Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
MT_80362_72605XLS.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MT_80362_72605XLS.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Npadosix.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Npadosix.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Npadosix.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\MT_80362_72605XLS.exe
|
"C:\Users\user\Desktop\MT_80362_72605XLS.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c ipconfig /release
|
||
C:\Windows\System32\ipconfig.exe
|
ipconfig /release
|
||
C:\Users\user\Desktop\MT_80362_72605XLS.exe
|
"C:\Users\user\Desktop\MT_80362_72605XLS.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c ipconfig /renew
|
||
C:\Windows\System32\ipconfig.exe
|
ipconfig /renew
|
||
C:\Users\user\AppData\Roaming\Npadosix.exe
|
"C:\Users\user\AppData\Roaming\Npadosix.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c ipconfig /release
|
||
C:\Windows\System32\ipconfig.exe
|
ipconfig /release
|
||
C:\Users\user\AppData\Roaming\Npadosix.exe
|
"C:\Users\user\AppData\Roaming\Npadosix.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c ipconfig /release
|
||
C:\Windows\System32\ipconfig.exe
|
ipconfig /release
|
||
C:\Users\user\AppData\Roaming\Npadosix.exe
|
"C:\Users\user\AppData\Roaming\Npadosix.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c ipconfig /renew
|
||
C:\Windows\System32\ipconfig.exe
|
ipconfig /renew
|
||
C:\Users\user\AppData\Roaming\Npadosix.exe
|
"C:\Users\user\AppData\Roaming\Npadosix.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c ipconfig /renew
|
||
C:\Windows\System32\ipconfig.exe
|
ipconfig /renew
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 14 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://reallyfreegeoip.org/xml/8.46.123.33p
|
unknown
|
||
http://checkip.dyndns.org/
|
158.101.44.242
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
http://78.111.67.189/del/Drsoyhfsam.mp3
|
78.111.67.189
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33Oc
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://78.111.67.189
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.97.3
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://78.111.67.189/del/Drsoyhfsam.mp3QYnagrycsn.Connections.UtilsMockConnector
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 10 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.97.3
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
158.101.44.242
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
78.111.67.189
|
unknown
|
Germany
|
||
158.101.44.242
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MT_80362_72605XLS_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Npadosix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Npadosix_RASMANCS
|
FileDirectory
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
293BEB10000
|
heap
|
page read and write
|
||
1C266549000
|
heap
|
page read and write
|
||
2178023C000
|
trusted library allocation
|
page read and write
|
||
1C24DA4B000
|
trusted library allocation
|
page read and write
|
||
226B8FD1000
|
trusted library allocation
|
page read and write
|
||
1C25EB66000
|
trusted library allocation
|
page read and write
|
||
293B6DAB000
|
trusted library allocation
|
page read and write
|
||
1C25E0EF000
|
trusted library allocation
|
page read and write
|
||
1C266270000
|
trusted library section
|
page read and write
|
||
21780001000
|
trusted library allocation
|
page read and write
|
||
1AE2E998000
|
trusted library allocation
|
page read and write
|
||
23E144F1000
|
trusted library allocation
|
page read and write
|
||
293B6B7C000
|
trusted library allocation
|
page read and write
|
||
1C25E980000
|
trusted library allocation
|
page read and write
|
||
1C265FE0000
|
trusted library section
|
page read and write
|
||
1C25E5DC000
|
trusted library allocation
|
page read and write
|
||
1C24D8A9000
|
trusted library allocation
|
page read and write
|
||
1C25D6EF000
|
trusted library allocation
|
page read and write
|
||
1AE2E705000
|
trusted library allocation
|
page read and write
|
||
14001B000
|
remote allocation
|
page execute and read and write
|
||
23E1470B000
|
trusted library allocation
|
page read and write
|
||
1AE47594000
|
heap
|
page read and write
|
||
293A5F5C000
|
trusted library allocation
|
page read and write
|
||
14001A000
|
remote allocation
|
page execute and read and write
|
||
293B714F000
|
trusted library allocation
|
page read and write
|
||
293A5E46000
|
trusted library allocation
|
page read and write
|
||
226B920D000
|
trusted library allocation
|
page read and write
|
||
293B7333000
|
trusted library allocation
|
page read and write
|
||
293B5C91000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8492C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8492B0000
|
trusted library allocation
|
page execute and read and write
|
||
1AE46F00000
|
heap
|
page execute and read and write
|
||
217FC99D000
|
heap
|
page read and write
|
||
1AE3EAF0000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
B7BD139000
|
stack
|
page read and write
|
||
217FAA20000
|
trusted library allocation
|
page read and write
|
||
293B60E0000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849028000
|
trusted library allocation
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
23E12880000
|
heap
|
page read and write
|
||
217FC9D3000
|
heap
|
page read and write
|
||
23E14692000
|
trusted library allocation
|
page read and write
|
||
23E1463C000
|
trusted library allocation
|
page read and write
|
||
217FA860000
|
trusted library allocation
|
page read and write
|
||
B37FEFE000
|
stack
|
page read and write
|
||
226B8FC0000
|
heap
|
page read and write
|
||
B7BD37D000
|
stack
|
page read and write
|
||
293A4670000
|
heap
|
page read and write
|
||
745E33E000
|
stack
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
1AE2CCD6000
|
heap
|
page read and write
|
||
23E12780000
|
heap
|
page read and write
|
||
23E1480C000
|
trusted library allocation
|
page read and write
|
||
217800E8000
|
trusted library allocation
|
page read and write
|
||
217FA7F0000
|
heap
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page execute and read and write
|
||
140012000
|
remote allocation
|
page execute and read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
7FF8492CA000
|
trusted library allocation
|
page read and write
|
||
226B7600000
|
heap
|
page read and write
|
||
7FF848E9C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491AA000
|
trusted library allocation
|
page read and write
|
||
226B744D000
|
heap
|
page read and write
|
||
217FA875000
|
heap
|
page read and write
|
||
293BE5DF000
|
heap
|
page read and write
|
||
AC689FE000
|
stack
|
page read and write
|
||
B7BCBFF000
|
stack
|
page read and write
|
||
7FF849300000
|
trusted library allocation
|
page read and write
|
||
140018000
|
remote allocation
|
page execute and read and write
|
||
1AE3F88E000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1C24BBA0000
|
heap
|
page read and write
|
||
7FF849334000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
AE73DFE000
|
stack
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
293BE5C1000
|
heap
|
page read and write
|
||
4D555FE000
|
stack
|
page read and write
|
||
4D542FF000
|
stack
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF84901D000
|
trusted library allocation
|
page read and write
|
||
7FF849324000
|
trusted library allocation
|
page read and write
|
||
1AE2E6CE000
|
trusted library allocation
|
page read and write
|
||
7FF849024000
|
trusted library allocation
|
page read and write
|
||
23E146C1000
|
trusted library allocation
|
page read and write
|
||
7FF8492E0000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
226B74E0000
|
heap
|
page read and write
|
||
B37ECFE000
|
stack
|
page read and write
|
||
7FF848E32000
|
trusted library allocation
|
page read and write
|
||
226B7553000
|
trusted library allocation
|
page read and write
|
||
140006000
|
remote allocation
|
page execute and read and write
|
||
1C2664A0000
|
trusted library section
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
21780103000
|
trusted library allocation
|
page read and write
|
||
21780148000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
293A44F0000
|
heap
|
page execute and read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
B7BCAFE000
|
stack
|
page read and write
|
||
1AE2CC20000
|
heap
|
page read and write
|
||
226B928E000
|
trusted library allocation
|
page read and write
|
||
226B932C000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
7FF8492A4000
|
trusted library allocation
|
page read and write
|
||
226B75D5000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF84931D000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
23E14682000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
217FA870000
|
heap
|
page read and write
|
||
21780196000
|
trusted library allocation
|
page read and write
|
||
7FF849051000
|
trusted library allocation
|
page read and write
|
||
217FCA50000
|
heap
|
page read and write
|
||
23E14696000
|
trusted library allocation
|
page read and write
|
||
4D554FE000
|
stack
|
page read and write
|
||
4D55A3E000
|
stack
|
page read and write
|
||
1C24D5A0000
|
heap
|
page execute and read and write
|
||
7FF849310000
|
trusted library allocation
|
page read and write
|
||
23E128D8000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
23E143DF000
|
heap
|
page read and write
|
||
1C24D5B5000
|
heap
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
226B75D0000
|
heap
|
page read and write
|
||
217FA648000
|
heap
|
page read and write
|
||
293A44A0000
|
trusted library allocation
|
page read and write
|
||
7FF8492F0000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
21780192000
|
trusted library allocation
|
page read and write
|
||
7FF8492A9000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849019000
|
trusted library allocation
|
page read and write
|
||
23E14640000
|
trusted library allocation
|
page read and write
|
||
745DCFE000
|
stack
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
AC682FE000
|
stack
|
page read and write
|
||
1C24B9A6000
|
unkown
|
page readonly
|
||
7FF848E2B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1C265EE0000
|
heap
|
page read and write
|
||
1C24BBE0000
|
trusted library allocation
|
page read and write
|
||
7FF849310000
|
trusted library allocation
|
page read and write
|
||
1C24B9A2000
|
unkown
|
page readonly
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
23E128EC000
|
heap
|
page read and write
|
||
226D18CE000
|
heap
|
page read and write
|
||
23E147AC000
|
trusted library allocation
|
page read and write
|
||
7FF848E34000
|
trusted library allocation
|
page read and write
|
||
217FA628000
|
heap
|
page read and write
|
||
23E14645000
|
trusted library allocation
|
page read and write
|
||
745E87D000
|
stack
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
1C24BBAD000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
1AE2E5E0000
|
trusted library allocation
|
page read and write
|
||
7FF8491BA000
|
trusted library allocation
|
page read and write
|
||
293A426A000
|
heap
|
page read and write
|
||
226B92E0000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
217FA600000
|
heap
|
page read and write
|
||
1AE2CC60000
|
heap
|
page read and write
|
||
AE744FE000
|
stack
|
page read and write
|
||
4D547FE000
|
stack
|
page read and write
|
||
7FF848FD7000
|
trusted library allocation
|
page read and write
|
||
226B9170000
|
trusted library allocation
|
page read and write
|
||
B37F2FE000
|
stack
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
217FA620000
|
heap
|
page read and write
|
||
14000A000
|
remote allocation
|
page execute and read and write
|
||
140003000
|
remote allocation
|
page execute and read and write
|
||
226B7520000
|
trusted library allocation
|
page read and write
|
||
23E24575000
|
trusted library allocation
|
page read and write
|
||
23E1469B000
|
trusted library allocation
|
page read and write
|
||
1AE2CCB8000
|
heap
|
page read and write
|
||
7FF8492A6000
|
trusted library allocation
|
page read and write
|
||
AC688FE000
|
stack
|
page read and write
|
||
23E12B80000
|
heap
|
page read and write
|
||
1AE3FA47000
|
trusted library allocation
|
page read and write
|
||
217FAA33000
|
trusted library allocation
|
page read and write
|
||
1AE2E95B000
|
trusted library allocation
|
page read and write
|
||
1C265FA5000
|
heap
|
page read and write
|
||
1AE2E630000
|
heap
|
page execute and read and write
|
||
226B92F3000
|
trusted library allocation
|
page read and write
|
||
7FF8492F0000
|
trusted library allocation
|
page read and write
|
||
1AE2CC15000
|
heap
|
page read and write
|
||
226C9054000
|
trusted library allocation
|
page read and write
|
||
AC690FC000
|
stack
|
page read and write
|
||
1AE47112000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
1AE3F960000
|
trusted library allocation
|
page read and write
|
||
1AE2CCEE000
|
heap
|
page read and write
|
||
1C24BCAA000
|
heap
|
page read and write
|
||
1C24BB40000
|
heap
|
page read and write
|
||
226C905D000
|
trusted library allocation
|
page read and write
|
||
4D549FE000
|
stack
|
page read and write
|
||
1AE470BF000
|
heap
|
page read and write
|
||
293B7226000
|
trusted library allocation
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
23E12860000
|
heap
|
page read and write
|
||
7FF8492D0000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
293A420C000
|
heap
|
page read and write
|
||
217FC9E1000
|
heap
|
page read and write
|
||
23E145E6000
|
trusted library allocation
|
page read and write
|
||
23E14638000
|
trusted library allocation
|
page read and write
|
||
1AE3FD43000
|
trusted library allocation
|
page read and write
|
||
23E145F4000
|
trusted library allocation
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
B37EBFF000
|
stack
|
page read and write
|
||
226B73DD000
|
heap
|
page read and write
|
||
293A4660000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
1AE2CD71000
|
heap
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
226B92B5000
|
trusted library allocation
|
page read and write
|
||
745E97D000
|
stack
|
page read and write
|
||
1AE47060000
|
heap
|
page read and write
|
||
AE733FE000
|
stack
|
page read and write
|
||
7FF848FA2000
|
trusted library allocation
|
page read and write
|
||
1AE470FD000
|
heap
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
21780123000
|
trusted library allocation
|
page read and write
|
||
B7BC3BD000
|
stack
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
B7BD03F000
|
stack
|
page read and write
|
||
7FF8492B0000
|
trusted library allocation
|
page read and write
|
||
226B73CA000
|
heap
|
page read and write
|
||
7FF849303000
|
trusted library allocation
|
page read and write
|
||
226B916C000
|
trusted library allocation
|
page read and write
|
||
226D1AA0000
|
heap
|
page read and write
|
||
1AE4712C000
|
heap
|
page read and write
|
||
7FF8491B3000
|
trusted library allocation
|
page read and write
|
||
1AE3E6AE000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
1C24BCFD000
|
heap
|
page read and write
|
||
AC67F8E000
|
stack
|
page read and write
|
||
B7BC8FF000
|
stack
|
page read and write
|
||
217FA687000
|
heap
|
page read and write
|
||
1AE3E8D0000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
23E244F1000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
7FF848DE4000
|
trusted library allocation
|
page read and write
|
||
B7BC7FF000
|
stack
|
page read and write
|
||
1C24BB60000
|
heap
|
page read and write
|
||
7FF848FF9000
|
trusted library allocation
|
page read and write
|
||
226B92E6000
|
trusted library allocation
|
page read and write
|
||
1AE470D3000
|
heap
|
page read and write
|
||
1AE2CF85000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
1AE2CCEB000
|
heap
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page execute and read and write
|
||
1AE2E6D0000
|
trusted library allocation
|
page read and write
|
||
7FF849320000
|
trusted library allocation
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
745E23E000
|
stack
|
page read and write
|
||
140020000
|
remote allocation
|
page execute and read and write
|
||
1C266720000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
1AE2CF80000
|
heap
|
page read and write
|
||
1AE47088000
|
heap
|
page read and write
|
||
4D551FE000
|
stack
|
page read and write
|
||
217FC9C6000
|
heap
|
page read and write
|
||
1C24D6D0000
|
heap
|
page read and write
|
||
293A4200000
|
heap
|
page read and write
|
||
217801A7000
|
trusted library allocation
|
page read and write
|
||
7FF848FF9000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
AE737FE000
|
stack
|
page read and write
|
||
293BE4A0000
|
heap
|
page execute and read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
1C265710000
|
trusted library allocation
|
page read and write
|
||
23E147B2000
|
trusted library allocation
|
page read and write
|
||
217FA810000
|
heap
|
page read and write
|
||
AC686FE000
|
stack
|
page read and write
|
||
293A4160000
|
heap
|
page read and write
|
||
217801BA000
|
trusted library allocation
|
page read and write
|
||
217800EF000
|
trusted library allocation
|
page read and write
|
||
7FF848E44000
|
trusted library allocation
|
page read and write
|
||
140009000
|
remote allocation
|
page execute and read and write
|
||
293A5C91000
|
trusted library allocation
|
page read and write
|
||
140008000
|
remote allocation
|
page execute and read and write
|
||
14001C000
|
remote allocation
|
page execute and read and write
|
||
7FF8491A3000
|
trusted library allocation
|
page read and write
|
||
AC68FFC000
|
stack
|
page read and write
|
||
23E128DE000
|
heap
|
page read and write
|
||
226B9123000
|
trusted library allocation
|
page read and write
|
||
B37FAFD000
|
stack
|
page read and write
|
||
21790008000
|
trusted library allocation
|
page read and write
|
||
140023000
|
remote allocation
|
page execute and read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
B37EEFE000
|
stack
|
page read and write
|
||
1AE3F14D000
|
trusted library allocation
|
page read and write
|
||
140010000
|
remote allocation
|
page execute and read and write
|
||
140016000
|
remote allocation
|
page execute and read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page read and write
|
||
23E12A10000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
226D18F0000
|
heap
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FF4000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
AC687FE000
|
stack
|
page read and write
|
||
7FF849296000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
226B9116000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
7FF8492AE000
|
trusted library allocation
|
page read and write
|
||
1C265FCB000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
23E146D4000
|
trusted library allocation
|
page read and write
|
||
745DFFE000
|
stack
|
page read and write
|
||
23E2CD40000
|
heap
|
page execute and read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page execute and read and write
|
||
B7BD87C000
|
stack
|
page read and write
|
||
1C26653B000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
4D55B3E000
|
stack
|
page read and write
|
||
293BE561000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
226B91FA000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF848FD4000
|
trusted library allocation
|
page read and write
|
||
226B73A0000
|
heap
|
page read and write
|
||
23E147A7000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
293A60AB000
|
trusted library allocation
|
page read and write
|
||
1AE2EABC000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
1AE3FCF4000
|
trusted library allocation
|
page read and write
|
||
7FF848FE9000
|
trusted library allocation
|
page read and write
|
||
7FF8492B6000
|
trusted library allocation
|
page read and write
|
||
1C265F0F000
|
heap
|
page read and write
|
||
293A4240000
|
heap
|
page read and write
|
||
140014000
|
remote allocation
|
page execute and read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
217FA645000
|
heap
|
page read and write
|
||
1C24D520000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
293A426C000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849048000
|
trusted library allocation
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
2178014C000
|
trusted library allocation
|
page read and write
|
||
1AE3E6A1000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
1AE2CD15000
|
heap
|
page read and write
|
||
226B72B0000
|
heap
|
page read and write
|
||
23E14617000
|
trusted library allocation
|
page read and write
|
||
2178019A000
|
trusted library allocation
|
page read and write
|
||
1C24BA60000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
217FAA40000
|
heap
|
page read and write
|
||
1C24BB80000
|
heap
|
page read and write
|
||
293A4675000
|
heap
|
page read and write
|
||
217FC9D9000
|
heap
|
page read and write
|
||
7FF8492A0000
|
trusted library allocation
|
page read and write
|
||
226B911E000
|
trusted library allocation
|
page read and write
|
||
226B9168000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
140000000
|
remote allocation
|
page execute and read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page execute and read and write
|
||
21780151000
|
trusted library allocation
|
page read and write
|
||
1C265F84000
|
heap
|
page read and write
|
||
14001E000
|
remote allocation
|
page execute and read and write
|
||
14001F000
|
remote allocation
|
page execute and read and write
|
||
1C266510000
|
heap
|
page read and write
|
||
217800E5000
|
trusted library allocation
|
page read and write
|
||
7FF848FC4000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
226C8FD1000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
217FA5F0000
|
heap
|
page read and write
|
||
1C2662D0000
|
trusted library section
|
page read and write
|
||
1C24D78F000
|
trusted library allocation
|
page read and write
|
||
226B9160000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1AE3FB5F000
|
trusted library allocation
|
page read and write
|
||
23E129B0000
|
heap
|
page read and write
|
||
7FF848E19000
|
trusted library allocation
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E4B000
|
trusted library allocation
|
page execute and read and write
|
||
1C265FD1000
|
heap
|
page read and write
|
||
4D548FD000
|
stack
|
page read and write
|
||
293B651E000
|
trusted library allocation
|
page read and write
|
||
23E2455A000
|
trusted library allocation
|
page read and write
|
||
1C24BCB1000
|
heap
|
page read and write
|
||
B37E102000
|
stack
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF84900B000
|
trusted library allocation
|
page read and write
|
||
23E128EE000
|
heap
|
page read and write
|
||
7FF848E19000
|
trusted library allocation
|
page read and write
|
||
14001D000
|
remote allocation
|
page execute and read and write
|
||
1AE466D0000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
1C24BEE0000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
140021000
|
remote allocation
|
page execute and read and write
|
||
7FF849300000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
226D190F000
|
heap
|
page read and write
|
||
217800F2000
|
trusted library allocation
|
page read and write
|
||
293A41F0000
|
trusted library allocation
|
page read and write
|
||
B37FFFE000
|
stack
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
745DDFE000
|
stack
|
page read and write
|
||
23E129F0000
|
trusted library allocation
|
page read and write
|
||
226C906A000
|
trusted library allocation
|
page read and write
|
||
1C24BC40000
|
heap
|
page read and write
|
||
4D553FE000
|
stack
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
23E147BB000
|
trusted library allocation
|
page read and write
|
||
293A4503000
|
heap
|
page read and write
|
||
B37E7FE000
|
stack
|
page read and write
|
||
AE73EFE000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
226B7623000
|
heap
|
page read and write
|
||
140022000
|
remote allocation
|
page execute and read and write
|
||
1AE3FD63000
|
trusted library allocation
|
page read and write
|
||
140015000
|
remote allocation
|
page execute and read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
23E14805000
|
trusted library allocation
|
page read and write
|
||
217FC950000
|
heap
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
23E145F6000
|
trusted library allocation
|
page read and write
|
||
226B911A000
|
trusted library allocation
|
page read and write
|
||
140017000
|
remote allocation
|
page execute and read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
1AE3FC7C000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
23E144A0000
|
heap
|
page read and write
|
||
293A4630000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
23E12A65000
|
heap
|
page read and write
|
||
7FF848DE2000
|
trusted library allocation
|
page read and write
|
||
7FF848FD3000
|
trusted library allocation
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
226B9299000
|
trusted library allocation
|
page read and write
|
||
23E12A23000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
1C24BEEC000
|
heap
|
page read and write
|
||
226B90D5000
|
trusted library allocation
|
page read and write
|
||
217FA65A000
|
heap
|
page read and write
|
||
226B7540000
|
trusted library allocation
|
page read and write
|
||
293BE500000
|
heap
|
page read and write
|
||
226B7550000
|
trusted library allocation
|
page read and write
|
||
745E0FE000
|
stack
|
page read and write
|
||
140005000
|
remote allocation
|
page execute and read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
B7BD27A000
|
stack
|
page read and write
|
||
293B695D000
|
trusted library allocation
|
page read and write
|
||
7FF84929E000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
23E147F9000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1AE2CCB0000
|
heap
|
page read and write
|
||
AE73CFE000
|
stack
|
page read and write
|
||
217801CE000
|
trusted library allocation
|
page read and write
|
||
23E145D3000
|
trusted library allocation
|
page read and write
|
||
AC68BFE000
|
stack
|
page read and write
|
||
217FAA45000
|
heap
|
page read and write
|
||
1AE47592000
|
heap
|
page read and write
|
||
7FF8492E0000
|
trusted library allocation
|
page read and write
|
||
293B6D9F000
|
trusted library allocation
|
page read and write
|
||
217800E2000
|
trusted library allocation
|
page read and write
|
||
226B74A0000
|
heap
|
page read and write
|
||
1C24DB1A000
|
trusted library allocation
|
page read and write
|
||
23E14473000
|
heap
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
1AE3FA6F000
|
trusted library allocation
|
page read and write
|
||
1AE470C3000
|
heap
|
page read and write
|
||
1AE2CF40000
|
trusted library allocation
|
page read and write
|
||
7FF849300000
|
trusted library allocation
|
page read and write
|
||
226B910D000
|
trusted library allocation
|
page read and write
|
||
21780212000
|
trusted library allocation
|
page read and write
|
||
226B9174000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
293BEB00000
|
heap
|
page read and write
|
||
21790011000
|
trusted library allocation
|
page read and write
|
||
AE743FE000
|
stack
|
page read and write
|
||
7FF848FF3000
|
trusted library allocation
|
page read and write
|
||
1AE3F7AB000
|
trusted library allocation
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
23E1468A000
|
trusted library allocation
|
page read and write
|
||
4D559FF000
|
stack
|
page read and write
|
||
7FF848E4D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
B37F9FE000
|
stack
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
7FF849330000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
7FF467EA0000
|
trusted library allocation
|
page execute and read and write
|
||
1C25E5D0000
|
trusted library allocation
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
226C9039000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
745E43D000
|
stack
|
page read and write
|
||
293A44B5000
|
heap
|
page read and write
|
||
7FF849041000
|
trusted library allocation
|
page read and write
|
||
23E128B8000
|
heap
|
page read and write
|
||
217FA65C000
|
heap
|
page read and write
|
||
7FF8492A0000
|
trusted library allocation
|
page read and write
|
||
23E128B0000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
7FF8492F0000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
7FF848FEB000
|
trusted library allocation
|
page read and write
|
||
23E147C5000
|
trusted library allocation
|
page read and write
|
||
226B9179000
|
trusted library allocation
|
page read and write
|
||
1AE2CD17000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
1AE47570000
|
heap
|
page read and write
|
||
1C24BCAC000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page execute and read and write
|
||
1AE3FABF000
|
trusted library allocation
|
page read and write
|
||
AE7463F000
|
stack
|
page read and write
|
||
293A42C2000
|
heap
|
page read and write
|
||
B7BC6FC000
|
stack
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
293A4180000
|
heap
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page execute and read and write
|
||
140007000
|
remote allocation
|
page execute and read and write
|
||
23E1462F000
|
trusted library allocation
|
page read and write
|
||
4D552FE000
|
stack
|
page read and write
|
||
1AE2CC10000
|
heap
|
page read and write
|
||
140002000
|
remote allocation
|
page execute and read and write
|
||
1AE3F7BB000
|
trusted library allocation
|
page read and write
|
||
AE728F2000
|
stack
|
page read and write
|
||
1C24BBA5000
|
heap
|
page read and write
|
||
745DBFE000
|
stack
|
page read and write
|
||
7FF8492EA000
|
trusted library allocation
|
page read and write
|
||
4D53EF2000
|
stack
|
page read and write
|
||
AC683FE000
|
stack
|
page read and write
|
||
217FA6C8000
|
heap
|
page read and write
|
||
7FF849031000
|
trusted library allocation
|
page read and write
|
||
226B91E3000
|
trusted library allocation
|
page read and write
|
||
226B9293000
|
trusted library allocation
|
page read and write
|
||
1AE2CF60000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
293B5C9E000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
B7BCE3D000
|
stack
|
page read and write
|
||
1AE47590000
|
heap
|
page read and write
|
||
217FC9D6000
|
heap
|
page read and write
|
||
21780144000
|
trusted library allocation
|
page read and write
|
||
745DAED000
|
stack
|
page read and write
|
||
226B91E7000
|
trusted library allocation
|
page read and write
|
||
1C25EA56000
|
trusted library allocation
|
page read and write
|
||
1C24D6E1000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
226B9164000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF8491B4000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
293A5CF5000
|
trusted library allocation
|
page read and write
|
||
B7BCD3F000
|
stack
|
page read and write
|
||
7FF8492B9000
|
trusted library allocation
|
page read and write
|
||
293B673D000
|
trusted library allocation
|
page read and write
|
||
AC684FF000
|
stack
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
23E147CE000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page execute and read and write
|
||
1AE3F36D000
|
trusted library allocation
|
page read and write
|
||
226B73A8000
|
heap
|
page read and write
|
||
293A4080000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
226B7620000
|
heap
|
page read and write
|
||
1AE3FBE6000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
1AE3EF2E000
|
trusted library allocation
|
page read and write
|
||
23E14350000
|
heap
|
page read and write
|
||
B7BD97E000
|
stack
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page execute and read and write
|
||
140013000
|
remote allocation
|
page execute and read and write
|
||
AE73FFD000
|
stack
|
page read and write
|
||
23E144E0000
|
heap
|
page execute and read and write
|
||
23E2CEF0000
|
heap
|
page read and write
|
||
14000F000
|
remote allocation
|
page execute and read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
23E147FF000
|
trusted library allocation
|
page read and write
|
||
293A4242000
|
heap
|
page read and write
|
||
7FF848DED000
|
trusted library allocation
|
page execute and read and write
|
||
23E12A40000
|
heap
|
page read and write
|
||
23E2458B000
|
trusted library allocation
|
page read and write
|
||
1AE2E6A1000
|
trusted library allocation
|
page read and write
|
||
226D18F3000
|
heap
|
page read and write
|
||
AC685FD000
|
stack
|
page read and write
|
||
293A5F4F000
|
trusted library allocation
|
page read and write
|
||
217FAA30000
|
trusted library allocation
|
page read and write
|
||
1C24BC83000
|
heap
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
7FF8492C0000
|
trusted library allocation
|
page read and write
|
||
226B919F000
|
trusted library allocation
|
page read and write
|
||
1C265F63000
|
heap
|
page read and write
|
||
1C25D6EC000
|
trusted library allocation
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page execute and read and write
|
||
1C24D749000
|
trusted library allocation
|
page read and write
|
||
226D1870000
|
heap
|
page execute and read and write
|
||
7FF849004000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
B7BCF3E000
|
stack
|
page read and write
|
||
23E145E3000
|
trusted library allocation
|
page read and write
|
||
217801F5000
|
trusted library allocation
|
page read and write
|
||
7FF848FF7000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
23E146E8000
|
trusted library allocation
|
page read and write
|
||
7FF8492E0000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
23E147CA000
|
trusted library allocation
|
page read and write
|
||
4D55B7E000
|
stack
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
23E143E4000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
B37EDFD000
|
stack
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
217FC9C0000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
7FF849038000
|
trusted library allocation
|
page read and write
|
||
7FF8492BE000
|
trusted library allocation
|
page read and write
|
||
7FF849314000
|
trusted library allocation
|
page read and write
|
||
B7BD57D000
|
stack
|
page read and write
|
||
226B915C000
|
trusted library allocation
|
page read and write
|
||
AE731FE000
|
stack
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
217FC150000
|
heap
|
page execute and read and write
|
||
1AE2CB30000
|
heap
|
page read and write
|
||
23E14470000
|
heap
|
page read and write
|
||
23E2457E000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
7FF849320000
|
trusted library allocation
|
page read and write
|
||
226B92AC000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
23E12B85000
|
heap
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF849004000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
4D55C7F000
|
stack
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
7FF848FFD000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1C24D797000
|
trusted library allocation
|
page read and write
|
||
1C24BC80000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
7FF8492F3000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
23E12A20000
|
trusted library allocation
|
page read and write
|
||
217800DD000
|
trusted library allocation
|
page read and write
|
||
7FF8492D9000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
B7BD477000
|
stack
|
page read and write
|
||
226B90D2000
|
trusted library allocation
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
293BDCC0000
|
trusted library allocation
|
page read and write
|
||
AC68AFD000
|
stack
|
page read and write
|
||
7FF848E96000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
1AE3F7AF000
|
trusted library allocation
|
page read and write
|
||
217801E1000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
2179000D000
|
trusted library allocation
|
page read and write
|
||
1C25D6E1000
|
trusted library allocation
|
page read and write
|
||
B37F6FE000
|
stack
|
page read and write
|
||
21780229000
|
trusted library allocation
|
page read and write
|
||
23E14844000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
AE7453E000
|
stack
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page execute and read and write
|
||
1AE3ED0F000
|
trusted library allocation
|
page read and write
|
||
1C24BCB6000
|
heap
|
page read and write
|
||
293A44B0000
|
heap
|
page read and write
|
||
23E143E1000
|
heap
|
page read and write
|
||
21780217000
|
trusted library allocation
|
page read and write
|
||
1AE3FBBE000
|
trusted library allocation
|
page read and write
|
||
7FF8491E4000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
217801A2000
|
trusted library allocation
|
page read and write
|
||
1AE3F58C000
|
trusted library allocation
|
page read and write
|
||
226B92B1000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
7FF848DE3000
|
trusted library allocation
|
page execute and read and write
|
||
23E14686000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
226B7630000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
1AE4711B000
|
heap
|
page read and write
|
||
226D190A000
|
heap
|
page read and write
|
||
7FF849294000
|
trusted library allocation
|
page read and write
|
||
23E12A60000
|
heap
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF8491E8000
|
trusted library allocation
|
page execute and read and write
|
||
1C24BC00000
|
trusted library allocation
|
page read and write
|
||
226B92ED000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1C24BC30000
|
heap
|
page execute and read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
293B72E4000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF8491F8000
|
trusted library allocation
|
page execute and read and write
|
||
293BE58B000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
2178018A000
|
trusted library allocation
|
page read and write
|
||
AE732FD000
|
stack
|
page read and write
|
||
AC68EFD000
|
stack
|
page read and write
|
||
1C25EB15000
|
trusted library allocation
|
page read and write
|
||
B7BCC3E000
|
stack
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
AE725CE000
|
stack
|
page read and write
|
||
226B90F5000
|
trusted library allocation
|
page read and write
|
||
745E53E000
|
stack
|
page read and write
|
||
1AE47050000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
B3000FE000
|
stack
|
page read and write
|
||
2178019E000
|
trusted library allocation
|
page read and write
|
||
2178013B000
|
trusted library allocation
|
page read and write
|
||
21790001000
|
trusted library allocation
|
page read and write
|
||
217FA685000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page execute and read and write
|
||
23E1439B000
|
heap
|
page read and write
|
||
745DEFD000
|
stack
|
page read and write
|
||
23E145D0000
|
trusted library allocation
|
page read and write
|
||
7FF8492C0000
|
trusted library allocation
|
page read and write
|
||
4D54DFE000
|
stack
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
B7BC9FC000
|
stack
|
page read and write
|
||
7FF849340000
|
trusted library allocation
|
page read and write
|
||
23E12918000
|
heap
|
page read and write
|
||
23E145D6000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
226D1880000
|
heap
|
page read and write
|
||
1AE2CC40000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF849310000
|
trusted library allocation
|
page read and write
|
||
217800DF000
|
trusted library allocation
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
4D546FF000
|
stack
|
page read and write
|
||
1C24BC46000
|
heap
|
page read and write
|
||
293A4272000
|
heap
|
page read and write
|
||
B37F7FF000
|
stack
|
page read and write
|
||
226B7635000
|
heap
|
page read and write
|
||
140019000
|
remote allocation
|
page execute and read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
745EA7C000
|
stack
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
217FC170000
|
heap
|
page read and write
|
||
AE73BFE000
|
stack
|
page read and write
|
||
7FF8492D0000
|
trusted library allocation
|
page read and write
|
||
293BE5E5000
|
heap
|
page read and write
|
||
745E13E000
|
stack
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
226B73E0000
|
heap
|
page read and write
|
||
140011000
|
remote allocation
|
page execute and read and write
|
||
AC67F3D000
|
stack
|
page read and write
|
||
226B91B2000
|
trusted library allocation
|
page read and write
|
||
B37E18E000
|
stack
|
page read and write
|
||
293B5EC0000
|
trusted library allocation
|
page read and write
|
||
217FCC00000
|
heap
|
page execute and read and write
|
||
7FF848FFB000
|
trusted library allocation
|
page read and write
|
||
1C266520000
|
heap
|
page read and write
|
||
B37F8FF000
|
stack
|
page read and write
|
||
226B7580000
|
heap
|
page execute and read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
23E1468E000
|
trusted library allocation
|
page read and write
|
||
23E14705000
|
trusted library allocation
|
page read and write
|
||
226B92A2000
|
trusted library allocation
|
page read and write
|
||
7FF848FA4000
|
trusted library allocation
|
page read and write
|
||
226D18CC000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8492A6000
|
trusted library allocation
|
page read and write
|
||
1AE3FCA4000
|
trusted library allocation
|
page read and write
|
||
1C24D95C000
|
trusted library allocation
|
page read and write
|
||
7FF8492D0000
|
trusted library allocation
|
page read and write
|
||
226B740A000
|
heap
|
page read and write
|
||
1AE47056000
|
heap
|
page read and write
|
||
1C24BEE5000
|
heap
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page execute and read and write
|
||
226B73D0000
|
heap
|
page read and write
|
||
226B918C000
|
trusted library allocation
|
page read and write
|
||
293A4206000
|
heap
|
page read and write
|
||
1C24B9A0000
|
unkown
|
page readonly
|
||
293A41A0000
|
heap
|
page read and write
|
||
B37E14E000
|
stack
|
page read and write
|
||
7FF8492DA000
|
trusted library allocation
|
page read and write
|
||
1C266528000
|
heap
|
page read and write
|
||
7FF8491C4000
|
trusted library allocation
|
page read and write
|
||
226B74C0000
|
heap
|
page read and write
|
||
B7BD17F000
|
stack
|
page read and write
|
||
7FF848FE2000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
1AE3F9EC000
|
trusted library allocation
|
page read and write
|
||
1AE3FC36000
|
trusted library allocation
|
page read and write
|
||
2178018E000
|
trusted library allocation
|
page read and write
|
||
1AE46A2F000
|
heap
|
page read and write
|
||
1AE2E690000
|
heap
|
page read and write
|
There are 847 hidden memdumps, click here to show them.