Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
astro-grep-setup.exe.doc
|
Microsoft OOXML
|
initial sample
|
||
C:\ProgramData\Memsys\ms.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\ASTRO-GREP.EXE
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\AstroGrep\AstroGrep.AdminProcess.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\AstroGrep\AstroGrep.AdminProcess.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\AstroGrep\AstroGrep.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\AstroGrep\AstroGrep.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\AstroGrep\AstroGrep.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\AstroGrep\AstroGrep_256x256.png
|
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\AstroGrep\ICSharpCode.AvalonEdit.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\AstroGrep\NLog.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\AstroGrep\Uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Program Files (x86)\AstroGrep\astrogrep.VisualElementsManifest.xml
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\AstroGrep\libAstroGrep.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\AstroGrep\license.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\AstroGrep\readme.txt
|
UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AstroGrep\AstroGrep.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Thu Apr 4 19:57:44 2019, mtime=Sun Jul 18 03:42:39 2021, atime=Thu Apr 4 19:57:44 2019, length=573440, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AstroGrep\Uninstall AstroGrep.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Sun Jul 18 03:42:40 2021, mtime=Sun Jul 18 03:42:40 2021, atime=Sun Jul 18 03:42:40 2021, length=61854, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\78FF0AD.png
|
PNG image data, 1024 x 768, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{5BCB44D4-31CD-44E2-A821-3408DFB7CA1A}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{8DB8CC3B-9141-43B7-951A-41190F623D30}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{90768F62-679A-419C-A2B1-C0B28319F5E4}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{FBF58E38-2270-4D70-A99C-79301888F689}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ASTROGREP_SETUP_V4.4.7.EXE
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\msoB754.tmp
|
GIF image data, version 89a, 15 x 15
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsa2731.tmp\LangDLL.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsa2731.tmp\StartMenu.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsa2731.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsa2731.tmp\modern-wizard.bmp
|
PC bitmap, Windows 3.x format, 164 x 314 x 4
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsa2731.tmp\nsDialogs.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp3E29.tmp.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\astro-grep-setup.exe.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:12
2020, mtime=Wed Aug 26 14:08:12 2020, atime=Sun Jul 18 03:39:30 2021, length=1443117, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$tro-grep-setup.exe.doc
|
data
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators, with overstriking
|
dropped
|
There are 27 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\ProgramData\Memsys\ms.exe
|
C:\ProgramData\Memsys\ms.exe
|
||
C:\Users\user\AppData\Local\Temp\ASTRO-GREP.EXE
|
'C:\Users\user\AppData\Local\Temp\ASTRO-GREP.EXE'
|
||
C:\Windows\SysWOW64\cmd.exe
|
'C:\Windows\System32\cmd.exe' /c schtasks /create /f /sc onlogon /rl highest /tn 'astro-grep' /tr ''C:\Users\user\AppData\Roaming\astro-grep.exe''
& exit
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ''C:\Users\user\AppData\Local\Temp\tmp3E29.tmp.bat''
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /f /sc onlogon /rl highest /tn 'astro-grep' /tr ''C:\Users\user\AppData\Roaming\astro-grep.exe''
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
C:\Users\user\AppData\Roaming\astro-grep.exe
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
'C:\Users\user\AppData\Roaming\astro-grep.exe'
|
||
C:\Users\user\AppData\Local\Temp\ASTROGREP_SETUP_V4.4.7.EXE
|
'C:\Users\user\AppData\Local\Temp\ASTROGREP_SETUP_V4.4.7.EXE'
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout 3
|
||
C:\Windows\System32\taskeng.exe
|
taskeng.exe {E0184388-4CC0-4E79-AF38-011207705295} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.windows.com/pctv.
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
https://pastebin.com/raw
|
unknown
|
||
https://pastebin.com/raw/VTByvKGM
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
https://nlog-project.org/
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
https://pastebin.com/raw/VTByvKGMHD
|
unknown
|
||
https://pastebin.comP
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
||
https://pastebin.com/raw/VTByvKGMHD9mPHD9m0HD9m
|
unknown
|
||
https://www.nuget.org/packages/NLog.Web.AspNetCore
|
unknown
|
||
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
http://pastebin.com
|
unknown
|
||
https://pastebin.com
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
https://pastebin.com/raw/VTByvKGMHD9m
|
unknown
|
There are 21 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pastebin.com
|
104.23.98.190
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.195.232.251
|
unknown
|
Sweden
|
||
104.23.98.190
|
pastebin.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
t#9
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
m$9
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
$&9
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
TCWP5FilesIntl_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
TCWP6FilesIntl_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Name
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Path
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Extensions
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Name
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Path
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Extensions
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Name
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Path
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Extensions
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EBA79
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
TCWP5FilesIntl_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
TCWP6FilesIntl_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
TCWP5FilesIntl_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
TCWP6FilesIntl_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Users\user\AppData\Local\Temp\ASTROGREP_SETUP_V4.4.7.EXE
|
NULL
|
||
C:\Users\user\AppData\Local\Temp\ASTROGREP_SETUP_V4.4.7.EXE
|
DisplayName
|
||
C:\Users\user\AppData\Local\Temp\ASTROGREP_SETUP_V4.4.7.EXE
|
DisplayIcon
|
||
C:\Users\user\AppData\Local\Temp\ASTROGREP_SETUP_V4.4.7.EXE
|
Publisher
|
||
C:\Users\user\AppData\Local\Temp\ASTROGREP_SETUP_V4.4.7.EXE
|
DisplayVersion
|
||
C:\Users\user\AppData\Local\Temp\ASTROGREP_SETUP_V4.4.7.EXE
|
UninstallString
|
||
C:\Users\user\AppData\Local\Temp\ASTROGREP_SETUP_V4.4.7.EXE
|
QuietUninstallString
|
||
C:\Users\user\AppData\Local\Temp\ASTROGREP_SETUP_V4.4.7.EXE
|
NoModify
|
||
C:\Users\user\AppData\Local\Temp\ASTROGREP_SETUP_V4.4.7.EXE
|
NoRepair
|
||
C:\Users\user\AppData\Local\Temp\ASTROGREP_SETUP_V4.4.7.EXE
|
EstimatedSize
|
||
C:\Users\user\AppData\Local\Temp\ASTROGREP_SETUP_V4.4.7.EXE
|
Start Menu Folder
|
||
C:\Users\user\AppData\Local\Temp\ASTROGREP_SETUP_V4.4.7.EXE
|
Installer Language
|
||
C:\Windows\System32\taskeng.exe
|
data
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
EnableFileTracing
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
EnableConsoleTracing
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
FileTracingMask
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
ConsoleTracingMask
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
MaxFileSize
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
FileDirectory
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
EnableFileTracing
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
EnableConsoleTracing
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
FileTracingMask
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
ConsoleTracingMask
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
MaxFileSize
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
FileDirectory
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
Blob
|
||
C:\Users\user\AppData\Roaming\astro-grep.exe
|
Blob
|
There are 63 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
922000
|
unkown image
|
page execute read
|
||
192000
|
unkown image
|
page execute read
|
||
B7F000
|
unkown image
|
page readonly
|
||
192000
|
unkown image
|
page execute read
|
||
192000
|
unkown image
|
page execute read
|
||
922000
|
unkown image
|
page execute read
|
||
192000
|
unkown image
|
page execute read
|
||
24AF000
|
unkown
|
page read and write
|
||
B7F000
|
unkown image
|
page readonly
|
||
4889000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
4948000
|
unkown
|
page read and write
|
||
4889000
|
unkown
|
page read and write
|
||
2368000
|
unkown
|
page read and write
|
||
1C70000
|
unkown
|
page readonly
|
||
4948000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
30F2000
|
unkown
|
page readonly
|
||
1F0000
|
unkown
|
page read and write
|
||
600000
|
heap private
|
page read and write
|
||
23D0000
|
unkown
|
page readonly
|
||
71F000
|
unkown
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
80000
|
unkown
|
page readonly
|
||
2431000
|
unkown
|
page read and write
|
||
4952000
|
unkown
|
page read and write
|
||
2860000
|
unkown
|
page readonly
|
||
1FC000
|
unkown
|
page read and write
|
||
409000
|
unkown image
|
page write copy
|
||
4A20000
|
unkown
|
page read and write
|
||
3A9000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
24C1000
|
unkown
|
page read and write
|
||
56A0000
|
heap private
|
page read and write
|
||
2210000
|
heap private
|
page read and write
|
||
5F0000
|
heap private
|
page execute and read and write
|
||
F0000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
687000
|
heap default
|
page read and write
|
||
325000
|
heap default
|
page read and write
|
||
F4000
|
heap private
|
page read and write
|
||
4A22000
|
unkown
|
page read and write
|
||
2F39000
|
unkown
|
page readonly
|
||
48D2000
|
unkown
|
page read and write
|
||
245A000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page read and write
|
||
609000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page readonly
|
||
420000
|
unkown
|
page read and write
|
||
F0000
|
heap private
|
page read and write
|
||
4A8E000
|
unkown
|
page read and write
|
||
4952000
|
unkown
|
page read and write
|
||
4B20000
|
unkown
|
page readonly
|
||
4D0D000
|
unkown
|
page read and write
|
||
190000
|
unkown image
|
page readonly
|
||
147000
|
unkown
|
page execute and read and write
|
||
13D000
|
unkown
|
page read and write
|
||
604F000
|
unkown
|
page read and write
|
||
60FF000
|
unkown
|
page read and write
|
||
2EA5000
|
unkown
|
page readonly
|
||
4952000
|
unkown
|
page read and write
|
||
520000
|
heap default
|
page read and write
|
||
710000
|
heap default
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
457000
|
heap default
|
page read and write
|
||
48D2000
|
unkown
|
page read and write
|
||
AF0000
|
unkown image
|
page readonly
|
||
3DB000
|
heap default
|
page read and write
|
||
3C0000
|
heap private
|
page read and write
|
||
15C000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
19E000
|
unkown image
|
page readonly
|
||
92E000
|
unkown image
|
page readonly
|
||
190000
|
unkown image
|
page readonly
|
||
9F0000
|
unkown
|
page read and write
|
||
446E000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
123000
|
unkown
|
page execute and read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
23FE000
|
unkown
|
page read and write
|
||
B7D000
|
unkown image
|
page read and write
|
||
21AE000
|
unkown
|
page read and write | page guard
|
||
6D1000
|
heap default
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
397000
|
heap default
|
page read and write
|
||
5EC1000
|
heap private
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
487E000
|
unkown
|
page read and write
|
||
230000
|
heap private
|
page execute and read and write
|
||
21D0000
|
heap private
|
page read and write
|
||
216E000
|
unkown
|
page read and write
|
||
609000
|
heap default
|
page read and write
|
||
4872000
|
unkown
|
page read and write
|
||
5C10000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
4F30000
|
heap private
|
page execute and read and write
|
||
2E04000
|
unkown
|
page readonly
|
||
2828000
|
heap private
|
page read and write
|
||
48D2000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page read and write
|
||
18A000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page read and write
|
||
2927000
|
unkown
|
page readonly
|
||
827000
|
heap private
|
page read and write
|
||
2AE000
|
unkown
|
page read and write
|
||
16D000
|
unkown
|
page execute and read and write
|
||
5560000
|
unkown
|
page read and write
|
||
230000
|
unkown
|
page read and write
|
||
4948000
|
unkown
|
page read and write
|
||
4948000
|
unkown
|
page read and write
|
||
58A0000
|
heap private
|
page read and write
|
||
49A000
|
heap default
|
page read and write
|
||
282B000
|
heap private
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
677000
|
heap default
|
page read and write
|
||
3C0000
|
unkown
|
page write copy
|
||
70000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
920000
|
unkown image
|
page readonly
|
||
320000
|
heap default
|
page read and write
|
||
694000
|
heap default
|
page read and write
|
||
60F000
|
unkown
|
page read and write
|
||
164000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
407000
|
unkown image
|
page readonly
|
||
15B000
|
unkown
|
page execute and read and write
|
||
56B0000
|
heap private
|
page read and write
|
||
6F1000
|
heap default
|
page read and write
|
||
2E32000
|
unkown
|
page readonly
|
||
89E000
|
unkown
|
page read and write
|
||
2F09000
|
unkown
|
page readonly
|
||
2357000
|
unkown
|
page read and write
|
||
8B0000
|
heap private
|
page execute and read and write
|
||
2E62000
|
unkown
|
page readonly
|
||
401000
|
unkown image
|
page execute read
|
||
60000
|
unkown
|
page readonly
|
||
2E92000
|
unkown
|
page readonly
|
||
331F000
|
unkown
|
page read and write
|
||
233B000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
3D6000
|
unkown
|
page read and write
|
||
26F000
|
unkown
|
page read and write
|
||
19B000
|
unkown
|
page execute and read and write
|
||
550000
|
unkown
|
page readonly
|
||
5EE000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
5C10000
|
unkown
|
page read and write
|
||
4948000
|
unkown
|
page read and write
|
||
4952000
|
unkown
|
page read and write
|
||
15B000
|
unkown
|
page execute and read and write
|
||
3A7000
|
heap default
|
page read and write
|
||
6F3000
|
heap default
|
page read and write
|
||
26CF000
|
unkown
|
page read and write
|
||
434000
|
unkown image
|
page read and write
|
||
69E000
|
unkown
|
page read and write
|
||
31E000
|
unkown
|
page read and write
|
||
19E000
|
unkown image
|
page readonly
|
||
5BBE000
|
unkown
|
page read and write
|
||
4885000
|
unkown
|
page read and write
|
||
28AD000
|
unkown
|
page read and write
|
||
1CB000
|
unkown
|
page read and write
|
||
142000
|
unkown
|
page read and write
|
||
5D3000
|
unkown
|
page read and write
|
||
4A0000
|
heap private
|
page execute and read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
5BF2000
|
heap private
|
page read and write
|
||
48D2000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
6B0000
|
heap default
|
page read and write
|
||
628000
|
unkown
|
page read and write
|
||
360000
|
heap private
|
page read and write
|
||
49D000
|
heap default
|
page read and write
|
||
570000
|
heap private
|
page read and write
|
||
920000
|
unkown image
|
page readonly
|
||
187000
|
unkown
|
page execute and read and write
|
||
6A0000
|
unkown
|
page readonly
|
||
490000
|
heap default
|
page read and write
|
||
4871000
|
unkown
|
page read and write
|
||
4948000
|
unkown
|
page read and write
|
||
4885000
|
unkown
|
page read and write
|
||
22E1000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
680000
|
heap default
|
page read and write
|
||
9C0000
|
heap private
|
page read and write
|
||
2060000
|
unkown
|
page read and write
|
||
6F1000
|
unkown
|
page read and write
|
||
B70000
|
unkown image
|
page readonly
|
||
20FE000
|
unkown
|
page read and write
|
||
2EC2000
|
unkown
|
page readonly
|
||
AC0000
|
unkown
|
page readonly
|
||
B71000
|
unkown image
|
page execute read
|
||
9F0000
|
unkown
|
page read and write
|
||
4881000
|
unkown
|
page read and write
|
||
5DD000
|
unkown
|
page read and write
|
||
3170000
|
unkown
|
page readonly
|
||
29D000
|
unkown
|
page read and write
|
||
4A90000
|
unkown
|
page readonly
|
||
2EE9000
|
unkown
|
page readonly
|
||
60F000
|
unkown
|
page read and write
|
||
556E000
|
unkown
|
page read and write
|
||
613000
|
unkown
|
page read and write
|
||
31C000
|
heap default
|
page read and write
|
||
48D000
|
unkown
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
9F0000
|
unkown
|
page read and write
|
||
2A7000
|
heap default
|
page read and write
|
||
4880000
|
unkown
|
page read and write
|
||
4F70000
|
unkown
|
page readonly
|
||
401000
|
unkown image
|
page execute read
|
||
407000
|
unkown image
|
page readonly
|
||
48D2000
|
unkown
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
4E0000
|
heap default
|
page read and write
|
||
4948000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
247C000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page read and write
|
||
890000
|
heap private
|
page read and write
|
||
259E000
|
unkown
|
page read and write
|
||
33F000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
4CA000
|
unkown
|
page read and write
|
||
74F000
|
unkown
|
page read and write
|
||
487E000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
520000
|
heap private
|
page read and write
|
||
52F000
|
heap default
|
page read and write
|
||
2F25000
|
unkown
|
page readonly
|
||
820000
|
heap private
|
page read and write
|
||
4952000
|
unkown
|
page read and write
|
||
6F4000
|
heap default
|
page read and write
|
||
3190000
|
unkown
|
page readonly
|
||
1D0000
|
unkown
|
page readonly
|
||
9F0000
|
unkown
|
page read and write
|
||
2E75000
|
unkown
|
page readonly
|
||
3A0000
|
heap default
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
609000
|
unkown
|
page read and write
|
||
910000
|
unkown
|
page readonly
|
||
440000
|
unkown image
|
page read and write
|
||
2DE000
|
unkown
|
page read and write
|
||
2164000
|
heap private
|
page read and write
|
||
220000
|
unkown
|
page read and write
|
||
19E000
|
unkown image
|
page readonly
|
||
630000
|
unkown
|
page readonly
|
||
23F3000
|
unkown
|
page read and write
|
||
23FE000
|
unkown
|
page read and write | page guard
|
||
870000
|
unkown
|
page readonly
|
||
4ED0000
|
unkown
|
page readonly
|
||
22DF000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
4948000
|
unkown
|
page read and write
|
||
62D000
|
unkown
|
page read and write
|
||
5BD0000
|
heap private
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
48D2000
|
unkown
|
page read and write
|
||
4C7000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
2080000
|
unkown
|
page readonly
|
||
2F32000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page read and write
|
||
5340000
|
unkown
|
page write copy
|
||
248A000
|
unkown
|
page read and write
|
||
2F62000
|
unkown
|
page readonly
|
||
550000
|
unkown
|
page read and write
|
||
440000
|
unkown image
|
page readonly
|
||
458E000
|
unkown
|
page read and write
|
||
2150000
|
heap private
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
487E000
|
unkown
|
page read and write
|
||
190000
|
unkown image
|
page readonly
|
||
9F0000
|
unkown
|
page read and write
|
||
2415000
|
unkown
|
page read and write
|
||
56F0000
|
unkown
|
page write copy
|
||
1F0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
830000
|
unkown
|
page read and write
|
||
2E86000
|
unkown
|
page readonly
|
||
48D2000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
4948000
|
unkown
|
page read and write
|
||
521000
|
heap default
|
page read and write
|
||
21AF000
|
unkown
|
page read and write
|
||
5870000
|
heap private
|
page read and write
|
||
737000
|
heap default
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
540000
|
heap private
|
page read and write
|
||
60F000
|
heap default
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
3431000
|
unkown
|
page read and write
|
||
23AE000
|
unkown
|
page read and write
|
||
6BA000
|
heap default
|
page read and write
|
||
4DB0000
|
heap private
|
page execute and read and write
|
||
670000
|
unkown
|
page readonly
|
||
6D0000
|
heap private
|
page execute and read and write
|
||
3150000
|
unkown
|
page readonly
|
||
4952000
|
unkown
|
page read and write
|
||
4952000
|
unkown
|
page read and write
|
||
27D0000
|
unkown
|
page read and write
|
||
4948000
|
unkown
|
page read and write
|
||
2DC2000
|
unkown
|
page readonly
|
||
5EB0000
|
heap private
|
page read and write
|
||
62D000
|
unkown
|
page read and write
|
||
5A7000
|
heap default
|
page read and write
|
||
2B00000
|
unkown
|
page readonly
|
||
9F0000
|
unkown
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
48F6000
|
unkown
|
page read and write
|
||
2F69000
|
unkown
|
page readonly
|
||
2B8000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
140000
|
unkown
|
page readonly
|
||
5A60000
|
unkown
|
page readonly
|
||
250000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
4A21000
|
unkown
|
page read and write
|
||
4750000
|
unkown
|
page readonly
|
||
5A0000
|
heap default
|
page read and write
|
||
170000
|
heap private
|
page read and write
|
||
3130000
|
unkown
|
page readonly
|
||
470000
|
heap default
|
page read and write
|
||
163000
|
unkown
|
page execute and read and write
|
||
110000
|
unkown
|
page read and write
|
||
860000
|
unkown image
|
page readonly
|
||
474000
|
heap default
|
page read and write
|
||
20BF000
|
unkown
|
page read and write
|
||
487F000
|
unkown
|
page read and write
|
||
4E90000
|
heap private
|
page execute and read and write
|
||
2B20000
|
unkown
|
page readonly
|
||
63C000
|
unkown
|
page read and write
|
||
6CF000
|
unkown
|
page read and write
|
||
1CA0000
|
unkown
|
page readonly
|
||
2344000
|
unkown
|
page read and write
|
||
2DC4000
|
unkown
|
page readonly
|
||
243E000
|
unkown
|
page read and write
|
||
4870000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
13C000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page read and write
|
||
554000
|
heap private
|
page read and write
|
||
48D2000
|
unkown
|
page read and write
|
||
5410000
|
heap private
|
page read and write
|
||
5D6000
|
heap default
|
page read and write
|
||
4DDE000
|
unkown
|
page read and write
|
||
44A000
|
unkown image
|
page readonly
|
||
2DE000
|
heap default
|
page read and write
|
||
35F0000
|
unkown
|
page read and write
|
||
2824000
|
heap private
|
page read and write
|
||
B79000
|
unkown image
|
page readonly
|
||
290000
|
unkown
|
page read and write
|
||
4970000
|
unkown
|
page readonly
|
||
71A000
|
heap default
|
page read and write
|
||
2740000
|
unkown
|
page readonly
|
||
23FF000
|
unkown
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
5E0000
|
unkown
|
page readonly
|
||
2A85000
|
heap private
|
page read and write
|
||
4C3000
|
unkown
|
page read and write
|
||
5CDE000
|
unkown
|
page read and write
|
||
2A0000
|
heap default
|
page read and write
|
||
4885000
|
unkown
|
page read and write
|
||
896000
|
heap private
|
page read and write
|
||
4877000
|
unkown
|
page read and write
|
||
5C4000
|
heap default
|
page read and write
|
||
197000
|
unkown
|
page execute and read and write
|
||
35E000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
2F55000
|
unkown
|
page readonly
|
||
572000
|
heap private
|
page read and write
|
||
54E000
|
unkown
|
page read and write
|
||
4DA000
|
heap default
|
page read and write
|
||
5780000
|
heap private
|
page read and write
|
||
570000
|
unkown
|
page read and write
|
||
5F0000
|
heap default
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2EED000
|
unkown
|
page readonly
|
||
22C000
|
unkown
|
page read and write
|
||
6BC000
|
heap default
|
page read and write
|
||
6F8000
|
unkown
|
page read and write
|
||
487D000
|
unkown
|
page read and write
|
||
7DE000
|
unkown
|
page read and write
|
||
23D0000
|
unkown
|
page read and write
|
||
364000
|
heap private
|
page read and write
|
||
557D000
|
unkown
|
page read and write
|
||
382000
|
heap private
|
page read and write
|
||
2DB000
|
unkown
|
page read and write
|
||
81D000
|
unkown
|
page read and write
|
||
62E000
|
unkown
|
page read and write
|
||
4952000
|
unkown
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
2F02000
|
unkown
|
page readonly
|
||
87000
|
unkown
|
page read and write
|
||
2E02000
|
unkown
|
page readonly
|
||
820000
|
unkown
|
page readonly
|
||
449000
|
unkown
|
page read and write
|
||
27D0000
|
unkown
|
page read and write
|
||
4952000
|
unkown
|
page read and write
|
||
4B01000
|
unkown
|
page read and write
|
||
2ED5000
|
unkown
|
page readonly
|
||
124000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
6BD000
|
heap default
|
page read and write
|
||
157000
|
unkown
|
page execute and read and write
|
||
200000
|
heap default
|
page read and write
|
||
544000
|
heap private
|
page read and write
|
||
2DE4000
|
unkown
|
page readonly
|
||
209E000
|
unkown
|
page read and write
|
||
486F000
|
unkown
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
4948000
|
unkown
|
page read and write
|
||
4952000
|
unkown
|
page read and write
|
||
940000
|
unkown
|
page readonly
|
||
110000
|
unkown
|
page read and write
|
||
B70000
|
unkown image
|
page readonly
|
||
545E000
|
unkown
|
page read and write
|
||
6D7000
|
heap default
|
page read and write
|
||
7EF40000
|
unkown
|
page execute and read and write
|
||
48D2000
|
unkown
|
page read and write
|
||
757000
|
heap default
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page read and write
|
||
2E45000
|
unkown
|
page readonly
|
||
6AE000
|
heap default
|
page read and write
|
||
930000
|
heap private
|
page read and write
|
||
3C4000
|
heap default
|
page read and write
|
||
240000
|
unkown
|
page readonly
|
||
6EE000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
6D0000
|
heap default
|
page read and write
|
||
4CCE000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
378000
|
unkown
|
page read and write
|
||
590000
|
unkown image
|
page readonly
|
||
1D0000
|
unkown
|
page read and write
|
||
19E000
|
unkown image
|
page readonly
|
||
27CF000
|
unkown
|
page read and write
|
||
450000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
59FE000
|
unkown
|
page read and write
|
||
152000
|
unkown
|
page read and write
|
||
489B000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
8DE000
|
unkown
|
page read and write
|
||
580000
|
unkown
|
page readonly
|
||
4DF0000
|
unkown
|
page readonly
|
||
6CD000
|
heap default
|
page read and write
|
||
426000
|
unkown
|
page read and write
|
||
4CA000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
3401000
|
unkown
|
page read and write
|
||
410000
|
heap private
|
page read and write
|
||
474E000
|
unkown
|
page read and write
|
||
4470000
|
unkown
|
page readonly
|
||
538000
|
heap default
|
page read and write
|
||
6A4000
|
heap default
|
page read and write
|
||
157000
|
unkown
|
page execute and read and write
|
||
AC0000
|
unkown
|
page readonly
|
||
4A82000
|
unkown
|
page read and write
|
||
531000
|
heap default
|
page read and write
|
||
130000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
2C02000
|
unkown
|
page readonly
|
||
9F0000
|
unkown
|
page read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
621000
|
unkown
|
page read and write
|
||
3D6000
|
heap default
|
page read and write
|
||
5E2000
|
heap default
|
page read and write
|
||
18A000
|
unkown
|
page execute and read and write
|
||
180000
|
unkown
|
page readonly
|
||
1FBE000
|
unkown
|
page read and write
|
||
2DE2000
|
unkown
|
page readonly
|
||
62D000
|
unkown
|
page read and write
|
||
12D000
|
unkown
|
page execute and read and write
|
||
2EB6000
|
unkown
|
page readonly
|
||
170000
|
unkown
|
page read and write
|
||
249F000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
B70000
|
unkown image
|
page readonly
|
||
48D2000
|
unkown
|
page read and write
|
||
3CD000
|
heap default
|
page read and write
|
||
136000
|
unkown
|
page read and write
|
||
23F0000
|
heap private
|
page execute and read and write
|
||
850000
|
unkown
|
page read and write
|
||
5EE000
|
unkown
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
48D2000
|
unkown
|
page read and write
|
||
372F000
|
unkown
|
page read and write
|
||
3B8000
|
unkown
|
page read and write
|
||
369000
|
unkown
|
page read and write
|
||
5C10000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
190000
|
unkown image
|
page readonly
|
||
450000
|
unkown
|
page read and write
|
||
23AE000
|
unkown
|
page read and write
|
||
750000
|
heap default
|
page read and write
|
||
2D02000
|
unkown
|
page readonly
|
||
2300000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page read and write
|
||
3570000
|
unkown
|
page read and write
|
||
24E6000
|
unkown
|
page read and write
|
||
5BD4000
|
heap private
|
page read and write
|
||
22DF000
|
unkown
|
page read and write
|
||
382F000
|
unkown
|
page read and write
|
||
2A80000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
124000
|
unkown
|
page read and write
|
||
533E000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
12D000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page read and write
|
||
4952000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page readonly
|
||
2220000
|
unkown
|
page readonly
|
||
5E1000
|
unkown
|
page read and write
|
||
5432000
|
heap private
|
page read and write
|
||
5415000
|
heap private
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
3377000
|
unkown
|
page readonly
|
||
2C08000
|
unkown
|
page readonly
|
||
3C6000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
234D000
|
unkown
|
page read and write
|
||
24E4000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
147000
|
unkown
|
page execute and read and write
|
||
32E1000
|
unkown
|
page read and write
|
||
390000
|
heap default
|
page read and write
|
||
920000
|
unkown image
|
page readonly
|
||
9F0000
|
unkown
|
page read and write
|
||
B79000
|
unkown image
|
page readonly
|
||
5F0000
|
unkown
|
page read and write
|
||
76E000
|
heap default
|
page read and write
|
||
92E000
|
unkown image
|
page readonly
|
||
F0000
|
unkown
|
page read and write
|
||
71C000
|
heap default
|
page read and write
|
||
219B000
|
heap private
|
page read and write
|
||
409000
|
unkown image
|
page read and write
|
||
B71000
|
unkown image
|
page execute read
|
||
238B000
|
unkown
|
page read and write
|
||
20D000
|
unkown
|
page read and write
|
||
22DE000
|
unkown
|
page read and write | page guard
|
||
62E000
|
unkown
|
page read and write
|
||
2160000
|
heap private
|
page read and write
|
||
2ABB000
|
heap private
|
page read and write
|
||
140000
|
unkown
|
page write copy
|
||
14A000
|
unkown
|
page execute and read and write
|
||
1E30000
|
unkown
|
page readonly
|
||
5570000
|
unkown
|
page read and write
|
||
614000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page read and write
|
||
2F85000
|
unkown
|
page readonly
|
||
2364000
|
unkown
|
page read and write
|
||
2880000
|
unkown
|
page readonly
|
||
4D8D000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
2D0000
|
heap default
|
page read and write
|
||
2820000
|
heap private
|
page read and write
|
||
182000
|
unkown
|
page read and write
|
||
44A000
|
unkown image
|
page readonly
|
||
27D0000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
2E56000
|
unkown
|
page readonly
|
||
9C7000
|
heap private
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
400000
|
unkown image
|
page readonly
|
||
23CF000
|
unkown
|
page read and write
|
||
4430000
|
unkown
|
page readonly
|
||
100000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
2EE6000
|
unkown
|
page readonly
|
||
2437000
|
unkown
|
page read and write
|
||
190000
|
unkown image
|
page readonly
|
||
5875000
|
heap private
|
page read and write
|
||
670000
|
heap default
|
page read and write
|
||
6A0000
|
unkown
|
page readonly
|
||
474F000
|
unkown
|
page read and write
|
||
B7D000
|
unkown image
|
page write copy
|
||
940000
|
unkown
|
page readonly
|
||
190000
|
unkown image
|
page readonly
|
||
220000
|
unkown
|
page read and write
|
||
F0000
|
heap private
|
page read and write
|
||
77B000
|
unkown
|
page read and write
|
||
123000
|
unkown
|
page execute and read and write
|
||
30FE000
|
unkown
|
page read and write
|
||
70000
|
unkown
|
page read and write
|
||
50C000
|
heap default
|
page read and write
|
||
550000
|
heap private
|
page read and write
|
||
4AF8000
|
unkown
|
page read and write
|
||
5AE000
|
unkown
|
page read and write
|
||
29AC000
|
unkown
|
page read and write
|
||
24C1000
|
unkown
|
page read and write
|
||
7BE000
|
unkown
|
page read and write
|
||
710000
|
unkown
|
page readonly
|
||
487F000
|
unkown
|
page read and write
|
||
2401000
|
unkown
|
page read and write
|
||
4A28000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page read and write
|
||
5892000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
There are 598 hidden memdumps, click here to show them.