IOC Report
4KjLUaW30K.exe

loading gif

Files

File Path
Type
Category
Malicious
4KjLUaW30K.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\mnUYCZffXdEgQlZPiczLektp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\mnUYCZffXdEgQlZPiczLektp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\logs\audiodg.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\logs\audiodg.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Windows Defender\dllhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows Defender\dllhost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\USOShared\Logs\mnUYCZffXdEgQlZPiczLektp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\USOShared\Logs\mnUYCZffXdEgQlZPiczLektp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Recovery\System.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\System.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Default\OneDrive\mnUYCZffXdEgQlZPiczLektp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Downloads\ShellExperienceHost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Downloads\ShellExperienceHost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\4KjLUaW30K.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\28bf72c6-5a6e-449b-a0d6-76cd4ab5c11d.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\70189604-2a9a-4ba1-809b-491977885217.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\ae22e728c3f23233571eb704564b4445f7960812.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ae22e728c3f23233571eb704564b4445f7960812.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\f8edc2df584126
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\Mozilla Maintenance Service\logs\42af1c969fbb7b
ASCII text, with very long lines (551), with no line terminators
dropped
C:\Program Files (x86)\Windows Defender\5940a34987c991
ASCII text, with very long lines (762), with no line terminators
dropped
C:\ProgramData\USOShared\Logs\f8edc2df584126
ASCII text, with very long lines (436), with no line terminators
dropped
C:\Recovery\27d1bcfc3c54e0
ASCII text, with very long lines (571), with no line terminators
dropped
C:\Users\Default\OneDrive\f8edc2df584126
ASCII text, with very long lines (446), with no line terminators
dropped
C:\Users\Default\OneDrive\mnUYCZffXdEgQlZPiczLektp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Downloads\f8c8f1285d826b
ASCII text, with very long lines (744), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ShellExperienceHost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\System.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\audiodg.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dllhost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\mnUYCZffXdEgQlZPiczLektp.exe.log
ASCII text, with CRLF line terminators
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\4KjLUaW30K.exe
"C:\Users\user\Desktop\4KjLUaW30K.exe"
malicious
C:\Windows\System32\dllhost.exe
C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Recovery\System.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\System.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Recovery\System.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\mozilla maintenance service\logs\audiodg.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\mozilla maintenance service\logs\audiodg.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\mozilla maintenance service\logs\audiodg.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mnUYCZffXdEgQlZPiczLektpm" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\USOShared\Logs\mnUYCZffXdEgQlZPiczLektp.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mnUYCZffXdEgQlZPiczLektp" /sc ONLOGON /tr "'C:\Users\All Users\USOShared\Logs\mnUYCZffXdEgQlZPiczLektp.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mnUYCZffXdEgQlZPiczLektpm" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\USOShared\Logs\mnUYCZffXdEgQlZPiczLektp.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "ShellExperienceHostS" /sc MINUTE /mo 5 /tr "'C:\Users\Public\Downloads\ShellExperienceHost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "ShellExperienceHost" /sc ONLOGON /tr "'C:\Users\Public\Downloads\ShellExperienceHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "ShellExperienceHostS" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Downloads\ShellExperienceHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\windows defender\dllhost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\windows defender\dllhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\windows defender\dllhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mnUYCZffXdEgQlZPiczLektpm" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\mnUYCZffXdEgQlZPiczLektp.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mnUYCZffXdEgQlZPiczLektp" /sc ONLOGON /tr "'C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\mnUYCZffXdEgQlZPiczLektp.exe'" /rl HIGHEST /f
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\logs\audiodg.exe
"C:\Program Files (x86)\mozilla maintenance service\logs\audiodg.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mnUYCZffXdEgQlZPiczLektpm" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\mnUYCZffXdEgQlZPiczLektp.exe'" /rl HIGHEST /f
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\logs\audiodg.exe
"C:\Program Files (x86)\mozilla maintenance service\logs\audiodg.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mnUYCZffXdEgQlZPiczLektpm" /sc MINUTE /mo 12 /tr "'C:\Users\Default\OneDrive\mnUYCZffXdEgQlZPiczLektp.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mnUYCZffXdEgQlZPiczLektp" /sc ONLOGON /tr "'C:\Users\Default\OneDrive\mnUYCZffXdEgQlZPiczLektp.exe'" /rl HIGHEST /f
malicious
C:\Program Files (x86)\Windows Defender\dllhost.exe
"C:\Program Files (x86)\windows defender\dllhost.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "mnUYCZffXdEgQlZPiczLektpm" /sc MINUTE /mo 6 /tr "'C:\Users\Default\OneDrive\mnUYCZffXdEgQlZPiczLektp.exe'" /rl HIGHEST /f
malicious
C:\Program Files (x86)\Windows Defender\dllhost.exe
"C:\Program Files (x86)\windows defender\dllhost.exe"
malicious
C:\ProgramData\USOShared\Logs\mnUYCZffXdEgQlZPiczLektp.exe
"C:\Users\All Users\USOShared\Logs\mnUYCZffXdEgQlZPiczLektp.exe"
malicious
C:\Users\Default\OneDrive\mnUYCZffXdEgQlZPiczLektp.exe
C:\Users\Default\OneDrive\mnUYCZffXdEgQlZPiczLektp.exe
malicious
C:\Users\Default\OneDrive\mnUYCZffXdEgQlZPiczLektp.exe
C:\Users\Default\OneDrive\mnUYCZffXdEgQlZPiczLektp.exe
malicious
C:\Users\Public\Downloads\ShellExperienceHost.exe
C:\Users\Public\Downloads\ShellExperienceHost.exe
malicious
C:\Users\Public\Downloads\ShellExperienceHost.exe
C:\Users\Public\Downloads\ShellExperienceHost.exe
malicious
C:\Recovery\System.exe
C:\Recovery\System.exe
malicious
C:\Recovery\System.exe
C:\Recovery\System.exe
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\70189604-2a9a-4ba1-809b-491977885217.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\28bf72c6-5a6e-449b-a0d6-76cd4ab5c11d.vbs"
malicious
C:\ProgramData\USOShared\Logs\mnUYCZffXdEgQlZPiczLektp.exe
"C:\Users\All Users\USOShared\Logs\mnUYCZffXdEgQlZPiczLektp.exe"
malicious
C:\Recovery\System.exe
"C:\Recovery\System.exe"
malicious
There are 28 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://a1043195.xsph.ru/e561840a.php?cl=MU3vrX2xf8nUihMHACnKj36jO&RpUrFFQZYG69rKpAFv3A0wkZY8y=NTXUg0GMdy3iEJI&060931c2fd73bb7eab1002c5e7ff62ae=c39cf4658ac2210f688ec15b4a8e711c&715f56a8f995d061ee256bc7f2c70953=wM3IjNhhzNxcTO4kjNlZzNkJDOhVmN5kjYjljYxgDOhRWMjVDZ1cDM&cl=MU3vrX2xf8nUihMHACnKj36jO&RpUrFFQZYG69rKpAFv3A0wkZY8y=NTXUg0GMdy3iEJI
141.8.192.93
malicious
http://a1043195.xsph.ru/e561840a.php?5KSwfM1XMNin8a1tisW=mdlGy9qsXR&060931c2fd73bb7eab1002c5e7ff62ae=c39cf4658ac2210f688ec15b4a8e711c&715f56a8f995d061ee256bc7f2c70953=wM3IjNhhzNxcTO4kjNlZzNkJDOhVmN5kjYjljYxgDOhRWMjVDZ1cDM&5KSwfM1XMNin8a1tisW=mdlGy9qsXR
141.8.192.93
malicious
http://a1043195.xsph.ru/e561840a.php?6AlqDLuQGYbBId=gCYL9zkUdBuC08JQaV7uaRdflujR&PwmCbXGZ2=jWpIoTJ3R
unknown
malicious
http://a1043195.xsph.ru/e561840a.php?OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs&060931c2fd73bb7eab1002c5e7ff62ae=c39cf4658ac2210f688ec15b4a8e711c&715f56a8f995d061ee256bc7f2c70953=wM3IjNhhzNxcTO4kjNlZzNkJDOhVmN5kjYjljYxgDOhRWMjVDZ1cDM&OA4wYep3at3BJWRE=LjRHrGY1NakWTvTw0sePnjeqs
141.8.192.93
malicious
http://a1043195.xsph.ru/e561840a.php?xVG80hM=hn2&8PfMQbdasrWBeFMD7qf8K3A4XF9O9rr=CHDgx4&gqVdG=FeuUIF0I3yEOlyKbPbB9N8XBqQCi8Sy&060931c2fd73bb7eab1002c5e7ff62ae=c39cf4658ac2210f688ec15b4a8e711c&715f56a8f995d061ee256bc7f2c70953=wM3IjNhhzNxcTO4kjNlZzNkJDOhVmN5kjYjljYxgDOhRWMjVDZ1cDM&xVG80hM=hn2&8PfMQbdasrWBeFMD7qf8K3A4XF9O9rr=CHDgx4&gqVdG=FeuUIF0I3yEOlyKbPbB9N8XBqQCi8Sy
141.8.192.93
malicious
http://a1043195.xsph.ru/e561840a.php?6AlqDLuQGYbBId=gCYL9zkUdBuC08JQaV7uaRdflujR&PwmCbXGZ2=jWpIoTJ3R6IApKsc&060931c2fd73bb7eab1002c5e7ff62ae=c39cf4658ac2210f688ec15b4a8e711c&715f56a8f995d061ee256bc7f2c70953=wM3IjNhhzNxcTO4kjNlZzNkJDOhVmN5kjYjljYxgDOhRWMjVDZ1cDM&6AlqDLuQGYbBId=gCYL9zkUdBuC08JQaV7uaRdflujR&PwmCbXGZ2=jWpIoTJ3R6IApKsc
141.8.192.93
malicious
http://a1043195.xsph.ru/e561840a.php?TuL2hSCP9SfVYBiGie5CRyTCq=bSB9NQ&hPoKZhDXzG8XL4Xlk2=O6efaILX0uNAFOw1v45I61pbrV&fQEqbHZBmDuOCOKMmmG2I=Dlqot1XRCxEepH&060931c2fd73bb7eab1002c5e7ff62ae=c39cf4658ac2210f688ec15b4a8e711c&715f56a8f995d061ee256bc7f2c70953=wM3IjNhhzNxcTO4kjNlZzNkJDOhVmN5kjYjljYxgDOhRWMjVDZ1cDM&TuL2hSCP9SfVYBiGie5CRyTCq=bSB9NQ&hPoKZhDXzG8XL4Xlk2=O6efaILX0uNAFOw1v45I61pbrV&fQEqbHZBmDuOCOKMmmG2I=Dlqot1XRCxEepH
141.8.192.93
malicious
http://a1043195.xsph.ru/e561840a.php?pjrl5w7K39YkW8ohPsI7w0KcXus=bWRfDt01CulxteygFk08RJEfi7EyY&NLECtgr2h=IxeeHUNRCoWx3tnSRw7F&BcxgatrvRyMCOzeojXNtw=u2aRUYaP45b7HUr7rlgfuzJvp&060931c2fd73bb7eab1002c5e7ff62ae=c39cf4658ac2210f688ec15b4a8e711c&715f56a8f995d061ee256bc7f2c70953=wM3IjNhhzNxcTO4kjNlZzNkJDOhVmN5kjYjljYxgDOhRWMjVDZ1cDM&pjrl5w7K39YkW8ohPsI7w0KcXus=bWRfDt01CulxteygFk08RJEfi7EyY&NLECtgr2h=IxeeHUNRCoWx3tnSRw7F&BcxgatrvRyMCOzeojXNtw=u2aRUYaP45b7HUr7rlgfuzJvp
141.8.192.93
malicious
http://a1043195.xsph.ru/
unknown
malicious
http://a1043195.xsph.ru/e561840a.php?I2G4s=IMSEV2S071HqCvJ1J7jvi0Ev&glD0UhPCN5IkMoV0wZ=KC1L8RsJV7M&IhhyROAmT1=y0AR6SN4wavlfoaFjmY4F&060931c2fd73bb7eab1002c5e7ff62ae=c39cf4658ac2210f688ec15b4a8e711c&715f56a8f995d061ee256bc7f2c70953=wM3IjNhhzNxcTO4kjNlZzNkJDOhVmN5kjYjljYxgDOhRWMjVDZ1cDM&I2G4s=IMSEV2S071HqCvJ1J7jvi0Ev&glD0UhPCN5IkMoV0wZ=KC1L8RsJV7M&IhhyROAmT1=y0AR6SN4wavlfoaFjmY4F
141.8.192.93
malicious
http://a1043195.xsph.ru
unknown
malicious
https://cp.sprinthost.ru
unknown
https://index.from.sh/pages/game.html
unknown
https://cp.sprinthost.ru/auth/login
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://go.mic
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
a1043195.xsph.ru
141.8.192.93
malicious

IPs

IP
Domain
Country
Malicious
141.8.192.93
a1043195.xsph.ru
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
System
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
System
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
audiodg
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
mnUYCZffXdEgQlZPiczLektp
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
mnUYCZffXdEgQlZPiczLektp
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ShellExperienceHost
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ShellExperienceHost
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
dllhost
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
PromptOnSecureDesktop
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
mnUYCZffXdEgQlZPiczLektp
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
mnUYCZffXdEgQlZPiczLektp
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
mnUYCZffXdEgQlZPiczLektp
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\59bb06aabf3bdeee648e2d4dc8257cfa0286f412
297b825bb1c999985e845391dbefe96115d4d6ff
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mnUYCZffXdEgQlZPiczLektp_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mnUYCZffXdEgQlZPiczLektp_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mnUYCZffXdEgQlZPiczLektp_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mnUYCZffXdEgQlZPiczLektp_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mnUYCZffXdEgQlZPiczLektp_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mnUYCZffXdEgQlZPiczLektp_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mnUYCZffXdEgQlZPiczLektp_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mnUYCZffXdEgQlZPiczLektp_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mnUYCZffXdEgQlZPiczLektp_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mnUYCZffXdEgQlZPiczLektp_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mnUYCZffXdEgQlZPiczLektp_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mnUYCZffXdEgQlZPiczLektp_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mnUYCZffXdEgQlZPiczLektp_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mnUYCZffXdEgQlZPiczLektp_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
There are 29 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2BAB000
trusted library allocation
page read and write
malicious
24C1000
trusted library allocation
page read and write
malicious
2EAB000
trusted library allocation
page read and write
malicious
2E38000
trusted library allocation
page read and write
malicious
3231000
trusted library allocation
page read and write
malicious
2E91000
trusted library allocation
page read and write
malicious
326D000
trusted library allocation
page read and write
malicious
27F1000
trusted library allocation
page read and write
malicious
2F91000
trusted library allocation
page read and write
malicious
2E31000
trusted library allocation
page read and write
malicious
12A2F000
trusted library allocation
page read and write
malicious
2A21000
trusted library allocation
page read and write
malicious
2FCD000
trusted library allocation
page read and write
malicious
2F81000
trusted library allocation
page read and write
malicious
2571000
trusted library allocation
page read and write
malicious
2F91000
trusted library allocation
page read and write
malicious
2B91000
trusted library allocation
page read and write
malicious
2E61000
trusted library allocation
page read and write
malicious
2C71000
trusted library allocation
page read and write
malicious
2781000
trusted library allocation
page read and write
malicious
7FF848FE1000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
12613000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
1BE5E000
stack
page read and write
8CC000
heap
page read and write
E9D000
heap
page read and write
12B94000
trusted library allocation
page read and write
2A8FF008000
heap
page read and write
E90000
heap
page read and write
7FF848F14000
trusted library allocation
page execute and read and write
7FF848FA3000
trusted library allocation
page read and write
2F80000
heap
page execute and read and write
F9A000
heap
page read and write
14A0000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
27A0000
heap
page execute and read and write
1BC4D000
stack
page read and write
1AFC0000
trusted library allocation
page read and write
12E61000
trusted library allocation
page read and write
1BD05000
heap
page read and write
1B9C0000
heap
page read and write
DD5000
heap
page read and write
2FDA000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
2A8FF050000
heap
page read and write
12F98000
trusted library allocation
page read and write
6B7000
heap
page read and write
7FF848DF3000
trusted library allocation
page read and write
7FF848F37000
trusted library allocation
page execute and read and write
14DF000
heap
page read and write
F30000
heap
page read and write
1B3BD000
stack
page read and write
7FF848E04000
trusted library allocation
page read and write
1BC23000
stack
page read and write
27C8000
trusted library allocation
page read and write
7FF848F27000
trusted library allocation
page execute and read and write
1490000
heap
page read and write
32EB000
trusted library allocation
page read and write
1B923000
stack
page read and write
B73000
heap
page read and write
930000
heap
page read and write
12F91000
trusted library allocation
page read and write
1232000
heap
page read and write
1B1BF000
stack
page read and write
7FF848FA0000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
10CF000
heap
page read and write
7FF848DF7000
trusted library allocation
page read and write
11BD000
heap
page read and write
7FF848FE3000
trusted library allocation
page read and write
7FF848FDB000
trusted library allocation
page read and write
2560000
heap
page execute and read and write
1BA5F000
stack
page read and write
7FF848E02000
trusted library allocation
page read and write
7FF848E0C000
trusted library allocation
page read and write
10D7000
heap
page read and write
D46000
stack
page read and write
2D23000
trusted library allocation
page read and write
12F81000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
7FF848F51000
trusted library allocation
page execute and read and write
FDA000
heap
page read and write
2A8FF1B0000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
12C78000
trusted library allocation
page read and write
1BFAE000
stack
page read and write
7FF848F9E000
trusted library allocation
page read and write
20E18D10000
heap
page read and write
1BD92000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
2FD6000
trusted library allocation
page read and write
AE9000
heap
page read and write
1BA05000
heap
page read and write
109A000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
1BD4C000
heap
page read and write
1B140000
heap
page read and write
1340000
heap
page read and write
7FF848FAE000
trusted library allocation
page read and write
1257F000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
7FF848FBA000
trusted library allocation
page read and write
D56000
stack
page read and write
10F0000
trusted library allocation
page read and write
12783000
trusted library allocation
page read and write
7FF848E3C000
trusted library allocation
page execute and read and write
690000
heap
page read and write
674000
unkown
page readonly
7FF848DF4000
trusted library allocation
page read and write
CF0000
heap
page read and write
7FF848FBC000
trusted library allocation
page read and write
1BACF000
stack
page read and write
1BC50000
heap
page read and write
7FF848F2F000
trusted library allocation
page execute and read and write
1030000
heap
page read and write
7FF848FA6000
trusted library allocation
page read and write
7D0000
heap
page read and write
2637000
trusted library allocation
page read and write
2EA6000
trusted library allocation
page read and write
108E000
stack
page read and write
153F000
stack
page read and write
1BA2E000
stack
page read and write
DB0000
heap
page read and write
1B341000
stack
page read and write
1B82F000
stack
page read and write
1A5A0000
trusted library allocation
page read and write
12FA1000
trusted library allocation
page read and write
12E93000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
2A8FF06B000
heap
page read and write
FA9000
heap
page read and write
3045000
trusted library allocation
page read and write
20E18F80000
heap
page read and write
BC0000
heap
page read and write
127F8000
trusted library allocation
page read and write
2A8FF00A000
heap
page read and write
27C4000
trusted library allocation
page read and write
7FF848FAC000
trusted library allocation
page read and write
7FF848E33000
trusted library allocation
page read and write
13C0000
heap
page read and write
F70000
heap
page read and write
12A0000
trusted library allocation
page read and write
1260000
heap
page read and write
106C000
heap
page read and write
27F0000
trusted library allocation
page read and write
2A8FF01D000
heap
page read and write
7FF848E34000
trusted library allocation
page read and write
6AC000
heap
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
12FE000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
2CE0000
heap
page execute and read and write
702000
heap
page read and write
FD5000
heap
page read and write
2970000
trusted library allocation
page read and write
1BF63000
stack
page read and write
12C81000
trusted library allocation
page read and write
1B8B0000
heap
page read and write
2A8FF02E000
heap
page read and write
88E000
stack
page read and write
20E190A5000
heap
page read and write
7FF848F3F000
trusted library allocation
page execute and read and write
EC6000
heap
page read and write
2A8FF02F000
heap
page read and write
1BDA3000
stack
page read and write
7FF848EC6000
trusted library allocation
page read and write
7FF848F21000
trusted library allocation
page execute and read and write
105B000
heap
page read and write
1C2DD000
stack
page read and write
EF0000
heap
page read and write
850000
heap
page read and write
2F1C000
trusted library allocation
page read and write
12F83000
trusted library allocation
page read and write
1BA2B000
heap
page read and write
FCB000
heap
page read and write
7FF848FD3000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
1AFB0000
trusted library allocation
page read and write
1B85E000
stack
page read and write
2EE3000
trusted library allocation
page read and write
2A50000
heap
page execute and read and write
1ACA0000
trusted library allocation
page read and write
2A8FF05F000
heap
page read and write
1BCB9000
heap
page read and write
7FF848E07000
trusted library allocation
page read and write
1100000
heap
page read and write
2A8FF01B000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
6B2000
heap
page read and write
E85000
heap
page read and write
2898000
trusted library allocation
page read and write
1B550000
heap
page read and write
8C0000
heap
page read and write
1B9B3000
heap
page read and write
1C2E4000
heap
page read and write
7FF848F41000
trusted library allocation
page execute and read and write
7FF848E6C000
trusted library allocation
page execute and read and write
2C47000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
2A8FF055000
heap
page read and write
12F93000
trusted library allocation
page read and write
303C000
trusted library allocation
page read and write
20E18D00000
heap
page read and write
2BD4000
trusted library allocation
page read and write
32E2000
trusted library allocation
page read and write
1192000
heap
page read and write
1B5C6000
heap
page read and write
1495000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF848E04000
trusted library allocation
page read and write
7FF848F9E000
trusted library allocation
page read and write
1B720000
heap
page execute and read and write
1BBB3000
stack
page read and write
BB0000
heap
page read and write
2C13000
trusted library allocation
page read and write
6BA000
heap
page read and write
7C0000
heap
page read and write
1B45E000
stack
page read and write
1098000
heap
page read and write
901000
heap
page read and write
2BBB000
trusted library allocation
page read and write
1045000
heap
page read and write
930000
heap
page read and write
1195000
heap
page read and write
1BE7E000
stack
page read and write
1B84E000
stack
page read and write
28A4000
trusted library allocation
page read and write
DD0000
heap
page read and write
7FF848F44000
trusted library allocation
page execute and read and write
7FF848E23000
trusted library allocation
page read and write
1B9A5000
heap
page read and write
12D0000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
12C0000
trusted library allocation
page read and write
7FF848F1F000
trusted library allocation
page execute and read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF848E1D000
trusted library allocation
page execute and read and write
6BF000
heap
page read and write
7F0000
heap
page read and write
14CA000
heap
page read and write
12F0E000
trusted library allocation
page read and write
1179000
heap
page read and write
1BCF9000
heap
page read and write
13B0000
trusted library allocation
page read and write
7FF848E0C000
trusted library allocation
page read and write
2A8FFAD0000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
7FF848FB0000
trusted library allocation
page read and write
2D2B000
trusted library allocation
page read and write
1C2E0000
heap
page read and write
1B82E000
stack
page read and write
1880000
heap
page read and write
12A2D000
trusted library allocation
page read and write
1BC52000
heap
page read and write
7FF848F11000
trusted library allocation
page execute and read and write
95C000
heap
page read and write
1289E000
trusted library allocation
page read and write
32EE000
trusted library allocation
page read and write
1BC90000
heap
page read and write
2F0D000
trusted library allocation
page read and write
C5E000
heap
page read and write
2EA9000
trusted library allocation
page read and write
7FF848E1C000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
281C000
trusted library allocation
page read and write
12D1E000
trusted library allocation
page read and write
123F000
stack
page read and write
7FF848F47000
trusted library allocation
page execute and read and write
2D26000
trusted library allocation
page read and write
AD0000
heap
page read and write
7FF848E3C000
trusted library allocation
page read and write
2F80000
heap
page read and write
1B14E000
stack
page read and write
12B91000
trusted library allocation
page read and write
2A8FEFE0000
heap
page read and write
1BF5E000
stack
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF848FA1000
trusted library allocation
page read and write
32DF000
trusted library allocation
page read and write
17A0000
heap
page read and write
1B9A1000
heap
page read and write
2E70000
heap
page read and write
13F0000
trusted library allocation
page read and write
2D40000
heap
page execute and read and write
7FF848E13000
trusted library allocation
page execute and read and write
13B5000
heap
page read and write
1360000
trusted library allocation
page read and write
12E9D000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
AFF000
heap
page read and write
2A8FF6F0000
heap
page read and write
1B1FE000
stack
page read and write
1B94E000
stack
page read and write
2E80000
heap
page execute and read and write
7FF848EE6000
trusted library allocation
page execute and read and write
7FF848ECC000
trusted library allocation
page execute and read and write
7C5000
heap
page read and write
198F000
stack
page read and write
2A8FF02E000
heap
page read and write
7FF84903D000
trusted library allocation
page read and write
7FF849021000
trusted library allocation
page read and write
7FF848F4F000
trusted library allocation
page execute and read and write
7FF848FD1000
trusted library allocation
page read and write
A90000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF848FE0000
trusted library allocation
page read and write
2BA9000
trusted library allocation
page read and write
510000
unkown
page readonly
AEE000
stack
page read and write
670000
heap
page read and write
512000
unkown
page readonly
12F91000
trusted library allocation
page read and write
890000
heap
page read and write
12ED000
heap
page read and write
1BBA3000
stack
page read and write
29B0000
trusted library section
page read and write
14D0000
heap
page read and write
7FF848F31000
trusted library allocation
page execute and read and write
7FF848FB3000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
E92C9FF000
stack
page read and write
1B55E000
stack
page read and write
1BD2E000
stack
page read and write
7FF848E07000
trusted library allocation
page read and write
12F9D000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF848E14000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
E92C8FD000
stack
page read and write
3033000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
1BA01000
heap
page read and write
2D1D000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
8C6000
heap
page read and write
8FC000
heap
page read and write
1BA2E000
stack
page read and write
13238000
trusted library allocation
page read and write
3049000
trusted library allocation
page read and write
7FF848F1F000
trusted library allocation
page execute and read and write
7FF848E3C000
trusted library allocation
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
1060000
heap
page read and write
570000
heap
page read and write
2DF6000
trusted library allocation
page read and write
27BF000
trusted library allocation
page read and write
12781000
trusted library allocation
page read and write
267E000
stack
page read and write
1B4DA000
stack
page read and write
12EF000
stack
page read and write
1256E000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
2A10000
heap
page execute and read and write
7FF848DFD000
trusted library allocation
page execute and read and write
1B3DE000
stack
page read and write
7FF848E3B000
trusted library allocation
page execute and read and write
1156000
heap
page read and write
7FF848FDB000
trusted library allocation
page read and write
790000
heap
page read and write
2C9E000
trusted library allocation
page read and write
12F88000
trusted library allocation
page read and write
650000
heap
page read and write
1AAFD000
stack
page read and write
AF300FE000
stack
page read and write
7FF848E0C000
trusted library allocation
page read and write
12F91000
trusted library allocation
page read and write
105D000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
3048000
trusted library allocation
page read and write
990000
heap
page read and write
12D2E000
trusted library allocation
page read and write
1140000
heap
page read and write
2A8FF050000
heap
page read and write
7FF848EB6000
trusted library allocation
page read and write
7FF848FA6000
trusted library allocation
page read and write
3E0000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF848F9C000
trusted library allocation
page read and write
1B9E8000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
2D50000
heap
page read and write
1B75E000
stack
page read and write
1435000
heap
page read and write
303F000
trusted library allocation
page read and write
2B8A000
trusted library allocation
page read and write
2A8FF038000
heap
page read and write
12E68000
trusted library allocation
page read and write
1B44B000
stack
page read and write
7FF848FC3000
trusted library allocation
page read and write
AF1000
heap
page read and write
13E5000
heap
page read and write
8F0000
heap
page read and write
1C42B000
stack
page read and write
92B000
heap
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
7FF848F96000
trusted library allocation
page read and write
2A8FF016000
heap
page read and write
22C0000
heap
page execute and read and write
20E190A0000
heap
page read and write
7FF849090000
trusted library allocation
page execute and read and write
2A8FF030000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
F60000
heap
page execute and read and write
1B82F000
stack
page read and write
F50000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
29D0000
trusted library section
page read and write
7FF848E24000
trusted library allocation
page read and write
10FB000
heap
page read and write
2ED8000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
1430000
heap
page read and write
BF0000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
1BACE000
stack
page read and write
596000
stack
page read and write
FB0000
heap
page read and write
2A8FF038000
heap
page read and write
7FF848FA3000
trusted library allocation
page read and write
11E0000
heap
page read and write
FED000
heap
page read and write
124C3000
trusted library allocation
page read and write
7FF848FD3000
trusted library allocation
page read and write
27E0000
heap
page read and write
3B0000
heap
page read and write
CEC000
heap
page read and write
13E0000
heap
page read and write
2D80000
heap
page read and write
1B62F000
stack
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
ACC000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
12801000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
536000
stack
page read and write
E85000
heap
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
2509000
trusted library allocation
page read and write
1B653000
stack
page read and write
7FF848F8E000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page read and write
105D000
heap
page read and write
20E18D78000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
AC0000
heap
page read and write
1B31E000
stack
page read and write
EF6000
stack
page read and write
302A000
trusted library allocation
page read and write
1072000
heap
page read and write
2F1E000
stack
page read and write
124CD000
trusted library allocation
page read and write
7A0000
heap
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
7FF848E14000
trusted library allocation
page read and write
1BCBE000
stack
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
5E0000
heap
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
1400000
heap
page read and write
12E71000
trusted library allocation
page read and write
12C22000
trusted library allocation
page read and write
24A0000
heap
page execute and read and write
7FF848FCE000
trusted library allocation
page read and write
12788000
trusted library allocation
page read and write
850000
heap
page read and write
1BD6E000
stack
page read and write
7FF848FCB000
trusted library allocation
page read and write
1B244000
stack
page read and write
670000
unkown
page readonly
7FF84900D000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
B2A000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
AF304FF000
stack
page read and write
779000
heap
page read and write
1330000
trusted library allocation
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
F70000
trusted library section
page read and write
122F000
heap
page read and write
2A8FF038000
heap
page read and write
7FF848F8C000
trusted library allocation
page read and write
7FF848FB3000
trusted library allocation
page read and write
106E000
heap
page read and write
11F0000
heap
page read and write
1055000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
1058000
heap
page read and write
1BD69000
heap
page read and write
7FF848FB3000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
7FF848FCC000
trusted library allocation
page read and write
7FF848F34000
trusted library allocation
page execute and read and write
900000
heap
page read and write
3C0000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
F00000
heap
page read and write
12C71000
trusted library allocation
page read and write
7FF848E12000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
D90000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
1BEAE000
stack
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1BA39000
heap
page read and write
7FF848FA1000
trusted library allocation
page read and write
13B0000
heap
page read and write
2D20000
heap
page read and write
10F6000
stack
page read and write
7FF848E24000
trusted library allocation
page read and write
1055000
heap
page read and write
7FF848FCC000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848F9C000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF848F40000
trusted library allocation
page execute and read and write
1B9A7000
heap
page read and write
7FF848F37000
trusted library allocation
page execute and read and write
1BC95000
heap
page read and write
1BD29000
heap
page read and write
2EE9000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page read and write
AF2FD8A000
stack
page read and write
1016000
heap
page read and write
2570000
heap
page read and write
2A8FF067000
heap
page read and write
2A8FF016000
heap
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
7FF848FB6000
trusted library allocation
page read and write
7FF848FD1000
trusted library allocation
page read and write
1BA23000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
11F6000
heap
page read and write
12E31000
trusted library allocation
page read and write
1B44E000
stack
page read and write
1BCA2000
heap
page read and write
1235000
heap
page read and write
7FF848E13000
trusted library allocation
page read and write
2F16000
trusted library allocation
page read and write
1BF5F000
stack
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
1BDA1000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
1364000
heap
page read and write
1280000
trusted library allocation
page read and write
1C32E000
stack
page read and write
755000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
7FF848DE2000
trusted library allocation
page read and write
1BB5E000
stack
page read and write
2A8FF038000
heap
page read and write
8F0000
heap
page read and write
7FF848FA1000
trusted library allocation
page read and write
256F000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
7FF848F91000
trusted library allocation
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
1B9FB000
heap
page read and write
28AA000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
1038000
heap
page read and write
AEC000
heap
page read and write
1B30D000
stack
page read and write
127F3000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
17A5000
heap
page read and write
855000
heap
page read and write
7FF848FD1000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
1B9DE000
heap
page read and write
12E3D000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
1C05E000
stack
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1303E000
trusted library allocation
page read and write
24BE000
stack
page read and write
F50000
trusted library section
page read and write
1AFDE000
stack
page read and write
150B000
heap
page read and write
DA0000
heap
page read and write
1670000
heap
page read and write
12C73000
trusted library allocation
page read and write
124C1000
trusted library allocation
page read and write
14E1000
heap
page read and write
1028000
heap
page read and write
2D1A000
trusted library allocation
page read and write
7FF848E44000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
2A8FF007000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
14CE000
stack
page read and write
E92C3DA000
stack
page read and write
2A8FF06C000
heap
page read and write
2EE6000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
2BD2000
trusted library allocation
page read and write
12B98000
trusted library allocation
page read and write
1B4E0000
heap
page read and write
7FF848FD7000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
2D79000
trusted library allocation
page read and write
7FF848FF8000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
12E63000
trusted library allocation
page read and write
2A8FF02B000
heap
page read and write
1450000
trusted library allocation
page read and write
1372E000
trusted library allocation
page read and write
1B55E000
stack
page read and write
C64000
heap
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
6FD000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1640000
heap
page execute and read and write
32D9000
trusted library allocation
page read and write
1BC23000
stack
page read and write
7FF848FBC000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page read and write
7FF848F24000
trusted library allocation
page execute and read and write
1B82E000
stack
page read and write
2B80000
heap
page read and write
6CE000
heap
page read and write
1BBA0000
heap
page execute and read and write
1BC2E000
stack
page read and write
F85000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
919000
heap
page read and write
820000
heap
page read and write
1B260000
trusted library allocation
page read and write
127F1000
trusted library allocation
page read and write
7FF849011000
trusted library allocation
page read and write
7D0000
heap
page read and write
1327000
heap
page read and write
800000
heap
page read and write
1B8F0000
heap
page execute and read and write
1B24E000
stack
page read and write
1BEAE000
stack
page read and write
15DE000
stack
page read and write
2990000
trusted library section
page read and write
7FF848DF7000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page execute and read and write
7FF848FF0000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF848FAA000
trusted library allocation
page read and write
E68000
heap
page read and write
1B753000
stack
page read and write
1B92E000
stack
page read and write
2EDB000
trusted library allocation
page read and write
B8F000
stack
page read and write
FAB000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
1085000
heap
page read and write
1B9AE000
stack
page read and write
E92CCFE000
stack
page read and write
7FF848F9B000
trusted library allocation
page read and write
7FF848FFD000
trusted library allocation
page read and write
7FF848FBB000
trusted library allocation
page read and write
1BAAE000
stack
page read and write
11CF000
stack
page read and write
E80000
trusted library allocation
page read and write
8B5000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
C30000
heap
page read and write
7FF848E17000
trusted library allocation
page read and write
1000000
heap
page read and write
1B95E000
stack
page read and write
2D2F000
trusted library allocation
page read and write
1C060000
heap
page read and write
7FF848FAE000
trusted library allocation
page read and write
FDD000
heap
page read and write
1BBFE000
stack
page read and write
95A000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
1BDBE000
stack
page read and write
7FF848E37000
trusted library allocation
page read and write
1490000
heap
page execute and read and write
7FF848F10000
trusted library allocation
page execute and read and write
7FF848FB6000
trusted library allocation
page read and write
2FC9000
trusted library allocation
page read and write
7FF848EB6000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
1780000
trusted library allocation
page read and write
1AF3F000
stack
page read and write
1BA44000
heap
page read and write
2A8FF001000
heap
page read and write
124C8000
trusted library allocation
page read and write
130CA000
trusted library allocation
page read and write
11B0000
heap
page read and write
1BCED000
heap
page read and write
20E18DA6000
heap
page read and write
2771000
trusted library allocation
page read and write
7FF848EB6000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page read and write
125B000
heap
page read and write
10C5000
heap
page read and write
1885000
heap
page read and write
2A8FF009000
heap
page read and write
7FF848F8C000
trusted library allocation
page read and write
7FF848E17000
trusted library allocation
page read and write
1260000
heap
page read and write
256C000
trusted library allocation
page read and write
13231000
trusted library allocation
page read and write
1190000
heap
page read and write
7FF848F41000
trusted library allocation
page execute and read and write
7FF848E13000
trusted library allocation
page read and write
E7B000
heap
page read and write
12C3E000
trusted library allocation
page read and write
1B210000
heap
page read and write
1020000
heap
page read and write
1C16A000
stack
page read and write
12C9000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
289E000
trusted library allocation
page read and write
7FF848F2F000
trusted library allocation
page execute and read and write
12A27000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
2581000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
7FF848E1C000
trusted library allocation
page read and write
12FA1000
trusted library allocation
page read and write
F75000
heap
page read and write
F80000
heap
page read and write
1510000
heap
page read and write
11FC000
heap
page read and write
7FF848F17000
trusted library allocation
page execute and read and write
2E7E000
stack
page read and write
7FF848FF0000
trusted library allocation
page read and write
1B995000
heap
page read and write
1BC77000
heap
page read and write
14AC000
heap
page read and write
1BB50000
heap
page execute and read and write
EE0000
heap
page read and write
2C5E000
stack
page read and write
7FF8490C0000
trusted library allocation
page execute and read and write
7FF848FC0000
trusted library allocation
page read and write
1320000
heap
page read and write
AF301FF000
stack
page read and write
7FF848E07000
trusted library allocation
page read and write
BEE000
stack
page read and write
2A8FF054000
heap
page read and write
7FF848E4B000
trusted library allocation
page execute and read and write
7FF848F24000
trusted library allocation
page execute and read and write
7FF848EDC000
trusted library allocation
page execute and read and write
7FF848F8A000
trusted library allocation
page read and write
1B9BF000
stack
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
1BC30000
heap
page execute and read and write
AF305FF000
stack
page read and write
12F98000
trusted library allocation
page read and write
7FF848FE3000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
2819000
trusted library allocation
page read and write
C5C000
heap
page read and write
12E98000
trusted library allocation
page read and write
B01000
heap
page read and write
1080000
heap
page read and write
2A8FF016000
heap
page read and write
12FF000
stack
page read and write
6D0000
heap
page read and write
1B7A0000
heap
page execute and read and write
12B9D000
trusted library allocation
page read and write
7FF848EA6000
trusted library allocation
page read and write
1BDAE000
stack
page read and write
7FF848EA6000
trusted library allocation
page read and write
BEF000
stack
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
12A5000
heap
page read and write
FAD000
heap
page read and write
2F0A000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
FD8000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
7FF848E03000
trusted library allocation
page execute and read and write
7FF848F17000
trusted library allocation
page execute and read and write
7FF848E9C000
trusted library allocation
page execute and read and write
2A8FF1E0000
heap
page read and write
1B04F000
stack
page read and write
F78000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
12F93000
trusted library allocation
page read and write
10F3000
heap
page read and write
2A8FF05D000
heap
page read and write
699000
heap
page read and write
13BF000
stack
page read and write
1B9C4000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
1C05E000
stack
page read and write
BA0000
heap
page execute and read and write
7FF849020000
trusted library allocation
page read and write
7FF848F27000
trusted library allocation
page execute and read and write
DA6000
stack
page read and write
1120000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
8A0000
trusted library allocation
page read and write
11A0000
trusted library allocation
page read and write
7FF848E22000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
1278D000
trusted library allocation
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
7FF848EE0000
trusted library allocation
page execute and read and write
BE0000
heap
page read and write
B2E000
heap
page read and write
7FF848E2C000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
127FD000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
2CB0000
heap
page read and write
1240000
heap
page read and write
1BDB7000
heap
page read and write
7FF848E13000
trusted library allocation
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
840000
trusted library allocation
page read and write
7FF848F1F000
trusted library allocation
page execute and read and write
D16000
stack
page read and write
7FF848FC0000
trusted library allocation
page read and write
1B74E000
stack
page read and write
2A8FF062000
heap
page read and write
1BE2E000
stack
page read and write
91C000
heap
page read and write
1BB2E000
stack
page read and write
1B95E000
stack
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
2E5E000
stack
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF848ECC000
trusted library allocation
page execute and read and write
2A8FF016000
heap
page read and write
7FF848E27000
trusted library allocation
page read and write
296E000
stack
page read and write
F40000
heap
page read and write
13EF000
stack
page read and write
1B50D000
stack
page read and write
7FF848E27000
trusted library allocation
page read and write
1B51C000
stack
page read and write
7FF849000000
trusted library allocation
page read and write
2EDE000
trusted library allocation
page read and write
7FF848E17000
trusted library allocation
page read and write
1C1CE000
stack
page read and write
12B93000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page read and write
1BC60000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
2A8FF02E000
heap
page read and write
1B520000
heap
page execute and read and write
7FF848FD6000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
745000
heap
page read and write
1BE53000
stack
page read and write
1015000
heap
page read and write
7FF848F54000
trusted library allocation
page execute and read and write
7FF848F83000
trusted library allocation
page read and write
7FF848F31000
trusted library allocation
page execute and read and write
1BF7B000
stack
page read and write
756000
stack
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
C15000
heap
page read and write
1B95E000
stack
page read and write
E10000
heap
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
1B997000
heap
page read and write
1BB24000
stack
page read and write
1B855000
stack
page read and write
EF6000
stack
page read and write
7FF848E03000
trusted library allocation
page read and write
7FF848E37000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1B63E000
stack
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
1BD7F000
heap
page read and write
FD6000
heap
page read and write
F70000
heap
page read and write
7FF848E2C000
trusted library allocation
page read and write
27C2000
trusted library allocation
page read and write
EC8000
heap
page read and write
1BC5F000
stack
page read and write
7FF848E07000
trusted library allocation
page read and write
2DCD000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7FF848E96000
trusted library allocation
page read and write
12EDE000
trusted library allocation
page read and write
12E33000
trusted library allocation
page read and write
7FF84906B000
trusted library allocation
page read and write
7FF848FC6000
trusted library allocation
page read and write
14BF000
stack
page read and write
3030000
trusted library allocation
page read and write
F80000
trusted library allocation
page read and write
1B9A9000
heap
page read and write
1675000
heap
page read and write
1A4F0000
trusted library allocation
page read and write
A30000
heap
page execute and read and write
A90000
heap
page read and write
1329000
heap
page read and write
1323D000
trusted library allocation
page read and write
275B000
trusted library allocation
page read and write
2A8FF03A000
heap
page read and write
2D25000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
2A8FF001000
heap
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
1052000
heap
page read and write
1257D000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
12EA1000
trusted library allocation
page read and write
2D28000
trusted library allocation
page read and write
7FF848FC1000
trusted library allocation
page read and write
7FF849001000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
1B581000
heap
page read and write
20E18D30000
heap
page read and write
11F0000
heap
page read and write
12F5000
heap
page read and write
2F13000
trusted library allocation
page read and write
28A7000
trusted library allocation
page read and write
13241000
trusted library allocation
page read and write
AF306FF000
stack
page read and write
1B11D000
stack
page read and write
1BB24000
stack
page read and write
1BD13000
heap
page read and write
E80000
heap
page read and write
2F11000
trusted library allocation
page read and write
B90000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
1282E000
trusted library allocation
page read and write
1B350000
heap
page execute and read and write
968000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
7FF848FC6000
trusted library allocation
page read and write
1BCAB000
stack
page read and write
7FF848FAC000
trusted library allocation
page read and write
7FF848FC3000
trusted library allocation
page read and write
1BC5F000
stack
page read and write
32E8000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF848F9E000
trusted library allocation
page read and write
1000000
heap
page read and write
7FF848F07000
trusted library allocation
page execute and read and write
5D0000
heap
page read and write
1AEC0000
trusted library allocation
page read and write
1AED0000
heap
page read and write
1310000
heap
page read and write
1BE2E000
stack
page read and write
2F10000
trusted library allocation
page read and write
7FF848DFC000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
2A8FEFE8000
heap
page read and write
E9B000
heap
page read and write
12E41000
trusted library allocation
page read and write
C10000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
1AFC0000
trusted library allocation
page read and write
E95000
heap
page read and write
254F000
stack
page read and write
1219000
heap
page read and write
2A8FF038000
heap
page read and write
1302E000
trusted library allocation
page read and write
C10000
heap
page read and write
2A8FEFD0000
heap
page read and write
FB9000
heap
page read and write
127F000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
2A8FF067000
heap
page read and write
7FF84907B000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1B3ED000
stack
page read and write
7FF848FD0000
trusted library allocation
page read and write
EEA000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
1C0AE000
stack
page read and write
2A8FF066000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
1159000
heap
page read and write
1B9AD000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1240000
heap
page read and write
7FF848FA6000
trusted library allocation
page read and write
7FF848E0B000
trusted library allocation
page execute and read and write
1B450000
heap
page read and write
124D1000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
12B5000
heap
page read and write
1B0DE000
stack
page read and write
7FF848FF1000
trusted library allocation
page read and write
1A7B0000
trusted library allocation
page read and write
2550000
heap
page read and write
932000
heap
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
1B1D3000
stack
page read and write
7FF848F17000
trusted library allocation
page execute and read and write
7FF848FA3000
trusted library allocation
page read and write
7FF848F3F000
trusted library allocation
page execute and read and write
1AD0D000
stack
page read and write
905000
heap
page read and write
2A8FF071000
heap
page read and write
1BD2E000
stack
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF848FB1000
trusted library allocation
page read and write
1020000
heap
page read and write
FB0000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
8FF000
heap
page read and write
10E1000
heap
page read and write
277F000
stack
page read and write
12E91000
trusted library allocation
page read and write
126BA000
trusted library allocation
page read and write
1BD3C000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
1AA4D000
stack
page read and write
7B6000
stack
page read and write
7FF848E3B000
trusted library allocation
page execute and read and write
1BA54000
heap
page read and write
2B5F000
stack
page read and write
B64000
heap
page read and write
2A8FF050000
heap
page read and write
C15000
heap
page read and write
12B0000
heap
page read and write
7FF848E1C000
trusted library allocation
page read and write
2E2E000
stack
page read and write
137F000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848EC0000
trusted library allocation
page read and write
7FF848E33000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
1140000
trusted library allocation
page read and write
E0E000
stack
page read and write
105B000
heap
page read and write
28A1000
trusted library allocation
page read and write
1AFAD000
stack
page read and write
510000
unkown
page readonly
105F000
stack
page read and write
7FF848FC0000
trusted library allocation
page read and write
1018000
heap
page read and write
D40000
heap
page read and write
1AF40000
heap
page execute and read and write
2506000
trusted library allocation
page read and write
7FF848FC7000
trusted library allocation
page read and write
3036000
trusted library allocation
page read and write
12973000
trusted library allocation
page read and write
2C4F000
stack
page read and write
1BD8E000
heap
page read and write
7FF848FBE000
trusted library allocation
page read and write
A0F000
stack
page read and write
12E6D000
trusted library allocation
page read and write
1B9C0000
heap
page read and write
F0F000
heap
page read and write
13233000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
7FF848EA0000
trusted library allocation
page execute and read and write
7FF849080000
trusted library allocation
page read and write
7FF848F9C000
trusted library allocation
page read and write
136F000
heap
page read and write
E60000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
7FF84904D000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
A00000
heap
page read and write
7FF848ED6000
trusted library allocation
page read and write
2A8FF064000
heap
page read and write
12E38000
trusted library allocation
page read and write
10C0000
heap
page read and write
7FF848FAC000
trusted library allocation
page read and write
29C0000
trusted library section
page read and write
278D000
trusted library allocation
page read and write
1B720000
heap
page execute and read and write
1315000
heap
page read and write
DE6000
stack
page read and write
7FF848DF0000
trusted library allocation
page read and write
2A8FF1F0000
heap
page read and write
1AA50000
trusted library allocation
page read and write
12C7D000
trusted library allocation
page read and write
BF6000
heap
page read and write
7FF848E06000
trusted library allocation
page read and write
1BA4B000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
1AE8F000
stack
page read and write
1B72E000
stack
page read and write
12571000
trusted library allocation
page read and write
24BE000
stack
page read and write
1B99F000
heap
page read and write
2CD0000
heap
page read and write
1190000
heap
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
2A8FF02C000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
23B0000
heap
page read and write
7FF848F24000
trusted library allocation
page execute and read and write
7FF848DF2000
trusted library allocation
page read and write
1B7BC000
stack
page read and write
AC6000
heap
page read and write
2A30000
heap
page read and write
1B8AE000
stack
page read and write
275D000
trusted library allocation
page read and write
118D000
heap
page read and write
13C5000
heap
page read and write
AF307FF000
stack
page read and write
1BABE000
stack
page read and write
C32000
heap
page read and write
12F9D000
trusted library allocation
page read and write
27B4000
trusted library allocation
page read and write
12F3E000
trusted library allocation
page read and write
1B34E000
stack
page read and write
32E5000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
2ED4000
trusted library allocation
page read and write
1B2DE000
stack
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848FB3000
trusted library allocation
page read and write
7FF848F21000
trusted library allocation
page execute and read and write
302D000
trusted library allocation
page read and write
2A8FF055000
heap
page read and write
2A8FF030000
heap
page read and write
176F000
stack
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
1176000
stack
page read and write
7FF848FD3000
trusted library allocation
page read and write
2A8FF03B000
heap
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
11C1000
heap
page read and write
1BEBE000
stack
page read and write
7FF848F0F000
trusted library allocation
page execute and read and write
7FF848E00000
trusted library allocation
page read and write
1110000
heap
page read and write
1303E000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
7FF848FE8000
trusted library allocation
page read and write
2970000
trusted library section
page read and write
1261E000
trusted library allocation
page read and write
2A8FEFFC000
heap
page read and write
2AC0000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF848EA6000
trusted library allocation
page read and write
2A8FF030000
heap
page read and write
2EED000
trusted library allocation
page read and write
D8F000
stack
page read and write
2A8FF071000
heap
page read and write
DE0000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF848E34000
trusted library allocation
page read and write
E60000
trusted library allocation
page read and write
7FF848DFC000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page read and write
1B65E000
stack
page read and write
7FF848FB3000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
1150000
heap
page read and write
1BD54000
heap
page read and write
274D000
trusted library allocation
page read and write
DE0000
heap
page read and write
7FF848F21000
trusted library allocation
page execute and read and write
1360000
trusted library allocation
page read and write
2C60000
heap
page read and write
7FF848E0C000
trusted library allocation
page read and write
7FF848FAB000
trusted library allocation
page read and write
C1B000
heap
page read and write
20E190AB000
heap
page read and write
E20000
heap
page read and write
1C22D000
stack
page read and write
7FF848EA6000
trusted library allocation
page read and write
2F1F000
trusted library allocation
page read and write
D90000
heap
page read and write
6F6000
stack
page read and write
774000
heap
page read and write
DD0000
heap
page read and write
1B543000
stack
page read and write
2E90000
heap
page execute and read and write
1B54E000
stack
page read and write
E40000
heap
page read and write
A95000
heap
page read and write
12A21000
trusted library allocation
page read and write
7FF848FC1000
trusted library allocation
page read and write
1A820000
trusted library allocation
page read and write
2707000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
1B3EF000
stack
page read and write
104D000
heap
page read and write
7FF848E96000
trusted library allocation
page read and write
1AD7D000
stack
page read and write
7FF848E03000
trusted library allocation
page read and write
2A8FF055000
heap
page read and write
E92CBFF000
stack
page read and write
2A8FF058000
heap
page read and write
12D1E000
trusted library allocation
page read and write
1C064000
stack
page read and write
1B92F000
stack
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
7FF848E23000
trusted library allocation
page execute and read and write
132DE000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
1230000
heap
page read and write
14A6000
heap
page read and write
2990000
trusted library allocation
page read and write
1B64E000
stack
page read and write
1BD84000
heap
page read and write
7FF45C9D0000
trusted library allocation
page execute and read and write
289B000
trusted library allocation
page read and write
2C0B000
trusted library allocation
page read and write
7FF848E2C000
trusted library allocation
page read and write
7FF848F9C000
trusted library allocation
page read and write
961000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
1BD6B000
heap
page read and write
AF303FF000
stack
page read and write
7FF848E4D000
trusted library allocation
page execute and read and write
1BD7D000
stack
page read and write
1BD54000
stack
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
12791000
trusted library allocation
page read and write
2B14000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
2A8FF061000
heap
page read and write
1AE90000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
7FF848E03000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page execute and read and write
108B000
heap
page read and write
134F000
stack
page read and write
7FF848DE4000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
20E18D70000
heap
page read and write
1BA13000
heap
page read and write
1B93D000
stack
page read and write
12C0000
heap
page read and write
1204000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
14BE000
stack
page read and write
1210000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
7FF848E34000
trusted library allocation
page read and write
272E000
stack
page read and write
2652000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1BA2E000
stack
page read and write
2CEA000
trusted library allocation
page read and write
1B51D000
stack
page read and write
1087000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
2B40000
heap
page execute and read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF848FD0000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
2F70000
heap
page read and write
322F000
stack
page read and write
12FB000
heap
page read and write
1BD53000
stack
page read and write
1B860000
heap
page execute and read and write
7FF848FBE000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
12F0000
heap
page read and write
1BCAE000
stack
page read and write
7FF848E27000
trusted library allocation
page read and write
7FF848FC3000
trusted library allocation
page read and write
1800000
heap
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
7FF848DF3000
trusted library allocation
page execute and read and write
7FF848DED000
trusted library allocation
page execute and read and write
1380000
trusted library allocation
page read and write
1B73E000
unkown
page read and write
7FF849040000
trusted library allocation
page execute and read and write
7FF848E44000
trusted library allocation
page read and write
1AE60000
trusted library allocation
page read and write
8B0000
heap
page read and write
1BCD2000
heap
page read and write
1B950000
heap
page read and write
28AD000
trusted library allocation
page read and write
12F8D000
trusted library allocation
page read and write
1C26E000
stack
page read and write
2E8E000
stack
page read and write
278F000
trusted library allocation
page read and write
1B960000
heap
page read and write
2837000
trusted library allocation
page read and write
15BE000
stack
page read and write
7FF848FD1000
trusted library allocation
page read and write
2EE1000
trusted library allocation
page read and write
12BA1000
trusted library allocation
page read and write
FEB000
heap
page read and write
7FF848FBC000
trusted library allocation
page read and write
12A28000
trusted library allocation
page read and write
7FF848E3C000
trusted library allocation
page execute and read and write
7FF848E0D000
trusted library allocation
page execute and read and write
14D5000
heap
page read and write
11C0000
heap
page read and write
2A8FF1E5000
heap
page read and write
1BE6E000
stack
page read and write
7FF848E14000
trusted library allocation
page read and write
32DC000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
292E000
stack
page read and write
7FF848DE0000
trusted library allocation
page read and write
There are 1290 hidden memdumps, click here to show them.