IOC Report
MT_80362_72605XLS.exe

loading gif

Files

File Path
Type
Category
Malicious
MT_80362_72605XLS.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MT_80362_72605XLS.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Roaming\Npadosix.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Npadosix.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Npadosix.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MT_80362_72605XLS.exe
"C:\Users\user\Desktop\MT_80362_72605XLS.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ipconfig /release
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /release
malicious
C:\Users\user\Desktop\MT_80362_72605XLS.exe
"C:\Users\user\Desktop\MT_80362_72605XLS.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ipconfig /renew
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /renew
malicious
C:\Users\user\AppData\Roaming\Npadosix.exe
"C:\Users\user\AppData\Roaming\Npadosix.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ipconfig /release
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /release
malicious
C:\Users\user\AppData\Roaming\Npadosix.exe
"C:\Users\user\AppData\Roaming\Npadosix.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ipconfig /release
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /release
malicious
C:\Users\user\AppData\Roaming\Npadosix.exe
"C:\Users\user\AppData\Roaming\Npadosix.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ipconfig /renew
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /renew
malicious
C:\Users\user\AppData\Roaming\Npadosix.exe
"C:\Users\user\AppData\Roaming\Npadosix.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ipconfig /renew
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /renew
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://reallyfreegeoip.org/xml/8.46.123.33p
unknown
http://checkip.dyndns.org/
158.101.44.242
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://78.111.67.189/del/Drsoyhfsam.mp3
78.111.67.189
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://reallyfreegeoip.org/xml/8.46.123.33Oc
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://github.com/mgravell/protobuf-net
unknown
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://78.111.67.189
unknown
http://checkip.dyndns.com
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://78.111.67.189/del/Drsoyhfsam.mp3QYnagrycsn.Connections.UtilsMockConnector
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
158.101.44.242

IPs

IP
Domain
Country
Malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
78.111.67.189
unknown
Germany
158.101.44.242
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Npadosix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
293BEB10000
heap
page read and write
malicious
1C266549000
heap
page read and write
malicious
2178023C000
trusted library allocation
page read and write
malicious
1C24DA4B000
trusted library allocation
page read and write
malicious
226B8FD1000
trusted library allocation
page read and write
malicious
1C25EB66000
trusted library allocation
page read and write
malicious
293B6DAB000
trusted library allocation
page read and write
malicious
1C25E0EF000
trusted library allocation
page read and write
malicious
1C266270000
trusted library section
page read and write
malicious
21780001000
trusted library allocation
page read and write
malicious
1AE2E998000
trusted library allocation
page read and write
malicious
23E144F1000
trusted library allocation
page read and write
malicious
293B6B7C000
trusted library allocation
page read and write
malicious
1C25E980000
trusted library allocation
page read and write
malicious
1C265FE0000
trusted library section
page read and write
malicious
1C25E5DC000
trusted library allocation
page read and write
malicious
1C24D8A9000
trusted library allocation
page read and write
malicious
1C25D6EF000
trusted library allocation
page read and write
malicious
1AE2E705000
trusted library allocation
page read and write
malicious
14001B000
remote allocation
page execute and read and write
malicious
23E1470B000
trusted library allocation
page read and write
malicious
1AE47594000
heap
page read and write
malicious
293A5F5C000
trusted library allocation
page read and write
malicious
14001A000
remote allocation
page execute and read and write
malicious
293B714F000
trusted library allocation
page read and write
malicious
293A5E46000
trusted library allocation
page read and write
malicious
226B920D000
trusted library allocation
page read and write
malicious
293B7333000
trusted library allocation
page read and write
malicious
293B5C91000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF8492C0000
trusted library allocation
page execute and read and write
7FF8492B0000
trusted library allocation
page execute and read and write
1AE46F00000
heap
page execute and read and write
217FC99D000
heap
page read and write
1AE3EAF0000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
7FF848FC0000
trusted library allocation
page read and write
B7BD139000
stack
page read and write
217FAA20000
trusted library allocation
page read and write
293B60E0000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
7FF848EE6000
trusted library allocation
page execute and read and write
7FF849028000
trusted library allocation
page read and write
7FF849290000
trusted library allocation
page read and write
23E12880000
heap
page read and write
217FC9D3000
heap
page read and write
23E14692000
trusted library allocation
page read and write
23E1463C000
trusted library allocation
page read and write
217FA860000
trusted library allocation
page read and write
B37FEFE000
stack
page read and write
226B8FC0000
heap
page read and write
B7BD37D000
stack
page read and write
293A4670000
heap
page read and write
745E33E000
stack
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
7FF848EB6000
trusted library allocation
page read and write
1AE2CCD6000
heap
page read and write
23E12780000
heap
page read and write
23E1480C000
trusted library allocation
page read and write
217800E8000
trusted library allocation
page read and write
217FA7F0000
heap
page read and write
7FF848E0B000
trusted library allocation
page execute and read and write
140012000
remote allocation
page execute and read and write
7FF849090000
trusted library allocation
page read and write
7FF8492CA000
trusted library allocation
page read and write
226B7600000
heap
page read and write
7FF848E9C000
trusted library allocation
page execute and read and write
7FF8491AA000
trusted library allocation
page read and write
226B744D000
heap
page read and write
217FA875000
heap
page read and write
293BE5DF000
heap
page read and write
AC689FE000
stack
page read and write
B7BCBFF000
stack
page read and write
7FF849300000
trusted library allocation
page read and write
140018000
remote allocation
page execute and read and write
1AE3F88E000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
1C24BBA0000
heap
page read and write
7FF849334000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
AE73DFE000
stack
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF848FD0000
trusted library allocation
page read and write
293BE5C1000
heap
page read and write
4D555FE000
stack
page read and write
4D542FF000
stack
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF84901D000
trusted library allocation
page read and write
7FF849324000
trusted library allocation
page read and write
1AE2E6CE000
trusted library allocation
page read and write
7FF849024000
trusted library allocation
page read and write
23E146C1000
trusted library allocation
page read and write
7FF8492E0000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF849110000
trusted library allocation
page read and write
226B74E0000
heap
page read and write
B37ECFE000
stack
page read and write
7FF848E32000
trusted library allocation
page read and write
226B7553000
trusted library allocation
page read and write
140006000
remote allocation
page execute and read and write
1C2664A0000
trusted library section
page read and write
7FF848E20000
trusted library allocation
page read and write
21780103000
trusted library allocation
page read and write
21780148000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
293A44F0000
heap
page execute and read and write
7FF849270000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
7FF848E5C000
trusted library allocation
page execute and read and write
B7BCAFE000
stack
page read and write
1AE2CC20000
heap
page read and write
226B928E000
trusted library allocation
page read and write
226B932C000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
7FF848E02000
trusted library allocation
page read and write
7FF8492A4000
trusted library allocation
page read and write
226B75D5000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
7FF84931D000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
23E14682000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
217FA870000
heap
page read and write
21780196000
trusted library allocation
page read and write
7FF849051000
trusted library allocation
page read and write
217FCA50000
heap
page read and write
23E14696000
trusted library allocation
page read and write
4D554FE000
stack
page read and write
4D55A3E000
stack
page read and write
1C24D5A0000
heap
page execute and read and write
7FF849310000
trusted library allocation
page read and write
23E128D8000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
23E143DF000
heap
page read and write
1C24D5B5000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
226B75D0000
heap
page read and write
217FA648000
heap
page read and write
293A44A0000
trusted library allocation
page read and write
7FF8492F0000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
21780192000
trusted library allocation
page read and write
7FF8492A9000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF849019000
trusted library allocation
page read and write
23E14640000
trusted library allocation
page read and write
745DCFE000
stack
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
AC682FE000
stack
page read and write
1C24B9A6000
unkown
page readonly
7FF848E2B000
trusted library allocation
page execute and read and write
7FF848E02000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
1C265EE0000
heap
page read and write
1C24BBE0000
trusted library allocation
page read and write
7FF849310000
trusted library allocation
page read and write
1C24B9A2000
unkown
page readonly
7FF848EC6000
trusted library allocation
page read and write
23E128EC000
heap
page read and write
226D18CE000
heap
page read and write
23E147AC000
trusted library allocation
page read and write
7FF848E34000
trusted library allocation
page read and write
217FA628000
heap
page read and write
23E14645000
trusted library allocation
page read and write
745E87D000
stack
page read and write
7FF849100000
trusted library allocation
page read and write
1C24BBAD000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
7FF848E12000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
1AE2E5E0000
trusted library allocation
page read and write
7FF8491BA000
trusted library allocation
page read and write
293A426A000
heap
page read and write
226B92E0000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF848E22000
trusted library allocation
page read and write
217FA600000
heap
page read and write
1AE2CC60000
heap
page read and write
AE744FE000
stack
page read and write
4D547FE000
stack
page read and write
7FF848FD7000
trusted library allocation
page read and write
226B9170000
trusted library allocation
page read and write
B37F2FE000
stack
page read and write
7FF848E24000
trusted library allocation
page read and write
217FA620000
heap
page read and write
14000A000
remote allocation
page execute and read and write
140003000
remote allocation
page execute and read and write
226B7520000
trusted library allocation
page read and write
23E24575000
trusted library allocation
page read and write
23E1469B000
trusted library allocation
page read and write
1AE2CCB8000
heap
page read and write
7FF8492A6000
trusted library allocation
page read and write
AC688FE000
stack
page read and write
23E12B80000
heap
page read and write
1AE3FA47000
trusted library allocation
page read and write
217FAA33000
trusted library allocation
page read and write
1AE2E95B000
trusted library allocation
page read and write
1C265FA5000
heap
page read and write
1AE2E630000
heap
page execute and read and write
226B92F3000
trusted library allocation
page read and write
7FF8492F0000
trusted library allocation
page read and write
1AE2CC15000
heap
page read and write
226C9054000
trusted library allocation
page read and write
AC690FC000
stack
page read and write
1AE47112000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
1AE3F960000
trusted library allocation
page read and write
1AE2CCEE000
heap
page read and write
1C24BCAA000
heap
page read and write
1C24BB40000
heap
page read and write
226C905D000
trusted library allocation
page read and write
4D549FE000
stack
page read and write
1AE470BF000
heap
page read and write
293B7226000
trusted library allocation
page read and write
7FF848E22000
trusted library allocation
page read and write
23E12860000
heap
page read and write
7FF8492D0000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
293A420C000
heap
page read and write
217FC9E1000
heap
page read and write
23E145E6000
trusted library allocation
page read and write
23E14638000
trusted library allocation
page read and write
1AE3FD43000
trusted library allocation
page read and write
23E145F4000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
B37EBFF000
stack
page read and write
226B73DD000
heap
page read and write
293A4660000
heap
page read and write
7FF848E13000
trusted library allocation
page read and write
1AE2CD71000
heap
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
7FF848FB0000
trusted library allocation
page read and write
226B92B5000
trusted library allocation
page read and write
745E97D000
stack
page read and write
1AE47060000
heap
page read and write
AE733FE000
stack
page read and write
7FF848FA2000
trusted library allocation
page read and write
1AE470FD000
heap
page read and write
7FF849290000
trusted library allocation
page read and write
21780123000
trusted library allocation
page read and write
B7BC3BD000
stack
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
7FF8490F0000
trusted library allocation
page read and write
B7BD03F000
stack
page read and write
7FF8492B0000
trusted library allocation
page read and write
226B73CA000
heap
page read and write
7FF849303000
trusted library allocation
page read and write
226B916C000
trusted library allocation
page read and write
226D1AA0000
heap
page read and write
1AE4712C000
heap
page read and write
7FF8491B3000
trusted library allocation
page read and write
1AE3E6AE000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
1C24BCFD000
heap
page read and write
AC67F8E000
stack
page read and write
B7BC8FF000
stack
page read and write
217FA687000
heap
page read and write
1AE3E8D0000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF849180000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
23E244F1000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
7FF848DE4000
trusted library allocation
page read and write
B7BC7FF000
stack
page read and write
1C24BB60000
heap
page read and write
7FF848FF9000
trusted library allocation
page read and write
226B92E6000
trusted library allocation
page read and write
1AE470D3000
heap
page read and write
1AE2CF85000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
1AE2CCEB000
heap
page read and write
7FF8491C0000
trusted library allocation
page execute and read and write
1AE2E6D0000
trusted library allocation
page read and write
7FF849320000
trusted library allocation
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
745E23E000
stack
page read and write
140020000
remote allocation
page execute and read and write
1C266720000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
1AE2CF80000
heap
page read and write
1AE47088000
heap
page read and write
4D551FE000
stack
page read and write
217FC9C6000
heap
page read and write
1C24D6D0000
heap
page read and write
293A4200000
heap
page read and write
217801A7000
trusted library allocation
page read and write
7FF848FF9000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
AE737FE000
stack
page read and write
293BE4A0000
heap
page execute and read and write
7FF848DE0000
trusted library allocation
page read and write
1C265710000
trusted library allocation
page read and write
23E147B2000
trusted library allocation
page read and write
217FA810000
heap
page read and write
AC686FE000
stack
page read and write
293A4160000
heap
page read and write
217801BA000
trusted library allocation
page read and write
217800EF000
trusted library allocation
page read and write
7FF848E44000
trusted library allocation
page read and write
140009000
remote allocation
page execute and read and write
293A5C91000
trusted library allocation
page read and write
140008000
remote allocation
page execute and read and write
14001C000
remote allocation
page execute and read and write
7FF8491A3000
trusted library allocation
page read and write
AC68FFC000
stack
page read and write
23E128DE000
heap
page read and write
226B9123000
trusted library allocation
page read and write
B37FAFD000
stack
page read and write
21790008000
trusted library allocation
page read and write
140023000
remote allocation
page execute and read and write
7FF849050000
trusted library allocation
page read and write
B37EEFE000
stack
page read and write
1AE3F14D000
trusted library allocation
page read and write
140010000
remote allocation
page execute and read and write
140016000
remote allocation
page execute and read and write
7FF848DF3000
trusted library allocation
page read and write
23E12A10000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
226D18F0000
heap
page read and write
7FF8491D0000
trusted library allocation
page execute and read and write
7FF848FF4000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
AC687FE000
stack
page read and write
7FF849296000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
226B9116000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
7FF8492AE000
trusted library allocation
page read and write
1C265FCB000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
23E146D4000
trusted library allocation
page read and write
745DFFE000
stack
page read and write
23E2CD40000
heap
page execute and read and write
7FF848E2B000
trusted library allocation
page execute and read and write
B7BD87C000
stack
page read and write
1C26653B000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
4D55B3E000
stack
page read and write
293BE561000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
226B91FA000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF848FD4000
trusted library allocation
page read and write
226B73A0000
heap
page read and write
23E147A7000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
293A60AB000
trusted library allocation
page read and write
1AE2EABC000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
7FF848EB6000
trusted library allocation
page read and write
1AE3FCF4000
trusted library allocation
page read and write
7FF848FE9000
trusted library allocation
page read and write
7FF8492B6000
trusted library allocation
page read and write
1C265F0F000
heap
page read and write
293A4240000
heap
page read and write
140014000
remote allocation
page execute and read and write
7FF848EB6000
trusted library allocation
page read and write
217FA645000
heap
page read and write
1C24D520000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
293A426C000
heap
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
7FF849048000
trusted library allocation
page read and write
7FF848E12000
trusted library allocation
page read and write
2178014C000
trusted library allocation
page read and write
1AE3E6A1000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
1AE2CD15000
heap
page read and write
226B72B0000
heap
page read and write
23E14617000
trusted library allocation
page read and write
2178019A000
trusted library allocation
page read and write
1C24BA60000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
217FAA40000
heap
page read and write
1C24BB80000
heap
page read and write
293A4675000
heap
page read and write
217FC9D9000
heap
page read and write
7FF8492A0000
trusted library allocation
page read and write
226B911E000
trusted library allocation
page read and write
226B9168000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
140000000
remote allocation
page execute and read and write
7FF849160000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF8491F0000
trusted library allocation
page execute and read and write
21780151000
trusted library allocation
page read and write
1C265F84000
heap
page read and write
14001E000
remote allocation
page execute and read and write
14001F000
remote allocation
page execute and read and write
1C266510000
heap
page read and write
217800E5000
trusted library allocation
page read and write
7FF848FC4000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
226C8FD1000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
217FA5F0000
heap
page read and write
1C2662D0000
trusted library section
page read and write
1C24D78F000
trusted library allocation
page read and write
226B9160000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
1AE3FB5F000
trusted library allocation
page read and write
23E129B0000
heap
page read and write
7FF848E19000
trusted library allocation
page read and write
7FF8491E0000
trusted library allocation
page execute and read and write
7FF848E4B000
trusted library allocation
page execute and read and write
1C265FD1000
heap
page read and write
4D548FD000
stack
page read and write
293B651E000
trusted library allocation
page read and write
23E2455A000
trusted library allocation
page read and write
1C24BCB1000
heap
page read and write
B37E102000
stack
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF84900B000
trusted library allocation
page read and write
23E128EE000
heap
page read and write
7FF848E19000
trusted library allocation
page read and write
14001D000
remote allocation
page execute and read and write
1AE466D0000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
1C24BEE0000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
140021000
remote allocation
page execute and read and write
7FF849300000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
226D190F000
heap
page read and write
217800F2000
trusted library allocation
page read and write
293A41F0000
trusted library allocation
page read and write
B37FFFE000
stack
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
745DDFE000
stack
page read and write
23E129F0000
trusted library allocation
page read and write
226C906A000
trusted library allocation
page read and write
1C24BC40000
heap
page read and write
4D553FE000
stack
page read and write
7FF849130000
trusted library allocation
page read and write
23E147BB000
trusted library allocation
page read and write
293A4503000
heap
page read and write
B37E7FE000
stack
page read and write
AE73EFE000
stack
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
226B7623000
heap
page read and write
140022000
remote allocation
page execute and read and write
1AE3FD63000
trusted library allocation
page read and write
140015000
remote allocation
page execute and read and write
7FF8490B0000
trusted library allocation
page read and write
23E14805000
trusted library allocation
page read and write
217FC950000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
23E145F6000
trusted library allocation
page read and write
226B911A000
trusted library allocation
page read and write
140017000
remote allocation
page execute and read and write
7FF848E30000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
1AE3FC7C000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
23E144A0000
heap
page read and write
293A4630000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
23E12A65000
heap
page read and write
7FF848DE2000
trusted library allocation
page read and write
7FF848FD3000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page execute and read and write
7FF848FD0000
trusted library allocation
page execute and read and write
226B9299000
trusted library allocation
page read and write
23E12A23000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
1C24BEEC000
heap
page read and write
226B90D5000
trusted library allocation
page read and write
217FA65A000
heap
page read and write
226B7540000
trusted library allocation
page read and write
293BE500000
heap
page read and write
226B7550000
trusted library allocation
page read and write
745E0FE000
stack
page read and write
140005000
remote allocation
page execute and read and write
7FF848E04000
trusted library allocation
page read and write
B7BD27A000
stack
page read and write
293B695D000
trusted library allocation
page read and write
7FF84929E000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
23E147F9000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
1AE2CCB0000
heap
page read and write
AE73CFE000
stack
page read and write
217801CE000
trusted library allocation
page read and write
23E145D3000
trusted library allocation
page read and write
AC68BFE000
stack
page read and write
217FAA45000
heap
page read and write
1AE47592000
heap
page read and write
7FF8492E0000
trusted library allocation
page read and write
293B6D9F000
trusted library allocation
page read and write
217800E2000
trusted library allocation
page read and write
226B74A0000
heap
page read and write
1C24DB1A000
trusted library allocation
page read and write
23E14473000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
1AE3FA6F000
trusted library allocation
page read and write
1AE470C3000
heap
page read and write
1AE2CF40000
trusted library allocation
page read and write
7FF849300000
trusted library allocation
page read and write
226B910D000
trusted library allocation
page read and write
21780212000
trusted library allocation
page read and write
226B9174000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
293BEB00000
heap
page read and write
21790011000
trusted library allocation
page read and write
AE743FE000
stack
page read and write
7FF848FF3000
trusted library allocation
page read and write
1AE3F7AB000
trusted library allocation
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
7FF848EF6000
trusted library allocation
page execute and read and write
7FF849110000
trusted library allocation
page read and write
23E1468A000
trusted library allocation
page read and write
4D559FF000
stack
page read and write
7FF848E4D000
trusted library allocation
page execute and read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF848E23000
trusted library allocation
page execute and read and write
7FF848E10000
trusted library allocation
page read and write
B37F9FE000
stack
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF849330000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
7FF467EA0000
trusted library allocation
page execute and read and write
1C25E5D0000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
226C9039000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
745E43D000
stack
page read and write
293A44B5000
heap
page read and write
7FF849041000
trusted library allocation
page read and write
23E128B8000
heap
page read and write
217FA65C000
heap
page read and write
7FF8492A0000
trusted library allocation
page read and write
23E128B0000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
7FF8492F0000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
7FF848FEB000
trusted library allocation
page read and write
23E147C5000
trusted library allocation
page read and write
226B9179000
trusted library allocation
page read and write
1AE2CD17000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
7FF849180000
trusted library allocation
page read and write
1AE47570000
heap
page read and write
1C24BCAC000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
7FF8491D0000
trusted library allocation
page execute and read and write
1AE3FABF000
trusted library allocation
page read and write
AE7463F000
stack
page read and write
293A42C2000
heap
page read and write
B7BC6FC000
stack
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
293A4180000
heap
page read and write
7FF849200000
trusted library allocation
page execute and read and write
140007000
remote allocation
page execute and read and write
23E1462F000
trusted library allocation
page read and write
4D552FE000
stack
page read and write
1AE2CC10000
heap
page read and write
140002000
remote allocation
page execute and read and write
1AE3F7BB000
trusted library allocation
page read and write
AE728F2000
stack
page read and write
1C24BBA5000
heap
page read and write
745DBFE000
stack
page read and write
7FF8492EA000
trusted library allocation
page read and write
4D53EF2000
stack
page read and write
AC683FE000
stack
page read and write
217FA6C8000
heap
page read and write
7FF849031000
trusted library allocation
page read and write
226B91E3000
trusted library allocation
page read and write
226B9293000
trusted library allocation
page read and write
1AE2CF60000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
293B5C9E000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
B7BCE3D000
stack
page read and write
1AE47590000
heap
page read and write
217FC9D6000
heap
page read and write
21780144000
trusted library allocation
page read and write
745DAED000
stack
page read and write
226B91E7000
trusted library allocation
page read and write
1C25EA56000
trusted library allocation
page read and write
1C24D6E1000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
226B9164000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF8491B4000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page read and write
293A5CF5000
trusted library allocation
page read and write
B7BCD3F000
stack
page read and write
7FF8492B9000
trusted library allocation
page read and write
293B673D000
trusted library allocation
page read and write
AC684FF000
stack
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
23E147CE000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
1AE3F36D000
trusted library allocation
page read and write
226B73A8000
heap
page read and write
293A4080000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
226B7620000
heap
page read and write
1AE3FBE6000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
7FF849190000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
1AE3EF2E000
trusted library allocation
page read and write
23E14350000
heap
page read and write
B7BD97E000
stack
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
140013000
remote allocation
page execute and read and write
AE73FFD000
stack
page read and write
23E144E0000
heap
page execute and read and write
23E2CEF0000
heap
page read and write
14000F000
remote allocation
page execute and read and write
7FF848FA0000
trusted library allocation
page read and write
23E147FF000
trusted library allocation
page read and write
293A4242000
heap
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
23E12A40000
heap
page read and write
23E2458B000
trusted library allocation
page read and write
1AE2E6A1000
trusted library allocation
page read and write
226D18F3000
heap
page read and write
AC685FD000
stack
page read and write
293A5F4F000
trusted library allocation
page read and write
217FAA30000
trusted library allocation
page read and write
1C24BC83000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF848F80000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
7FF8492C0000
trusted library allocation
page read and write
226B919F000
trusted library allocation
page read and write
1C265F63000
heap
page read and write
1C25D6EC000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
7FF848E3B000
trusted library allocation
page execute and read and write
1C24D749000
trusted library allocation
page read and write
226D1870000
heap
page execute and read and write
7FF849004000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
B7BCF3E000
stack
page read and write
23E145E3000
trusted library allocation
page read and write
217801F5000
trusted library allocation
page read and write
7FF848FF7000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
23E146E8000
trusted library allocation
page read and write
7FF8492E0000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
23E147CA000
trusted library allocation
page read and write
4D55B7E000
stack
page read and write
7FF849160000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
23E143E4000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
B37EDFD000
stack
page read and write
7FF849080000
trusted library allocation
page read and write
217FC9C0000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF849038000
trusted library allocation
page read and write
7FF8492BE000
trusted library allocation
page read and write
7FF849314000
trusted library allocation
page read and write
B7BD57D000
stack
page read and write
226B915C000
trusted library allocation
page read and write
AE731FE000
stack
page read and write
7FF849030000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
217FC150000
heap
page execute and read and write
1AE2CB30000
heap
page read and write
23E14470000
heap
page read and write
23E2457E000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF849320000
trusted library allocation
page read and write
226B92AC000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
23E12B85000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF849004000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
4D55C7F000
stack
page read and write
7FF8491C0000
trusted library allocation
page read and write
7FF848FFD000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
1C24D797000
trusted library allocation
page read and write
1C24BC80000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
7FF8492F3000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
23E12A20000
trusted library allocation
page read and write
217800DD000
trusted library allocation
page read and write
7FF8492D9000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
B7BD477000
stack
page read and write
226B90D2000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
293BDCC0000
trusted library allocation
page read and write
AC68AFD000
stack
page read and write
7FF848E96000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page read and write
1AE3F7AF000
trusted library allocation
page read and write
217801E1000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
2179000D000
trusted library allocation
page read and write
1C25D6E1000
trusted library allocation
page read and write
B37F6FE000
stack
page read and write
21780229000
trusted library allocation
page read and write
23E14844000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
AE7453E000
stack
page read and write
7FF849160000
trusted library allocation
page read and write
7FF8491D0000
trusted library allocation
page execute and read and write
1AE3ED0F000
trusted library allocation
page read and write
1C24BCB6000
heap
page read and write
293A44B0000
heap
page read and write
23E143E1000
heap
page read and write
21780217000
trusted library allocation
page read and write
1AE3FBBE000
trusted library allocation
page read and write
7FF8491E4000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page execute and read and write
217801A2000
trusted library allocation
page read and write
1AE3F58C000
trusted library allocation
page read and write
226B92B1000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
23E14686000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
226B7630000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
1AE4711B000
heap
page read and write
226D190A000
heap
page read and write
7FF849294000
trusted library allocation
page read and write
23E12A60000
heap
page read and write
7FF848E02000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF8491E8000
trusted library allocation
page execute and read and write
1C24BC00000
trusted library allocation
page read and write
226B92ED000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
1C24BC30000
heap
page execute and read and write
7FF849020000
trusted library allocation
page read and write
293B72E4000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF8491F8000
trusted library allocation
page execute and read and write
293BE58B000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
2178018A000
trusted library allocation
page read and write
AE732FD000
stack
page read and write
AC68EFD000
stack
page read and write
1C25EB15000
trusted library allocation
page read and write
B7BCC3E000
stack
page read and write
7FF849080000
trusted library allocation
page read and write
AE725CE000
stack
page read and write
226B90F5000
trusted library allocation
page read and write
745E53E000
stack
page read and write
1AE47050000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
B3000FE000
stack
page read and write
2178019E000
trusted library allocation
page read and write
2178013B000
trusted library allocation
page read and write
21790001000
trusted library allocation
page read and write
217FA685000
heap
page read and write
7FF848F90000
trusted library allocation
page execute and read and write
23E1439B000
heap
page read and write
745DEFD000
stack
page read and write
23E145D0000
trusted library allocation
page read and write
7FF8492C0000
trusted library allocation
page read and write
4D54DFE000
stack
page read and write
7FF8491E0000
trusted library allocation
page read and write
B7BC9FC000
stack
page read and write
7FF849340000
trusted library allocation
page read and write
23E12918000
heap
page read and write
23E145D6000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
226D1880000
heap
page read and write
1AE2CC40000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF849310000
trusted library allocation
page read and write
217800DF000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
4D546FF000
stack
page read and write
1C24BC46000
heap
page read and write
293A4272000
heap
page read and write
B37F7FF000
stack
page read and write
226B7635000
heap
page read and write
140019000
remote allocation
page execute and read and write
7FF849140000
trusted library allocation
page read and write
745EA7C000
stack
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
217FC170000
heap
page read and write
AE73BFE000
stack
page read and write
7FF8492D0000
trusted library allocation
page read and write
293BE5E5000
heap
page read and write
745E13E000
stack
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
226B73E0000
heap
page read and write
140011000
remote allocation
page execute and read and write
AC67F3D000
stack
page read and write
226B91B2000
trusted library allocation
page read and write
B37E18E000
stack
page read and write
293B5EC0000
trusted library allocation
page read and write
217FCC00000
heap
page execute and read and write
7FF848FFB000
trusted library allocation
page read and write
1C266520000
heap
page read and write
B37F8FF000
stack
page read and write
226B7580000
heap
page execute and read and write
7FF848ECC000
trusted library allocation
page execute and read and write
23E1468E000
trusted library allocation
page read and write
23E14705000
trusted library allocation
page read and write
226B92A2000
trusted library allocation
page read and write
7FF848FA4000
trusted library allocation
page read and write
226D18CC000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF848EE6000
trusted library allocation
page execute and read and write
7FF8492A6000
trusted library allocation
page read and write
1AE3FCA4000
trusted library allocation
page read and write
1C24D95C000
trusted library allocation
page read and write
7FF8492D0000
trusted library allocation
page read and write
226B740A000
heap
page read and write
1AE47056000
heap
page read and write
1C24BEE5000
heap
page read and write
7FF848E3C000
trusted library allocation
page execute and read and write
226B73D0000
heap
page read and write
226B918C000
trusted library allocation
page read and write
293A4206000
heap
page read and write
1C24B9A0000
unkown
page readonly
293A41A0000
heap
page read and write
B37E14E000
stack
page read and write
7FF8492DA000
trusted library allocation
page read and write
1C266528000
heap
page read and write
7FF8491C4000
trusted library allocation
page read and write
226B74C0000
heap
page read and write
B7BD17F000
stack
page read and write
7FF848FE2000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1AE3F9EC000
trusted library allocation
page read and write
1AE3FC36000
trusted library allocation
page read and write
2178018E000
trusted library allocation
page read and write
1AE46A2F000
heap
page read and write
1AE2E690000
heap
page read and write
There are 847 hidden memdumps, click here to show them.