Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PuranWipeDiskSetup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files\Puran Wipe Disk\Default.cjstyles (copy)
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\Puran Wipe Disk\Help\Wipe_Disk.chm (copy)
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Program Files\Puran Wipe Disk\Help\is-JQLMN.tmp
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Program Files\Puran Wipe Disk\Puran Wipe Disk.exe (copy)
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Puran Wipe Disk\Puran Wipe Disk.url
|
MS Windows 95 Internet shortcut text (URL=<http://www.puransoftware.com>), ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Puran Wipe Disk\home.html (copy)
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Puran Wipe Disk\home.png (copy)
|
PNG image data, 55 x 21, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files\Puran Wipe Disk\homebutton.html (copy)
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Puran Wipe Disk\is-6S64H.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\Puran Wipe Disk\is-7J9I7.tmp
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Puran Wipe Disk\is-E3G21.tmp
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Puran Wipe Disk\is-II2TT.tmp
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Puran Wipe Disk\is-JRBGR.tmp
|
PNG image data, 55 x 21, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files\Puran Wipe Disk\is-UDJ45.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\Puran Wipe Disk\unins000.dat
|
InnoSetup Log 64-bit Puran Wipe Disk, version 0x418, 5245 bytes, 899552\37\user\376, C:\Program Files\Puran Wipe Disk\376\377\3
|
dropped
|
||
C:\Program Files\Puran Wipe Disk\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Puran Wipe Disk\Puran Wipe Disk on the Web.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun
Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Puran Wipe Disk\Puran Wipe Disk.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Apr 17 20:27:13 2024, mtime=Wed Apr 17 20:27:13 2024, atime=Tue Apr 28 09:45:58 2020, length=984576, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\home[1].png
|
PNG image data, 55 x 21, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\basicusageb1[1].PNG
|
PNG image data, 784 x 256, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\npupage7[1].htm
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\fblike[1].jpg
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 140x21, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\IMTE83B.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-99JSC.tmp\PuranWipeDiskSetup.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BUOCP.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BUOCP.tmp\_isetup\_shfoldr.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF226B5233800436BA.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DFAD402C8DF9D6ED10.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\HTML Help\hh.dat
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Users\user\Desktop\Puran Wipe Disk.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Apr 17 20:27:13 2024, mtime=Wed Apr 17 20:27:13 2024, atime=Tue Apr 28 09:45:58 2020, length=984576, window=hide
|
dropped
|
There are 22 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Puran Wipe Disk\Puran Wipe Disk.exe
|
"C:\Program Files\Puran Wipe Disk\Puran Wipe Disk.exe"
|
||
C:\Users\user\Desktop\PuranWipeDiskSetup.exe
|
"C:\Users\user\Desktop\PuranWipeDiskSetup.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-99JSC.tmp\PuranWipeDiskSetup.tmp
|
"C:\Users\user\AppData\Local\Temp\is-99JSC.tmp\PuranWipeDiskSetup.tmp" /SL5="$10450,952714,192000,C:\Users\user\Desktop\PuranWipeDiskSetup.exe"
|
||
C:\Windows\hh.exe
|
"C:\Windows\hh.exe" C:\Program Files\Puran Wipe Disk\help\Wipe_Disk.chm
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.innosetup.com/
|
unknown
|
||
http://www.purannetworks.com/pupage7c.html
|
unknown
|
||
http://www.purannetworks.com/home.pngnational)
|
unknown
|
||
http://www.purannetworks.com/npupage7.htmlPuran
|
unknown
|
||
http://www.purannetworks.com/home.png...nb
|
unknown
|
||
http://www.purannetworks.com/fblike.jpg...
|
unknown
|
||
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
http://www.puransoftware.com/
|
unknown
|
||
http://www.purannetworks.com/pupage7.html
|
unknown
|
||
http://www.purannetworks.com/npupage7.htmlUUC:
|
unknown
|
||
http://www.puransoftware.comq
|
unknown
|
||
http://www.purannetworks.com/npupage7.html6v
|
unknown
|
||
http://www.purannetworks.com/npupage7ty.html
|
unknown
|
||
http://www.purannetworks.com/npupage7.htmlS
|
unknown
|
||
http://www.purannetworks.com/npupage7.htmlttp://www.purannetworks.com/fblike.jpg...
|
unknown
|
||
http://www.purannetworks.com/npupage7.html
|
69.49.232.79
|
||
http://www.puransoftware.com
|
unknown
|
||
http://www.purannetworks.com/home.pngB
|
unknown
|
||
http://www.purannetworks.com/npupage7.html.dll
|
unknown
|
||
http://www.purannetworks.com/npupage7c.htmlhttp://www.purannetworks.com/npupage7ty.htmlhttp://www.pu
|
unknown
|
||
http://www.puransoftware.com/L
|
unknown
|
||
http://www.purannetworks.com/home.png
|
69.49.232.79
|
||
http://www.purannetworks.com/npupage7.htmlil.imgmll...e7.htmlent
|
unknown
|
||
http://www.purannetworks.com/rentVersion
|
unknown
|
||
http://www.purannetworks.com/npupage7.htmlC:
|
unknown
|
||
http://www.purannetworks.com/fblike.jpgF
|
unknown
|
||
http://www.purannetworks.com/npupage7c.html
|
unknown
|
||
http://www.purannetworks.com/npupage7.htmlannetworks.com/npupage7.html
|
unknown
|
||
http://www.puransoftware.comD~
|
unknown
|
||
http://www.puransoftware.com-default-browser-puran
|
unknown
|
||
http://www.purannetworks.com/fblike.jpgH
|
unknown
|
||
http://www.purannetworks.com/npupage7.htmlq
|
unknown
|
||
http://www.purannetworks.com/npupage7.html4Q
|
unknown
|
||
http://www.purannetworks.com/npupage7.htmls
|
unknown
|
||
http://www.remobjects.com/ps
|
unknown
|
||
http://www.puransoftware.com8http://www.puransoftware.com8http://www.puransoftware.com(
|
unknown
|
||
http://www.purannetworks.com/fblike.jpg
|
69.49.232.79
|
||
http://www.purannetworks.com/npupage7.htmlLMEMx
|
unknown
|
||
http://www.purannetworks.com/npupage7.htmlowsh
|
unknown
|
||
http://www.purannetworks.com/pupage7ty.html
|
unknown
|
There are 30 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
purannetworks.com
|
69.49.232.79
|
||
www.purannetworks.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
69.49.232.79
|
purannetworks.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
Inno Setup: Setup Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
Inno Setup: App Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
Inno Setup: Icon Group
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
Inno Setup: User
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
Inno Setup: Selected Tasks
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
Inno Setup: Deselected Tasks
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
Inno Setup: Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
|
EstimatedSize
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\hh.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\hh.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch
|
Version
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4A94000
|
trusted library allocation
|
page read and write
|
||
1E09CC7A000
|
heap
|
page read and write
|
||
2633000
|
heap
|
page read and write
|
||
262F000
|
heap
|
page read and write
|
||
23D0000
|
direct allocation
|
page read and write
|
||
35FF000
|
direct allocation
|
page read and write
|
||
2181000
|
direct allocation
|
page read and write
|
||
1E8A5370000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
24FA000
|
direct allocation
|
page read and write
|
||
41C000
|
unkown
|
page readonly
|
||
704000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
93000
|
stack
|
page read and write
|
||
92B000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
1E8A5348000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
1E8A54FD000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E8A999D000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
2632000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
47F7000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2480000
|
direct allocation
|
page read and write
|
||
5B0000
|
stack
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
262B000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
2495000
|
heap
|
page read and write
|
||
479D000
|
heap
|
page read and write
|
||
1E09EB5C000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E8A5529000
|
heap
|
page read and write
|
||
1E09EB30000
|
heap
|
page read and write
|
||
1E09EB1C000
|
heap
|
page read and write
|
||
4A28000
|
trusted library allocation
|
page read and write
|
||
1E8A54C6000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
21F6000
|
direct allocation
|
page read and write
|
||
909000
|
heap
|
page read and write
|
||
5F40000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09FE20000
|
trusted library allocation
|
page read and write
|
||
8B6000
|
heap
|
page read and write
|
||
1E8A54EE000
|
heap
|
page read and write
|
||
21C9000
|
direct allocation
|
page read and write
|
||
2264000
|
direct allocation
|
page read and write
|
||
958000
|
heap
|
page read and write
|
||
ADF000
|
stack
|
page read and write
|
||
2631000
|
heap
|
page read and write
|
||
947000
|
heap
|
page read and write
|
||
1E09CC13000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E8A53CC000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
509000
|
unkown
|
page read and write
|
||
1E8A54B9000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09CBFE000
|
heap
|
page read and write
|
||
1E0A4CB0000
|
trusted library allocation
|
page read and write
|
||
2508000
|
direct allocation
|
page read and write
|
||
1E09CBC9000
|
heap
|
page read and write
|
||
1E09CBD8000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E8A5490000
|
heap
|
page read and write
|
||
7DF4B7751000
|
trusted library allocation
|
page execute read
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
||
2631000
|
heap
|
page read and write
|
||
2632000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
38ED000
|
heap
|
page read and write
|
||
38EE000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
25A6000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
704000
|
heap
|
page read and write
|
||
1E8A5517000
|
heap
|
page read and write
|
||
262E000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
1E8A5580000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
21B3000
|
direct allocation
|
page read and write
|
||
1E09EB1C000
|
heap
|
page read and write
|
||
1E8A53F0000
|
trusted library allocation
|
page read and write
|
||
25D1000
|
direct allocation
|
page read and write
|
||
361D000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
4763000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
97FE8CE000
|
stack
|
page read and write
|
||
24D4000
|
direct allocation
|
page read and write
|
||
1E09EB2A000
|
heap
|
page read and write
|
||
97FE94E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1E8A551B000
|
heap
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
2632000
|
heap
|
page read and write
|
||
4710000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
97FEC4E000
|
stack
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
265B000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
962000
|
heap
|
page read and write
|
||
47C7000
|
heap
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
49E0000
|
trusted library allocation
|
page read and write
|
||
262D000
|
heap
|
page read and write
|
||
97FEA4E000
|
stack
|
page read and write
|
||
9A6000
|
heap
|
page read and write
|
||
3309000
|
direct allocation
|
page read and write
|
||
2480000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EB53000
|
heap
|
page read and write
|
||
2239000
|
direct allocation
|
page read and write
|
||
32FD000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
25BC000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
978000
|
heap
|
page read and write
|
||
49E2000
|
trusted library allocation
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
47EF000
|
heap
|
page read and write
|
||
7DF4B7760000
|
trusted library allocation
|
page readonly
|
||
4AA8000
|
trusted library allocation
|
page read and write
|
||
38B1000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E0A0960000
|
trusted library allocation
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
1E8A5389000
|
trusted library allocation
|
page read and write
|
||
218F000
|
direct allocation
|
page read and write
|
||
1E8A5350000
|
trusted library allocation
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
477A000
|
heap
|
page read and write
|
||
1E09EB52000
|
heap
|
page read and write
|
||
B020000
|
trusted library allocation
|
page read and write
|
||
2632000
|
heap
|
page read and write
|
||
1E09EB54000
|
heap
|
page read and write
|
||
1E09EBF0000
|
trusted library section
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
6090000
|
direct allocation
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
97FE9CE000
|
stack
|
page read and write
|
||
5E8D000
|
stack
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
4A08000
|
trusted library allocation
|
page read and write
|
||
1E8A54E6000
|
heap
|
page read and write
|
||
1E8A5338000
|
trusted library allocation
|
page read and write
|
||
1E09CF00000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E8A54DC000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page write copy
|
||
907F000
|
stack
|
page read and write
|
||
4F32000
|
heap
|
page read and write
|
||
262F000
|
heap
|
page read and write
|
||
4A2C000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E8A5364000
|
trusted library allocation
|
page read and write
|
||
476A000
|
heap
|
page read and write
|
||
7FE33000
|
direct allocation
|
page read and write
|
||
99A000
|
heap
|
page read and write
|
||
2633000
|
heap
|
page read and write
|
||
1E0A0980000
|
trusted library allocation
|
page read and write
|
||
1E09EB41000
|
heap
|
page read and write
|
||
262E000
|
heap
|
page read and write
|
||
1E09EB41000
|
heap
|
page read and write
|
||
989000
|
heap
|
page read and write
|
||
347C000
|
stack
|
page read and write
|
||
95B000
|
heap
|
page read and write
|
||
2204000
|
direct allocation
|
page read and write
|
||
4F1A000
|
heap
|
page read and write
|
||
1E0A0990000
|
trusted library allocation
|
page read and write
|
||
1E09EB41000
|
heap
|
page read and write
|
||
25C3000
|
direct allocation
|
page read and write
|
||
262F000
|
heap
|
page read and write
|
||
1E8A53A8000
|
trusted library allocation
|
page read and write
|
||
929E000
|
stack
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
2440000
|
heap
|
page read and write
|
||
7FD10000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2499000
|
heap
|
page read and write
|
||
1E8A54B5000
|
heap
|
page read and write
|
||
21FD000
|
direct allocation
|
page read and write
|
||
1E09EB28000
|
heap
|
page read and write
|
||
4803000
|
heap
|
page read and write
|
||
7FF6DF101000
|
unkown
|
page execute read
|
||
2516000
|
direct allocation
|
page read and write
|
||
224F000
|
direct allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2753000
|
heap
|
page read and write
|
||
2633000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09CC2B000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
47E7000
|
heap
|
page read and write
|
||
1E09CB80000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E8A5368000
|
trusted library allocation
|
page read and write
|
||
1E8A53B8000
|
trusted library allocation
|
page read and write
|
||
470F000
|
stack
|
page read and write
|
||
262B000
|
heap
|
page read and write
|
||
1E09EB3A000
|
heap
|
page read and write
|
||
93F000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
97FEB4B000
|
stack
|
page read and write
|
||
49DC000
|
trusted library allocation
|
page read and write
|
||
1E09EB27000
|
heap
|
page read and write
|
||
9703000
|
trusted library allocation
|
page read and write
|
||
1E09EB27000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EB37000
|
heap
|
page read and write
|
||
1E8A53BC000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EAB4000
|
heap
|
page read and write
|
||
9710000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
47DA000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
4A31000
|
trusted library allocation
|
page read and write
|
||
4A48000
|
trusted library allocation
|
page read and write
|
||
262D000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
52B000
|
unkown
|
page readonly
|
||
1E09EB47000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
1E09EB27000
|
heap
|
page read and write
|
||
49E8000
|
trusted library allocation
|
page read and write
|
||
1E8A54E0000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E0A5320000
|
heap
|
page read and write
|
||
80F000
|
stack
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EAD6000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EB41000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
38B0000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
7FF6DF101000
|
unkown
|
page execute read
|
||
97FE340000
|
stack
|
page read and write
|
||
262E000
|
heap
|
page read and write
|
||
479B000
|
heap
|
page read and write
|
||
35C6000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
262F000
|
heap
|
page read and write
|
||
97FE6FE000
|
stack
|
page read and write
|
||
1E09EB27000
|
heap
|
page read and write
|
||
2169000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
4A04000
|
trusted library allocation
|
page read and write
|
||
1E8A540C000
|
trusted library allocation
|
page read and write
|
||
4750000
|
heap
|
page read and write
|
||
49F8000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2634000
|
heap
|
page read and write
|
||
1E09EB22000
|
heap
|
page read and write
|
||
1E0A532D000
|
heap
|
page read and write
|
||
24B7000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
94F0000
|
heap
|
page read and write
|
||
1E0A0970000
|
heap
|
page readonly
|
||
1E0A5324000
|
heap
|
page read and write
|
||
1E8A9961000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
1E8A5384000
|
trusted library allocation
|
page read and write
|
||
1E09CB88000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
265B000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
919000
|
heap
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
2632000
|
heap
|
page read and write
|
||
2470000
|
heap
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
265B000
|
heap
|
page read and write
|
||
1E09EB30000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2632000
|
heap
|
page read and write
|
||
7DF4B7750000
|
trusted library allocation
|
page readonly
|
||
4B2F000
|
stack
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2565000
|
direct allocation
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
4E7D000
|
stack
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2533000
|
direct allocation
|
page read and write
|
||
4F2C000
|
heap
|
page read and write
|
||
7FF6DF193000
|
unkown
|
page readonly
|
||
95D000
|
heap
|
page read and write
|
||
263C000
|
heap
|
page read and write
|
||
262F000
|
heap
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
1E0A4CB3000
|
trusted library allocation
|
page read and write
|
||
25B4000
|
direct allocation
|
page read and write
|
||
2543000
|
direct allocation
|
page read and write
|
||
1E8A5398000
|
trusted library allocation
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
1E8A556F000
|
heap
|
page read and write
|
||
2221000
|
direct allocation
|
page read and write
|
||
4A5C000
|
trusted library allocation
|
page read and write
|
||
49D8000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E0A5144000
|
heap
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
1E09EB41000
|
heap
|
page read and write
|
||
1E8A53E0000
|
trusted library allocation
|
page read and write
|
||
4A0C000
|
trusted library allocation
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
263C000
|
heap
|
page read and write
|
||
947000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
262E000
|
heap
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
1E0A516A000
|
heap
|
page read and write
|
||
1E8A54CE000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
5D8F000
|
stack
|
page read and write
|
||
47F5000
|
heap
|
page read and write
|
||
1E8A53E4000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E8A54E4000
|
heap
|
page read and write
|
||
21E7000
|
direct allocation
|
page read and write
|
||
254B000
|
direct allocation
|
page read and write
|
||
1E09CBD2000
|
heap
|
page read and write
|
||
8090000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EB41000
|
heap
|
page read and write
|
||
7FF6DF100000
|
unkown
|
page readonly
|
||
48ED000
|
heap
|
page read and write
|
||
1E8A53D4000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E8A5480000
|
heap
|
page read and write
|
||
21C2000
|
direct allocation
|
page read and write
|
||
1E09CB00000
|
heap
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
1E8A557E000
|
heap
|
page read and write
|
||
250F000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
1E09EB3A000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
2231000
|
direct allocation
|
page read and write
|
||
48EA000
|
heap
|
page read and write
|
||
25CA000
|
direct allocation
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
6245000
|
direct allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
256C000
|
direct allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
2E9B000
|
stack
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
2632000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
1E09EB10000
|
heap
|
page read and write
|
||
1E09EB30000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
21EE000
|
direct allocation
|
page read and write
|
||
1E0A0983000
|
trusted library allocation
|
page read and write
|
||
4A18000
|
trusted library allocation
|
page read and write
|
||
1E09EB41000
|
heap
|
page read and write
|
||
1E09CB30000
|
heap
|
page read and write
|
||
1E8A54A4000
|
heap
|
page read and write
|
||
21D0000
|
direct allocation
|
page read and write
|
||
BDF000
|
stack
|
page read and write
|
||
915000
|
heap
|
page read and write
|
||
263C000
|
heap
|
page read and write
|
||
1E8A9986000
|
heap
|
page read and write
|
||
219E000
|
direct allocation
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
1E09CF05000
|
heap
|
page read and write
|
||
7120000
|
trusted library section
|
page readonly
|
||
4F2C000
|
heap
|
page read and write
|
||
986000
|
heap
|
page read and write
|
||
361A000
|
direct allocation
|
page read and write
|
||
1E8A5506000
|
heap
|
page read and write
|
||
262F000
|
heap
|
page read and write
|
||
1E09EB1C000
|
heap
|
page read and write
|
||
262F000
|
heap
|
page read and write
|
||
257B000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2636000
|
heap
|
page read and write
|
||
259F000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2632000
|
heap
|
page read and write
|
||
48CD000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
4716000
|
heap
|
page read and write
|
||
25D8000
|
direct allocation
|
page read and write
|
||
4783000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
24E3000
|
direct allocation
|
page read and write
|
||
262F000
|
heap
|
page read and write
|
||
1E8A999C000
|
heap
|
page read and write
|
||
501000
|
unkown
|
page write copy
|
||
1E09EB20000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EB27000
|
heap
|
page read and write
|
||
7FF6DF1C9000
|
unkown
|
page read and write
|
||
1E09CC30000
|
heap
|
page read and write
|
||
2632000
|
heap
|
page read and write
|
||
1E09EB20000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
1E09EB21000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E8A534C000
|
trusted library allocation
|
page read and write
|
||
1E0A4F70000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
1E8A542C000
|
trusted library allocation
|
page read and write
|
||
4A6C000
|
trusted library allocation
|
page read and write
|
||
1E8A999C000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
711B000
|
stack
|
page read and write
|
||
2634000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
25AD000
|
direct allocation
|
page read and write
|
||
1E09EB28000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
262C000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2637000
|
heap
|
page read and write
|
||
4F3E000
|
heap
|
page read and write
|
||
264A000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
32F0000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
8BA2000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
505000
|
unkown
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
6EE000
|
stack
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
330C000
|
direct allocation
|
page read and write
|
||
21DF000
|
direct allocation
|
page read and write
|
||
47AD000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EB47000
|
heap
|
page read and write
|
||
9591000
|
heap
|
page read and write
|
||
52F000
|
unkown
|
page readonly
|
||
704000
|
heap
|
page read and write
|
||
1E8A533C000
|
trusted library allocation
|
page read and write
|
||
35F7000
|
direct allocation
|
page read and write
|
||
1E8A8EB2000
|
trusted library allocation
|
page read and write
|
||
21BB000
|
direct allocation
|
page read and write
|
||
1E09CBC5000
|
heap
|
page read and write
|
||
501000
|
unkown
|
page read and write
|
||
4A78000
|
trusted library allocation
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
1E8A5340000
|
trusted library allocation
|
page read and write
|
||
226C000
|
direct allocation
|
page read and write
|
||
2631000
|
heap
|
page read and write
|
||
2582000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
512000
|
unkown
|
page readonly
|
||
1E09EB34000
|
heap
|
page read and write
|
||
1E8A53FC000
|
trusted library allocation
|
page read and write
|
||
96F0000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EB30000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
96D000
|
heap
|
page read and write
|
||
24A0000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
227A000
|
direct allocation
|
page read and write
|
||
50C000
|
unkown
|
page read and write
|
||
419000
|
unkown
|
page write copy
|
||
263B000
|
heap
|
page read and write
|
||
1E0A5159000
|
heap
|
page read and write
|
||
93C000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
1E0A515E000
|
heap
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EB27000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09E5C3000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EA90000
|
heap
|
page read and write
|
||
1E09EB20000
|
heap
|
page read and write
|
||
1E09EB27000
|
heap
|
page read and write
|
||
1E0A4CA0000
|
trusted library allocation
|
page read and write
|
||
4A24000
|
trusted library allocation
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
97FEACC000
|
trusted library allocation
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
7FF4CD761000
|
trusted library allocation
|
page execute read
|
||
2256000
|
direct allocation
|
page read and write
|
||
1E8A54E2000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2598000
|
direct allocation
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
4F12000
|
heap
|
page read and write
|
||
32F0000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
21D7000
|
direct allocation
|
page read and write
|
||
362E000
|
direct allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
2197000
|
direct allocation
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
47C3000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
1E09EB24000
|
heap
|
page read and write
|
||
9A9000
|
heap
|
page read and write
|
||
1E0A0B20000
|
trusted library allocation
|
page read and write
|
||
1E8A5354000
|
trusted library allocation
|
page read and write
|
||
7DF4B7771000
|
trusted library allocation
|
page execute read
|
||
97FE77D000
|
stack
|
page read and write
|
||
251E000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2188000
|
direct allocation
|
page read and write
|
||
91C000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2633000
|
heap
|
page read and write
|
||
1E09EB2F000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09CBB9000
|
heap
|
page read and write
|
||
1E09EB30000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
905000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EB1C000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EB30000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
4788000
|
heap
|
page read and write
|
||
21AC000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2F9C000
|
stack
|
page read and write
|
||
918E000
|
stack
|
page read and write
|
||
97FEBCF000
|
stack
|
page read and write
|
||
1E09EB41000
|
heap
|
page read and write
|
||
1E8A53B0000
|
trusted library allocation
|
page read and write
|
||
94D000
|
heap
|
page read and write
|
||
360A000
|
direct allocation
|
page read and write
|
||
49EC000
|
trusted library allocation
|
page read and write
|
||
1E8A5342000
|
trusted library allocation
|
page read and write
|
||
939C000
|
trusted library allocation
|
page read and write
|
||
1E09EB20000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2505000
|
heap
|
page read and write
|
||
262E000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
4799000
|
heap
|
page read and write
|
||
24C6000
|
direct allocation
|
page read and write
|
||
2470000
|
unkown
|
page readonly
|
||
34D0000
|
direct allocation
|
page read and write
|
||
1E09EB30000
|
heap
|
page read and write
|
||
1E8A5360000
|
trusted library allocation
|
page read and write
|
||
945000
|
heap
|
page read and write
|
||
1E8A995F000
|
heap
|
page read and write
|
||
4F32000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
263C000
|
heap
|
page read and write
|
||
7FF6DF100000
|
unkown
|
page readonly
|
||
704000
|
heap
|
page read and write
|
||
2552000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
4797000
|
heap
|
page read and write
|
||
1E09EB28000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E0A4CC0000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
360E000
|
direct allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
1E8A53C8000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
255D000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
38ED000
|
heap
|
page read and write
|
||
1E8A535C000
|
trusted library allocation
|
page read and write
|
||
2468000
|
heap
|
page read and write
|
||
1E09EB52000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
2463000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
24F7000
|
direct allocation
|
page read and write
|
||
1E09EB61000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2240000
|
direct allocation
|
page read and write
|
||
35F5000
|
direct allocation
|
page read and write
|
||
24F1000
|
direct allocation
|
page read and write
|
||
225D000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
478A000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
262F000
|
heap
|
page read and write
|
||
4A1C000
|
trusted library allocation
|
page read and write
|
||
263C000
|
heap
|
page read and write
|
||
1E09EB2A000
|
heap
|
page read and write
|
||
1E09E600000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
4772000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
936000
|
heap
|
page read and write
|
||
1E0A0960000
|
trusted library allocation
|
page read and write
|
||
4F32000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
24CD000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
6155000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
985000
|
heap
|
page read and write
|
||
4A98000
|
trusted library allocation
|
page read and write
|
||
97FE7FD000
|
stack
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
98F000
|
stack
|
page read and write
|
||
1E8A997E000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
975000
|
heap
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
417000
|
unkown
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
263C000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
922000
|
heap
|
page read and write
|
||
1E09EB2A000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
262F000
|
heap
|
page read and write
|
||
7FF6DF1D5000
|
unkown
|
page readonly
|
||
980000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
2631000
|
heap
|
page read and write
|
||
1E09EB35000
|
heap
|
page read and write
|
||
1E09CB10000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
4A74000
|
trusted library allocation
|
page read and write
|
||
7FF4CD760000
|
trusted library allocation
|
page readonly
|
||
1E09EAF6000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EB09000
|
heap
|
page read and write
|
||
4790000
|
heap
|
page read and write
|
||
48C4000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EB1D000
|
heap
|
page read and write
|
||
1E8A98C0000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
2288000
|
direct allocation
|
page read and write
|
||
4F32000
|
heap
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
4A88000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
4795000
|
heap
|
page read and write
|
||
1E09EB27000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E8A53F8000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09EB28000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
263C000
|
heap
|
page read and write
|
||
2501000
|
direct allocation
|
page read and write
|
||
4F3A000
|
heap
|
page read and write
|
||
47FC000
|
heap
|
page read and write
|
||
1E09EB41000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E0A5140000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
4F2B000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
21A5000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E8A5378000
|
trusted library allocation
|
page read and write
|
||
2281000
|
direct allocation
|
page read and write
|
||
2637000
|
heap
|
page read and write
|
||
2631000
|
heap
|
page read and write
|
||
8E7000
|
heap
|
page read and write
|
||
1E8A53A2000
|
trusted library allocation
|
page read and write
|
||
48D4000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E8A54DE000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
92F000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
2211000
|
direct allocation
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
7FF6DF1D5000
|
unkown
|
page readonly
|
||
97C000
|
heap
|
page read and write
|
||
4EFF000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2632000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
49F4000
|
trusted library allocation
|
page read and write
|
||
1E09EB27000
|
heap
|
page read and write
|
||
860000
|
direct allocation
|
page execute and read and write
|
||
263C000
|
heap
|
page read and write
|
||
4776000
|
heap
|
page read and write
|
||
263B000
|
heap
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
7FF6DF193000
|
unkown
|
page readonly
|
||
704000
|
heap
|
page read and write
|
||
2633000
|
heap
|
page read and write
|
||
35E6000
|
direct allocation
|
page read and write
|
||
1E8A54C2000
|
heap
|
page read and write
|
||
93F000
|
heap
|
page read and write
|
||
7FF6DF1C9000
|
unkown
|
page write copy
|
||
1E09EB41000
|
heap
|
page read and write
|
||
1E09EAB0000
|
heap
|
page read and write
|
||
9700000
|
trusted library allocation
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E8A5411000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
23D0000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
1E09E5C0000
|
heap
|
page read and write
|
||
2273000
|
direct allocation
|
page read and write
|
||
916000
|
heap
|
page read and write
|
||
93C000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
65E000
|
stack
|
page read and write
|
||
1E09E590000
|
heap
|
page read and write
|
||
1E09EB20000
|
heap
|
page read and write
|
||
92D000
|
heap
|
page read and write
|
||
7DF4B7761000
|
trusted library allocation
|
page execute read
|
||
704000
|
heap
|
page read and write
|
||
27A3000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
91C000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
1E09EB41000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2632000
|
heap
|
page read and write
|
||
2590000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
24EA000
|
direct allocation
|
page read and write
|
||
1E8A5374000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
2490000
|
heap
|
page read and write
|
||
2589000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
1E8A5380000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
263C000
|
heap
|
page read and write
|
||
8F7000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
4A54000
|
trusted library allocation
|
page read and write
|
||
1E8A53A0000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
50C000
|
unkown
|
page write copy
|
||
59E000
|
stack
|
page read and write
|
||
24B0000
|
direct allocation
|
page read and write
|
||
1E8A53D8000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
913000
|
heap
|
page read and write
|
||
24DB000
|
direct allocation
|
page read and write
|
||
4F2A000
|
heap
|
page read and write
|
||
331D000
|
direct allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
There are 828 hidden memdumps, click here to show them.