Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Move Mouse.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Ellanet\Move Mouse\Settings.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Move Mouse.exe
|
"C:\Users\user\Desktop\Move Mouse.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://schemas.xceed.com/wpf/xaml/toolkit&Xceed.Wpf.Toolkit.PropertyGrid.Editors
|
unknown
|
||
https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=QZTWHD9CRW5XN-GitHubLink_OnMous
|
unknown
|
||
http://quartznet.sourceforge.net/JobSchedulingData?
|
unknown
|
||
https://github.com/serilog/serilog-sinks-fileC
|
unknown
|
||
http://schemas.xceed.com/wpf/xaml/toolkit)Xceed.Wpf.Toolkit.PropertyGrid.Converters
|
unknown
|
||
https://raw.githubusercontent.com/sw3103/movemouse/master/Update_4x.xml.contact
|
unknown
|
||
https://www.paypal.com
|
unknown
|
||
https://github.com/sw3103/movemouse/wiki
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://github.com/serilog/serilog.git
|
unknown
|
||
https://raw.githubusercontent.com/sw3103/movemouse/master/Update_4x.xml)Update/LatestVersion%Update/
|
unknown
|
||
https://github.com/serilog/serilog-sinks-file
|
unknown
|
||
https://github.com/quartznet/quartznet
|
unknown
|
||
https://github.com/sw3103/movemouse/wiki/Troubleshooting/TwitterLink_OnMouseDown;https://twitter.com
|
unknown
|
||
http://defaultcontainer/Resources/Mouse-SystemTray-Active.ico
|
unknown
|
||
http://www.w3.or
|
unknown
|
||
https://github.com/hardcodet/wpf-notifyicon.
|
unknown
|
||
http://www.hardcodet.net/projects/wpf-notifyicon
|
unknown
|
||
http://www.quartz-scheduler.org/documentation/quartz-2.3.0/tutorials/crontrigger.htmlphttps://github
|
unknown
|
||
https://github.com/sw3103/movemouse/wiki/Troubleshooting).
|
unknown
|
||
https://github.com/dotnet/runtime
|
unknown
|
||
http://www.movemouse.co.uk/
|
unknown
|
||
http://quartznet.sourceforge.net/JobSchedulingData_
|
unknown
|
||
http://schemas.xceed.com/wpf/xaml/toolkit)Xceed.Wpf.Toolkit.PropertyGrid.Attributes
|
unknown
|
||
http://schemas.xceed.com/wpf/xaml/toolkit
|
unknown
|
||
http://www.quartz-scheduler.org/documentation/quartz-2.3.0/tutorials/crontrigger.html/AddActionButto
|
unknown
|
||
http://www.hardcodet.net/taskbar
|
unknown
|
||
http://defaultcontainer/Resources/Mouse.ico
|
unknown
|
||
https://raw.githubusercontent.com
|
unknown
|
||
http://quartznet.sourceforge.net/JobSchedulingDatae
|
unknown
|
||
https://github.com/hardcodet/wpf-notifyicon
|
unknown
|
||
http://quartznet.sourceforge.net/JobSchedulingDatah
|
unknown
|
||
http://schemas.xceed.com/wpf/xaml/toolkit)Xceed.Wpf.Toolkit.PropertyGrid.AttributesV
|
unknown
|
||
https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=QZTWHD9CRW5XN4http://www.movemo
|
unknown
|
||
http://schemas.xceed.com/wpf/xaml/toolkit&Xceed.Wpf.Toolkit.PropertyGrid.EditorsH
|
unknown
|
||
https://raw.githubusercontent.com/serilog/serilog-sinks-file/7eb21bd4d35d0b8b7d13e6a15851c9903ea9a46
|
unknown
|
||
https://twitter.com/movemouse
|
unknown
|
||
https://github.com/ejensen/toggle-switch-control
|
unknown
|
||
https://raw.githubusercontent.com/sw3103/movemouse/master/Update_4x.xml
|
185.199.111.133
|
||
http://schemas.xceed.com/wpf/xaml/toolkit)Xceed.Wpf.Toolkit.PropertyGrid.ConvertersU
|
unknown
|
||
http://quartznet.sourceforge.net/JobSchedulingData
|
unknown
|
||
https://github.com/sw3103/movemouse
|
unknown
|
||
http://defaultcontainer/Resources/Mouse-SystemTray-Execute.ico
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.movemouse.co.uk
|
unknown
|
||
https://github.com/serilog/serilog/pull/819.
|
unknown
|
||
https://github.com/sw3103/movemouse/releases/tag/v4.16.2
|
unknown
|
||
http://quartznet.sourceforge.net/JobSchedulingDataT
|
unknown
|
There are 38 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
raw.githubusercontent.com
|
185.199.111.133
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.199.111.133
|
raw.githubusercontent.com
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
20B80001000
|
trusted library allocation
|
page read and write
|
||
20BEBF92000
|
unkown
|
page readonly
|
||
20BF5C77000
|
heap
|
page read and write
|
||
7FF40819C000
|
trusted library allocation
|
page readonly
|
||
48490FE000
|
stack
|
page read and write
|
||
20BF6147000
|
heap
|
page read and write
|
||
20BF568E000
|
heap
|
page read and write
|
||
20BEEA00000
|
trusted library section
|
page read and write
|
||
48489FB000
|
stack
|
page read and write
|
||
20BEC630000
|
trusted library section
|
page read and write
|
||
20BEECE0000
|
trusted library allocation
|
page read and write
|
||
7FF408188000
|
trusted library allocation
|
page readonly
|
||
20BF56AC000
|
heap
|
page read and write
|
||
20BF5CE1000
|
heap
|
page read and write
|
||
4847BCE000
|
stack
|
page read and write
|
||
20BEEEA0000
|
trusted library allocation
|
page read and write
|
||
20BEC663000
|
heap
|
page execute and read and write
|
||
20BEEA30000
|
heap
|
page read and write
|
||
20BEEF00000
|
trusted library allocation
|
page read and write
|
||
7FF4081A2000
|
trusted library allocation
|
page readonly
|
||
20BF6070000
|
trusted library allocation
|
page read and write
|
||
20BF046F000
|
heap
|
page read and write
|
||
7FF4081A9000
|
trusted library allocation
|
page execute read
|
||
20BF58FB000
|
heap
|
page read and write
|
||
7FF9CE270000
|
trusted library allocation
|
page read and write
|
||
7FF4081BC000
|
trusted library allocation
|
page readonly
|
||
7FF9CE2C9000
|
trusted library allocation
|
page read and write
|
||
7FF9CE3C0000
|
trusted library allocation
|
page read and write
|
||
20BEEDB0000
|
trusted library allocation
|
page read and write
|
||
20BF050D000
|
heap
|
page read and write
|
||
20BEEE10000
|
trusted library allocation
|
page read and write
|
||
20BF2B58000
|
heap
|
page read and write
|
||
20B9009A000
|
trusted library allocation
|
page read and write
|
||
7FF9CE364000
|
trusted library allocation
|
page read and write
|
||
20B80249000
|
trusted library allocation
|
page read and write
|
||
20BF040F000
|
heap
|
page read and write
|
||
7FF9CE51E000
|
trusted library allocation
|
page read and write
|
||
20BF05D6000
|
heap
|
page read and write
|
||
20B90001000
|
trusted library allocation
|
page read and write
|
||
20BF2927000
|
heap
|
page read and write
|
||
7FF408182000
|
trusted library allocation
|
page readonly
|
||
7FF9CE230000
|
trusted library allocation
|
page read and write
|
||
20BEEA20000
|
heap
|
page read and write
|
||
20B80CEE000
|
trusted library allocation
|
page read and write
|
||
20BEF160000
|
trusted library allocation
|
page read and write
|
||
20BEEF80000
|
trusted library allocation
|
page read and write
|
||
20BF5E09000
|
heap
|
page read and write
|
||
20BF60F0000
|
trusted library allocation
|
page read and write
|
||
20BF297A000
|
heap
|
page read and write
|
||
20BF59AB000
|
heap
|
page read and write
|
||
20BEC705000
|
heap
|
page read and write
|
||
7FF9CE480000
|
trusted library allocation
|
page execute and read and write
|
||
20BF2899000
|
heap
|
page read and write
|
||
20BEC2A0000
|
heap
|
page read and write
|
||
4847E3E000
|
stack
|
page read and write
|
||
20BF2790000
|
trusted library allocation
|
page read and write
|
||
7FF4081C4000
|
trusted library allocation
|
page readonly
|
||
20B80F76000
|
trusted library allocation
|
page read and write
|
||
20BF59B3000
|
heap
|
page read and write
|
||
7FF9CE200000
|
trusted library allocation
|
page read and write
|
||
48491FD000
|
stack
|
page read and write
|
||
20BEEEE0000
|
trusted library allocation
|
page read and write
|
||
20BF5F70000
|
trusted library allocation
|
page read and write
|
||
20BF2830000
|
heap
|
page read and write
|
||
20BEF170000
|
trusted library allocation
|
page read and write
|
||
48492FE000
|
stack
|
page read and write
|
||
7FF40820E000
|
trusted library allocation
|
page readonly
|
||
20BF29F4000
|
heap
|
page read and write
|
||
20B900E4000
|
trusted library allocation
|
page read and write
|
||
20BF041F000
|
heap
|
page read and write
|
||
7FF408184000
|
trusted library allocation
|
page readonly
|
||
7FF9CE023000
|
trusted library allocation
|
page execute and read and write
|
||
20BEC540000
|
trusted library section
|
page read and write
|
||
48485FE000
|
stack
|
page read and write
|
||
20BEEF10000
|
trusted library allocation
|
page read and write
|
||
20BEEF50000
|
trusted library allocation
|
page read and write
|
||
20BF5979000
|
heap
|
page read and write
|
||
20BF5A9F000
|
heap
|
page read and write
|
||
20BF59C3000
|
heap
|
page read and write
|
||
7FF408196000
|
trusted library allocation
|
page readonly
|
||
7FF9CE3F0000
|
trusted library allocation
|
page execute and read and write
|
||
20BF28AA000
|
heap
|
page read and write
|
||
4848DFA000
|
stack
|
page read and write
|
||
7FF4081FE000
|
trusted library allocation
|
page readonly
|
||
20B8050B000
|
trusted library allocation
|
page read and write
|
||
20BEC6E0000
|
heap
|
page read and write
|
||
20BF0406000
|
heap
|
page read and write
|
||
20BF28F5000
|
heap
|
page read and write
|
||
20BF5A5E000
|
heap
|
page read and write
|
||
7FF9CE033000
|
trusted library allocation
|
page read and write
|
||
7FF9CE210000
|
trusted library allocation
|
page read and write
|
||
7FF9CE250000
|
trusted library allocation
|
page read and write
|
||
20BF5F40000
|
trusted library allocation
|
page read and write
|
||
20BF5F20000
|
trusted library allocation
|
page read and write
|
||
20BF5B1E000
|
heap
|
page read and write
|
||
20BF0452000
|
heap
|
page read and write
|
||
20BEC553000
|
heap
|
page read and write
|
||
20BF7330000
|
trusted library allocation
|
page read and write
|
||
20BF4960000
|
trusted library section
|
page read and write
|
||
7FF408180000
|
trusted library allocation
|
page readonly
|
||
20BEE716000
|
heap
|
page read and write
|
||
20BEE780000
|
trusted library section
|
page read and write
|
||
7FF9CE2A0000
|
trusted library allocation
|
page read and write
|
||
20BEC34C000
|
heap
|
page read and write
|
||
20BF5A21000
|
heap
|
page read and write
|
||
7FF9CE220000
|
trusted library allocation
|
page execute and read and write
|
||
20BEEED0000
|
trusted library allocation
|
page read and write
|
||
20BF72E0000
|
trusted library allocation
|
page read and write
|
||
20BEED10000
|
trusted library allocation
|
page read and write
|
||
7FF9CE350000
|
trusted library allocation
|
page execute and read and write
|
||
20BF6189000
|
heap
|
page read and write
|
||
7FF9CE024000
|
trusted library allocation
|
page read and write
|
||
7FF4081BF000
|
trusted library allocation
|
page execute read
|
||
7FF4081A0000
|
trusted library allocation
|
page readonly
|
||
20BEF020000
|
trusted library allocation
|
page read and write
|
||
20BEE680000
|
heap
|
page read and write
|
||
20BF29D2000
|
heap
|
page read and write
|
||
20BF2855000
|
heap
|
page read and write
|
||
20BF29D4000
|
heap
|
page read and write
|
||
20BF29CA000
|
heap
|
page read and write
|
||
4848EEB000
|
stack
|
page read and write
|
||
7FF408181000
|
trusted library allocation
|
page execute read
|
||
7FF4081A6000
|
trusted library allocation
|
page readonly
|
||
20BF7320000
|
trusted library allocation
|
page read and write
|
||
20BF568C000
|
heap
|
page read and write
|
||
20BEED00000
|
trusted library allocation
|
page read and write
|
||
20BEC2E6000
|
heap
|
page read and write
|
||
7FF9CE24B000
|
trusted library allocation
|
page read and write
|
||
20BF59AF000
|
heap
|
page read and write
|
||
7FF40818F000
|
trusted library allocation
|
page execute read
|
||
20BF29DC000
|
heap
|
page read and write
|
||
20BF046B000
|
heap
|
page read and write
|
||
20BEEE40000
|
trusted library allocation
|
page read and write
|
||
7FF9CE282000
|
trusted library allocation
|
page read and write
|
||
20BF27CE000
|
heap
|
page read and write
|
||
7FF9CE0D6000
|
trusted library allocation
|
page read and write
|
||
20BEDEE0000
|
trusted library allocation
|
page read and write
|
||
7FF9CE380000
|
trusted library allocation
|
page read and write
|
||
20BF03E0000
|
heap
|
page read and write
|
||
7FF40819A000
|
trusted library allocation
|
page readonly
|
||
20BF5AD1000
|
heap
|
page read and write
|
||
20BF59C7000
|
heap
|
page read and write
|
||
20BF5863000
|
heap
|
page read and write
|
||
20BEBF90000
|
unkown
|
page readonly
|
||
20BF5733000
|
heap
|
page read and write
|
||
20BEEF30000
|
trusted library allocation
|
page read and write
|
||
20BF5742000
|
heap
|
page read and write
|
||
7FF9CE490000
|
trusted library allocation
|
page read and write
|
||
7FF40818D000
|
trusted library allocation
|
page execute read
|
||
20BF710E000
|
heap
|
page read and write
|
||
20BF5686000
|
heap
|
page read and write
|
||
7FF4081CC000
|
trusted library allocation
|
page readonly
|
||
7FF408192000
|
trusted library allocation
|
page readonly
|
||
7FF4081C9000
|
trusted library allocation
|
page execute read
|
||
7FF4081C3000
|
trusted library allocation
|
page execute read
|
||
20BF57E8000
|
heap
|
page read and write
|
||
20BF5AC9000
|
heap
|
page read and write
|
||
20BEC2E0000
|
heap
|
page read and write
|
||
20BF03FC000
|
heap
|
page read and write
|
||
20BF281C000
|
heap
|
page read and write
|
||
7FF408204000
|
trusted library allocation
|
page readonly
|
||
7FF4081C6000
|
trusted library allocation
|
page readonly
|
||
20BEC513000
|
trusted library allocation
|
page read and write
|
||
7FF9CE28C000
|
trusted library allocation
|
page read and write
|
||
20BF051A000
|
heap
|
page read and write
|
||
7FF9CE32B000
|
trusted library allocation
|
page read and write
|
||
20BF46F0000
|
trusted library allocation
|
page read and write
|
||
20BF59BD000
|
heap
|
page read and write
|
||
20BF5CF1000
|
heap
|
page read and write
|
||
20BF0413000
|
heap
|
page read and write
|
||
7FF9CE2D6000
|
trusted library allocation
|
page read and write
|
||
20BF29CC000
|
heap
|
page read and write
|
||
48486FE000
|
stack
|
page read and write
|
||
20BEC270000
|
heap
|
page read and write
|
||
20BF27D2000
|
heap
|
page read and write
|
||
20BF5D40000
|
heap
|
page read and write
|
||
20BF0461000
|
heap
|
page read and write
|
||
20BF5963000
|
heap
|
page read and write
|
||
20BEC660000
|
heap
|
page execute and read and write
|
||
20BF5800000
|
heap
|
page read and write
|
||
20BEC670000
|
trusted library section
|
page read and write
|
||
20BF59A5000
|
heap
|
page read and write
|
||
20BEEF60000
|
trusted library allocation
|
page read and write
|
||
7FF9CE21A000
|
trusted library allocation
|
page read and write
|
||
20BEC5A5000
|
heap
|
page read and write
|
||
20BF5AA7000
|
heap
|
page read and write
|
||
20BF5694000
|
heap
|
page read and write
|
||
20BEEDD0000
|
trusted library allocation
|
page read and write
|
||
7FF9CE1D4000
|
trusted library allocation
|
page read and write
|
||
20BF5650000
|
heap
|
page read and write
|
||
20BEEF90000
|
trusted library section
|
page read and write
|
||
7FF9CE2F0000
|
trusted library allocation
|
page read and write
|
||
4848FFD000
|
stack
|
page read and write
|
||
20BF60B0000
|
trusted library allocation
|
page read and write
|
||
20BF569E000
|
heap
|
page read and write
|
||
20BF72F0000
|
trusted library allocation
|
page read and write
|
||
20BEC700000
|
heap
|
page read and write
|
||
20BF5ABB000
|
heap
|
page read and write
|
||
20BF598F000
|
heap
|
page read and write
|
||
7FF9CE07C000
|
trusted library allocation
|
page execute and read and write
|
||
20BF5F30000
|
trusted library allocation
|
page read and write
|
||
20BF5B1A000
|
heap
|
page read and write
|
||
20BF61C8000
|
heap
|
page read and write
|
||
20BF29FA000
|
heap
|
page read and write
|
||
20BEE735000
|
heap
|
page read and write
|
||
7FF9CE02D000
|
trusted library allocation
|
page execute and read and write
|
||
20BF598D000
|
heap
|
page read and write
|
||
20BF5981000
|
heap
|
page read and write
|
||
20BEC352000
|
heap
|
page read and write
|
||
7FF408202000
|
trusted library allocation
|
page readonly
|
||
7FF40819D000
|
trusted library allocation
|
page execute read
|
||
20BF598B000
|
heap
|
page read and write
|
||
7FF9CE0E0000
|
trusted library allocation
|
page execute and read and write
|
||
20BEEF40000
|
trusted library allocation
|
page read and write
|
||
48494FB000
|
stack
|
page read and write
|
||
7FF9CE51A000
|
trusted library allocation
|
page read and write
|
||
20BF59BB000
|
heap
|
page read and write
|
||
20BF29F0000
|
heap
|
page read and write
|
||
20BF0449000
|
heap
|
page read and write
|
||
20BF5813000
|
heap
|
page read and write
|
||
7FF4081A3000
|
trusted library allocation
|
page execute read
|
||
20BEEAD6000
|
heap
|
page read and write
|
||
7FF9CE260000
|
trusted library allocation
|
page read and write
|
||
20BF0596000
|
heap
|
page read and write
|
||
20BF59B1000
|
heap
|
page read and write
|
||
20BEC280000
|
heap
|
page read and write
|
||
7FF9CE1D2000
|
trusted library allocation
|
page read and write
|
||
7FF9CE3D0000
|
trusted library allocation
|
page read and write
|
||
20BF29A5000
|
heap
|
page read and write
|
||
20BEEF70000
|
trusted library section
|
page read and write
|
||
20BF0518000
|
heap
|
page read and write
|
||
20BEEDA0000
|
trusted library allocation
|
page read and write
|
||
20BEC6F0000
|
trusted library allocation
|
page read and write
|
||
20BF5858000
|
heap
|
page read and write
|
||
20BF03FA000
|
heap
|
page read and write
|
||
7FF9CE290000
|
trusted library allocation
|
page read and write
|
||
20BEEFD0000
|
trusted library allocation
|
page read and write
|
||
20BF2B61000
|
heap
|
page read and write
|
||
20BF5837000
|
heap
|
page read and write
|
||
7FF40818E000
|
trusted library allocation
|
page readonly
|
||
20BEEDC0000
|
trusted library allocation
|
page read and write
|
||
7FF4081C2000
|
trusted library allocation
|
page readonly
|
||
7FF4081BD000
|
trusted library allocation
|
page execute read
|
||
7FF9CE0D0000
|
trusted library allocation
|
page read and write
|
||
7FF4081C5000
|
trusted library allocation
|
page execute read
|
||
20BF4720000
|
trusted library allocation
|
page read and write
|
||
20BF283A000
|
heap
|
page read and write
|
||
4848AFB000
|
stack
|
page read and write
|
||
7FF9CE044000
|
trusted library allocation
|
page read and write
|
||
20BF04D2000
|
heap
|
page read and write
|
||
7FF4081EB000
|
trusted library allocation
|
page execute read
|
||
7FF4081B5000
|
trusted library allocation
|
page execute read
|
||
4848CF0000
|
stack
|
page read and write
|
||
20BF03F1000
|
heap
|
page read and write
|
||
20BEDEB0000
|
trusted library allocation
|
page read and write
|
||
20BEEB20000
|
heap
|
page execute and read and write
|
||
20BF5A92000
|
heap
|
page read and write
|
||
7FF408210000
|
trusted library allocation
|
page execute and read and write
|
||
20BF0402000
|
heap
|
page read and write
|
||
20BF0551000
|
heap
|
page read and write
|
||
20BF5A48000
|
heap
|
page read and write
|
||
20BF5AA2000
|
heap
|
page read and write
|
||
20BF0419000
|
heap
|
page read and write
|
||
7FF408193000
|
trusted library allocation
|
page execute read
|
||
7FF4081AA000
|
trusted library allocation
|
page readonly
|
||
20BF0555000
|
heap
|
page read and write
|
||
7FF4081B4000
|
trusted library allocation
|
page readonly
|
||
20BF283F000
|
heap
|
page read and write
|
||
20BEECD0000
|
trusted library allocation
|
page read and write
|
||
20BEC2C0000
|
heap
|
page read and write
|
||
20BF299A000
|
heap
|
page read and write
|
||
7FF9CE04B000
|
trusted library allocation
|
page execute and read and write
|
||
4848FFB000
|
stack
|
page read and write
|
||
20BEC580000
|
heap
|
page read and write
|
||
7FF4081C0000
|
trusted library allocation
|
page readonly
|
||
7FF9CE1E0000
|
trusted library allocation
|
page read and write
|
||
20BF2A0B000
|
heap
|
page read and write
|
||
20B903AC000
|
trusted library allocation
|
page read and write
|
||
7FF9CE1EB000
|
trusted library allocation
|
page read and write
|
||
20BF29F6000
|
heap
|
page read and write
|
||
20BEEFC0000
|
trusted library allocation
|
page read and write
|
||
7FF4081EA000
|
trusted library allocation
|
page readonly
|
||
7FF9CE50A000
|
trusted library allocation
|
page read and write
|
||
7FF40820F000
|
trusted library allocation
|
page execute read
|
||
20BF5662000
|
heap
|
page read and write
|
||
20BF5BAE000
|
heap
|
page read and write
|
||
20BF6090000
|
trusted library allocation
|
page read and write
|
||
7FF9CE240000
|
trusted library allocation
|
page read and write
|
||
7FF9CE1F6000
|
trusted library allocation
|
page read and write
|
||
20BEC550000
|
heap
|
page read and write
|
||
7FF9CE300000
|
trusted library allocation
|
page read and write
|
||
20BF5F60000
|
trusted library allocation
|
page read and write
|
||
7FF9CE1C0000
|
trusted library allocation
|
page read and write
|
||
20BEED30000
|
trusted library section
|
page read and write
|
||
20BF569A000
|
heap
|
page read and write
|
||
7FF9CE2EB000
|
trusted library allocation
|
page read and write
|
||
20BF29BA000
|
heap
|
page read and write
|
||
20BF2954000
|
heap
|
page read and write
|
||
7FF408203000
|
trusted library allocation
|
page execute read
|
||
20BEC31F000
|
heap
|
page read and write
|
||
7FF9CE1E7000
|
trusted library allocation
|
page read and write
|
||
20BF56A4000
|
heap
|
page read and write
|
||
7FF9CE530000
|
trusted library allocation
|
page read and write
|
||
7FF9CE4E0000
|
trusted library allocation
|
page read and write
|
||
7FF9CE244000
|
trusted library allocation
|
page read and write
|
||
20BF29EC000
|
heap
|
page read and write
|
||
7FF4081CB000
|
trusted library allocation
|
page execute read
|
||
20BF29E8000
|
heap
|
page read and write
|
||
20BEE72D000
|
heap
|
page read and write
|
||
7FF4081F8000
|
trusted library allocation
|
page readonly
|
||
20BF4610000
|
trusted library allocation
|
page read and write
|
||
20BEE6D4000
|
heap
|
page read and write
|
||
20BF2B0B000
|
heap
|
page read and write
|
||
20BF29D0000
|
heap
|
page read and write
|
||
20BF60A0000
|
trusted library allocation
|
page read and write
|
||
20BF6100000
|
heap
|
page read and write
|
||
20BF58B5000
|
heap
|
page read and write
|
||
20BEE763000
|
heap
|
page read and write
|
||
20BF5B26000
|
heap
|
page read and write
|
||
20BF294A000
|
heap
|
page read and write
|
||
7FF9CE3A0000
|
trusted library allocation
|
page read and write
|
||
20BF4700000
|
trusted library allocation
|
page read and write
|
||
7FF9CE2E0000
|
trusted library allocation
|
page read and write
|
||
7FF9CE520000
|
trusted library allocation
|
page read and write
|
||
20BF29D6000
|
heap
|
page read and write
|
||
7FF4081F9000
|
trusted library allocation
|
page execute read
|
||
20BEED90000
|
trusted library allocation
|
page read and write
|
||
20BEEFF0000
|
trusted library allocation
|
page read and write
|
||
7FF9CE0DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF4081C7000
|
trusted library allocation
|
page execute read
|
||
7FF9CE020000
|
trusted library allocation
|
page read and write
|
||
20BEECA0000
|
trusted library allocation
|
page read and write
|
||
20BEE6D2000
|
heap
|
page read and write
|
||
20BEE6C8000
|
heap
|
page read and write
|
||
20BF2A45000
|
heap
|
page read and write
|
||
20BF03E8000
|
heap
|
page read and write
|
||
7FF408194000
|
trusted library allocation
|
page readonly
|
||
7FF4081C1000
|
trusted library allocation
|
page execute read
|
||
20BF6184000
|
heap
|
page read and write
|
||
20BEC321000
|
heap
|
page read and write
|
||
20BEEE20000
|
trusted library allocation
|
page read and write
|
||
20BF58D4000
|
heap
|
page read and write
|
||
20BF28B0000
|
heap
|
page read and write
|
||
20BF5738000
|
heap
|
page read and write
|
||
20BF6193000
|
heap
|
page read and write
|
||
7FF4081BE000
|
trusted library allocation
|
page readonly
|
||
20BF56F6000
|
heap
|
page read and write
|
||
20B80218000
|
trusted library allocation
|
page read and write
|
||
20BEEA6F000
|
heap
|
page read and write
|
||
7FF9CE1D0000
|
trusted library allocation
|
page read and write
|
||
20BEEA4E000
|
heap
|
page read and write
|
||
7FF9CE4B0000
|
trusted library allocation
|
page read and write
|
||
20BF2946000
|
heap
|
page read and write
|
||
20BF2A28000
|
heap
|
page read and write
|
||
20BEEEC0000
|
trusted library allocation
|
page read and write
|
||
20BEECC0000
|
trusted library allocation
|
page read and write
|
||
20BF573B000
|
heap
|
page read and write
|
||
7FF9CE390000
|
trusted library allocation
|
page read and write
|
||
20BF2A4F000
|
heap
|
page read and write
|
||
20B90366000
|
trusted library allocation
|
page read and write
|
||
20BF60E0000
|
trusted library allocation
|
page read and write
|
||
20BF618C000
|
heap
|
page read and write
|
||
20BF57E1000
|
heap
|
page read and write
|
||
20BF5F10000
|
trusted library allocation
|
page read and write
|
||
20BEE725000
|
heap
|
page read and write
|
||
20BF7300000
|
trusted library allocation
|
page read and write
|
||
7FF9CE040000
|
trusted library allocation
|
page read and write
|
||
48482FC000
|
stack
|
page read and write
|
||
20BF46D0000
|
trusted library allocation
|
page read and write
|
||
20BF29DA000
|
heap
|
page read and write
|
||
20BF7118000
|
heap
|
page read and write
|
||
20BF05CB000
|
heap
|
page read and write
|
||
20BF5684000
|
heap
|
page read and write
|
||
20BEED20000
|
trusted library allocation
|
page read and write
|
||
20BEEE30000
|
trusted library allocation
|
page read and write
|
||
20BEECB0000
|
trusted library allocation
|
page read and write
|
||
20BF2B5E000
|
heap
|
page read and write
|
||
7FF9CE4F0000
|
trusted library allocation
|
page read and write
|
||
7FF408195000
|
trusted library allocation
|
page execute read
|
||
7FF9CE140000
|
trusted library allocation
|
page execute and read and write
|
||
7FF9CE3B0000
|
trusted library allocation
|
page execute and read and write
|
||
20BF2845000
|
heap
|
page read and write
|
||
7FF9CE106000
|
trusted library allocation
|
page execute and read and write
|
||
7FF9CE1F0000
|
trusted library allocation
|
page read and write
|
||
20BEBF90000
|
unkown
|
page readonly
|
||
20BEE71C000
|
heap
|
page read and write
|
||
20BEEF20000
|
trusted library allocation
|
page read and write
|
||
20B80D34000
|
trusted library allocation
|
page read and write
|
||
7FF4081AD000
|
trusted library allocation
|
page execute read
|
||
20BF59A1000
|
heap
|
page read and write
|
||
7FF9CE502000
|
trusted library allocation
|
page read and write
|
||
7FF4081A8000
|
trusted library allocation
|
page readonly
|
||
20BF29FF000
|
heap
|
page read and write
|
||
20BEC5A0000
|
heap
|
page read and write
|
||
20BF2931000
|
heap
|
page read and write
|
||
20BF581C000
|
heap
|
page read and write
|
||
20BF28F0000
|
heap
|
page read and write
|
||
7FF9CE340000
|
trusted library allocation
|
page read and write
|
||
20BF46C0000
|
trusted library allocation
|
page read and write
|
||
4848BF5000
|
stack
|
page read and write
|
||
20BF5F50000
|
trusted library allocation
|
page read and write
|
||
7FF9CE470000
|
trusted library allocation
|
page read and write
|
||
7FF9CE370000
|
trusted library allocation
|
page read and write
|
||
20BF5997000
|
heap
|
page read and write
|
||
7FF40818C000
|
trusted library allocation
|
page readonly
|
||
7FF9CE03D000
|
trusted library allocation
|
page execute and read and write
|
||
20BF5875000
|
heap
|
page read and write
|
||
20BF5924000
|
heap
|
page read and write
|
||
7FF408189000
|
trusted library allocation
|
page execute read
|
||
7FF4081AC000
|
trusted library allocation
|
page readonly
|
||
20BF5B84000
|
heap
|
page read and write
|
||
20BEE729000
|
heap
|
page read and write
|
||
20BEEE00000
|
trusted library allocation
|
page read and write
|
||
20BF044B000
|
heap
|
page read and write
|
||
20BF042C000
|
heap
|
page read and write
|
||
20BF5777000
|
heap
|
page read and write
|
||
7FF9CE320000
|
trusted library allocation
|
page read and write
|
||
20BF5254000
|
trusted library allocation
|
page read and write
|
||
20BEEE60000
|
trusted library allocation
|
page read and write
|
||
20BF59B7000
|
heap
|
page read and write
|
||
20BF70E0000
|
heap
|
page read and write
|
||
20B80240000
|
trusted library allocation
|
page read and write
|
||
20BF59A9000
|
heap
|
page read and write
|
||
20BEE239000
|
heap
|
page read and write
|
||
20BEEFB0000
|
trusted library allocation
|
page read and write
|
||
20BF5987000
|
heap
|
page read and write
|
||
7FF408197000
|
trusted library allocation
|
page execute read
|
||
20BF70D0000
|
trusted library allocation
|
page read and write
|
||
7FF9CE3E0000
|
trusted library allocation
|
page execute and read and write
|
||
20BF46E0000
|
trusted library allocation
|
page read and write
|
||
20BEEE50000
|
trusted library allocation
|
page read and write
|
||
4847B76000
|
stack
|
page read and write
|
||
20BEEEF0000
|
trusted library allocation
|
page read and write
|
||
20BF5A24000
|
heap
|
page read and write
|
||
20BEC500000
|
trusted library allocation
|
page read and write
|
||
20BF56AF000
|
heap
|
page read and write
|
||
20BEC510000
|
trusted library allocation
|
page read and write
|
||
20BF59C5000
|
heap
|
page read and write
|
||
20BF58B0000
|
heap
|
page read and write
|
||
20BF03F7000
|
heap
|
page read and write
|
||
48487FB000
|
stack
|
page read and write
|
||
7FF4081CA000
|
trusted library allocation
|
page readonly
|
||
20BF5A4B000
|
heap
|
page read and write
|
||
48493FB000
|
stack
|
page read and write
|
||
20BF27A0000
|
heap
|
page read and write
|
||
7FF9CE4C0000
|
trusted library allocation
|
page read and write
|
||
7FF9CE21F000
|
trusted library allocation
|
page read and write
|
||
7FF408185000
|
trusted library allocation
|
page execute read
|
||
7FF9CE4D0000
|
trusted library allocation
|
page read and write
|
||
20BF2A31000
|
heap
|
page read and write
|
||
7FF4081FF000
|
trusted library allocation
|
page execute read
|
||
20BF59B5000
|
heap
|
page read and write
|
||
48495FB000
|
stack
|
page read and write
|
||
20B80B96000
|
trusted library allocation
|
page read and write
|
||
7FF408183000
|
trusted library allocation
|
page execute read
|
||
20BF2B0E000
|
heap
|
page read and write
|
||
20BEEDF0000
|
trusted library allocation
|
page read and write
|
||
20BF6080000
|
trusted library allocation
|
page read and write
|
||
20BF589C000
|
heap
|
page read and write
|
||
20BEC680000
|
heap
|
page execute and read and write
|
||
20BEEE70000
|
trusted library allocation
|
page read and write
|
||
7FF408205000
|
trusted library allocation
|
page execute read
|
||
20BEF010000
|
trusted library allocation
|
page read and write
|
||
20BEEA9E000
|
heap
|
page read and write
|
||
7FF9CE360000
|
trusted library allocation
|
page read and write
|
||
20BF27DE000
|
heap
|
page read and write
|
||
20BF5A14000
|
heap
|
page read and write
|
||
20B8025B000
|
trusted library allocation
|
page read and write
|
||
20BF27FC000
|
heap
|
page read and write
|
||
20BF5B4F000
|
heap
|
page read and write
|
||
48483F4000
|
stack
|
page read and write
|
||
7FF40819B000
|
trusted library allocation
|
page execute read
|
||
20BEC4E0000
|
trusted library allocation
|
page read and write
|
||
7FF9CE1CE000
|
trusted library allocation
|
page read and write
|
||
20BEC3A8000
|
heap
|
page read and write
|
||
20BF7114000
|
heap
|
page read and write
|
||
20BF27CC000
|
heap
|
page read and write
|
||
20BF5676000
|
heap
|
page read and write
|
||
20BEEE80000
|
trusted library allocation
|
page read and write
|
||
20BF5272000
|
trusted library allocation
|
page read and write
|
||
7FF9CE286000
|
trusted library allocation
|
page read and write
|
||
7FF4081A7000
|
trusted library allocation
|
page execute read
|
||
20BEEDE0000
|
trusted library allocation
|
page read and write
|
||
20BEEFE0000
|
trusted library allocation
|
page read and write
|
||
20BF29AE000
|
heap
|
page read and write
|
||
20BEEE90000
|
trusted library allocation
|
page read and write
|
||
7FF4081AB000
|
trusted library allocation
|
page execute read
|
||
20BF5A17000
|
heap
|
page read and write
|
||
7FF408201000
|
trusted library allocation
|
page execute read
|
||
20BF57F0000
|
heap
|
page read and write
|
||
7FF9CE4A0000
|
trusted library allocation
|
page read and write
|
||
20BEEADF000
|
heap
|
page read and write
|
||
20B80D1A000
|
trusted library allocation
|
page read and write
|
||
48488FB000
|
stack
|
page read and write
|
||
20B80257000
|
trusted library allocation
|
page read and write
|
||
20BF3DA0000
|
trusted library allocation
|
page read and write
|
||
20BF60D0000
|
trusted library allocation
|
page read and write
|
||
20BF29C0000
|
heap
|
page read and write
|
||
7FF9CE311000
|
trusted library allocation
|
page read and write
|
||
20BF5682000
|
heap
|
page read and write
|
||
20BF4710000
|
trusted library allocation
|
page read and write
|
||
20BF27EC000
|
heap
|
page read and write
|
||
20BF60C0000
|
trusted library allocation
|
page read and write
|
||
7FF9CE330000
|
trusted library allocation
|
page read and write
|
||
20BF29D8000
|
heap
|
page read and write
|
||
20BF2AE8000
|
heap
|
page read and write
|
||
20BEE77D000
|
heap
|
page read and write
|
||
20BF27E2000
|
heap
|
page read and write
|
||
20BEECF0000
|
trusted library allocation
|
page read and write
|
||
20BF29DE000
|
heap
|
page read and write
|
||
7FF4081A1000
|
trusted library allocation
|
page execute read
|
||
20BEE690000
|
heap
|
page read and write
|
||
20BF2B6D000
|
heap
|
page read and write
|
||
20BEE9D0000
|
trusted library section
|
page read and write
|
||
7FF4081CD000
|
trusted library allocation
|
page execute read
|
||
20BF2780000
|
trusted library allocation
|
page read and write
|
||
48481FE000
|
stack
|
page read and write
|
||
20BF4600000
|
trusted library allocation
|
page read and write
|
||
20BF0503000
|
heap
|
page read and write
|
There are 509 hidden memdumps, click here to show them.