Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
iwtYgAXvKB.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Common Files\Services\LhMoEdVbIY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\MhsFZJQzCIAWwGKKZKgtHJpnVmmJDKNszUpodVapiywc\conhost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\LhMoEdVbIY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Microsoft\EdgeCore\LhMoEdVbIY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Windows Mail\LhMoEdVbIY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\smss.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\winlogon.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6qUMg8BuEM.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\LOU1YTO9ROLERK7.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\UYOTATHKKW9YY9G.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\LhMoEdVbIY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Links\sppsvc.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Speech_OneCore\Engines\SR\en-GB-N\LhMoEdVbIY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\containerprovider\WD8Tyzwe3aBcLS.vbe
|
data
|
dropped
|
||
C:\containerprovider\bridgeComponentreview.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Common Files\Services\8995e9fee2d9e2
|
ASCII text, with very long lines (349), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\MhsFZJQzCIAWwGKKZKgtHJpnVmmJDKNszUpodVapiywc\088424020bedd6
|
ASCII text, with very long lines (920), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\8995e9fee2d9e2
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\Microsoft\EdgeCore\8995e9fee2d9e2
|
ASCII text, with very long lines (476), with no line terminators
|
dropped
|
||
C:\Program Files\Windows Mail\8995e9fee2d9e2
|
ASCII text, with very long lines (762), with no line terminators
|
dropped
|
||
C:\Recovery\69ddcba757bf72
|
ASCII text, with very long lines (856), with no line terminators
|
dropped
|
||
C:\Recovery\cc11b995f2a76d
|
ASCII text, with very long lines (519), with no line terminators
|
dropped
|
||
C:\Users\user\8995e9fee2d9e2
|
ASCII text, with very long lines (710), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\bridgeComponentreview.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\WtSaPxMAJl
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\Links\0a1fd5f707cd16
|
ASCII text, with very long lines (469), with no line terminators
|
dropped
|
||
C:\Windows\Speech_OneCore\Engines\SR\en-GB-N\8995e9fee2d9e2
|
ASCII text, with very long lines (532), with no line terminators
|
dropped
|
||
C:\containerprovider\HWCHX7UinH.bat
|
ASCII text, with no line terminators
|
dropped
|
There are 19 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\iwtYgAXvKB.exe
|
"C:\Users\user\Desktop\iwtYgAXvKB.exe"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\containerprovider\WD8Tyzwe3aBcLS.vbe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\containerprovider\bridgeComponentreview.exe
|
"C:\containerprovider\bridgeComponentreview.exe"
|
||
C:\Program Files (x86)\Microsoft\EdgeCore\LhMoEdVbIY.exe
|
"C:\Program Files (x86)\microsoft\EdgeCore\LhMoEdVbIY.exe"
|
||
C:\Program Files (x86)\Microsoft\EdgeCore\LhMoEdVbIY.exe
|
"C:\Program Files (x86)\microsoft\EdgeCore\LhMoEdVbIY.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\containerprovider\HWCHX7UinH.bat" "
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://951499cm.nyashtech.top/PollGeoDbwordpressTemporary/722944f89091ce5d9b1c5fbdfd00568555f67a8aa3
|
unknown
|
||
http://951499cm.nyashtech.top/PollGeoDbwordpressTemporary/722944f89091ce5d9b1c5fbdfd00568555f67a8aa399d5400d05a2a7b07fcbcd263346663ea3568b
|
80.211.144.156
|
||
http://951499cm.nyashtech.top/sqlcentralUploads.php
|
80.211.144.156
|
||
http://951499cm.nyashtech.top
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
951499cm.nyashtech.top
|
80.211.144.156
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
80.211.144.156
|
951499cm.nyashtech.top
|
Italy
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
EnableLUA
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
PromptOnSecureDesktop
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\5339817287ab33b8ae7096b4a58afd52d3dbb863
|
654adb41c0ea67eeac07a6845e5165cf3ae8c54c
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASMANCS
|
FileDirectory
|
There are 27 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1297B000
|
trusted library allocation
|
page read and write
|
||
2CEF000
|
trusted library allocation
|
page read and write
|
||
2401000
|
trusted library allocation
|
page read and write
|
||
12481000
|
trusted library allocation
|
page read and write
|
||
294E000
|
trusted library allocation
|
page read and write
|
||
2481000
|
trusted library allocation
|
page read and write
|
||
2C31000
|
trusted library allocation
|
page read and write
|
||
2FE3000
|
stack
|
page read and write
|
||
1BF25000
|
heap
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
12CFB000
|
trusted library allocation
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
2FFA000
|
stack
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page read and write
|
||
1BD8E000
|
stack
|
page read and write
|
||
23F0000
|
heap
|
page execute and read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
E3C000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
2DD3000
|
heap
|
page read and write
|
||
1BD96000
|
heap
|
page read and write
|
||
1B44E000
|
stack
|
page read and write
|
||
860000
|
trusted library allocation
|
page read and write
|
||
1AFFE000
|
stack
|
page read and write
|
||
7A1000
|
unkown
|
page execute read
|
||
1ACBF000
|
stack
|
page read and write
|
||
124CB000
|
trusted library allocation
|
page read and write
|
||
12DFD000
|
trusted library allocation
|
page read and write
|
||
130FE000
|
trusted library allocation
|
page read and write
|
||
2DED000
|
heap
|
page read and write
|
||
1C160000
|
heap
|
page read and write
|
||
12EA3000
|
trusted library allocation
|
page read and write
|
||
125C7000
|
trusted library allocation
|
page read and write
|
||
7FF848F13000
|
trusted library allocation
|
page read and write
|
||
7E4B000
|
stack
|
page read and write
|
||
7FF848F1C000
|
trusted library allocation
|
page read and write
|
||
530D000
|
stack
|
page read and write
|
||
1B71E000
|
stack
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
1BDD1000
|
heap
|
page read and write
|
||
2CCC000
|
trusted library allocation
|
page read and write
|
||
1BE01000
|
heap
|
page read and write
|
||
12614000
|
trusted library allocation
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
1C35F000
|
stack
|
page read and write
|
||
2DE7000
|
heap
|
page read and write
|
||
7A8E000
|
stack
|
page read and write
|
||
2FC6000
|
stack
|
page read and write
|
||
7FF848D62000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
stack
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
3583000
|
heap
|
page read and write
|
||
130BE000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
3385000
|
heap
|
page read and write
|
||
5430000
|
heap
|
page read and write
|
||
358C000
|
heap
|
page read and write
|
||
12E94000
|
trusted library allocation
|
page read and write
|
||
77BA000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page execute and read and write
|
||
130DC000
|
trusted library allocation
|
page read and write
|
||
34F8000
|
heap
|
page read and write
|
||
12CF3000
|
trusted library allocation
|
page read and write
|
||
2CFB000
|
stack
|
page read and write
|
||
3501000
|
heap
|
page read and write
|
||
1BDEA000
|
heap
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
51CF000
|
stack
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
1B57B000
|
heap
|
page read and write
|
||
24DB000
|
trusted library allocation
|
page read and write
|
||
7FF848F72000
|
trusted library allocation
|
page read and write
|
||
28AC000
|
trusted library allocation
|
page read and write
|
||
12D4E000
|
trusted library allocation
|
page read and write
|
||
77B5000
|
heap
|
page read and write
|
||
125C2000
|
trusted library allocation
|
page read and write
|
||
12D85000
|
trusted library allocation
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
1BC5D000
|
stack
|
page read and write
|
||
5401000
|
trusted library allocation
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
125A7000
|
trusted library allocation
|
page read and write
|
||
244A000
|
trusted library allocation
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page readonly
|
||
628000
|
heap
|
page read and write
|
||
3582000
|
heap
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
132D5000
|
trusted library allocation
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
1263F000
|
trusted library allocation
|
page read and write
|
||
132D9000
|
trusted library allocation
|
page read and write
|
||
3549000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F60000
|
trusted library allocation
|
page execute and read and write
|
||
2DC8000
|
heap
|
page read and write
|
||
1BF6E000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
1266F000
|
trusted library allocation
|
page read and write
|
||
2527000
|
trusted library allocation
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
3532000
|
heap
|
page read and write
|
||
12A0C000
|
trusted library allocation
|
page read and write
|
||
128CC000
|
trusted library allocation
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
2DD3000
|
heap
|
page read and write
|
||
2832000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
2CB4000
|
trusted library allocation
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
12A2F000
|
trusted library allocation
|
page read and write
|
||
291B000
|
stack
|
page read and write
|
||
12D7A000
|
trusted library allocation
|
page read and write
|
||
3980000
|
heap
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
1BEB3000
|
heap
|
page read and write
|
||
1268B000
|
trusted library allocation
|
page read and write
|
||
328A000
|
heap
|
page read and write
|
||
2DDE000
|
heap
|
page read and write
|
||
1BC5E000
|
stack
|
page read and write
|
||
125CB000
|
trusted library allocation
|
page read and write
|
||
1BC8E000
|
stack
|
page read and write
|
||
7E4000
|
unkown
|
page read and write
|
||
12681000
|
trusted library allocation
|
page read and write
|
||
132DE000
|
trusted library allocation
|
page read and write
|
||
3558000
|
heap
|
page read and write
|
||
7FF848F23000
|
trusted library allocation
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
12643000
|
trusted library allocation
|
page read and write
|
||
7FF848F5C000
|
trusted library allocation
|
page read and write
|
||
1AEE0000
|
heap
|
page execute and read and write
|
||
12AAA000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
3515000
|
heap
|
page read and write
|
||
352C000
|
heap
|
page read and write
|
||
7FF848D33000
|
trusted library allocation
|
page execute and read and write
|
||
1B58B000
|
heap
|
page read and write
|
||
7FF848ED3000
|
trusted library allocation
|
page read and write
|
||
13242000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
7FF848D9B000
|
trusted library allocation
|
page execute and read and write
|
||
9BE000
|
stack
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
12648000
|
trusted library allocation
|
page read and write
|
||
2485000
|
trusted library allocation
|
page read and write
|
||
5454000
|
heap
|
page read and write
|
||
2DFD000
|
heap
|
page read and write
|
||
13247000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
2E09000
|
heap
|
page read and write
|
||
6AF000
|
heap
|
page read and write
|
||
2E11000
|
heap
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
2E26000
|
heap
|
page read and write
|
||
3549000
|
heap
|
page read and write
|
||
2E11000
|
heap
|
page read and write
|
||
672000
|
heap
|
page read and write
|
||
7D3000
|
unkown
|
page readonly
|
||
5DB000
|
heap
|
page read and write
|
||
DDC000
|
heap
|
page read and write
|
||
24BC000
|
trusted library allocation
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
34FB000
|
heap
|
page read and write
|
||
12AA4000
|
trusted library allocation
|
page read and write
|
||
26AC000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
7FF848EFC000
|
trusted library allocation
|
page read and write
|
||
12A47000
|
trusted library allocation
|
page read and write
|
||
1AEF0000
|
heap
|
page read and write
|
||
2290000
|
trusted library section
|
page read and write
|
||
352D000
|
heap
|
page read and write
|
||
24B0000
|
trusted library allocation
|
page read and write
|
||
13251000
|
trusted library allocation
|
page read and write
|
||
12E9E000
|
trusted library allocation
|
page read and write
|
||
70B000
|
heap
|
page read and write
|
||
1BE5D000
|
stack
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
2E26000
|
heap
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
2DD2000
|
heap
|
page read and write
|
||
1BDBA000
|
heap
|
page read and write
|
||
12E4A000
|
trusted library allocation
|
page read and write
|
||
3582000
|
heap
|
page read and write
|
||
2EF6000
|
stack
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page execute and read and write
|
||
12D4A000
|
trusted library allocation
|
page read and write
|
||
2DC2000
|
heap
|
page read and write
|
||
12D71000
|
trusted library allocation
|
page read and write
|
||
12665000
|
trusted library allocation
|
page read and write
|
||
2456000
|
trusted library allocation
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
1BE28000
|
heap
|
page read and write
|
||
7D3000
|
unkown
|
page readonly
|
||
2D88000
|
heap
|
page read and write
|
||
1BB5E000
|
stack
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
1BE9E000
|
heap
|
page read and write
|
||
2DC4000
|
heap
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
3565000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page execute and read and write
|
||
130FB000
|
trusted library allocation
|
page read and write
|
||
2DC3000
|
heap
|
page read and write
|
||
7FF848D3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
2DDF000
|
heap
|
page read and write
|
||
12E8A000
|
trusted library allocation
|
page read and write
|
||
2487000
|
trusted library allocation
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
125D0000
|
trusted library allocation
|
page read and write
|
||
3583000
|
heap
|
page read and write
|
||
1BF67000
|
heap
|
page read and write
|
||
7FF848F0C000
|
trusted library allocation
|
page read and write
|
||
1B95E000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
13260000
|
trusted library allocation
|
page read and write
|
||
1AE44000
|
stack
|
page read and write
|
||
6FB3000
|
heap
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
2859000
|
trusted library allocation
|
page read and write
|
||
1B2F5000
|
stack
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
7FF848F58000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
156000
|
unkown
|
page readonly
|
||
10AF000
|
stack
|
page read and write
|
||
1253F000
|
trusted library allocation
|
page read and write
|
||
1BF55000
|
stack
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
1254E000
|
trusted library allocation
|
page read and write
|
||
7FF848F1B000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
802000
|
unkown
|
page write copy
|
||
25C6000
|
trusted library allocation
|
page read and write
|
||
5660000
|
heap
|
page read and write
|
||
12D7F000
|
trusted library allocation
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
2CDB000
|
trusted library allocation
|
page read and write
|
||
1B9A1000
|
heap
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
3544000
|
heap
|
page read and write
|
||
5A3C000
|
stack
|
page read and write
|
||
6FBB000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
1BEE4000
|
heap
|
page read and write
|
||
2DCD000
|
heap
|
page read and write
|
||
24A7000
|
trusted library allocation
|
page read and write
|
||
12D98000
|
trusted library allocation
|
page read and write
|
||
12563000
|
trusted library allocation
|
page read and write
|
||
3583000
|
heap
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
7FF848F1A000
|
trusted library allocation
|
page read and write
|
||
124C8000
|
trusted library allocation
|
page read and write
|
||
34FA000
|
heap
|
page read and write
|
||
12521000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1C05E000
|
stack
|
page read and write
|
||
554F000
|
stack
|
page read and write
|
||
1325A000
|
trusted library allocation
|
page read and write
|
||
27F6000
|
trusted library allocation
|
page read and write
|
||
2CD9000
|
trusted library allocation
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
12547000
|
trusted library allocation
|
page read and write
|
||
358C000
|
heap
|
page read and write
|
||
5C9000
|
heap
|
page read and write
|
||
1291B000
|
trusted library allocation
|
page read and write
|
||
2E26000
|
heap
|
page read and write
|
||
1BE0D000
|
heap
|
page read and write
|
||
58FF000
|
stack
|
page read and write
|
||
1B990000
|
heap
|
page read and write
|
||
130E7000
|
trusted library allocation
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
2DCE000
|
heap
|
page read and write
|
||
7FF848EF4000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
1B64E000
|
stack
|
page read and write
|
||
13265000
|
trusted library allocation
|
page read and write
|
||
2DCC000
|
heap
|
page read and write
|
||
27B8000
|
trusted library allocation
|
page read and write
|
||
32000
|
unkown
|
page readonly
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page read and write
|
||
2FCC000
|
stack
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
2C83000
|
trusted library allocation
|
page read and write
|
||
2DEE000
|
heap
|
page read and write
|
||
12A15000
|
trusted library allocation
|
page read and write
|
||
1C17A000
|
heap
|
page read and write
|
||
132BE000
|
trusted library allocation
|
page read and write
|
||
12A28000
|
trusted library allocation
|
page read and write
|
||
7FF848E1C000
|
trusted library allocation
|
page execute and read and write
|
||
1BDF9000
|
heap
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
540E000
|
stack
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
2DC5000
|
heap
|
page read and write
|
||
12C96000
|
trusted library allocation
|
page read and write
|
||
1BD5E000
|
stack
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
12D2F000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
1C197000
|
heap
|
page read and write
|
||
2DFD000
|
heap
|
page read and write
|
||
3544000
|
heap
|
page read and write
|
||
1BE3E000
|
heap
|
page read and write
|
||
1BEF8000
|
heap
|
page read and write
|
||
7FF848D34000
|
trusted library allocation
|
page read and write
|
||
7FF848D94000
|
trusted library allocation
|
page read and write
|
||
12D54000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
12D48000
|
trusted library allocation
|
page read and write
|
||
1B54E000
|
stack
|
page read and write
|
||
25E8000
|
trusted library allocation
|
page read and write
|
||
7FF848D5B000
|
trusted library allocation
|
page execute and read and write
|
||
12E99000
|
trusted library allocation
|
page read and write
|
||
12660000
|
trusted library allocation
|
page read and write
|
||
1B91F000
|
stack
|
page read and write
|
||
1B3F5000
|
stack
|
page read and write
|
||
9AC000
|
heap
|
page read and write
|
||
2E09000
|
heap
|
page read and write
|
||
1A430000
|
trusted library allocation
|
page read and write
|
||
E12000
|
heap
|
page read and write
|
||
3524000
|
heap
|
page read and write
|
||
7FF848D32000
|
trusted library allocation
|
page read and write
|
||
1BECF000
|
heap
|
page read and write
|
||
12617000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
2DBE000
|
heap
|
page read and write
|
||
1BD78000
|
heap
|
page read and write
|
||
12CF8000
|
trusted library allocation
|
page read and write
|
||
2DE1000
|
heap
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
659000
|
heap
|
page read and write
|
||
34F7000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
1BD91000
|
heap
|
page read and write
|
||
1A4B0000
|
trusted library allocation
|
page read and write
|
||
1BB8D000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
3555000
|
heap
|
page read and write
|
||
1B5AF000
|
heap
|
page read and write
|
||
E66000
|
heap
|
page read and write
|
||
352D000
|
heap
|
page read and write
|
||
1261B000
|
trusted library allocation
|
page read and write
|
||
1BF2F000
|
heap
|
page read and write
|
||
7DE000
|
unkown
|
page read and write
|
||
7FF848F1E000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
trusted library allocation
|
page read and write
|
||
7FF848F26000
|
trusted library allocation
|
page read and write
|
||
24D9000
|
trusted library allocation
|
page read and write
|
||
7FF848DCC000
|
trusted library allocation
|
page execute and read and write
|
||
128C7000
|
trusted library allocation
|
page read and write
|
||
12403000
|
trusted library allocation
|
page read and write
|
||
12DF3000
|
trusted library allocation
|
page read and write
|
||
152000
|
unkown
|
page readonly
|
||
2FD7000
|
stack
|
page read and write
|
||
A1D000
|
heap
|
page read and write
|
||
3536000
|
heap
|
page read and write
|
||
57FE000
|
stack
|
page read and write
|
||
1A87D000
|
stack
|
page read and write
|
||
12D2D000
|
trusted library allocation
|
page read and write
|
||
12DB2000
|
trusted library allocation
|
page read and write
|
||
1BA1B000
|
stack
|
page read and write
|
||
12D8D000
|
trusted library allocation
|
page read and write
|
||
350F000
|
heap
|
page read and write
|
||
12A34000
|
trusted library allocation
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
1B98E000
|
stack
|
page read and write
|
||
1BDFB000
|
heap
|
page read and write
|
||
1B345000
|
stack
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
3525000
|
heap
|
page read and write
|
||
12D5C000
|
trusted library allocation
|
page read and write
|
||
2E09000
|
heap
|
page read and write
|
||
1BE9B000
|
heap
|
page read and write
|
||
12D9D000
|
trusted library allocation
|
page read and write
|
||
900000
|
trusted library allocation
|
page read and write
|
||
1BE95000
|
heap
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
2DBD000
|
heap
|
page read and write
|
||
5FB000
|
heap
|
page read and write
|
||
960000
|
heap
|
page execute and read and write
|
||
12C59000
|
trusted library allocation
|
page read and write
|
||
880000
|
trusted library allocation
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
12567000
|
trusted library allocation
|
page read and write
|
||
12AB8000
|
trusted library allocation
|
page read and write
|
||
1BE80000
|
heap
|
page read and write
|
||
358C000
|
heap
|
page read and write
|
||
1B5C2000
|
heap
|
page read and write
|
||
1324C000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page execute and read and write
|
||
34FA000
|
heap
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
12466000
|
trusted library allocation
|
page read and write
|
||
1BFC6000
|
heap
|
page read and write
|
||
2E09000
|
heap
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
1BD86000
|
heap
|
page read and write
|
||
3581000
|
heap
|
page read and write
|
||
1B490000
|
heap
|
page read and write
|
||
7D0E000
|
stack
|
page read and write
|
||
2483000
|
trusted library allocation
|
page read and write
|
||
12C33000
|
trusted library allocation
|
page read and write
|
||
352B000
|
heap
|
page read and write
|
||
352B000
|
heap
|
page read and write
|
||
3501000
|
heap
|
page read and write
|
||
34E6000
|
heap
|
page read and write
|
||
1261C000
|
trusted library allocation
|
page read and write
|
||
2911000
|
trusted library allocation
|
page read and write
|
||
1BE46000
|
heap
|
page read and write
|
||
2DD1000
|
heap
|
page read and write
|
||
12D3B000
|
trusted library allocation
|
page read and write
|
||
3528000
|
heap
|
page read and write
|
||
34ED000
|
heap
|
page read and write
|
||
1BFAE000
|
heap
|
page read and write
|
||
1B14E000
|
stack
|
page read and write
|
||
7FF848F26000
|
trusted library allocation
|
page read and write
|
||
2DE7000
|
heap
|
page read and write
|
||
224E000
|
stack
|
page read and write
|
||
7FF848D4C000
|
trusted library allocation
|
page read and write
|
||
12A58000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
34FA000
|
heap
|
page read and write
|
||
7FF848D72000
|
trusted library allocation
|
page read and write
|
||
12558000
|
trusted library allocation
|
page read and write
|
||
7FF848F35000
|
trusted library allocation
|
page read and write
|
||
1BD5D000
|
stack
|
page read and write
|
||
E3A000
|
heap
|
page read and write
|
||
1B0FE000
|
stack
|
page read and write
|
||
124C3000
|
trusted library allocation
|
page read and write
|
||
5520000
|
heap
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
7FF848DE6000
|
trusted library allocation
|
page read and write
|
||
1C18B000
|
heap
|
page read and write
|
||
12DBB000
|
trusted library allocation
|
page read and write
|
||
3565000
|
heap
|
page read and write
|
||
12970000
|
trusted library allocation
|
page read and write
|
||
1B58F000
|
heap
|
page read and write
|
||
1BD60000
|
heap
|
page read and write
|
||
1B9C8000
|
heap
|
page read and write
|
||
585000
|
heap
|
page read and write
|
||
3517000
|
heap
|
page read and write
|
||
12585000
|
trusted library allocation
|
page read and write
|
||
12549000
|
trusted library allocation
|
page read and write
|
||
24AA000
|
trusted library allocation
|
page read and write
|
||
7FF848D8C000
|
trusted library allocation
|
page execute and read and write
|
||
1AA0C000
|
stack
|
page read and write
|
||
1BF8B000
|
stack
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
1AE60000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
2DA8000
|
heap
|
page read and write
|
||
1318D000
|
trusted library allocation
|
page read and write
|
||
1BE31000
|
heap
|
page read and write
|
||
1252F000
|
trusted library allocation
|
page read and write
|
||
12E8E000
|
trusted library allocation
|
page read and write
|
||
34F5000
|
heap
|
page read and write
|
||
1265C000
|
trusted library allocation
|
page read and write
|
||
1BD6D000
|
heap
|
page read and write
|
||
7A1000
|
unkown
|
page execute read
|
||
5FD000
|
heap
|
page read and write
|
||
12401000
|
trusted library allocation
|
page read and write
|
||
24D2000
|
trusted library allocation
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
12EBB000
|
trusted library allocation
|
page read and write
|
||
12D31000
|
trusted library allocation
|
page read and write
|
||
1B562000
|
heap
|
page read and write
|
||
2E11000
|
heap
|
page read and write
|
||
132E7000
|
trusted library allocation
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
7FF848D9D000
|
trusted library allocation
|
page execute and read and write
|
||
2FBC000
|
stack
|
page read and write
|
||
12DD6000
|
trusted library allocation
|
page read and write
|
||
3509000
|
heap
|
page read and write
|
||
2D08000
|
trusted library allocation
|
page read and write
|
||
1BE4E000
|
heap
|
page read and write
|
||
7FF848D84000
|
trusted library allocation
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
E3F000
|
heap
|
page read and write
|
||
7CCF000
|
stack
|
page read and write
|
||
2FE9000
|
stack
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
2DD1000
|
heap
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
12D94000
|
trusted library allocation
|
page read and write
|
||
2545000
|
trusted library allocation
|
page read and write
|
||
2DCE000
|
heap
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
1256C000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
358C000
|
heap
|
page read and write
|
||
536000
|
stack
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
24B9000
|
trusted library allocation
|
page read and write
|
||
12429000
|
trusted library allocation
|
page read and write
|
||
2270000
|
heap
|
page execute and read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D73000
|
trusted library allocation
|
page read and write
|
||
7FF848D8B000
|
trusted library allocation
|
page execute and read and write
|
||
12544000
|
trusted library allocation
|
page read and write
|
||
1B0AC000
|
stack
|
page read and write
|
||
1B594000
|
stack
|
page read and write
|
||
83F000
|
stack
|
page read and write
|
||
12E77000
|
trusted library allocation
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
12DEF000
|
trusted library allocation
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
13256000
|
trusted library allocation
|
page read and write
|
||
12A9F000
|
trusted library allocation
|
page read and write
|
||
1BFE2000
|
heap
|
page read and write
|
||
7FF848F31000
|
trusted library allocation
|
page read and write
|
||
125E2000
|
trusted library allocation
|
page read and write
|
||
2E11000
|
heap
|
page read and write
|
||
2DFD000
|
heap
|
page read and write
|
||
12580000
|
trusted library allocation
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
12C31000
|
trusted library allocation
|
page read and write
|
||
12DF8000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
unkown
|
page readonly
|
||
1E0000
|
heap
|
page read and write
|
||
3502000
|
heap
|
page read and write
|
||
7FF4064D0000
|
trusted library allocation
|
page execute and read and write
|
||
1255F000
|
trusted library allocation
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
12D66000
|
trusted library allocation
|
page read and write
|
||
12A1F000
|
trusted library allocation
|
page read and write
|
||
1BFD6000
|
heap
|
page read and write
|
||
11AF000
|
stack
|
page read and write
|
||
2DA1000
|
heap
|
page read and write
|
||
132E2000
|
trusted library allocation
|
page read and write
|
||
77BD000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
2E26000
|
heap
|
page read and write
|
||
2DA8000
|
heap
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EDA000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
7B8E000
|
stack
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
3553000
|
heap
|
page read and write
|
||
1B88E000
|
stack
|
page read and write
|
||
3515000
|
heap
|
page read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
||
1BF60000
|
heap
|
page read and write
|
||
7BCE000
|
stack
|
page read and write
|
||
12DAC000
|
trusted library allocation
|
page read and write
|
||
12A11000
|
trusted library allocation
|
page read and write
|
||
4F6000
|
stack
|
page read and write
|
||
3511000
|
heap
|
page read and write
|
||
50CF000
|
stack
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
3583000
|
heap
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
77B8000
|
heap
|
page read and write
|
||
1B5A5000
|
heap
|
page read and write
|
||
12A1A000
|
trusted library allocation
|
page read and write
|
||
2DC3000
|
heap
|
page read and write
|
||
593B000
|
stack
|
page read and write
|
||
7A0000
|
unkown
|
page readonly
|
||
5664000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
2DE9000
|
heap
|
page read and write
|
||
34E6000
|
heap
|
page read and write
|
||
1B04F000
|
stack
|
page read and write
|
||
3528000
|
heap
|
page read and write
|
||
1B24E000
|
stack
|
page read and write
|
||
1291F000
|
trusted library allocation
|
page read and write
|
||
24AD000
|
trusted library allocation
|
page read and write
|
||
802000
|
unkown
|
page readonly
|
||
5450000
|
heap
|
page read and write
|
||
2CB8000
|
trusted library allocation
|
page read and write
|
||
7FF848F2B000
|
trusted library allocation
|
page read and write
|
||
3515000
|
heap
|
page read and write
|
||
1288D000
|
trusted library allocation
|
page read and write
|
||
2C87000
|
trusted library allocation
|
page read and write
|
||
2250000
|
trusted library section
|
page read and write
|
||
3583000
|
heap
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
34FA000
|
heap
|
page read and write
|
||
3551000
|
heap
|
page read and write
|
||
2DDE000
|
heap
|
page read and write
|
||
2C20000
|
heap
|
page execute and read and write
|
||
7FF848D83000
|
trusted library allocation
|
page read and write
|
||
2DC8000
|
heap
|
page read and write
|
||
12D75000
|
trusted library allocation
|
page read and write
|
||
801000
|
unkown
|
page read and write
|
||
21FF000
|
stack
|
page read and write
|
||
803000
|
unkown
|
page readonly
|
||
77B1000
|
heap
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E50000
|
trusted library allocation
|
page execute and read and write
|
||
29CE000
|
stack
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
12674000
|
trusted library allocation
|
page read and write
|
||
1266A000
|
trusted library allocation
|
page read and write
|
||
2DC2000
|
heap
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
12525000
|
trusted library allocation
|
page read and write
|
||
2EE5000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
34F8000
|
heap
|
page read and write
|
||
2604000
|
trusted library allocation
|
page read and write
|
||
12DDC000
|
trusted library allocation
|
page read and write
|
||
1B610000
|
trusted library allocation
|
page read and write
|
||
12AB0000
|
trusted library allocation
|
page read and write
|
||
28E3000
|
trusted library allocation
|
page read and write
|
||
12D42000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
125BA000
|
trusted library allocation
|
page read and write
|
||
34C8000
|
heap
|
page read and write
|
||
131A1000
|
trusted library allocation
|
page read and write
|
||
358C000
|
heap
|
page read and write
|
||
1BF11000
|
heap
|
page read and write
|
||
34EB000
|
heap
|
page read and write
|
||
7F4C000
|
stack
|
page read and write
|
||
12E45000
|
trusted library allocation
|
page read and write
|
||
1B1FE000
|
stack
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
1AC60000
|
trusted library allocation
|
page read and write
|
||
1BE72000
|
heap
|
page read and write
|
||
9A5000
|
heap
|
page read and write
|
||
132D0000
|
trusted library allocation
|
page read and write
|
||
1BF7D000
|
heap
|
page read and write
|
||
1257D000
|
trusted library allocation
|
page read and write
|
||
1B81E000
|
stack
|
page read and write
|
||
64C000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
3988000
|
heap
|
page read and write
|
||
1BDAD000
|
heap
|
page read and write
|
||
1C556000
|
stack
|
page read and write
|
||
2DEF000
|
heap
|
page read and write
|
||
2FF2000
|
stack
|
page read and write
|
||
12A23000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
125E5000
|
trusted library allocation
|
page read and write
|
||
1323E000
|
trusted library allocation
|
page read and write
|
||
12E72000
|
trusted library allocation
|
page read and write
|
||
1B500000
|
heap
|
page read and write
|
||
12E6D000
|
trusted library allocation
|
page read and write
|
||
125BD000
|
trusted library allocation
|
page read and write
|
||
1B5D0000
|
heap
|
page execute and read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page execute and read and write
|
||
626000
|
heap
|
page read and write
|
||
3516000
|
heap
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
2CCE000
|
trusted library allocation
|
page read and write
|
||
2DCB000
|
heap
|
page read and write
|
||
1C45E000
|
stack
|
page read and write
|
||
1C4FB000
|
stack
|
page read and write
|
||
7DE000
|
unkown
|
page write copy
|
||
34FA000
|
heap
|
page read and write
|
||
682000
|
heap
|
page read and write
|
||
2719000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
24D3000
|
trusted library allocation
|
page read and write
|
||
1BE87000
|
heap
|
page read and write
|
||
1258B000
|
trusted library allocation
|
page read and write
|
||
1BF8A000
|
heap
|
page read and write
|
||
1BEAB000
|
heap
|
page read and write
|
||
7FF848E56000
|
trusted library allocation
|
page execute and read and write
|
||
1B4FE000
|
stack
|
page read and write
|
||
1BD7F000
|
heap
|
page read and write
|
||
1250B000
|
trusted library allocation
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
2240000
|
trusted library section
|
page read and write
|
||
1BFB8000
|
heap
|
page read and write
|
||
7E0F000
|
stack
|
page read and write
|
||
12538000
|
trusted library allocation
|
page read and write
|
||
2DFD000
|
heap
|
page read and write
|
||
24B3000
|
trusted library allocation
|
page read and write
|
||
1C15E000
|
stack
|
page read and write
|
||
6AD000
|
heap
|
page read and write
|
||
3582000
|
heap
|
page read and write
|
||
2DC7000
|
heap
|
page read and write
|
||
12EB2000
|
trusted library allocation
|
page read and write
|
||
7FF848DEC000
|
trusted library allocation
|
page execute and read and write
|
||
6B9000
|
heap
|
page read and write
|
||
2DCC000
|
heap
|
page read and write
|
||
1BA5E000
|
stack
|
page read and write
|
||
2DE2000
|
heap
|
page read and write
|
||
247E000
|
stack
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
1BF04000
|
heap
|
page read and write
|
||
12A6B000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
560000
|
heap
|
page read and write
|
||
2280000
|
trusted library section
|
page read and write
|
There are 702 hidden memdumps, click here to show them.