
page read and write
|
||
7430000
|
trusted library allocation
|
page execute and read and write
|
||
A26000
|
heap
|
page read and write
|
||
23F0000
|
direct allocation
|
page read and write
|
||
983C000
|
stack
|
page read and write
|
||
E03000
|
trusted library allocation
|
page execute and read and write
|
||
2395000
|
direct allocation
|
page read and write
|
||
75A6000
|
direct allocation
|
page read and write
|
||
22F1000
|
direct allocation
|
page read and write
|
||
2414000
|
direct allocation
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
1106000
|
trusted library allocation
|
page execute and read and write
|
||
75B2000
|
direct allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
5DFC000
|
stack
|
page read and write
|
||
61F0000
|
heap
|
page read and write
|
||
5BFC000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
110A000
|
trusted library allocation
|
page execute and read and write
|
||
22D2000
|
direct allocation
|
page read and write
|
||
2FD6000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
heap
|
page execute and read and write
|
||
9E8000
|
heap
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
22E9000
|
direct allocation
|
page read and write
|
||
A23E000
|
stack
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
2230000
|
heap
|
page read and write
|
||
2255000
|
direct allocation
|
page read and write
|
||
29CA000
|
trusted library allocation
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
99BE000
|
stack
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
23B2000
|
direct allocation
|
page read and write
|
||
9B10000
|
heap
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
15A5000
|
heap
|
page read and write
|
||
3291000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
22F8000
|
direct allocation
|
page read and write
|
||
273B000
|
trusted library allocation
|
page execute and read and write
|
||
810000
|
heap
|
page read and write
|
||
5872000
|
unkown
|
page readonly
|
||
367E000
|
stack
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
9B03000
|
heap
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
2C90000
|
trusted library allocation
|
page read and write
|
||
3761000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
1800000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
heap
|
page read and write
|
||
5520000
|
heap
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
4291000
|
trusted library allocation
|
page read and write
|
||
2B19000
|
trusted library allocation
|
page read and write
|
||
36E0000
|
heap
|
page read and write
|
||
29D5000
|
trusted library allocation
|
page read and write
|
||
57F1000
|
trusted library allocation
|
page read and write
|
||
625D000
|
heap
|
page read and write
|
||
23A3000
|
direct allocation
|
page read and write
|
||
5C5E000
|
stack
|
page read and write
|
||
5915000
|
trusted library allocation
|
page read and write
|
||
29DA000
|
trusted library allocation
|
page read and write
|
||
22A0000
|
direct allocation
|
page read and write
|
||
65EE000
|
stack
|
page read and write
|
||
2B3D000
|
trusted library allocation
|
page read and write
|
||
18A0000
|
trusted library allocation
|
page read and write
|
||
2B3F000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
4E51000
|
trusted library allocation
|
page read and write
|
||
6C7000
|
unkown
|
page write copy
|
||
1590000
|
heap
|
page read and write
|
||
17E0000
|
trusted library allocation
|
page read and write
|
||
57CF000
|
stack
|
page read and write
|
||
3490000
|
direct allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
2483000
|
direct allocation
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
58EF000
|
trusted library allocation
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
1614000
|
trusted library allocation
|
page read and write
|
||
7530000
|
direct allocation
|
page read and write
|
||
2A08000
|
trusted library allocation
|
page read and write
|
||
2275000
|
direct allocation
|
page read and write
|
||
2A29000
|
trusted library allocation
|
page read and write
|
||
A3B000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
9B3000
|
heap
|
page read and write
|
||
1870000
|
trusted library allocation
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
279E000
|
stack
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
23E9000
|
direct allocation
|
page read and write
|
||
22CB000
|
direct allocation
|
page read and write
|
||
4E4E000
|
trusted library allocation
|
page read and write
|
||
233F000
|
direct allocation
|
page read and write
|
||
7ECD000
|
stack
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2B34000
|
trusted library allocation
|
page read and write
|
||
3401000
|
trusted library allocation
|
page read and write
|
||
52E3000
|
trusted library allocation
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
7352000
|
heap
|
page read and write
|
||
519C000
|
stack
|
page read and write
|
||
606E000
|
heap
|
page read and write
|
||
58E2000
|
trusted library allocation
|
page read and write
|
||
58FE000
|
trusted library allocation
|
page read and write
|
||
2EA5000
|
trusted library allocation
|
page read and write
|
||
A4DE000
|
stack
|
page read and write
|
||
58E6000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
A4B000
|
heap
|
page read and write
|
||
2432000
|
direct allocation
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
3A1E000
|
stack
|
page read and write
|
||
2BBD000
|
trusted library allocation
|
page read and write
|
||
5FE8000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page execute and read and write
|
||
228A000
|
direct allocation
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
247C000
|
direct allocation
|
page read and write
|
||
758C000
|
direct allocation
|
page read and write
|
||
75D8000
|
direct allocation
|
page read and write
|
||
93000
|
stack
|
page read and write
|
||
161D000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
5F91000
|
heap
|
page read and write
|
||
5340000
|
heap
|
page read and write
|
||
1890000
|
heap
|
page read and write
|
||
4B9000
|
unkown
|
page read and write
|
||
759C000
|
direct allocation
|
page read and write
|
||
CA2000
|
heap
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
57DF000
|
trusted library allocation
|
page read and write
|
||
27C0000
|
trusted library allocation
|
page execute and read and write
|
||
95BE000
|
stack
|
page read and write
|
||
B910000
|
trusted library allocation
|
page execute and read and write
|
||
7520000
|
direct allocation
|
page read and write
|
||
58EB000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
238E000
|
direct allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
34A0000
|
direct allocation
|
page read and write
|
||
5F89000
|
heap
|
page read and write
|
||
2A2D000
|
trusted library allocation
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
57F9000
|
trusted library allocation
|
page read and write
|
||
19CE000
|
stack
|
page read and write
|
||
7B4E000
|
stack
|
page read and write
|
||
2292000
|
direct allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
4401000
|
trusted library allocation
|
page read and write
|
||
57EE000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
538D000
|
stack
|
page read and write
|
||
2B29000
|
trusted library allocation
|
page read and write
|
||
A33000
|
heap
|
page read and write
|
||
5FB7000
|
heap
|
page read and write
|
||
A446000
|
trusted library allocation
|
page read and write
|
||
5F79000
|
heap
|
page read and write
|
||
169B000
|
heap
|
page read and write
|
||
269E000
|
stack
|
page read and write
|
||
3763000
|
heap
|
page read and write
|
||
2F76000
|
trusted library allocation
|
page read and write
|
||
1850000
|
heap
|
page execute and read and write
|
||
2B2C000
|
trusted library allocation
|
page read and write
|
||
23B9000
|
direct allocation
|
page read and write
|
||
A42000
|
heap
|
page read and write
|
||
33ED000
|
stack
|
page read and write
|
||
E27000
|
heap
|
page read and write
|
||
11AB000
|
stack
|
page read and write
|
||
C9D000
|
heap
|
page read and write
|
||
E0D000
|
trusted library allocation
|
page execute and read and write
|
||
578000
|
heap
|
page read and write
|
||
A42000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
1ACE000
|
stack
|
page read and write
|
||
5980000
|
heap
|
page read and write
|
||
5961000
|
trusted library allocation
|
page read and write
|
||
2491000
|
direct allocation
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
7E4D000
|
stack
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
947E000
|
stack
|
page read and write
|
||
4E3B000
|
trusted library allocation
|
page read and write
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
unkown
|
page readonly
|
||
1830000
|
heap
|
page read and write
|
||
14F9000
|
stack
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
2732000
|
trusted library allocation
|
page read and write
|
||
2B26000
|
trusted library allocation
|
page read and write
|
||
22B6000
|
direct allocation
|
page read and write
|
||
2CF3000
|
trusted library allocation
|
page read and write
|
||
7FE16000
|
direct allocation
|
page read and write
|
||
A34000
|
heap
|
page read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
A3B000
|
heap
|
page read and write
|
||
A2CC000
|
heap
|
page read and write
|
||
756B000
|
direct allocation
|
page read and write
|
||
923F000
|
stack
|
page read and write
|
||
2DEB000
|
trusted library allocation
|
page read and write
|
||
4E56000
|
trusted library allocation
|
page read and write
|
||
A67000
|
heap
|
page read and write
|
||
7A90000
|
trusted library allocation
|
page execute and read and write
|
||
29A9000
|
trusted library allocation
|
page read and write
|
||
34C0000
|
direct allocation
|
page read and write
|
||
2735000
|
trusted library allocation
|
page execute and read and write
|
||
57DB000
|
trusted library allocation
|
page read and write
|
||
25C0000
|
direct allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page execute and read and write
|
||
A41000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
A80D000
|
stack
|
page read and write
|
||
2750000
|
trusted library allocation
|
page read and write
|
||
9FB000
|
heap
|
page read and write
|
||
765A000
|
direct allocation
|
page read and write
|
||
6065000
|
heap
|
page read and write
|
||
5967000
|
trusted library allocation
|
page read and write
|
||
37A1000
|
heap
|
page read and write
|
||
234D000
|
direct allocation
|
page read and write
|
||
B8F0000
|
trusted library allocation
|
page read and write
|
||
A3D000
|
heap
|
page read and write
|
||
2321000
|
direct allocation
|
page read and write
|
||
6D1000
|
unkown
|
page read and write
|
||
666000
|
unkown
|
page readonly
|
||
5F40000
|
trusted library section
|
page readonly
|
||
7527000
|
direct allocation
|
page read and write
|
||
2A18000
|
trusted library allocation
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
2283000
|
direct allocation
|
page read and write
|
||
180B000
|
trusted library allocation
|
page execute and read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
2A0C000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
2312000
|
direct allocation
|
page read and write
|
||
997C000
|
stack
|
page read and write
|
||
BB9000
|
heap
|
page read and write
|
||
2B4C000
|
trusted library allocation
|
page read and write
|
||
757C000
|
direct allocation
|
page read and write
|
||
2360000
|
direct allocation
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
1598000
|
heap
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
AEA0000
|
trusted library allocation
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
6DE000
|
unkown
|
page readonly
|
||
83F000
|
stack
|
page read and write
|
||
2B14000
|
trusted library allocation
|
page read and write
|
||
15BB000
|
heap
|
page read and write
|
||
7AA0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A489000
|
trusted library allocation
|
page read and write
|
||
5870000
|
unkown
|
page readonly
|
||
74EF000
|
direct allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
28AA000
|
direct allocation
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
281C000
|
stack
|
page read and write
|
||
509F000
|
stack
|
page read and write
|
||
15AE000
|
stack
|
page read and write
|
||
57E4000
|
trusted library allocation
|
page read and write
|
||
616E000
|
stack
|
page read and write
|
||
37A3000
|
heap
|
page read and write
|
||
91FE000
|
stack
|
page read and write
|
||
5910000
|
heap
|
page read and write
|
||
6240000
|
heap
|
page read and write
|
||
9140000
|
heap
|
page execute and read and write
|
||
17E4000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
DFD000
|
stack
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
3951000
|
trusted library allocation
|
page read and write
|
||
1638000
|
heap
|
page read and write
|
||
29E3000
|
trusted library allocation
|
page read and write
|
||
4E5D000
|
trusted library allocation
|
page read and write
|
||
2B16000
|
trusted library allocation
|
page read and write
|
||
53D3000
|
heap
|
page execute and read and write
|
||
6CE000
|
unkown
|
page read and write
|
||
442000
|
unkown
|
page readonly
|
||
B6DE000
|
stack
|
page read and write
|
||
2378000
|
direct allocation
|
page read and write
|
||
17C0000
|
trusted library allocation
|
page read and write
|
||
22E2000
|
direct allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
A28000
|
heap
|
page read and write
|
||
7C4F000
|
stack
|
page read and write
|
||
34CC000
|
direct allocation
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
A485000
|
trusted library allocation
|
page read and write
|
||
A1E000
|
heap
|
page read and write
|
||
2299000
|
direct allocation
|
page read and write
|
||
235C000
|
direct allocation
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
2737000
|
trusted library allocation
|
page execute and read and write
|
||
58F4000
|
trusted library allocation
|
page read and write
|
||
79E0000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
6068000
|
heap
|
page read and write
|
||
CD7000
|
heap
|
page read and write
|
||
7D0D000
|
stack
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
6D6000
|
unkown
|
page read and write
|
||
16BC000
|
heap
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
7E0B000
|
stack
|
page read and write
|
||
18A6000
|
trusted library allocation
|
page read and write
|
||
25C0000
|
direct allocation
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
4B7000
|
unkown
|
page write copy
|
||
2B49000
|
trusted library allocation
|
page read and write
|
||
37E0000
|
heap
|
page read and write
|
||
973D000
|
stack
|
page read and write
|
||
1620000
|
trusted library allocation
|
page read and write
|
||
15C8000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page execute and read and write
|
||
22A7000
|
direct allocation
|
page read and write
|
||
1880000
|
trusted library allocation
|
page read and write
|
There are 614 hidden memdumps, click here to show them.