Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Pnihosiyvr.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\sssssssssssssssss.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_6f7dcd1940ace3d3d06544b01a852bbab5b6d4_9e133ab6_1cc90496-baf4-4257-a69f-6b76b5dbc299\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2BA4.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu Apr 11 09:32:37 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2D4B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2D7B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MSBuild.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Pnihosiyvr.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sssssssssssssssss.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Roaming\sssssssssssssssss.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Pnihosiyvr.exe
|
"C:\Users\user\Desktop\Pnihosiyvr.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
|
||
C:\Users\user\AppData\Roaming\sssssssssssssssss.exe
|
"C:\Users\user\AppData\Roaming\sssssssssssssssss.exe"
|
||
C:\Users\user\AppData\Roaming\sssssssssssssssss.exe
|
"C:\Users\user\AppData\Roaming\sssssssssssssssss.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 2128 -s 1412
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\choice.exe
|
choice /C Y /N /D Y /T 3
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://checkip.dyndns.org/
|
158.101.44.242
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://cdn.discordapp.com/attachments/1223189307423064096/1227506231204253746/Vfjvqmgnpj.mp3?ex=662
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
https://cdn.discordapp.com/attachments/1223189307423064096/1227506231204253746/Vfjvqmgnpj.mp3?ex=6628a743&is=66163243&hm=e36bea9e5aea3063f473ba3c29865ff160adc592430b1e4958d27899b61679dc&
|
162.159.135.233
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://scratchdreams.tk
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
http://crl.microsoftS
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://reallyfreegeoip.org/xml/156.146.36.197
|
172.67.177.134
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
https://cdn.discordapp.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://reallyfreegeoip.org/xml/156.146.36.197p
|
unknown
|
||
http://checkip.dyndns.org/P6
|
unknown
|
||
http://checkip.dyndns.org/A
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 14 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
checkip.dyndns.com
|
158.101.44.242
|
||
checkip.dyndns.org
|
unknown
|
||
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
cdn.discordapp.com
|
162.159.135.233
|
||
reallyfreegeoip.org
|
172.67.177.134
|
||
fp2e7a.wpc.phicdn.net
|
192.229.211.108
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
158.101.44.242
|
checkip.dyndns.com
|
United States
|
||
162.159.135.233
|
cdn.discordapp.com
|
United States
|
||
172.67.177.134
|
reallyfreegeoip.org
|
United States
|
||
162.159.134.233
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Pnihosiyvr_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
sssssssssssssssss
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MSBuild_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
ProgramId
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
FileId
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
LowerCaseLongPath
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
LongPathHash
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
Name
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
OriginalFileName
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
Publisher
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
Version
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
BinFileVersion
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
BinaryType
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
ProductName
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
ProductVersion
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
LinkDate
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
BinProductVersion
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
AppxPackageFullName
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
Size
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
Language
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
IsOsComponent
|
||
\REGISTRY\A\{689786b0-b931-f580-ef86-5329d425eed2}\Root\InventoryApplicationFile\msbuild.exe|d51fd18b57a7d7c0
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sssssssssssssssss_RASMANCS
|
FileDirectory
|
There are 53 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1A34568A000
|
heap
|
page read and write
|
||
1A33CFF1000
|
trusted library allocation
|
page read and write
|
||
16180001000
|
trusted library allocation
|
page read and write
|
||
1D298BAB000
|
trusted library allocation
|
page read and write
|
||
1D2B1430000
|
heap
|
page read and write
|
||
1D2A9703000
|
trusted library allocation
|
page read and write
|
||
20A90DE1000
|
trusted library allocation
|
page read and write
|
||
1A32CC78000
|
trusted library allocation
|
page read and write
|
||
1D298AE8000
|
trusted library allocation
|
page read and write
|
||
1A32CC01000
|
trusted library allocation
|
page read and write
|
||
1A33D6EA000
|
trusted library allocation
|
page read and write
|
||
1D2A9582000
|
trusted library allocation
|
page read and write
|
||
1D298B45000
|
trusted library allocation
|
page read and write
|
||
20A80380000
|
trusted library allocation
|
page read and write
|
||
18357C03000
|
trusted library allocation
|
page read and write
|
||
1D2A98B0000
|
trusted library allocation
|
page read and write
|
||
20A80001000
|
trusted library allocation
|
page read and write
|
||
2592BEA1000
|
trusted library allocation
|
page read and write
|
||
183579D1000
|
trusted library allocation
|
page read and write
|
||
1A3456F0000
|
trusted library section
|
page read and write
|
||
1A33D91A000
|
trusted library allocation
|
page read and write
|
||
140002000
|
remote allocation
|
page execute and read and write
|
||
1A32CB00000
|
trusted library section
|
page read and write
|
||
1D2987F1000
|
trusted library allocation
|
page read and write
|
||
1A32CF85000
|
trusted library allocation
|
page read and write
|
||
20A80078000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
140000000
|
remote allocation
|
page execute and read and write
|
||
18357AC4000
|
trusted library allocation
|
page read and write
|
||
67074FE000
|
stack
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
161F9AD3000
|
trusted library allocation
|
page read and write
|
||
20AF7670000
|
heap
|
page execute and read and write
|
||
1A3454A0000
|
heap
|
page execute and read and write
|
||
7FF848E4B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8492B6000
|
trusted library allocation
|
page read and write
|
||
1837026B000
|
heap
|
page read and write
|
||
12D90B00000
|
heap
|
page read and write
|
||
12D90DE0000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
7FF8492B9000
|
trusted library allocation
|
page read and write
|
||
20A806A1000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
2592BE20000
|
heap
|
page execute and read and write
|
||
328133F000
|
stack
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
161F9AD0000
|
trusted library allocation
|
page read and write
|
||
161FBD44000
|
heap
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
7FF8492AE000
|
trusted library allocation
|
page read and write
|
||
25944820000
|
heap
|
page read and write
|
||
1D296CB1000
|
heap
|
page read and write
|
||
692A3FE000
|
stack
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
1A32B2A0000
|
trusted library allocation
|
page read and write
|
||
18356020000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
7FF849038000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
18357B66000
|
trusted library allocation
|
page read and write
|
||
9187DFE000
|
stack
|
page read and write
|
||
7FF848F95000
|
trusted library allocation
|
page read and write
|
||
1A32B090000
|
heap
|
page read and write
|
||
1D296E95000
|
heap
|
page read and write
|
||
24205DF0000
|
heap
|
page read and write
|
||
1D2A87F1000
|
trusted library allocation
|
page read and write
|
||
3281DFE000
|
stack
|
page read and write
|
||
1A32B030000
|
heap
|
page read and write
|
||
12D90DD0000
|
heap
|
page read and write
|
||
20A90AEA000
|
trusted library allocation
|
page read and write
|
||
161F9890000
|
trusted library allocation
|
page read and write
|
||
20AF54C0000
|
heap
|
page execute and read and write
|
||
6707CFE000
|
stack
|
page read and write
|
||
7FF849330000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
20AF52A0000
|
heap
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
1A32AF40000
|
unkown
|
page readonly
|
||
20AF5200000
|
heap
|
page read and write
|
||
161F98C0000
|
heap
|
page read and write
|
||
7FF8492C0000
|
trusted library allocation
|
page read and write
|
||
20A90D1A000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
18355E1D000
|
heap
|
page read and write
|
||
1A33CC0C000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
161F9B75000
|
heap
|
page read and write
|
||
1D2A89E1000
|
trusted library allocation
|
page read and write
|
||
161F9720000
|
heap
|
page read and write
|
||
18357B6E000
|
trusted library allocation
|
page read and write
|
||
20A80066000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
91871FE000
|
stack
|
page read and write
|
||
67077FD000
|
stack
|
page read and write
|
||
7FF848E33000
|
trusted library allocation
|
page read and write
|
||
2592A32D000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8492B0000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E4B000
|
trusted library allocation
|
page execute and read and write
|
||
161F9840000
|
heap
|
page read and write
|
||
16180150000
|
trusted library allocation
|
page read and write
|
||
1A32B050000
|
heap
|
page read and write
|
||
1D298E85000
|
trusted library allocation
|
page read and write
|
||
20A903F1000
|
trusted library allocation
|
page read and write
|
||
6929FF2000
|
stack
|
page read and write
|
||
7FF848FAE000
|
trusted library allocation
|
page read and write
|
||
20AF52CC000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
3282DFF000
|
stack
|
page read and write
|
||
7FF849041000
|
trusted library allocation
|
page read and write
|
||
7FF849294000
|
trusted library allocation
|
page read and write
|
||
24205DE0000
|
heap
|
page read and write
|
||
2592A570000
|
heap
|
page read and write
|
||
692CFFF000
|
stack
|
page read and write
|
||
7FF8492F5000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
18355DB5000
|
heap
|
page read and write
|
||
C3999FE000
|
stack
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
7FF848E4D000
|
trusted library allocation
|
page execute and read and write
|
||
1619000D000
|
trusted library allocation
|
page read and write
|
||
1A345625000
|
heap
|
page read and write
|
||
18355D50000
|
heap
|
page read and write
|
||
2592A3CB000
|
heap
|
page read and write
|
||
C39A3FF000
|
stack
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
1D296E90000
|
heap
|
page read and write
|
||
18357B2A000
|
trusted library allocation
|
page read and write
|
||
7FF848F9E000
|
trusted library allocation
|
page read and write
|
||
F2B730C000
|
stack
|
page read and write
|
||
7FF849310000
|
trusted library allocation
|
page read and write
|
||
1A32B010000
|
heap
|
page read and write
|
||
15B23FF000
|
unkown
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1A33CC0F000
|
trusted library allocation
|
page read and write
|
||
1D298E71000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
20A90D0D000
|
trusted library allocation
|
page read and write
|
||
20AF5420000
|
heap
|
page read and write
|
||
7FF8492EF000
|
trusted library allocation
|
page read and write
|
||
18357B72000
|
trusted library allocation
|
page read and write
|
||
8064EED000
|
stack
|
page read and write
|
||
183679D1000
|
trusted library allocation
|
page read and write
|
||
1D2A8E29000
|
trusted library allocation
|
page read and write
|
||
20A90EC0000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
692AFFD000
|
stack
|
page read and write
|
||
1D298E7C000
|
trusted library allocation
|
page read and write
|
||
1A32AF70000
|
unkown
|
page readonly
|
||
18355E4B000
|
heap
|
page read and write
|
||
24205DB0000
|
heap
|
page read and write
|
||
20A90639000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
8065AFE000
|
stack
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
161FB3A0000
|
heap
|
page execute and read and write
|
||
20A8068C000
|
trusted library allocation
|
page read and write
|
||
7FF849048000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
20AF770B000
|
heap
|
page read and write
|
||
20A9072A000
|
trusted library allocation
|
page read and write
|
||
15B24FF000
|
stack
|
page read and write
|
||
161FBD85000
|
heap
|
page read and write
|
||
7FF848E4D000
|
trusted library allocation
|
page execute and read and write
|
||
91865FE000
|
stack
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
2592BFB0000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1837024F000
|
heap
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
20AF5269000
|
heap
|
page read and write
|
||
161F9AE0000
|
heap
|
page read and write
|
||
2592A395000
|
heap
|
page read and write
|
||
18355F10000
|
trusted library allocation
|
page read and write
|
||
1A32B0FD000
|
heap
|
page read and write
|
||
692A7FE000
|
stack
|
page read and write
|
||
1A345627000
|
heap
|
page read and write
|
||
32829FD000
|
stack
|
page read and write
|
||
7FF8492EA000
|
trusted library allocation
|
page read and write
|
||
2593BEB1000
|
trusted library allocation
|
page read and write
|
||
32839FF000
|
stack
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
80659FE000
|
stack
|
page read and write
|
||
7FF848FC3000
|
trusted library allocation
|
page read and write
|
||
24205E58000
|
heap
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
18355E0D000
|
heap
|
page read and write
|
||
1A32D296000
|
trusted library allocation
|
page read and write
|
||
12D90DD5000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
20AF5288000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
7FF8492F0000
|
trusted library allocation
|
page read and write
|
||
1D296CD9000
|
heap
|
page read and write
|
||
1D2A8E01000
|
trusted library allocation
|
page read and write
|
||
7FF848FA5000
|
trusted library allocation
|
page read and write
|
||
16190001000
|
trusted library allocation
|
page read and write
|
||
20AF5352000
|
heap
|
page read and write
|
||
67075FE000
|
stack
|
page read and write
|
||
7FF8492C0000
|
trusted library allocation
|
page read and write
|
||
7FF849319000
|
trusted library allocation
|
page read and write
|
||
20AF5370000
|
trusted library allocation
|
page read and write
|
||
7FF8491AA000
|
trusted library allocation
|
page read and write
|
||
20AF7035000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
20AF5100000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
18355EF0000
|
trusted library allocation
|
page read and write
|
||
7FF8492E0000
|
trusted library allocation
|
page read and write
|
||
18357B76000
|
trusted library allocation
|
page read and write
|
||
2592A318000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
1D298E8F000
|
trusted library allocation
|
page read and write
|
||
18357930000
|
heap
|
page execute and read and write
|
||
18357B95000
|
trusted library allocation
|
page read and write
|
||
7FF8492D0000
|
trusted library allocation
|
page read and write
|
||
2592BF97000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page execute and read and write
|
||
18357AFC000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1D298A61000
|
trusted library allocation
|
page read and write
|
||
12D90C00000
|
heap
|
page read and write
|
||
2592BFB3000
|
trusted library allocation
|
page read and write
|
||
67079FE000
|
stack
|
page read and write
|
||
1D2B1126000
|
heap
|
page read and write
|
||
161F9820000
|
heap
|
page read and write
|
||
7FF8492AE000
|
trusted library allocation
|
page read and write
|
||
1A32D285000
|
trusted library allocation
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
161F9800000
|
heap
|
page read and write
|
||
20AF5425000
|
heap
|
page read and write
|
||
16180142000
|
trusted library allocation
|
page read and write
|
||
1D2A94FD000
|
trusted library allocation
|
page read and write
|
||
91885FD000
|
stack
|
page read and write
|
||
7FF848E19000
|
trusted library allocation
|
page read and write
|
||
161FB5F0000
|
heap
|
page read and write
|
||
161F98FC000
|
heap
|
page read and write
|
||
161801AC000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
20A80695000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
1D2A905A000
|
trusted library allocation
|
page read and write
|
||
692D7FE000
|
stack
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
161F9996000
|
heap
|
page read and write
|
||
18355C70000
|
heap
|
page read and write
|
||
7FF8492A0000
|
trusted library allocation
|
page read and write
|
||
692BFFE000
|
stack
|
page read and write
|
||
18355D70000
|
heap
|
page read and write
|
||
2593BEAD000
|
trusted library allocation
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
1618010A000
|
trusted library allocation
|
page read and write
|
||
18355FC0000
|
heap
|
page execute and read and write
|
||
20A8067F000
|
trusted library allocation
|
page read and write
|
||
7FF848FCE000
|
trusted library allocation
|
page read and write
|
||
6706EED000
|
stack
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
692CBFE000
|
stack
|
page read and write
|
||
2592A2D0000
|
trusted library allocation
|
page read and write
|
||
7FF848E44000
|
trusted library allocation
|
page read and write
|
||
7FF849300000
|
trusted library allocation
|
page read and write
|
||
1D296D90000
|
trusted library allocation
|
page read and write
|
||
1A32B13C000
|
heap
|
page read and write
|
||
C39A0FD000
|
stack
|
page read and write
|
||
7FF8492C0000
|
trusted library allocation
|
page read and write
|
||
1A32B0B0000
|
trusted library allocation
|
page read and write
|
||
1D2A88E1000
|
trusted library allocation
|
page read and write
|
||
20A9086A000
|
trusted library allocation
|
page read and write
|
||
161FBD46000
|
heap
|
page read and write
|
||
1D298E6F000
|
trusted library allocation
|
page read and write
|
||
80654FE000
|
stack
|
page read and write
|
||
12D90C38000
|
heap
|
page read and write
|
||
2592A575000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
20A80074000
|
trusted library allocation
|
page read and write
|
||
1D296C7C000
|
heap
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
7FF848E39000
|
trusted library allocation
|
page read and write
|
||
20AF5220000
|
heap
|
page read and write
|
||
1D296C70000
|
heap
|
page read and write
|
||
1D2A8861000
|
trusted library allocation
|
page read and write
|
||
6707AFF000
|
stack
|
page read and write
|
||
1D29884E000
|
trusted library allocation
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page execute and read and write
|
||
1D2B1143000
|
heap
|
page read and write
|
||
7FF849305000
|
trusted library allocation
|
page read and write
|
||
24205DC0000
|
heap
|
page read and write
|
||
1D2B0820000
|
trusted library allocation
|
page read and write
|
||
161FB480000
|
heap
|
page read and write
|
||
7FF849068000
|
trusted library allocation
|
page read and write
|
||
20A90031000
|
trusted library allocation
|
page read and write
|
||
1A345430000
|
trusted library section
|
page read and write
|
||
9185DF2000
|
stack
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
1D2A9986000
|
trusted library allocation
|
page read and write
|
||
7FF849340000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
16180108000
|
trusted library allocation
|
page read and write
|
||
1A32D281000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
20A90D42000
|
trusted library allocation
|
page read and write
|
||
7FF849296000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
1D2A8BE1000
|
trusted library allocation
|
page read and write
|
||
1D298E73000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
1D296C9B000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
C399DFE000
|
stack
|
page read and write
|
||
8064FFE000
|
stack
|
page read and write
|
||
C39A1FE000
|
stack
|
page read and write
|
||
1A32B10F000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
1D2B10B0000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF8492A6000
|
trusted library allocation
|
page read and write
|
||
1A32B300000
|
trusted library section
|
page read and write
|
||
7FF849071000
|
trusted library allocation
|
page read and write
|
||
1A32D2A1000
|
trusted library allocation
|
page read and write
|
||
67076FE000
|
stack
|
page read and write
|
||
692BBFE000
|
stack
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FA2000
|
trusted library allocation
|
page read and write
|
||
18357ACC000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
20AF534F000
|
heap
|
page read and write
|
||
20A8051C000
|
trusted library allocation
|
page read and write
|
||
161801B0000
|
trusted library allocation
|
page read and write
|
||
2592A260000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
20AF771A000
|
heap
|
page read and write
|
||
1A3453E0000
|
trusted library section
|
page read and write
|
||
1D2A96B0000
|
trusted library allocation
|
page read and write
|
||
7FF848E4D000
|
trusted library allocation
|
page execute and read and write
|
||
6706FFE000
|
stack
|
page read and write
|
||
1A32CBF0000
|
heap
|
page read and write
|
||
2592A2F9000
|
heap
|
page read and write
|
||
7FF8492CA000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1837024C000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
7FF8492FF000
|
trusted library allocation
|
page read and write
|
||
161F98FE000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
1D298B9D000
|
trusted library allocation
|
page read and write
|
||
18357B7A000
|
trusted library allocation
|
page read and write
|
||
18357B6A000
|
trusted library allocation
|
page read and write
|
||
18355E08000
|
heap
|
page read and write
|
||
12D90C55000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF848E44000
|
trusted library allocation
|
page read and write
|
||
32821FF000
|
stack
|
page read and write
|
||
1D2B10DC000
|
heap
|
page read and write
|
||
1D296CDB000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
1D298D0C000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
692B7FE000
|
stack
|
page read and write
|
||
7FF8492DF000
|
trusted library allocation
|
page read and write
|
||
1A32B13E000
|
heap
|
page read and write
|
||
1A32D283000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
2592A30A000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
1D2A950A000
|
trusted library allocation
|
page read and write
|
||
692992E000
|
stack
|
page read and write
|
||
80653FE000
|
stack
|
page read and write
|
||
18357B7E000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
20A80068000
|
trusted library allocation
|
page read and write
|
||
1D296CE1000
|
heap
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
1D29886A000
|
trusted library allocation
|
page read and write
|
||
1A32CC5C000
|
trusted library allocation
|
page read and write
|
||
161801C4000
|
trusted library allocation
|
page read and write
|
||
2592A31A000
|
heap
|
page read and write
|
||
1D2B10E0000
|
heap
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
1D2A8F1A000
|
trusted library allocation
|
page read and write
|
||
7FF8492A0000
|
trusted library allocation
|
page read and write
|
||
7FF4E6EC0000
|
trusted library allocation
|
page execute and read and write
|
||
1D2A87FF000
|
trusted library allocation
|
page read and write
|
||
692D3FB000
|
stack
|
page read and write
|
||
12D90C30000
|
heap
|
page read and write
|
||
F2B738E000
|
stack
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
2592A31D000
|
heap
|
page read and write
|
||
2592A490000
|
heap
|
page read and write
|
||
1A344C30000
|
trusted library allocation
|
page read and write
|
||
7FF8491F8000
|
trusted library allocation
|
page execute and read and write
|
||
80656FD000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E44000
|
trusted library allocation
|
page read and write
|
||
7FF8491B3000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
16190011000
|
trusted library allocation
|
page read and write
|
||
C399CFD000
|
stack
|
page read and write
|
||
1D296B20000
|
heap
|
page read and write
|
||
692ABFF000
|
stack
|
page read and write
|
||
7FF8492B0000
|
trusted library allocation
|
page read and write
|
||
20A901F1000
|
trusted library allocation
|
page read and write
|
||
6707BFE000
|
stack
|
page read and write
|
||
16180158000
|
trusted library allocation
|
page read and write
|
||
18357BCF000
|
trusted library allocation
|
page read and write
|
||
1D2B1162000
|
heap
|
page read and write
|
||
7FF8491E8000
|
trusted library allocation
|
page execute and read and write
|
||
18356025000
|
heap
|
page read and write
|
||
2592A240000
|
heap
|
page read and write
|
||
80651FE000
|
stack
|
page read and write
|
||
1618012D000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
161801D7000
|
trusted library allocation
|
page read and write
|
||
1D298866000
|
trusted library allocation
|
page read and write
|
||
1A32CC68000
|
trusted library allocation
|
page read and write
|
||
1D2A9922000
|
trusted library allocation
|
page read and write
|
||
692C3FE000
|
stack
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
7FF8491C4000
|
trusted library allocation
|
page read and write
|
||
7FF8492A4000
|
trusted library allocation
|
page read and write
|
||
18357B26000
|
trusted library allocation
|
page read and write
|
||
32831FE000
|
stack
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
3283DFD000
|
stack
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
80655FD000
|
stack
|
page read and write
|
||
91861FF000
|
stack
|
page read and write
|
||
2593BEA1000
|
trusted library allocation
|
page read and write
|
||
20AF53E0000
|
heap
|
page read and write
|
||
32825FE000
|
stack
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
2592BE90000
|
heap
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
1A32B330000
|
heap
|
page read and write
|
||
67072FE000
|
stack
|
page read and write
|
||
69298EF000
|
stack
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
C3998ED000
|
stack
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8492CF000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
12D90C3D000
|
heap
|
page read and write
|
||
1A32CFB1000
|
trusted library allocation
|
page read and write
|
||
20A8005C000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
1A344F8F000
|
heap
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
20AF5505000
|
heap
|
page read and write
|
||
18355E22000
|
heap
|
page read and write
|
||
80658FE000
|
stack
|
page read and write
|
||
67078FE000
|
stack
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
20A9000F000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
24205E50000
|
heap
|
page read and write
|
||
1A3455F0000
|
heap
|
page read and write
|
||
18357BF0000
|
trusted library allocation
|
page read and write
|
||
7FF8492EB000
|
trusted library allocation
|
page read and write
|
||
2593BEA8000
|
trusted library allocation
|
page read and write
|
||
91869FE000
|
stack
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
32812FF000
|
stack
|
page read and write
|
||
7FF8492E0000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
1A32B112000
|
heap
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
20A80681000
|
trusted library allocation
|
page read and write
|
||
91879FE000
|
stack
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
80650FE000
|
stack
|
page read and write
|
||
7FF84900B000
|
trusted library allocation
|
page read and write
|
||
2592A160000
|
heap
|
page read and write
|
||
1D296DE0000
|
heap
|
page execute and read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
183701D0000
|
heap
|
page read and write
|
||
7FF8492D9000
|
trusted library allocation
|
page read and write
|
||
32845FE000
|
stack
|
page read and write
|
||
18357C20000
|
trusted library allocation
|
page read and write
|
||
20AF51E0000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
C399AFE000
|
stack
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
161F9AE5000
|
heap
|
page read and write
|
||
1D298651000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
9186DFD000
|
stack
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
1D2987E0000
|
heap
|
page read and write
|
||
C39A2FF000
|
stack
|
page read and write
|
||
1D2A8821000
|
trusted library allocation
|
page read and write
|
||
7FF8492F0000
|
trusted library allocation
|
page read and write
|
||
161F98FA000
|
heap
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
7FF8491B4000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
183679D8000
|
trusted library allocation
|
page read and write
|
||
18357BA8000
|
trusted library allocation
|
page read and write
|
||
18357B14000
|
trusted library allocation
|
page read and write
|
||
20A90071000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF8492A6000
|
trusted library allocation
|
page read and write
|
||
7FF848FFB000
|
trusted library allocation
|
page read and write
|
||
20A9000C000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1D296DB0000
|
trusted library allocation
|
page read and write
|
||
7FF8492D0000
|
trusted library allocation
|
page read and write
|
||
1D2A92DA000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
20AF535E000
|
heap
|
page read and write
|
||
80652FD000
|
stack
|
page read and write
|
||
18357B1E000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
1D296C20000
|
heap
|
page read and write
|
||
1A32CC66000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
692B3FE000
|
stack
|
page read and write
|
||
2592A39B000
|
heap
|
page read and write
|
||
16190008000
|
trusted library allocation
|
page read and write
|
||
C39A4FE000
|
stack
|
page read and write
|
||
7FF8491E4000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
20AF7753000
|
heap
|
page read and write
|
||
7FF849320000
|
trusted library allocation
|
page read and write
|
||
32849FE000
|
stack
|
page read and write
|
||
20AF76B2000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
2592A359000
|
heap
|
page read and write
|
||
7FF84929E000
|
trusted library allocation
|
page read and write
|
||
18357B22000
|
trusted library allocation
|
page read and write
|
||
80657FE000
|
stack
|
page read and write
|
||
161FB630000
|
heap
|
page execute and read and write
|
||
1A32B335000
|
heap
|
page read and write
|
||
1D296C9D000
|
heap
|
page read and write
|
||
2592A3F0000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
7FF849009000
|
trusted library allocation
|
page read and write
|
||
1D2A94FA000
|
trusted library allocation
|
page read and write
|
||
20A900F1000
|
trusted library allocation
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
7FF8492D0000
|
trusted library allocation
|
page read and write
|
||
18370213000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF849051000
|
trusted library allocation
|
page read and write
|
||
2592BF9A000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
20AF5354000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1A32AF42000
|
unkown
|
page readonly
|
||
1D298E91000
|
trusted library allocation
|
page read and write
|
||
161F98C9000
|
heap
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
C399EFE000
|
stack
|
page read and write
|
||
1D296C40000
|
heap
|
page read and write
|
||
1D2B1176000
|
heap
|
page read and write
|
||
1A32CC74000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
67073FC000
|
stack
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
7FF8491BA000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
692C7FF000
|
stack
|
page read and write
|
||
20AF6CE0000
|
trusted library allocation
|
page read and write
|
||
7FF8492FB000
|
trusted library allocation
|
page read and write
|
||
67071FE000
|
stack
|
page read and write
|
||
18370292000
|
heap
|
page read and write
|
||
1D298859000
|
trusted library allocation
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
7FF848E33000
|
trusted library allocation
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
20A8069F000
|
trusted library allocation
|
page read and write
|
||
18355D90000
|
heap
|
page read and write
|
||
18357BBB000
|
trusted library allocation
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
161800F2000
|
trusted library allocation
|
page read and write
|
||
1A32CB60000
|
heap
|
page execute and read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1A32D11C000
|
trusted library allocation
|
page read and write
|
||
15B22FC000
|
stack
|
page read and write
|
||
18355E05000
|
heap
|
page read and write
|
||
1A33CC01000
|
trusted library allocation
|
page read and write
|
||
161F98B0000
|
trusted library allocation
|
page read and write
|
||
1D296EA5000
|
heap
|
page read and write
|
||
2592A32F000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
18355E4D000
|
heap
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page read and write
|
||
67070FF000
|
stack
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
18357ADC000
|
trusted library allocation
|
page read and write
|
||
1D2A87FC000
|
trusted library allocation
|
page read and write
|
||
18355DB0000
|
heap
|
page read and write
|
||
91875FE000
|
stack
|
page read and write
|
||
7FF8492BE000
|
trusted library allocation
|
page read and write
|
||
161F9993000
|
heap
|
page read and write
|
||
7FF84931F000
|
trusted library allocation
|
page read and write
|
||
1D296CAF000
|
heap
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
2592A280000
|
heap
|
page read and write
|
||
161FBD00000
|
heap
|
page read and write
|
||
7FF849300000
|
trusted library allocation
|
page read and write
|
||
32819F2000
|
stack
|
page read and write
|
||
32835FE000
|
stack
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF8491A3000
|
trusted library allocation
|
page read and write
|
||
183679DD000
|
trusted library allocation
|
page read and write
|
||
1A32B0D0000
|
heap
|
page read and write
|
||
7FF848FE4000
|
trusted library allocation
|
page read and write
|
||
161F98E8000
|
heap
|
page read and write
|
||
32841FF000
|
stack
|
page read and write
|
||
2592BD20000
|
heap
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
7FF848FC4000
|
trusted library allocation
|
page read and write
|
||
7FF848FF9000
|
trusted library allocation
|
page read and write
|
||
2592A320000
|
heap
|
page read and write
|
||
1A32B0D6000
|
heap
|
page read and write
|
||
161F99B2000
|
heap
|
page read and write
|
||
C39A5FF000
|
stack
|
page read and write
|
||
C399BFF000
|
stack
|
page read and write
|
||
1D2B0F60000
|
heap
|
page execute and read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
20AF529D000
|
heap
|
page read and write
|
||
1618014C000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
2592A400000
|
trusted library allocation
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8492A9000
|
trusted library allocation
|
page read and write
|
||
7FF8492BA000
|
trusted library allocation
|
page read and write
|
||
1A32D28E000
|
trusted library allocation
|
page read and write
|
||
7FF848E4B000
|
trusted library allocation
|
page execute and read and write
|
||
18355F50000
|
heap
|
page read and write
|
||
183679E1000
|
trusted library allocation
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
1A33D90D000
|
trusted library allocation
|
page read and write
|
||
20A90611000
|
trusted library allocation
|
page read and write
|
||
1D2A8E7A000
|
trusted library allocation
|
page read and write
|
||
7FF848FD4000
|
trusted library allocation
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page execute and read and write
|
||
18357B82000
|
trusted library allocation
|
page read and write
|
||
7FF84902B000
|
trusted library allocation
|
page read and write
|
||
7FF8492E0000
|
trusted library allocation
|
page read and write
|
||
24205DE5000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF8492F0000
|
trusted library allocation
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page execute and read and write
|
||
20A90001000
|
trusted library allocation
|
page read and write
|
||
91881FF000
|
stack
|
page read and write
|
||
12D90BE0000
|
heap
|
page read and write
|
||
7FF849014000
|
trusted library allocation
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
20AF5390000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
1A32B095000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
7FF849004000
|
trusted library allocation
|
page read and write
|
||
183579C0000
|
heap
|
page read and write
|
||
161F9B70000
|
heap
|
page read and write
|
||
2592A495000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
2592A2F0000
|
heap
|
page read and write
|
||
20A90D92000
|
trusted library allocation
|
page read and write
|
||
7FF849300000
|
trusted library allocation
|
page read and write
|
||
20A90D0A000
|
trusted library allocation
|
page read and write
|
||
2592A403000
|
trusted library allocation
|
page read and write
|
||
1D296C00000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1D296EA0000
|
heap
|
page read and write
|
||
161801A4000
|
trusted library allocation
|
page read and write
|
||
161FBD9E000
|
heap
|
page read and write
|
||
25944A10000
|
heap
|
page execute and read and write
|
||
16180154000
|
trusted library allocation
|
page read and write
|
||
18355DE0000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
20AF5260000
|
heap
|
page read and write
|
||
1A32B000000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
161800FA000
|
trusted library allocation
|
page read and write
|
||
1D298A7F000
|
trusted library allocation
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
161F98EA000
|
heap
|
page read and write
|
||
1D2B1172000
|
heap
|
page read and write
|
||
7FF849310000
|
trusted library allocation
|
page read and write
|
||
161801A8000
|
trusted library allocation
|
page read and write
|
||
161F9928000
|
heap
|
page read and write
|
||
C399FFE000
|
stack
|
page read and write
|
||
1A32B0FB000
|
heap
|
page read and write
|
||
1D298BD0000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
20AF5500000
|
heap
|
page read and write
|
||
18357BEC000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
18357AC1000
|
trusted library allocation
|
page read and write
|
||
20A80683000
|
trusted library allocation
|
page read and write
|
||
7FF848E33000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
1D29888F000
|
trusted library allocation
|
page read and write
|
||
1D2B119C000
|
heap
|
page read and write
|
||
7FF848E39000
|
trusted library allocation
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
F2B767E000
|
stack
|
page read and write
|
||
18355E10000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
20A9068A000
|
trusted library allocation
|
page read and write
|
||
20AF7680000
|
heap
|
page read and write
|
There are 759 hidden memdumps, click here to show them.