Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
imX19sLDxY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\TempWaircut.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\system.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Tempdll.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9e82a5ccaed752a57fda004b4018de61.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\Tempdll.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\system.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TempWaircut.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Patcher\TempWaircut.exe_StrongName_hu55jcqz1l0xzwol4xdhfkxzesvt1zhm\2.0.0.0\pwjvxtxk.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Patcher\TempWaircut.exe_StrongName_hu55jcqz1l0xzwol4xdhfkxzesvt1zhm\2.0.0.0\user.config (copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\imX19sLDxY.exe
|
"C:\Users\user\Desktop\imX19sLDxY.exe"
|
||
C:\Users\user\AppData\Local\TempWaircut.exe
|
"C:\Users\user\AppData\Local\TempWaircut.exe"
|
||
C:\Users\user\AppData\Local\Tempdll.exe
|
"C:\Users\user\AppData\Local\Tempdll.exe"
|
||
C:\Users\user\AppData\Local\Temp\system.exe
|
"C:\Users\user\AppData\Local\Temp\system.exe"
|
||
C:\Windows\System32\netsh.exe
|
netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\system.exe" "system.exe" ENABLE
|
||
C:\Users\user\AppData\Local\Temp\system.exe
|
"C:\Users\user\AppData\Local\Temp\system.exe" ..
|
||
C:\Users\user\AppData\Local\Temp\system.exe
|
"C:\Users\user\AppData\Local\Temp\system.exe" ..
|
||
C:\Users\user\AppData\Local\Temp\system.exe
|
"C:\Users\user\AppData\Local\Temp\system.exe" ..
|
||
C:\Users\user\AppData\Local\Temp\system.exe
|
"C:\Users\user\AppData\Local\Temp\system.exe" ..
|
||
C:\Users\user\AppData\Local\Temp\system.exe
|
"C:\Users\user\AppData\Local\Temp\system.exe" ..
|
||
C:\Users\user\AppData\Local\Temp\system.exe
|
"C:\Users\user\AppData\Local\Temp\system.exe" ..
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://sourceforge.net/projects/waircutU
|
unknown
|
||
https://sourceforge.net/projects/waircut/files/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.mediafire.com/api/1.4/upload/simple.php?filedrop_key=492214d7de748aafa049a2428a99157bbcd9
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
x555hd.ddns.net
|
197.207.192.227
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
197.207.192.227
|
x555hd.ddns.net
|
Algeria
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER
|
di
|
||
HKEY_CURRENT_USER\Environment
|
SEE_MASK_NOZONECHECKS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
9e82a5ccaed752a57fda004b4018de61
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
9e82a5ccaed752a57fda004b4018de61
|
||
HKEY_CURRENT_USER\SOFTWARE\9e82a5ccaed752a57fda004b4018de61
|
[kl]
|
||
HKEY_CURRENT_USER\SOFTWARE\9e82a5ccaed752a57fda004b4018de61
|
[kl]
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4082000
|
trusted library allocation
|
page read and write
|
||
1BC40000
|
trusted library section
|
page read and write
|
||
3565000
|
trusted library allocation
|
page read and write
|
||
3FC2000
|
trusted library allocation
|
page read and write
|
||
28C28392000
|
heap
|
page read and write
|
||
28C283E7000
|
heap
|
page read and write
|
||
391E000
|
trusted library allocation
|
page read and write
|
||
C0F05FE000
|
stack
|
page read and write
|
||
7460000
|
trusted library allocation
|
page read and write
|
||
1BB8000
|
heap
|
page read and write
|
||
2040000
|
trusted library allocation
|
page read and write
|
||
7FF848EDA000
|
trusted library allocation
|
page execute and read and write
|
||
28C283DE000
|
heap
|
page read and write
|
||
20DF000
|
stack
|
page read and write
|
||
28C28385000
|
heap
|
page read and write
|
||
28C283E4000
|
heap
|
page read and write
|
||
28C2A437000
|
heap
|
page read and write
|
||
2D12000
|
trusted library allocation
|
page read and write
|
||
39B9000
|
trusted library allocation
|
page read and write
|
||
B780000
|
trusted library allocation
|
page read and write
|
||
200D0000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page execute and read and write
|
||
5330000
|
heap
|
page read and write
|
||
28C283AA000
|
heap
|
page read and write
|
||
1518B000
|
trusted library allocation
|
page read and write
|
||
28C283E4000
|
heap
|
page read and write
|
||
28C2A43B000
|
heap
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
28C283D6000
|
heap
|
page read and write
|
||
28C283D6000
|
heap
|
page read and write
|
||
AF50000
|
trusted library allocation
|
page read and write
|
||
1C0BE000
|
stack
|
page read and write
|
||
AE5F000
|
heap
|
page read and write
|
||
1D45000
|
unkown
|
page readonly
|
||
7903000
|
trusted library section
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
14009000
|
trusted library allocation
|
page read and write
|
||
26EA000
|
trusted library allocation
|
page read and write
|
||
13D3000
|
heap
|
page read and write
|
||
91C000
|
unkown
|
page readonly
|
||
1FFE000
|
stack
|
page read and write
|
||
4222000
|
trusted library allocation
|
page read and write
|
||
1EFF000
|
stack
|
page read and write
|
||
7FF848E52000
|
trusted library allocation
|
page execute and read and write
|
||
1CDC0000
|
heap
|
page read and write
|
||
28C2A3C1000
|
heap
|
page read and write
|
||
28C2A43B000
|
heap
|
page read and write
|
||
2713000
|
heap
|
page read and write
|
||
2A6F000
|
stack
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
2D0E000
|
trusted library allocation
|
page read and write
|
||
5E1E000
|
stack
|
page read and write
|
||
28C283B5000
|
heap
|
page read and write
|
||
AF40000
|
trusted library allocation
|
page read and write
|
||
7FF848F0A000
|
trusted library allocation
|
page execute and read and write
|
||
1C91E000
|
stack
|
page read and write
|
||
28C2A43D000
|
heap
|
page read and write
|
||
EDE000
|
heap
|
page read and write
|
||
21D9000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
2D01000
|
trusted library allocation
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
3E6F000
|
trusted library allocation
|
page read and write
|
||
F2D0000
|
trusted library allocation
|
page read and write
|
||
28C283D6000
|
heap
|
page read and write
|
||
2210000
|
heap
|
page execute and read and write
|
||
7FF848EE2000
|
trusted library allocation
|
page execute and read and write
|
||
28C2A3C0000
|
heap
|
page read and write
|
||
2260000
|
heap
|
page read and write
|
||
CB8E000
|
stack
|
page read and write
|
||
28C29F50000
|
heap
|
page read and write
|
||
1AA0000
|
trusted library allocation
|
page read and write
|
||
28C2A401000
|
heap
|
page read and write
|
||
3EF6000
|
trusted library allocation
|
page read and write
|
||
28C283D8000
|
heap
|
page read and write
|
||
AEAA000
|
heap
|
page read and write
|
||
28C28399000
|
heap
|
page read and write
|
||
C92C000
|
heap
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page execute and read and write
|
||
1BD26000
|
trusted library allocation
|
page read and write
|
||
3D7F000
|
trusted library allocation
|
page read and write
|
||
28C28383000
|
heap
|
page read and write
|
||
AE40000
|
heap
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
CE00000
|
trusted library allocation
|
page read and write
|
||
1CBE0000
|
trusted library allocation
|
page read and write
|
||
B7E0000
|
heap
|
page read and write
|
||
28C28419000
|
heap
|
page read and write
|
||
3EE7000
|
trusted library allocation
|
page read and write
|
||
1BD4D000
|
trusted library allocation
|
page read and write
|
||
227C000
|
heap
|
page read and write
|
||
28C2A43B000
|
heap
|
page read and write
|
||
2140000
|
trusted library allocation
|
page read and write
|
||
2620000
|
heap
|
page execute and read and write
|
||
1430000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page execute and read and write
|
||
E9A2000
|
trusted library allocation
|
page read and write
|
||
2180000
|
trusted library allocation
|
page read and write
|
||
2B70000
|
heap
|
page execute and read and write
|
||
2209000
|
trusted library allocation
|
page read and write
|
||
1C82E000
|
stack
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
1448000
|
heap
|
page read and write
|
||
CCCE000
|
stack
|
page read and write
|
||
28C2A420000
|
heap
|
page read and write
|
||
ED8000
|
unkown
|
page readonly
|
||
3F16000
|
trusted library allocation
|
page read and write
|
||
28C283EA000
|
heap
|
page read and write
|
||
28C2841E000
|
heap
|
page read and write
|
||
1BCA5000
|
trusted library allocation
|
page read and write
|
||
28C283AA000
|
heap
|
page read and write
|
||
28C283EB000
|
heap
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
1BC5000
|
heap
|
page read and write
|
||
28C283CD000
|
heap
|
page read and write
|
||
1CCA4000
|
heap
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EFA000
|
trusted library allocation
|
page execute and read and write
|
||
D250000
|
trusted library allocation
|
page execute and read and write
|
||
1E19000
|
heap
|
page read and write
|
||
15A4000
|
heap
|
page read and write
|
||
A9E0000
|
trusted library allocation
|
page execute and read and write
|
||
28C2836B000
|
heap
|
page read and write
|
||
B6FE000
|
stack
|
page read and write
|
||
14EC6000
|
trusted library allocation
|
page read and write
|
||
7FF848E4F000
|
trusted library allocation
|
page execute and read and write
|
||
2650000
|
trusted library allocation
|
page read and write
|
||
B810000
|
heap
|
page read and write
|
||
28C2A43C000
|
heap
|
page read and write
|
||
28C283E3000
|
heap
|
page read and write
|
||
1DEA000
|
heap
|
page read and write
|
||
5F1E000
|
stack
|
page read and write
|
||
3EC7000
|
trusted library allocation
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
B7A0000
|
trusted library allocation
|
page execute and read and write
|
||
CB4E000
|
stack
|
page read and write
|
||
28C29EB0000
|
heap
|
page read and write
|
||
1E12E000
|
stack
|
page read and write
|
||
5C30000
|
trusted library allocation
|
page read and write
|
||
21D0000
|
trusted library allocation
|
page read and write
|
||
CDF0000
|
trusted library allocation
|
page execute and read and write
|
||
1C5F9000
|
trusted library allocation
|
page read and write
|
||
28C2A424000
|
heap
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
28C283EB000
|
heap
|
page read and write
|
||
229A000
|
heap
|
page read and write
|
||
4D2D000
|
stack
|
page read and write
|
||
21E0000
|
heap
|
page execute and read and write
|
||
2630000
|
trusted library allocation
|
page read and write
|
||
28C283EF000
|
heap
|
page read and write
|
||
1577000
|
heap
|
page read and write
|
||
20000
|
trusted library allocation
|
page read and write
|
||
28C283D2000
|
heap
|
page read and write
|
||
395C000
|
trusted library allocation
|
page read and write
|
||
1C4D8000
|
heap
|
page read and write
|
||
1C5E0000
|
trusted library allocation
|
page read and write
|
||
C946000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
B010000
|
trusted library section
|
page readonly
|
||
7FF848F67000
|
trusted library allocation
|
page read and write
|
||
28C2A420000
|
heap
|
page read and write
|
||
200DA000
|
heap
|
page read and write
|
||
21F5000
|
heap
|
page read and write
|
||
7FF848F22000
|
trusted library allocation
|
page execute and read and write
|
||
1C748000
|
heap
|
page read and write
|
||
7FF848F5C000
|
trusted library allocation
|
page read and write
|
||
3B91000
|
trusted library allocation
|
page read and write
|
||
1CA2E000
|
stack
|
page read and write
|
||
ACF0000
|
heap
|
page read and write
|
||
1C81E000
|
stack
|
page read and write
|
||
7FF848F22000
|
trusted library allocation
|
page execute and read and write
|
||
28C283AD000
|
heap
|
page read and write
|
||
2380000
|
trusted library allocation
|
page read and write
|
||
7FF497C30000
|
trusted library allocation
|
page execute and read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
EC2000
|
trusted library allocation
|
page read and write
|
||
1407D000
|
trusted library allocation
|
page read and write
|
||
1B30000
|
heap
|
page read and write
|
||
1473000
|
heap
|
page read and write
|
||
1D65000
|
heap
|
page read and write
|
||
514E000
|
stack
|
page read and write
|
||
7FF848F82000
|
trusted library allocation
|
page read and write
|
||
1BE84000
|
trusted library allocation
|
page read and write
|
||
28C28380000
|
heap
|
page read and write
|
||
EDC0000
|
trusted library allocation
|
page execute and read and write
|
||
1D4D000
|
unkown
|
page readonly
|
||
20A9000
|
heap
|
page read and write
|
||
2CD6000
|
trusted library allocation
|
page read and write
|
||
D260000
|
trusted library allocation
|
page read and write
|
||
4219000
|
trusted library allocation
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page read and write
|
||
AEBE000
|
heap
|
page read and write
|
||
14310000
|
trusted library allocation
|
page read and write
|
||
20000
|
trusted library allocation
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
1DF5000
|
heap
|
page read and write
|
||
28C283EA000
|
heap
|
page read and write
|
||
B00C000
|
stack
|
page read and write
|
||
7FF848E37000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F15000
|
trusted library allocation
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
431C000
|
trusted library allocation
|
page read and write
|
||
1C5E8000
|
trusted library allocation
|
page read and write
|
||
B020000
|
heap
|
page read and write
|
||
22E3000
|
heap
|
page read and write
|
||
D30E000
|
stack
|
page read and write
|
||
28C2A420000
|
heap
|
page read and write
|
||
3F64000
|
trusted library allocation
|
page read and write
|
||
1DF0000
|
heap
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
B7F0000
|
trusted library allocation
|
page read and write
|
||
1B50000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page execute and read and write
|
||
3546000
|
trusted library allocation
|
page read and write
|
||
28C283D1000
|
heap
|
page read and write
|
||
28C283EC000
|
heap
|
page read and write
|
||
1C5F3000
|
trusted library allocation
|
page read and write
|
||
ACE0000
|
trusted library allocation
|
page read and write
|
||
7FF848F59000
|
trusted library allocation
|
page read and write
|
||
7FF848F1A000
|
trusted library allocation
|
page execute and read and write
|
||
C12000
|
unkown
|
page readonly
|
||
2220000
|
heap
|
page read and write
|
||
21B2000
|
trusted library allocation
|
page read and write
|
||
3D01000
|
trusted library allocation
|
page read and write
|
||
28C2A43B000
|
heap
|
page read and write
|
||
111B000
|
trusted library allocation
|
page execute and read and write
|
||
4176000
|
trusted library allocation
|
page read and write
|
||
28C283E2000
|
heap
|
page read and write
|
||
1725000
|
heap
|
page read and write
|
||
C926000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page execute and read and write
|
||
28C2A3E7000
|
heap
|
page read and write
|
||
4BD9000
|
trusted library allocation
|
page read and write
|
||
EC6000
|
trusted library allocation
|
page execute and read and write
|
||
398B000
|
trusted library allocation
|
page read and write
|
||
2600000
|
trusted library allocation
|
page read and write
|
||
CDCF000
|
stack
|
page read and write
|
||
762000
|
unkown
|
page readonly
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
1F20000
|
heap
|
page read and write
|
||
28C283D3000
|
heap
|
page read and write
|
||
7FF848EF5000
|
trusted library allocation
|
page read and write
|
||
1C6DE000
|
stack
|
page read and write
|
||
2321000
|
heap
|
page read and write
|
||
28C283AA000
|
heap
|
page read and write
|
||
28C28260000
|
heap
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
2388000
|
trusted library allocation
|
page read and write
|
||
1BC50000
|
trusted library allocation
|
page read and write
|
||
1A93000
|
heap
|
page read and write
|
||
28C283AA000
|
heap
|
page read and write
|
||
20FB000
|
heap
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
28C28380000
|
heap
|
page read and write
|
||
4157000
|
trusted library allocation
|
page read and write
|
||
3797000
|
trusted library allocation
|
page read and write
|
||
28C2A43B000
|
heap
|
page read and write
|
||
1BC7C000
|
heap
|
page read and write
|
||
28C28412000
|
heap
|
page read and write
|
||
7FF848E6F000
|
trusted library allocation
|
page execute and read and write
|
||
3F93000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E53000
|
trusted library allocation
|
page execute and read and write
|
||
28C28382000
|
heap
|
page read and write
|
||
13D6000
|
heap
|
page read and write
|
||
28C28250000
|
heap
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
AE8D000
|
heap
|
page read and write
|
||
D270000
|
trusted library allocation
|
page read and write
|
||
38C0000
|
trusted library allocation
|
page read and write
|
||
1BC56000
|
trusted library allocation
|
page read and write
|
||
7FF848E73000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E2A000
|
trusted library allocation
|
page execute and read and write
|
||
1CDAC000
|
stack
|
page read and write
|
||
28C28411000
|
heap
|
page read and write
|
||
CC8E000
|
stack
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
7FF848E84000
|
trusted library allocation
|
page execute and read and write
|
||
135A1000
|
trusted library allocation
|
page read and write
|
||
2D04000
|
trusted library allocation
|
page read and write
|
||
239B000
|
trusted library allocation
|
page read and write
|
||
28C283D8000
|
heap
|
page read and write
|
||
28C283B5000
|
heap
|
page read and write
|
||
28C283CD000
|
heap
|
page read and write
|
||
1E632000
|
trusted library allocation
|
page read and write
|
||
28C2A443000
|
heap
|
page read and write
|
||
19F5000
|
stack
|
page read and write
|
||
1D5A000
|
unkown
|
page readonly
|
||
15183000
|
trusted library allocation
|
page read and write
|
||
77C8000
|
trusted library section
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
1D40000
|
heap
|
page read and write
|
||
1EF5000
|
stack
|
page read and write
|
||
1BC90000
|
trusted library allocation
|
page read and write
|
||
2367000
|
heap
|
page read and write
|
||
22B7000
|
heap
|
page read and write
|
||
28C28411000
|
heap
|
page read and write
|
||
4137000
|
trusted library allocation
|
page read and write
|
||
7FF487440000
|
trusted library allocation
|
page execute and read and write
|
||
F70000
|
heap
|
page read and write
|
||
28C283B5000
|
heap
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
18D2000
|
unkown
|
page readonly
|
||
28C28411000
|
heap
|
page read and write
|
||
1BEF0000
|
trusted library allocation
|
page read and write
|
||
1B88000
|
heap
|
page read and write
|
||
7FF848F8C000
|
trusted library allocation
|
page read and write
|
||
28C283D7000
|
heap
|
page read and write
|
||
1BD40000
|
trusted library allocation
|
page read and write
|
||
2D16000
|
trusted library allocation
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
1C1BE000
|
stack
|
page read and write
|
||
28C283AC000
|
heap
|
page read and write
|
||
28C283DA000
|
heap
|
page read and write
|
||
22E6000
|
heap
|
page read and write
|
||
1C710000
|
heap
|
page read and write
|
||
1562000
|
heap
|
page read and write
|
||
3DAD000
|
trusted library allocation
|
page read and write
|
||
7FF848F65000
|
trusted library allocation
|
page read and write
|
||
22F5000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
7FF848E2A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EEA000
|
trusted library allocation
|
page execute and read and write
|
||
28C283AD000
|
heap
|
page read and write
|
||
28C28399000
|
heap
|
page read and write
|
||
28C28397000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
77F1000
|
trusted library section
|
page read and write
|
||
1D89000
|
heap
|
page read and write
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
2030000
|
trusted library allocation
|
page read and write
|
||
20F5000
|
stack
|
page read and write
|
||
1CDE9000
|
heap
|
page read and write
|
||
4BBD000
|
trusted library allocation
|
page read and write
|
||
22AA000
|
heap
|
page read and write
|
||
4280000
|
trusted library allocation
|
page read and write
|
||
1BD20000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
5303000
|
heap
|
page execute and read and write
|
||
1C11E000
|
stack
|
page read and write
|
||
2319000
|
heap
|
page read and write
|
||
28C283E7000
|
heap
|
page read and write
|
||
1A2E000
|
stack
|
page read and write
|
||
ED2000
|
unkown
|
page readonly
|
||
1D72000
|
unkown
|
page readonly
|
||
28C28397000
|
heap
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
1B20000
|
heap
|
page read and write
|
||
AED8000
|
heap
|
page read and write
|
||
28C28399000
|
heap
|
page read and write
|
||
14077000
|
trusted library allocation
|
page read and write
|
||
7FF848F6C000
|
trusted library allocation
|
page read and write
|
||
1CDB0000
|
heap
|
page read and write
|
||
7FF848EFD000
|
trusted library allocation
|
page execute and read and write
|
||
25F3000
|
heap
|
page read and write
|
||
1BF00000
|
trusted library allocation
|
page read and write
|
||
D280000
|
trusted library allocation
|
page read and write
|
||
1BCA0000
|
trusted library allocation
|
page read and write
|
||
264A000
|
trusted library allocation
|
page read and write
|
||
1C5FB000
|
trusted library allocation
|
page read and write
|
||
28C283E7000
|
heap
|
page read and write
|
||
28C28411000
|
heap
|
page read and write
|
||
EB3000
|
trusted library allocation
|
page read and write
|
||
13E08000
|
trusted library allocation
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
1BD4A000
|
trusted library allocation
|
page read and write
|
||
7FF848E32000
|
trusted library allocation
|
page execute and read and write
|
||
14011000
|
trusted library allocation
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
28C283E4000
|
heap
|
page read and write
|
||
2192000
|
trusted library allocation
|
page read and write
|
||
B7B0000
|
trusted library allocation
|
page execute and read and write
|
||
1CBDE000
|
stack
|
page read and write
|
||
AE8F000
|
heap
|
page read and write
|
||
375E000
|
trusted library allocation
|
page read and write
|
||
7FF848EA4000
|
trusted library allocation
|
page execute and read and write
|
||
28C283D2000
|
heap
|
page read and write
|
||
77A9000
|
trusted library section
|
page read and write
|
||
28C2A3A0000
|
heap
|
page read and write
|
||
7FF848E37000
|
trusted library allocation
|
page execute and read and write
|
||
2100000
|
heap
|
page read and write
|
||
13D05000
|
trusted library allocation
|
page read and write
|
||
7FF848EE2000
|
trusted library allocation
|
page execute and read and write
|
||
2119000
|
heap
|
page read and write
|
||
28C283DA000
|
heap
|
page read and write
|
||
13D08000
|
trusted library allocation
|
page read and write
|
||
20000
|
trusted library allocation
|
page read and write
|
||
1BDA000
|
heap
|
page read and write
|
||
4071000
|
trusted library allocation
|
page read and write
|
||
1D20000
|
heap
|
page read and write
|
||
23A3000
|
heap
|
page read and write
|
||
7FF848E57000
|
trusted library allocation
|
page execute and read and write
|
||
2B91000
|
trusted library allocation
|
page read and write
|
||
1BEF9000
|
trusted library allocation
|
page read and write
|
||
28C2A400000
|
heap
|
page read and write
|
||
28C283F1000
|
heap
|
page read and write
|
||
28C283AB000
|
heap
|
page read and write
|
||
1D58000
|
unkown
|
page readonly
|
||
2074000
|
heap
|
page read and write
|
||
1FA0000
|
heap
|
page read and write
|
||
28C283D2000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
14301000
|
trusted library allocation
|
page read and write
|
||
E960000
|
trusted library allocation
|
page read and write
|
||
C0F0131000
|
stack
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
7FF44B4D0000
|
trusted library allocation
|
page execute and read and write
|
||
28C28280000
|
heap
|
page read and write
|
||
2200000
|
trusted library allocation
|
page read and write
|
||
EEF000
|
heap
|
page read and write
|
||
A960000
|
heap
|
page read and write
|
||
5090000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F1D000
|
trusted library allocation
|
page execute and read and write
|
||
F80000
|
heap
|
page read and write
|
||
20000
|
trusted library allocation
|
page read and write
|
||
2048000
|
heap
|
page read and write
|
||
2CF8000
|
trusted library allocation
|
page read and write
|
||
1D70000
|
heap
|
page read and write
|
||
51D3000
|
heap
|
page read and write
|
||
1C3DA000
|
heap
|
page read and write
|
||
7FF848F42000
|
trusted library allocation
|
page execute and read and write
|
||
4232000
|
trusted library allocation
|
page read and write
|
||
229C000
|
heap
|
page read and write
|
||
A9DD000
|
stack
|
page read and write
|
||
7FF848F0A000
|
trusted library allocation
|
page execute and read and write
|
||
1AF4000
|
stack
|
page read and write
|
||
1CB30000
|
trusted library section
|
page read and write
|
||
28C28399000
|
heap
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
1BC1E000
|
stack
|
page read and write
|
||
2020000
|
heap
|
page read and write
|
||
20FD000
|
heap
|
page read and write
|
||
28C283ED000
|
heap
|
page read and write
|
||
28C283E4000
|
heap
|
page read and write
|
||
909000
|
unkown
|
page readonly
|
||
7FF848E2C000
|
trusted library allocation
|
page execute and read and write
|
||
1BF1B000
|
trusted library allocation
|
page read and write
|
||
E970000
|
trusted library allocation
|
page execute and read and write
|
||
1BED000
|
heap
|
page read and write
|
||
28C283CF000
|
heap
|
page read and write
|
||
28C283CD000
|
heap
|
page read and write
|
||
28C2A425000
|
heap
|
page read and write
|
||
ED8000
|
heap
|
page read and write
|
||
2D07000
|
trusted library allocation
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
2390000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
28C2A43B000
|
heap
|
page read and write
|
||
2085000
|
heap
|
page read and write
|
||
28C283B0000
|
heap
|
page read and write
|
||
7FF848F87000
|
trusted library allocation
|
page read and write
|
||
2D0A000
|
trusted library allocation
|
page read and write
|
||
28C283AB000
|
heap
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
7FF44B4E0000
|
trusted library allocation
|
page execute and read and write
|
||
1BE7E000
|
stack
|
page read and write
|
||
1CEB0000
|
heap
|
page read and write
|
||
1BF13000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
2305000
|
heap
|
page read and write
|
||
28C283D0000
|
heap
|
page read and write
|
||
28C2A420000
|
heap
|
page read and write
|
||
2399000
|
trusted library allocation
|
page read and write
|
||
3BA1000
|
trusted library allocation
|
page read and write
|
||
28C2841E000
|
heap
|
page read and write
|
||
13D4E000
|
trusted library allocation
|
page read and write
|
||
7FF848E42000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F1D000
|
trusted library allocation
|
page execute and read and write
|
||
2160000
|
trusted library allocation
|
page read and write
|
||
2040000
|
heap
|
page read and write
|
||
28C283EF000
|
heap
|
page read and write
|
||
212000
|
unkown
|
page readonly
|
||
1334E000
|
trusted library allocation
|
page read and write
|
||
7FF436110000
|
trusted library allocation
|
page execute and read and write
|
||
4BAE000
|
trusted library allocation
|
page read and write
|
||
5176000
|
trusted library allocation
|
page read and write
|
||
1CCA0000
|
heap
|
page read and write
|
||
28C283D8000
|
heap
|
page read and write
|
||
411C000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
7FF848F42000
|
trusted library allocation
|
page execute and read and write
|
||
432C000
|
trusted library allocation
|
page read and write
|
||
28C2A43E000
|
heap
|
page read and write
|
||
1BC70000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page execute and read and write
|
||
1BC80000
|
trusted library allocation
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
1A96000
|
heap
|
page read and write
|
||
28C283E3000
|
heap
|
page read and write
|
||
1B84000
|
heap
|
page read and write
|
||
1B72000
|
heap
|
page read and write
|
||
1C6FE000
|
stack
|
page read and write
|
||
28C28394000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page execute and read and write
|
||
35A1000
|
trusted library allocation
|
page read and write
|
||
1AB0000
|
heap
|
page execute and read and write
|
||
28C283ED000
|
heap
|
page read and write
|
||
28C28411000
|
heap
|
page read and write
|
||
210C000
|
heap
|
page read and write
|
||
D40F000
|
stack
|
page read and write
|
||
28C283DA000
|
heap
|
page read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
28C283E2000
|
heap
|
page read and write
|
||
28C2841D000
|
heap
|
page read and write
|
||
28C28414000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
28C28320000
|
heap
|
page read and write
|
||
2440000
|
trusted library allocation
|
page read and write
|
||
CDE0000
|
heap
|
page execute and read and write
|
||
28C2A401000
|
heap
|
page read and write
|
||
21B4000
|
trusted library allocation
|
page read and write
|
||
2483000
|
heap
|
page execute and read and write
|
||
7FF848E22000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
42DE000
|
trusted library allocation
|
page read and write
|
||
22F0000
|
heap
|
page read and write
|
||
28C283EF000
|
heap
|
page read and write
|
||
F41000
|
heap
|
page read and write
|
||
2200000
|
heap
|
page read and write
|
||
7790000
|
trusted library section
|
page read and write
|
||
ED0000
|
unkown
|
page readonly
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
ACD0000
|
trusted library allocation
|
page read and write
|
||
1B7A000
|
heap
|
page read and write
|
||
EAD000
|
trusted library allocation
|
page execute and read and write
|
||
11E4000
|
stack
|
page read and write
|
||
1A40000
|
trusted library allocation
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
1CA59000
|
stack
|
page read and write
|
||
13E01000
|
trusted library allocation
|
page read and write
|
||
ACCE000
|
stack
|
page read and write
|
||
28C2A43B000
|
heap
|
page read and write
|
||
1BFBD000
|
stack
|
page read and write
|
||
1EB00000
|
heap
|
page read and write
|
||
B7E5000
|
heap
|
page read and write
|
||
2623000
|
heap
|
page execute and read and write
|
||
AEA5000
|
heap
|
page read and write
|
||
1CE50000
|
heap
|
page execute and read and write
|
||
212A000
|
heap
|
page read and write
|
||
1C0D0000
|
trusted library allocation
|
page read and write
|
||
3982000
|
trusted library allocation
|
page read and write
|
||
2065000
|
heap
|
page read and write
|
||
1CC30000
|
trusted library section
|
page readonly
|
||
ED0000
|
unkown
|
page readonly
|
||
1DF30000
|
heap
|
page read and write
|
||
28C28380000
|
heap
|
page read and write
|
||
13E05000
|
trusted library allocation
|
page read and write
|
||
7FF848F69000
|
trusted library allocation
|
page read and write
|
||
D420000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E4F000
|
trusted library allocation
|
page execute and read and write
|
||
1BE80000
|
trusted library allocation
|
page read and write
|
||
28C28382000
|
heap
|
page read and write
|
||
1E32E000
|
stack
|
page read and write
|
||
1573000
|
heap
|
page read and write
|
||
D410000
|
trusted library allocation
|
page read and write
|
||
1FD0000
|
heap
|
page read and write
|
||
28C283D6000
|
heap
|
page read and write
|
||
246E000
|
stack
|
page read and write
|
||
28C28387000
|
heap
|
page read and write
|
||
AE67000
|
heap
|
page read and write
|
||
7FF848E32000
|
trusted library allocation
|
page execute and read and write
|
||
3E89000
|
trusted library allocation
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
A990000
|
trusted library allocation
|
page read and write
|
||
28C283D6000
|
heap
|
page read and write
|
||
3536000
|
trusted library allocation
|
page read and write
|
||
2173000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page execute and read and write
|
||
396C000
|
trusted library allocation
|
page read and write
|
||
1755000
|
heap
|
page read and write
|
||
7FF848EEA000
|
trusted library allocation
|
page execute and read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
20000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
AEEE000
|
heap
|
page read and write
|
||
15B8000
|
heap
|
page read and write
|
||
2170000
|
heap
|
page read and write
|
||
7FF848EED000
|
trusted library allocation
|
page execute and read and write
|
||
1115000
|
trusted library allocation
|
page execute and read and write
|
||
434B000
|
trusted library allocation
|
page read and write
|
||
1DAA000
|
heap
|
page read and write
|
||
28C283D5000
|
heap
|
page read and write
|
||
28C28380000
|
heap
|
page read and write
|
||
1BAF000
|
heap
|
page read and write
|
||
28C2A431000
|
heap
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
7FF848E42000
|
trusted library allocation
|
page execute and read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1C01E000
|
stack
|
page read and write
|
||
C0F04FE000
|
unkown
|
page read and write
|
||
7FF848F67000
|
trusted library allocation
|
page read and write
|
||
C91E000
|
heap
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F12000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
1C5F0000
|
trusted library allocation
|
page read and write
|
||
7FF848EFD000
|
trusted library allocation
|
page execute and read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
4BB6000
|
trusted library allocation
|
page read and write
|
||
2585000
|
heap
|
page read and write
|
||
2107000
|
heap
|
page read and write
|
||
C0F013E000
|
stack
|
page read and write
|
||
28C283B0000
|
heap
|
page read and write
|
||
260A000
|
trusted library allocation
|
page read and write
|
||
2276000
|
heap
|
page read and write
|
||
EF7000
|
heap
|
page read and write
|
||
1C5DE000
|
stack
|
page read and write
|
||
28C283EC000
|
heap
|
page read and write
|
||
B800000
|
trusted library allocation
|
page execute and read and write
|
||
14DE000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
28C283DE000
|
heap
|
page read and write
|
||
7FF848F57000
|
trusted library allocation
|
page read and write
|
||
1D40000
|
heap
|
page read and write
|
||
28C2A3C1000
|
heap
|
page read and write
|
||
1BC9A000
|
trusted library allocation
|
page read and write
|
||
B846000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
AF28000
|
heap
|
page read and write
|
||
7FF848E3F000
|
trusted library allocation
|
page execute and read and write
|
||
1A60000
|
trusted library allocation
|
page read and write
|
||
7F7D0000
|
trusted library allocation
|
page execute and read and write
|
||
11C8000
|
heap
|
page read and write
|
||
28C28346000
|
heap
|
page read and write
|
||
1C2BB000
|
stack
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
1F7E000
|
stack
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page execute and read and write
|
||
1540000
|
heap
|
page read and write
|
||
2604000
|
trusted library allocation
|
page read and write
|
||
7FF4D9F40000
|
trusted library allocation
|
page execute and read and write
|
||
28C2A400000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
216E000
|
stack
|
page read and write
|
||
7FF848F02000
|
trusted library allocation
|
page execute and read and write
|
||
1C3EE000
|
stack
|
page read and write
|
||
28C283CF000
|
heap
|
page read and write
|
||
B790000
|
trusted library allocation
|
page read and write
|
||
7930000
|
trusted library section
|
page read and write
|
||
F62000
|
heap
|
page read and write
|
||
2E3E000
|
trusted library allocation
|
page read and write
|
||
144C6000
|
trusted library allocation
|
page read and write
|
||
7FF848F55000
|
trusted library allocation
|
page read and write
|
||
28C2838C000
|
heap
|
page read and write
|
||
28C283D7000
|
heap
|
page read and write
|
||
3F25000
|
trusted library allocation
|
page read and write
|
||
C910000
|
heap
|
page read and write
|
||
14307000
|
trusted library allocation
|
page read and write
|
||
1BD42000
|
trusted library allocation
|
page read and write
|
||
C0F012E000
|
stack
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
28C28371000
|
heap
|
page read and write
|
||
28C283B0000
|
heap
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
2644000
|
trusted library allocation
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
28C2A43E000
|
heap
|
page read and write
|
||
2634000
|
trusted library allocation
|
page read and write
|
||
10700000
|
trusted library allocation
|
page read and write
|
||
3F06000
|
trusted library allocation
|
page read and write
|
||
28C29F60000
|
heap
|
page read and write
|
||
28C2A449000
|
heap
|
page read and write
|
||
7FF848F22000
|
trusted library allocation
|
page execute and read and write
|
||
5DDE000
|
stack
|
page read and write
|
||
1548000
|
heap
|
page read and write
|
||
1BC94000
|
trusted library allocation
|
page read and write
|
||
7FF848F6C000
|
trusted library allocation
|
page read and write
|
||
26E4000
|
trusted library allocation
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
99F000
|
stack
|
page read and write
|
||
B040000
|
trusted library allocation
|
page read and write
|
||
EA4000
|
trusted library allocation
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
28C2A420000
|
heap
|
page read and write
|
||
2480000
|
heap
|
page execute and read and write
|
||
1D60000
|
heap
|
page read and write
|
||
1DA2000
|
heap
|
page read and write
|
||
7FF848E4A000
|
trusted library allocation
|
page execute and read and write
|
||
ED80000
|
trusted library allocation
|
page execute and read and write
|
||
28C2A434000
|
heap
|
page read and write
|
||
20DB000
|
heap
|
page read and write
|
||
2640000
|
trusted library allocation
|
page read and write
|
||
7FF4AD2C0000
|
trusted library allocation
|
page execute and read and write
|
||
FD5000
|
heap
|
page read and write
|
||
28C283AA000
|
heap
|
page read and write
|
||
51D0000
|
heap
|
page read and write
|
||
14071000
|
trusted library allocation
|
page read and write
|
||
28C2841E000
|
heap
|
page read and write
|
||
21A0000
|
heap
|
page read and write
|
||
1CAA0000
|
heap
|
page read and write
|
||
1BE82000
|
trusted library allocation
|
page read and write
|
||
13D01000
|
trusted library allocation
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
C95A000
|
heap
|
page read and write
|
||
EB2000
|
unkown
|
page readonly
|
||
7FF848F1A000
|
trusted library allocation
|
page execute and read and write
|
||
1BD44000
|
trusted library allocation
|
page read and write
|
||
182E000
|
stack
|
page read and write
|
||
16D5000
|
heap
|
page read and write
|
||
5300000
|
heap
|
page execute and read and write
|
||
1BA1D000
|
heap
|
page read and write
|
||
7FF848F6C000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
135A5000
|
trusted library allocation
|
page read and write
|
||
EA3000
|
trusted library allocation
|
page execute and read and write
|
||
28C2A449000
|
heap
|
page read and write
|
||
4BB1000
|
trusted library allocation
|
page read and write
|
||
1C40000
|
heap
|
page read and write
|
||
13348000
|
trusted library allocation
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
7FF848EEA000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E5A000
|
trusted library allocation
|
page execute and read and write
|
||
1B58000
|
heap
|
page read and write
|
||
778E000
|
stack
|
page read and write
|
||
EB4000
|
unkown
|
page readonly
|
||
28C283B5000
|
heap
|
page read and write
|
||
7FF848F85000
|
trusted library allocation
|
page read and write
|
||
7FF848F67000
|
trusted library allocation
|
page read and write
|
||
2025000
|
heap
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
28C2841E000
|
heap
|
page read and write
|
||
2176000
|
heap
|
page read and write
|
||
41E2000
|
trusted library allocation
|
page read and write
|
||
28C28399000
|
heap
|
page read and write
|
||
1469000
|
heap
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
1BEB000
|
heap
|
page read and write
|
||
1C92E000
|
stack
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
1BF3000
|
heap
|
page read and write
|
||
1BF19000
|
trusted library allocation
|
page read and write
|
||
15D6000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F02000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EEA000
|
trusted library allocation
|
page execute and read and write
|
||
14305000
|
trusted library allocation
|
page read and write
|
||
23A6000
|
heap
|
page read and write
|
||
B030000
|
heap
|
page read and write
|
||
28C283AD000
|
heap
|
page read and write
|
||
4301000
|
trusted library allocation
|
page read and write
|
||
28C2841E000
|
heap
|
page read and write
|
||
ED0000
|
unkown
|
page readonly
|
||
21B0000
|
trusted library allocation
|
page read and write
|
||
1D80000
|
heap
|
page read and write
|
||
28C2838A000
|
heap
|
page read and write
|
||
CF8000
|
stack
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
223E000
|
stack
|
page read and write
|
||
28C283DD000
|
heap
|
page read and write
|
||
2060000
|
heap
|
page read and write
|
||
430D000
|
trusted library allocation
|
page read and write
|
||
1FD5000
|
heap
|
page read and write
|
||
28C2A428000
|
heap
|
page read and write
|
||
1A90000
|
heap
|
page read and write
|
||
AE57000
|
heap
|
page read and write
|
||
28C2A43D000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
A970000
|
trusted library allocation
|
page execute and read and write
|
||
4BD0000
|
trusted library allocation
|
page read and write
|
||
7FF848E52000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EE2000
|
trusted library allocation
|
page execute and read and write
|
||
28C28395000
|
heap
|
page read and write
|
||
1CC70000
|
heap
|
page execute and read and write
|
||
1CC10000
|
heap
|
page read and write
|
||
1112000
|
trusted library allocation
|
page read and write
|
||
1CA1E000
|
stack
|
page read and write
|
||
1CB2E000
|
stack
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
1BDB0000
|
heap
|
page read and write
|
||
7FF848ED2000
|
trusted library allocation
|
page execute and read and write
|
||
117E000
|
stack
|
page read and write
|
||
7FF848F89000
|
trusted library allocation
|
page read and write
|
||
D290000
|
trusted library allocation
|
page execute and read and write
|
||
28C2A43B000
|
heap
|
page read and write
|
||
2580000
|
heap
|
page read and write
|
||
28C283EC000
|
heap
|
page read and write
|
||
C0F06FE000
|
stack
|
page read and write
|
||
5C20000
|
trusted library allocation
|
page read and write
|
||
7FF848EFA000
|
trusted library allocation
|
page execute and read and write
|
||
1117000
|
trusted library allocation
|
page execute and read and write
|
||
4212000
|
trusted library allocation
|
page read and write
|
||
1C21E000
|
stack
|
page read and write
|
||
4241000
|
trusted library allocation
|
page read and write
|
||
28C283ED000
|
heap
|
page read and write
|
||
28C2A42A000
|
heap
|
page read and write
|
||
2B6F000
|
stack
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page execute and read and write
|
||
2240000
|
heap
|
page read and write
|
||
3862000
|
trusted library allocation
|
page read and write
|
||
173E000
|
stack
|
page read and write
|
||
AEDC000
|
heap
|
page read and write
|
||
360F000
|
trusted library allocation
|
page read and write
|
||
28C28615000
|
heap
|
page read and write
|
||
1C94D000
|
stack
|
page read and write
|
||
AF60000
|
trusted library allocation
|
page execute and read and write
|
||
1F80000
|
heap
|
page read and write
|
||
AF80000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
7FF848E27000
|
trusted library allocation
|
page execute and read and write
|
||
28C2A3E0000
|
heap
|
page read and write
|
||
28C28394000
|
heap
|
page read and write
|
||
2000000
|
heap
|
page read and write
|
||
13341000
|
trusted library allocation
|
page read and write
|
||
28C28412000
|
heap
|
page read and write
|
||
28C2A449000
|
heap
|
page read and write
|
||
2B8A000
|
heap
|
page read and write
|
||
156A000
|
heap
|
page read and write
|
||
28C28610000
|
heap
|
page read and write
|
||
1BF08000
|
trusted library allocation
|
page read and write
|
||
15D4000
|
heap
|
page read and write
|
||
2393000
|
trusted library allocation
|
page read and write
|
||
256E000
|
stack
|
page read and write
|
||
B839000
|
heap
|
page read and write
|
||
2716000
|
heap
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
192E000
|
stack
|
page read and write
|
||
3341000
|
trusted library allocation
|
page read and write
|
||
11BB000
|
stack
|
page read and write
|
||
28C283DA000
|
heap
|
page read and write
|
||
2D47000
|
trusted library allocation
|
page read and write
|
||
EBD000
|
trusted library allocation
|
page execute and read and write
|
||
28C283CD000
|
heap
|
page read and write
|
||
C0F09FE000
|
stack
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
2170000
|
trusted library allocation
|
page read and write
|
||
20BD000
|
heap
|
page read and write
|
||
28C2A3E3000
|
heap
|
page read and write
|
||
1A70000
|
trusted library allocation
|
page read and write
|
||
7FF848E32000
|
trusted library allocation
|
page execute and read and write
|
||
28C2A443000
|
heap
|
page read and write
|
||
3D21000
|
trusted library allocation
|
page read and write
|
||
1DB3000
|
heap
|
page read and write
|
||
7FF848E6F000
|
trusted library allocation
|
page execute and read and write
|
||
21F0000
|
heap
|
page read and write
|
||
14075000
|
trusted library allocation
|
page read and write
|
||
B820000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page execute and read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
5C9E000
|
stack
|
page read and write
|
||
2CFE000
|
trusted library allocation
|
page read and write
|
||
1CA95000
|
stack
|
page read and write
|
||
28C283E7000
|
heap
|
page read and write
|
||
28C2841E000
|
heap
|
page read and write
|
||
5C50000
|
trusted library allocation
|
page execute and read and write
|
||
28C283B0000
|
heap
|
page read and write
|
||
28C2A3C1000
|
heap
|
page read and write
|
||
163F000
|
stack
|
page read and write
|
||
2194000
|
trusted library allocation
|
page read and write
|
||
3E01000
|
trusted library allocation
|
page read and write
|
||
20000
|
trusted library allocation
|
page read and write
|
||
28C28392000
|
heap
|
page read and write
|
||
13345000
|
trusted library allocation
|
page read and write
|
||
28C283E7000
|
heap
|
page read and write
|
||
C95F000
|
heap
|
page read and write
|
||
2D1B000
|
trusted library allocation
|
page read and write
|
||
135A8000
|
trusted library allocation
|
page read and write
|
||
28C28399000
|
heap
|
page read and write
|
||
1BF10000
|
trusted library allocation
|
page read and write
|
||
1D20000
|
heap
|
page read and write
|
||
ECA000
|
trusted library allocation
|
page execute and read and write
|
||
CA4E000
|
stack
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
28C283D3000
|
heap
|
page read and write
|
||
2010000
|
trusted library allocation
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
28C283DA000
|
heap
|
page read and write
|
||
12F4000
|
stack
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
There are 869 hidden memdumps, click here to show them.