IOC Report
1Vkf7silOj.exe

loading gif

Files

File Path
Type
Category
Malicious
1Vkf7silOj.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1Vkf7silOj.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\ldr[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\whiteheroin[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\1[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\alex5555555[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\gold[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\Installer[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\vcf-to-csv-converter[1].exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\123[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\NewLatest[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000020001\1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000035001\gold.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000064001\NewLatest.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000091001\Installer.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000108001\ldr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000109001\alex5555555.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000110001\123.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000111001\O3B6wY7ZkFhh.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\28feeece5c\Hkbsse.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\configurationValue\Explorers.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\configurationValue\svhosts.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\d3d9.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BAKJKFHCAEGDHIDGDHDAKEGHCG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BFBKFHIDHIIJJKECGHCF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GCBKFBFCGIEHIDGCFBFBFBKEBG
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\GCGCBAECFCAKKEBFCFII
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\ProgramData\HDHCFIJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IJKFIIIJJKJJKEBGIDGCAEGCGD
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JKJEHJKJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\KEBKJDBAAKJDGCBFHCFCGIEBFB
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\KEGDAKEHJDHIDHJJDAEC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x5e5d5c2b, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_alex5555555.exe_cce71ab03df258e643ba272e65fa3e2b04eb551_f5cc273e_11956d76-fbba-4fca-b29f-4d2b17a6b33f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_gold.exe_21d759a5ab80ebaa4db8463ebaa192b4f6ec389c_0b896d0c_bc4c7750-18ae-4178-ad38-fbcc2f30e2af\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F12.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F51.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F79.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Jun 27 05:40:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5074.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5094.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER50A2.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5130.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8A02.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Jun 27 05:40:23 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8C25.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8E59.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EC6.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9177.tmp.txt
data
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\123.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Explorers.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TpWWMUpe0LEV.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\IXP000.TMP\ins.bat
DOS batch file, ASCII text, with very long lines (303), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tcjhj0if.3us.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wabtgtek.swb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xj5jztyf.1dx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yhzbo1hp.5zd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\install.bat
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\Tasks\Hkbsse.job
data
dropped
C:\Windows\Tasks\axplong.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 177
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 178
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
There are 75 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1Vkf7silOj.exe
"C:\Users\user\Desktop\1Vkf7silOj.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://iplogger.co/1lLub
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=1880,i,1559005208409857201,3821663929955985099,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\6.exe
"C:\Users\user~1\AppData\Local\Temp\6.exe"
malicious
C:\Users\user\AppData\Local\Temp\7.exe
"C:\Users\user~1\AppData\Local\Temp\7.exe"
malicious
C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
"C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000035001\gold.exe
"C:\Users\user~1\AppData\Local\Temp\1000035001\gold.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000064001\NewLatest.exe
"C:\Users\user~1\AppData\Local\Temp\1000064001\NewLatest.exe"
malicious
C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
"C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"
malicious
C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
malicious
C:\Users\user\AppData\Local\Temp\1000091001\Installer.exe
"C:\Users\user~1\AppData\Local\Temp\1000091001\Installer.exe"
malicious
C:\Windows\System32\cmd.exe
cmd /c ins.bat
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /SC MINUTE /MO 10 /TN "CCleaner" /TR "\"C:\Program Files\Google\Chrome\Application\chrome.exe\" http://starjod.xyz/Website.php"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /SC MINUTE /MO 11 /TN "Updater" /TR "\"C:\Program Files\Google\Chrome\Application\chrome.exe\" http://starjod.xyz/Website.php"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Invoke-WebRequest -Uri 'https://bit.ly/4c7L8Zs' -UseBasicParsing >$null"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" http://starjod.xyz/Website.php
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" http://starjod.xyz/Website.php
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1992,i,12647430490960773708,190328804482566679,262144 /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1480 --field-trial-handle=1844,i,568275399353426171,11183762438970494550,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\1000108001\ldr.exe
"C:\Users\user~1\AppData\Local\Temp\1000108001\ldr.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000020001\1.exe
"C:\Users\user~1\AppData\Local\Temp\1000020001\1.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Start-Process 'C:\Users\user~1\AppData\Local\Temp\install.bat' -Verb runAs -WindowStyle Hidden"
malicious
C:\Users\user\AppData\Local\Temp\28feeece5c\Hkbsse.exe
"C:\Users\user~1\AppData\Local\Temp\28feeece5c\Hkbsse.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000109001\alex5555555.exe
"C:\Users\user~1\AppData\Local\Temp\1000109001\alex5555555.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000110001\123.exe
"C:\Users\user~1\AppData\Local\Temp\1000110001\123.exe"
malicious
C:\Users\user\AppData\Roaming\configurationValue\svhosts.exe
"C:\Users\user\AppData\Roaming\configurationValue\svhosts.exe"
malicious
C:\Users\user\AppData\Roaming\configurationValue\Explorers.exe
"C:\Users\user\AppData\Roaming\configurationValue\Explorers.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user~1\AppData\Local\Temp\install.bat"
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user~1\AppData\Local\Temp\IXP000.TMP\"
malicious
C:\Users\user\AppData\Local\Temp\1000111001\O3B6wY7ZkFhh.exe
"C:\Users\user~1\AppData\Local\Temp\1000111001\O3B6wY7ZkFhh.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks /create /tn "Cleaner" /tr "C:\Users\user\AppData\Local\Corporation\File\RemoteExecuteScriptSilent.exe" /sc onstart /delay 0005:00
malicious
C:\Windows\System32\reg.exe
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /f /v DisableTaskMgr /t REG_DWORD /d 00000001
malicious
C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
"C:\Users\user~1\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalService -s W32Time
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 7752 -ip 7752
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7752 -s 320
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 212 -p 8560 -ip 8560
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8560 -s 284
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 40 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.172.128.116/Mb3GvQs8/index.phpIN
unknown
malicious
http://65.21.175.0
unknown
malicious
http://qeqei.xyz/tmp/
malicious
http://65.21.175.0/b13597c85f807692/msvcp140.dll
65.21.175.0
malicious
http://65.21.175.0/b13597c85f807692/vcruntime140.dll
65.21.175.0
malicious
185.215.113.67:40960
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://tempuri.org/Entity/Id24LR
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
https://facilitycoursedw.shop/api$
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://77.91.77.81/Kiru9gu/index.phpe
unknown
http://77.91.77.81/lend/123.exed4
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://65.21.175.0/108e010e8f91c38c.phpWC
unknown
http://tempuri.org/Entity/Id13LR
unknown
http://65.21.175.0/b13597c85f807692/msvcp140.dllEM
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id5LR
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
https://iplogger.co/1lLub-&
unknown
http://Passport.NET/tb_
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdsenfo
unknown
https://facilitycoursedw.shop/apii
unknown
http://185.172.128.116/Mb3GvQs8/index.phpFa
unknown
http://crl.ver)
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://77.91.77.81/Kiru9gu/index.phptch
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://tempuri.org/Entity/Id14LR
unknown
http://tempuri.org/Entity/Id6LR
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://ipinfo.io/
34.117.186.192
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdes
unknown
https://doughtdrillyksow.shop/
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
https://bargainnygroandjwk.shop/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultH
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://185.172.128.116/erences.SourceAumid
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://moreapp4you.online
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://tempuri.org/Entity/Id22LR
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
https://login.microsoftonline.com/ppsecure/DeviceQuery.srf
unknown
https://pixel.com/
54.67.42.145
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/Entity/Id7LR
unknown
http://65.21.175.0/b13597c85f807692/vcruntime140.dllka
unknown
http://tempuri.org/Entity/Id11LR
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://docs.oasis-open.org
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://tempuri.org/Entity/Id9On
unknown
http://www.w3.o
unknown
http://tempuri.org/Entity/Id13Response
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://65.21.175.0/b13597c85f807692/nss3.dllal
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
https://signup.live.com/signup.aspx
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80601
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80600
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80603
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://tempuri.org/Entity/Id23LR
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-http://Passport.NET/STS09/xmldsig#ripledes-c
unknown
http://tempuri.org/Entity/Id4ResponseD
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80605
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80604
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
http://tempuri.org/Entity/Id22ResponseD
unknown
http://tempuri.org/Entity/Id16ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
unknown
http://tempuri.org/Entity/Id19ResponseD
unknown
https://account.live.com/inlinesignup.aspx?iww=1&id=80605amp;id=806
unknown
http://tempuri.org/Entity/Id8LR
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc
unknown
https://iplogger.co/1lLub%
unknown
http://tempuri.org/Entity/Id12LR
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bit.ly
67.199.248.11
malicious
leafcalfconflcitw.shop
unknown
malicious
facilitycoursedw.shop
unknown
malicious
time.windows.com
unknown
malicious
publicitycharetew.shop
unknown
malicious
computerexcudesp.shop
unknown
malicious
disappointcredisotw.shop
unknown
malicious
doughtdrillyksow.shop
unknown
malicious
injurypiggyoewirog.shop
unknown
malicious
bargainnygroandjwk.shop
unknown
malicious
pixel.com
54.67.42.145
moreapp4you.online
31.31.196.208
github.com
140.82.121.3
www.google.com
216.58.206.36
iplogger.co
172.67.167.249
biancolevrin.com
103.28.36.182
objects.githubusercontent.com
185.199.111.133
There are 7 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.67
unknown
Portugal
malicious
192.168.2.7
unknown
unknown
malicious
67.199.248.11
bit.ly
United States
malicious
65.21.175.0
unknown
United States
malicious
185.172.128.116
unknown
Russian Federation
94.228.166.74
unknown
Russian Federation
185.172.128.33
unknown
Russian Federation
216.58.206.36
www.google.com
United States
185.199.111.133
objects.githubusercontent.com
Netherlands
31.31.196.208
moreapp4you.online
Russian Federation
43.153.49.49
unknown
Japan
140.82.121.3
github.com
United States
4.184.236.127
unknown
United States
54.67.42.145
pixel.com
United States
172.67.167.249
iplogger.co
United States
239.255.255.250
unknown
Reserved
77.91.77.81
unknown
Russian Federation
103.28.36.182
biancolevrin.com
Viet Nam
127.0.0.1
unknown
unknown
There are 9 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
DisableTaskMgr
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\1Vkf7silOj_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\1Vkf7silOj_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\1Vkf7silOj_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\1Vkf7silOj_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\1Vkf7silOj_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\1Vkf7silOj_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\1Vkf7silOj_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\1Vkf7silOj_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\1Vkf7silOj_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\1Vkf7silOj_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\1Vkf7silOj_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\1Vkf7silOj_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\1Vkf7silOj_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\1Vkf7silOj_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\Config
LastKnownGoodTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\8284
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\8284
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\8284
CreationTime
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
ProgramId
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
FileId
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
LowerCaseLongPath
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
LongPathHash
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
Name
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
OriginalFileName
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
Publisher
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
Version
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
BinFileVersion
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
BinaryType
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
ProductName
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
ProductVersion
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
LinkDate
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
BinProductVersion
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
AppxPackageFullName
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
AppxPackageRelativeId
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
Size
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
Language
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\gold.exe|45dcaeb532233d8a
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\2C85006A1A028BCC349DF23C474724C055FDE8B6
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\B68D8F953E551914324E557E6164D68B9926650C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL
ClockSkew
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qtltntcbrequaj
Reason
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02bvvmhiiaffgeoh
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02bvvmhiiaffgeoh
Provision Thursday, June 27, 2024 01:40:13
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02bvvmhiiaffgeoh
AppIdList
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
URL
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
Name
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
P3P
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
Flags
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02psbtbqujhpqftm
Request Thursday, June 27, 2024 01:40:18
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02psbtbqujhpqftm
Response Thursday, June 27, 2024 01:40:18
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02psbtbqujhpqftm
Reason
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02icgsdszpmcugxo
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02icgsdszpmcugxo
AppIdList
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qtltntcbrequaj
AppIdList
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
ValidDeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL
ClockSkew
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL
GlobalDeviceUpdateTime
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02bvvmhiiaffgeoh
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
ValidDeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02bvvmhiiaffgeoh
DeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL
ClockSkew
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02bvvmhiiaffgeoh
DeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL
ClockSkew
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
ValidDeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02psbtbqujhpqftm
AppIdList
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL
ClockSkew
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02icgsdszpmcugxo
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
ValidDeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02icgsdszpmcugxo
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\ExtendedProperties
LID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02icgsdszpmcugxo
DeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
ProgramId
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
FileId
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
LowerCaseLongPath
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
LongPathHash
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
Name
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
OriginalFileName
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
Publisher
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
Version
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
BinFileVersion
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
BinaryType
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
ProductName
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
ProductVersion
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
LinkDate
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
BinProductVersion
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
AppxPackageFullName
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
AppxPackageRelativeId
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
Size
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
Language
\REGISTRY\A\{f72423a9-c216-c204-9c36-170e17176029}\Root\InventoryApplicationFile\alex5555555.exe|899a471135089542
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 163 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
232000
unkown
page readonly
malicious
3E25000
trusted library allocation
page read and write
malicious
6D1000
unkown
page execute read
malicious
99D000
unkown
page read and write
malicious
3017000
heap
page read and write
malicious
81000
unkown
page execute read
malicious
5410000
direct allocation
page read and write
malicious
81000
unkown
page execute read
malicious
8AF000
unkown
page read and write
malicious
5F1000
unkown
page execute read
malicious
6B6EE000
unkown
page read and write
malicious
D51000
unkown
page execute read
malicious
6D1000
unkown
page execute read
malicious
400000
remote allocation
page execute and read and write
malicious
17F000
unkown
page read and write
malicious
6B1000
unkown
page execute and read and write
malicious
C51000
unkown
page execute and read and write
malicious
6B1000
unkown
page execute and read and write
malicious
891000
unkown
page readonly
malicious
23E0000
direct allocation
page read and write
malicious
4F0000
remote allocation
page execute and read and write
malicious
932000
unkown
page readonly
malicious
4FB0000
direct allocation
page read and write
malicious
81000
unkown
page execute read
malicious
5F1000
unkown
page execute read
malicious
402000
remote allocation
page execute and read and write
malicious
D51000
unkown
page execute read
malicious
4E90000
direct allocation
page read and write
malicious
81000
unkown
page execute read
malicious
2521000
unclassified section
page read and write
malicious
1496F559000
heap
page read and write
6EDBD000
unkown
page read and write
4125000
trusted library allocation
page read and write
1881000
heap
page read and write
236CB000
heap
page read and write
333E000
trusted library allocation
page read and write
1496F3A0000
remote allocation
page read and write
23221000
heap
page read and write
1496F593000
heap
page read and write
4BDC000
stack
page read and write
301E000
trusted library allocation
page read and write
1496F55C000
heap
page read and write
2A3D000
trusted library allocation
page read and write
7FF67FBC1000
unkown
page execute read
E52000
trusted library allocation
page read and write
236DE000
heap
page read and write
2F10000
trusted library allocation
page read and write
1496F574000
heap
page read and write
6F9F000
heap
page read and write
1496F55C000
heap
page read and write
3174000
trusted library allocation
page read and write
451E000
stack
page read and write
4F81000
heap
page read and write
23CD000
stack
page read and write
3900000
remote allocation
page read and write
49F1000
heap
page read and write
6791000
heap
page read and write
2A0C000
trusted library allocation
page read and write
1496F537000
heap
page read and write
4F81000
heap
page read and write
51B0000
trusted library allocation
page read and write
C000400000
direct allocation
page read and write
162E000
stack
page read and write
23750000
heap
page read and write
533E000
stack
page read and write
17F0000
direct allocation
page read and write
3B7F000
stack
page read and write
2DC9000
trusted library allocation
page read and write
2F87000
trusted library allocation
page read and write
236EB000
heap
page read and write
24732EC000
stack
page read and write
25E0000
trusted library allocation
page read and write
5720000
trusted library allocation
page execute and read and write
1160000
trusted library allocation
page read and write
C000162000
direct allocation
page read and write
5000000
direct allocation
page execute and read and write
334F000
stack
page read and write
4F81000
heap
page read and write
704A000
heap
page read and write
1CACF000
stack
page read and write
200BECFD000
heap
page read and write
3F7B000
trusted library allocation
page read and write
5150000
trusted library allocation
page execute and read and write
1496ECA4000
heap
page read and write
1496F57A000
heap
page read and write
F40F7FB000
stack
page read and write
1D14F000
stack
page read and write
881000
unkown
page execute read
4F81000
heap
page read and write
12CB000
stack
page read and write
2BF0000
heap
page read and write
1496F533000
heap
page read and write
5630000
direct allocation
page execute and read and write
708A000
trusted library allocation
page read and write
54A9000
trusted library allocation
page execute and read and write
30FD000
heap
page read and write
A2E000
heap
page read and write
187A8431000
heap
page read and write
17F0000
direct allocation
page read and write
E70000
trusted library allocation
page read and write
316C000
trusted library allocation
page read and write
4F81000
heap
page read and write
2810000
trusted library allocation
page read and write
5400000
direct allocation
page read and write
9C1000
heap
page read and write
5820000
trusted library allocation
page execute and read and write
178182B0000
heap
page read and write
483E000
stack
page read and write
870000
unkown
page readonly
2C4E000
stack
page read and write
310E000
stack
page read and write
2C95000
trusted library allocation
page read and write
C000045000
direct allocation
page read and write
6B6D0000
unkown
page readonly
5120000
trusted library allocation
page read and write
5810000
trusted library allocation
page read and write
B72000
unkown
page readonly
E5B000
trusted library allocation
page execute and read and write
1496FAE4000
heap
page read and write
30A7000
trusted library allocation
page read and write
C00001A000
direct allocation
page read and write
1342000
heap
page read and write
F0F000
unkown
page execute and read and write
3C8F000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
80000
unkown
page readonly
61EB7000
direct allocation
page readonly
4E80000
direct allocation
page read and write
546B000
trusted library allocation
page read and write
E1A000
unkown
page read and write
3CFE000
trusted library allocation
page read and write
236C9000
heap
page read and write
31FF000
trusted library allocation
page read and write
1496F592000
heap
page read and write
1F256672000
heap
page read and write
6EDA000
trusted library allocation
page read and write
2D2B000
stack
page read and write
2883000
trusted library allocation
page read and write
530F000
stack
page read and write
1070000
heap
page read and write
1857000
heap
page read and write
6780000
heap
page read and write
6F86000
heap
page read and write
1083000
unkown
page execute read
3C90000
trusted library allocation
page read and write
E9000
unkown
page readonly
7063000
trusted library allocation
page read and write
DE5000
heap
page read and write
33D4000
trusted library allocation
page read and write
3088000
trusted library allocation
page read and write
2AD0000
heap
page execute and read and write
418E000
trusted library allocation
page read and write
C000168000
direct allocation
page read and write
6775000
heap
page read and write
9B4000
unkown
page execute and write copy
200BEE00000
trusted library allocation
page read and write
5191000
trusted library allocation
page read and write
3900000
remote allocation
page read and write
236CF000
heap
page read and write
3C9A000
trusted library allocation
page read and write
1654000
heap
page read and write
108E000
heap
page read and write
5196000
trusted library allocation
page read and write
3CC000
stack
page read and write
43562AB000
stack
page read and write
3C5E000
stack
page read and write
1070000
trusted library allocation
page read and write
6D8B000
stack
page read and write
5180000
trusted library allocation
page read and write
1BFF9502000
heap
page read and write
4F81000
heap
page read and write
3C63000
trusted library allocation
page read and write
3E4E000
trusted library allocation
page read and write
1654000
heap
page read and write
187A8433000
heap
page read and write
41A8000
trusted library allocation
page read and write
402F000
trusted library allocation
page read and write
5130000
direct allocation
page execute and read and write
400000
remote allocation
page execute and read and write
2778000
trusted library allocation
page read and write
D0000
unkown
page readonly
C00006E000
direct allocation
page read and write
4026000
trusted library allocation
page read and write
3D27000
trusted library allocation
page read and write
2E5F000
stack
page read and write
33FF000
stack
page read and write
4017000
trusted library allocation
page read and write
2878000
trusted library allocation
page read and write
433E000
stack
page read and write
1881000
heap
page read and write
55F0000
direct allocation
page execute and read and write
1496ED3C000
heap
page read and write
760E000
stack
page read and write
62AF000
stack
page read and write
E3D000
trusted library allocation
page execute and read and write
409A000
trusted library allocation
page read and write
8A0000
unkown
page readonly
2E73000
trusted library allocation
page read and write
27E7E2F0000
direct allocation
page read and write
1496F576000
heap
page read and write
720000
unkown
page readonly
625C000
stack
page read and write
C00011E000
direct allocation
page read and write
528E000
stack
page read and write
7FF67FBC0000
unkown
page readonly
3007000
trusted library allocation
page read and write
E9000
unkown
page readonly
1496FAD9000
heap
page read and write
43A0000
heap
page read and write
4F81000
heap
page read and write
51E1000
trusted library allocation
page read and write
4F81000
heap
page read and write
4F81000
heap
page read and write
4F81000
heap
page read and write
46EF000
stack
page read and write
236C1000
heap
page read and write
4F81000
heap
page read and write
C00012E000
direct allocation
page read and write
3087000
trusted library allocation
page read and write
200B9F1A000
heap
page read and write
53B0000
trusted library allocation
page read and write
EFD000
stack
page read and write
11EE000
heap
page read and write
39DE000
stack
page read and write
40C3000
trusted library allocation
page read and write
5980000
heap
page read and write
1342000
heap
page read and write
287E000
trusted library allocation
page read and write
2610000
trusted library allocation
page execute and read and write
2893000
trusted library allocation
page read and write
C000170000
direct allocation
page read and write
236EC000
heap
page read and write
3339000
trusted library allocation
page read and write
200BEE00000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
324E000
stack
page read and write
553A000
trusted library allocation
page read and write
739000
unkown
page readonly
2D56000
trusted library allocation
page read and write
338E000
stack
page read and write
81DC000
stack
page read and write
49F1000
heap
page read and write
CB9000
unkown
page write copy
3C0F000
trusted library allocation
page read and write
1496F580000
heap
page read and write
E23000
trusted library allocation
page execute and read and write
D4E000
stack
page read and write
5620000
direct allocation
page execute and read and write
41C000
remote allocation
page execute and read and write
1BA8B44A000
heap
page read and write
DB4000
unkown
page write copy
4DD3000
heap
page read and write
40C7000
trusted library allocation
page read and write
F2E000
stack
page read and write
236EA000
heap
page read and write
821E000
stack
page read and write
23221000
heap
page read and write
319B000
trusted library allocation
page read and write
1BA8B472000
heap
page read and write
5800000
trusted library allocation
page read and write
27E590D0000
direct allocation
page read and write
187A8444000
heap
page read and write
1654000
heap
page read and write
1496F55D000
heap
page read and write
130E000
stack
page read and write
27F3000
trusted library allocation
page read and write
2844000
trusted library allocation
page read and write
309A000
trusted library allocation
page read and write
18EE000
heap
page read and write
236EC000
heap
page read and write
14AA000
heap
page read and write
3CF4000
trusted library allocation
page read and write
71BC000
stack
page read and write
6DA0000
trusted library allocation
page read and write
1040000
heap
page read and write
236DF000
heap
page read and write
C00000A000
direct allocation
page read and write
2E6D000
trusted library allocation
page read and write
187A8370000
heap
page read and write
400000
unkown
page readonly
10C0000
direct allocation
page read and write
9A6000
unkown
page execute and read and write
4F81000
heap
page read and write
F80000
heap
page read and write
4095000
trusted library allocation
page read and write
28C3000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
1803E08F000
heap
page read and write
4D30000
trusted library allocation
page read and write
40B6000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
1303000
heap
page read and write
40B0000
heap
page read and write
995000
heap
page read and write
6EB2000
trusted library allocation
page read and write
3BBE000
stack
page read and write
6100000
trusted library allocation
page read and write
374E000
stack
page read and write
1496F592000
heap
page read and write
30C1000
trusted library allocation
page read and write
281F000
trusted library allocation
page read and write
9E0000
heap
page readonly
1496F583000
heap
page read and write
D50000
unkown
page readonly
A3F000
unkown
page readonly
4A7F000
stack
page read and write
1BFF9370000
heap
page read and write
6CE3E000
unkown
page read and write
1496FB13000
heap
page read and write
DE7000
heap
page read and write
C000186000
direct allocation
page read and write
1654000
heap
page read and write
200BECEF000
heap
page read and write
27FB000
trusted library allocation
page read and write
1654000
heap
page read and write
200BECEA000
heap
page read and write
C000043000
direct allocation
page read and write
3EE1000
trusted library allocation
page read and write
30CF000
stack
page read and write
CB9000
unkown
page read and write
10E0000
heap
page read and write
1BA8B44B000
heap
page read and write
153D000
heap
page read and write
10C0000
direct allocation
page read and write
3D6C000
trusted library allocation
page read and write
6B10000
trusted library section
page read and write
10B4000
heap
page read and write
118F000
heap
page read and write
3CFE000
stack
page read and write
200BEC40000
heap
page read and write
200BF170000
trusted library allocation
page read and write
7190000
trusted library allocation
page execute and read and write
414B000
trusted library allocation
page read and write
1CFFD000
stack
page read and write
C000158000
direct allocation
page read and write
413E000
trusted library allocation
page read and write
55C0000
heap
page execute and read and write
200BECB8000
heap
page read and write
2D5D000
trusted library allocation
page read and write
2E00000
heap
page read and write
42A0000
heap
page read and write
1328000
heap
page read and write
1496FB13000
heap
page read and write
7FF6801B9000
unkown
page readonly
633A000
heap
page read and write
236EC000
heap
page read and write
121E000
stack
page read and write
18E6000
heap
page read and write
1030000
heap
page read and write
6F61000
heap
page read and write
2F8F000
stack
page read and write
5010000
direct allocation
page execute and read and write
4F81000
heap
page read and write
1BCF000
stack
page read and write
1496F582000
heap
page read and write
8A3000
unkown
page readonly
6520000
trusted library allocation
page read and write
1137000
heap
page read and write
2FC0000
heap
page read and write
7008000
heap
page read and write
56C0000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
1654000
heap
page read and write
54A000
remote allocation
page execute and read and write
200B9580000
trusted library allocation
page read and write
284E000
stack
page read and write
40DF000
trusted library allocation
page read and write
169E000
stack
page read and write
3C3E000
trusted library allocation
page read and write
787F000
heap
page read and write
1152000
heap
page read and write
281D000
trusted library allocation
page read and write
3023000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
27E7E431000
direct allocation
page read and write
1318000
trusted library allocation
page read and write
4F81000
heap
page read and write
3FD8000
trusted library allocation
page read and write
236CD000
heap
page read and write
5DF0000
heap
page read and write
3C9F000
trusted library allocation
page read and write
5511000
trusted library allocation
page read and write
49F1000
heap
page read and write
236D0000
heap
page read and write
1496F513000
heap
page read and write
2BD0000
trusted library allocation
page read and write
200B9540000
heap
page read and write
151D000
heap
page read and write
2861000
trusted library allocation
page read and write
1010000
heap
page read and write
D54000
heap
page read and write
187C000
heap
page read and write
3D11000
trusted library allocation
page read and write
23281000
heap
page read and write
1010000
heap
page read and write
49F1000
heap
page read and write
2851000
trusted library allocation
page read and write
39C1C7E000
stack
page read and write
40C1000
heap
page read and write
182E000
heap
page read and write
712000
unkown
page execute and read and write
11F3000
trusted library allocation
page execute and read and write
236C9000
heap
page read and write
2F46000
trusted library allocation
page read and write
3E7000
heap
page read and write
4DA2000
trusted library allocation
page read and write
4BE8000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
5142000
trusted library allocation
page read and write
1227000
trusted library allocation
page execute and read and write
3B80000
remote allocation
page read and write
4F81000
heap
page read and write
200B9F00000
heap
page read and write
F40000
heap
page read and write
63C0000
heap
page read and write
F40EBFE000
stack
page read and write
7FF67FDF0000
unkown
page read and write
1D1B1000
heap
page read and write
1654000
heap
page read and write
2348C000
heap
page read and write
18E6000
heap
page read and write
313D000
trusted library allocation
page read and write
2865000
trusted library allocation
page read and write
17817FF8000
heap
page read and write
2F0C000
trusted library allocation
page read and write
2C78000
trusted library allocation
page read and write
187A8433000
heap
page read and write
2874000
trusted library allocation
page read and write
C0007E6000
direct allocation
page read and write
1496F56E000
heap
page read and write
3191000
trusted library allocation
page read and write
F53000
unkown
page execute and write copy
6D93000
heap
page read and write
5152000
trusted library allocation
page read and write
6330000
heap
page read and write
3601000
heap
page read and write
5FD9000
heap
page read and write
49F1000
heap
page read and write
200BAA70000
trusted library allocation
page read and write
70B0000
trusted library allocation
page read and write
1337000
heap
page read and write
25A0000
heap
page read and write
7FF67FBC1000
unkown
page execute read
1496F50E000
heap
page read and write
1496F557000
heap
page read and write
130A000
heap
page read and write
1496F55D000
heap
page read and write
7A9E000
stack
page read and write
2FBE000
trusted library allocation
page read and write
1ECFD010000
heap
page read and write
3090000
trusted library allocation
page read and write
3ED4000
trusted library allocation
page read and write
5025000
trusted library allocation
page read and write
5482000
trusted library allocation
page read and write
4F81000
heap
page read and write
6C9E000
stack
page read and write
3DDD000
stack
page read and write
1090000
heap
page read and write
1496ED3C000
heap
page read and write
45BE000
stack
page read and write
49F1000
heap
page read and write
880000
unkown
page readonly
2E8E000
stack
page read and write
28A8000
trusted library allocation
page read and write
4F81000
heap
page read and write
1496EC89000
heap
page read and write
2F2E000
trusted library allocation
page read and write
236CD000
heap
page read and write
4F81000
heap
page read and write
18D9000
heap
page read and write
EA5000
heap
page read and write
49F1000
heap
page read and write
3E6C000
trusted library allocation
page read and write
6ECF000
trusted library allocation
page read and write
284A000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
732000
unkown
page write copy
1496F552000
heap
page read and write
6EE7000
heap
page read and write
430000
unkown
page read and write
3031000
trusted library allocation
page read and write
3BE1000
trusted library allocation
page read and write
339E000
stack
page read and write
1BA8B440000
heap
page read and write
335F000
stack
page read and write
C000800000
direct allocation
page read and write
1496F572000
heap
page read and write
1496EC13000
heap
page read and write
10C0000
direct allocation
page read and write
4F81000
heap
page read and write
53C0000
trusted library allocation
page read and write
10C0000
direct allocation
page read and write
27E7E470000
direct allocation
page read and write
4E8C000
stack
page read and write
4CF8000
trusted library allocation
page read and write
C50000
unkown
page read and write
49F1000
heap
page read and write
3D7B000
trusted library allocation
page read and write
11CD000
heap
page read and write
426E000
stack
page read and write
3D8E000
stack
page read and write
2899000
trusted library allocation
page read and write
3051000
trusted library allocation
page read and write
5522000
trusted library allocation
page read and write
518B000
trusted library allocation
page read and write
6E8C000
stack
page read and write
3FC4000
trusted library allocation
page read and write
7075000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
8FE000
stack
page read and write
284E000
trusted library allocation
page read and write
1311000
heap
page read and write
BF0000
heap
page read and write
4180000
trusted library allocation
page read and write
4EBD000
stack
page read and write
200B968E000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
D9E000
stack
page read and write
497E000
stack
page read and write
4071000
trusted library allocation
page read and write
41CE000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
749E000
stack
page read and write
57C0000
trusted library allocation
page read and write
49F1000
heap
page read and write
4A6000
remote allocation
page execute and read and write
2D5E000
stack
page read and write
1496F57E000
heap
page read and write
41C000
unkown
page readonly
175E000
stack
page read and write
63B0000
heap
page read and write
1496F55C000
heap
page read and write
C0006D0000
direct allocation
page read and write
2E55000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
1842000
heap
page read and write
109E000
heap
page read and write
1803FFF2000
heap
page read and write
5EA2000
heap
page read and write
200B9640000
heap
page read and write
3347000
trusted library allocation
page read and write
89B000
trusted library allocation
page execute and read and write
DE7000
heap
page read and write
1496FC04000
heap
page read and write
5B66000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
4F81000
heap
page read and write
514D000
trusted library allocation
page read and write
2FCE000
stack
page read and write
3D33000
trusted library allocation
page read and write
5E96000
heap
page read and write
49F1000
heap
page read and write
200BEA80000
trusted library allocation
page read and write
C00011C000
direct allocation
page read and write
4ED0000
heap
page read and write
27E7E510000
direct allocation
page read and write
A3F000
unkown
page readonly
45EE000
stack
page read and write
655000
unkown
page read and write
3E2B000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
1496EC5F000
heap
page read and write
C000106000
direct allocation
page read and write
9C000
stack
page read and write
33C3000
trusted library allocation
page read and write
48A000
remote allocation
page execute and read and write
10C0000
direct allocation
page read and write
1496FAE1000
heap
page read and write
49F1000
heap
page read and write
3CBC000
trusted library allocation
page read and write
2E48000
trusted library allocation
page read and write
D70000
heap
page read and write
55A0000
heap
page read and write
18C2000
heap
page read and write
4F81000
heap
page read and write
425000
remote allocation
page execute and read and write
7355000
trusted library allocation
page read and write
11DE000
stack
page read and write
8700000
heap
page read and write
1496FAA1000
heap
page read and write
277F000
trusted library allocation
page read and write
1342000
heap
page read and write
4FA0000
direct allocation
page read and write
6C30000
trusted library allocation
page execute and read and write
1090000
heap
page read and write
3C17000
trusted library allocation
page read and write
36BE000
stack
page read and write
5565000
trusted library allocation
page read and write
4B1F000
stack
page read and write
5560000
heap
page read and write
121A000
trusted library allocation
page execute and read and write
5392000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
187A8530000
heap
page read and write
7FF68018E000
unkown
page write copy
200BEBF0000
trusted library allocation
page read and write
2F9F000
stack
page read and write
6AEE000
stack
page read and write
25D0000
trusted library allocation
page read and write
5820000
trusted library allocation
page execute and read and write
4D50000
trusted library allocation
page read and write
37FE000
stack
page read and write
115E000
stack
page read and write
475F000
stack
page read and write
1654000
heap
page read and write
49F1000
heap
page read and write
4F81000
heap
page read and write
14BF000
stack
page read and write
1496ED1B000
heap
page read and write
25CD000
trusted library allocation
page execute and read and write
1BA8BC02000
trusted library allocation
page read and write
4F81000
heap
page read and write
4F7F000
stack
page read and write
5570000
trusted library allocation
page read and write
C00095A000
direct allocation
page read and write
475E000
heap
page read and write
EC9000
heap
page read and write
4F81000
heap
page read and write
C000176000
direct allocation
page read and write
11CA000
trusted library allocation
page execute and read and write
2FB0000
trusted library allocation
page read and write
F30000
heap
page read and write
398F000
stack
page read and write
14DF000
stack
page read and write
1305000
heap
page read and write
D50000
heap
page read and write
31A7000
trusted library allocation
page read and write
86A000
trusted library allocation
page execute and read and write
4C90000
trusted library allocation
page read and write
2E1E000
stack
page read and write
200B96A4000
heap
page read and write
236DE000
heap
page read and write
CB2000
unkown
page execute and read and write
23221000
heap
page read and write
750E000
stack
page read and write
7FF6D02F1000
unkown
page execute read
5E87000
heap
page read and write
4356D7C000
stack
page read and write
3EF4000
trusted library allocation
page read and write
31A4000
trusted library allocation
page read and write
1902000
heap
page read and write
3173000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
C00014C000
direct allocation
page read and write
53B3000
heap
page read and write
3EAE000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
2BEE000
stack
page read and write
27E58FA9000
direct allocation
page read and write
F54000
unkown
page execute and write copy
51A0000
direct allocation
page execute and read and write
6E00000
trusted library allocation
page read and write
12ED000
heap
page read and write
3C89000
trusted library allocation
page read and write
1654000
heap
page read and write
4189000
trusted library allocation
page read and write
6DA8000
heap
page read and write
114D000
trusted library allocation
page execute and read and write
40F000
unkown
page readonly
D1C000
stack
page read and write
1496F531000
heap
page read and write
200BEEA0000
remote allocation
page read and write
4F81000
heap
page read and write
200BECF7000
heap
page read and write
4FEE000
stack
page read and write
A9E000
stack
page read and write
3D83000
trusted library allocation
page read and write
1496F554000
heap
page read and write
5640000
trusted library allocation
page read and write
49F1000
heap
page read and write
234B1000
heap
page read and write
1CB0D000
stack
page read and write
5EFE000
stack
page read and write
C000025000
direct allocation
page read and write
200B9702000
heap
page read and write
2E9C000
trusted library allocation
page read and write
307E000
heap
page read and write
2CF0000
direct allocation
page read and write
46BF000
stack
page read and write
1050000
trusted library allocation
page read and write
7FF67FE04000
unkown
page readonly
4F81000
heap
page read and write
49F1000
heap
page read and write
393E000
stack
page read and write
3CF1000
trusted library allocation
page read and write
1510000
heap
page read and write
3008000
trusted library allocation
page read and write
4F81000
heap
page read and write
2ED3000
trusted library allocation
page read and write
187A8400000
heap
page read and write
6FD000
stack
page read and write
1496FA71000
heap
page read and write
307E000
heap
page read and write
25B3FF000
stack
page read and write
385F000
stack
page read and write
464E000
stack
page read and write
27E59041000
direct allocation
page read and write
DB0000
heap
page read and write
A10000
heap
page read and write
2325B000
heap
page read and write
830000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
43569FE000
stack
page read and write
799E000
stack
page read and write
2BE0000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page read and write
46BF000
stack
page read and write
1803E300000
heap
page read and write
57A0000
trusted library allocation
page execute and read and write
3F8F000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
5560000
direct allocation
page execute and read and write
4F81000
heap
page read and write
5780000
trusted library allocation
page read and write
236E6000
heap
page read and write
5590000
trusted library allocation
page read and write
E8E000
stack
page read and write
7410000
trusted library allocation
page read and write
2634000
trusted library allocation
page read and write
1496FAAB000
heap
page read and write
5168000
trusted library allocation
page read and write
27E58E98000
heap
page read and write
110C000
heap
page read and write
1496FA6E000
heap
page read and write
1812000
heap
page read and write
1222000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
3DF3000
trusted library allocation
page read and write
27E59020000
direct allocation
page read and write
49F1000
heap
page read and write
27FD000
trusted library allocation
page read and write
C000140000
direct allocation
page read and write
C000020000
direct allocation
page read and write
5020000
trusted library allocation
page read and write
236DF000
heap
page read and write
130C000
heap
page read and write
6BAC000
stack
page read and write
6BF4000
heap
page read and write
6793000
heap
page read and write
2E2C000
trusted library allocation
page read and write
2EE8000
trusted library allocation
page read and write
2D71000
trusted library allocation
page read and write
236CD000
heap
page read and write
3C4E000
stack
page read and write
3CBF000
stack
page read and write
1496F578000
heap
page read and write
3B1E000
stack
page read and write
333C000
trusted library allocation
page read and write
2F2F000
trusted library allocation
page read and write
27E7E3E0000
direct allocation
page read and write
41B5000
trusted library allocation
page read and write
1496F556000
heap
page read and write
4F81000
heap
page read and write
54E0000
trusted library allocation
page read and write
18C2000
heap
page read and write
1496EC87000
heap
page read and write
6AAF000
stack
page read and write
4356F7B000
stack
page read and write
1496F532000
heap
page read and write
2325C000
heap
page read and write
323A000
trusted library allocation
page read and write
1654000
heap
page read and write
1496F55A000
heap
page read and write
23287000
heap
page read and write
4C08000
trusted library allocation
page read and write
56E0000
heap
page read and write
15E0000
trusted library allocation
page read and write
2CF0000
direct allocation
page read and write
2F38000
trusted library allocation
page read and write
4AD000
remote allocation
page execute and read and write
1526000
heap
page read and write
88BF000
stack
page read and write
C00014E000
direct allocation
page read and write
3201000
trusted library allocation
page read and write
12E1000
heap
page read and write
3F3E000
trusted library allocation
page read and write
2560000
heap
page read and write
17E0000
heap
page read and write
10B0000
heap
page read and write
1911000
heap
page read and write
2EF5000
trusted library allocation
page read and write
1496F593000
heap
page read and write
F40000
heap
page read and write
B9F000
stack
page read and write
2F3E000
trusted library allocation
page read and write
4000000
trusted library allocation
page read and write
4F81000
heap
page read and write
1105000
heap
page read and write
357F000
stack
page read and write
E42000
trusted library allocation
page read and write
F58000
stack
page read and write
2EE0000
trusted library allocation
page read and write
6A7E000
stack
page read and write
1496F57E000
heap
page read and write
2E2D000
stack
page read and write
200BEC8B000
heap
page read and write
3C97000
trusted library allocation
page read and write
3CA9000
trusted library allocation
page read and write
7FF6D02FE000
unkown
page readonly
2E28000
trusted library allocation
page read and write
4B20000
heap
page read and write
3F06000
trusted library allocation
page read and write
1CC4E000
stack
page read and write
DB2000
unkown
page read and write
2895000
trusted library allocation
page read and write
3C20000
trusted library allocation
page read and write
56D1000
heap
page read and write
236DF000
heap
page read and write
30A8000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
5986000
heap
page read and write
5960000
trusted library allocation
page read and write
435707E000
unkown
page readonly
554E000
stack
page read and write
1F256715000
trusted library allocation
page read and write
719000
unkown
page write copy
3E8F000
stack
page read and write
652000
unkown
page read and write
23350000
trusted library allocation
page read and write
407C000
trusted library allocation
page read and write
F40ECFE000
unkown
page readonly
1C9CE000
stack
page read and write
5760000
trusted library allocation
page execute and read and write
C000006000
direct allocation
page read and write
128A000
heap
page read and write
200BAA41000
trusted library allocation
page read and write
5020000
direct allocation
page execute and read and write
6D0000
unkown
page readonly
49F1000
heap
page read and write
3D66000
trusted library allocation
page read and write
400D000
stack
page read and write
40A5000
trusted library allocation
page read and write
C00001C000
direct allocation
page read and write
3ADF000
stack
page read and write
572E000
stack
page read and write
1D1A0000
heap
page read and write
3CC0000
trusted library allocation
page read and write
3EEB000
trusted library allocation
page read and write
1496FAD6000
heap
page read and write
3F1F000
trusted library allocation
page read and write
25B5FE000
stack
page read and write
1153000
heap
page read and write
11B4000
trusted library allocation
page read and write
1496F402000
heap
page read and write
200B9E02000
heap
page read and write
EF5000
heap
page read and write
2DAE000
trusted library allocation
page read and write
C000122000
direct allocation
page read and write
3D09000
trusted library allocation
page read and write
5385000
trusted library allocation
page read and write
1654000
heap
page read and write
30DF000
stack
page read and write
5460000
trusted library allocation
page read and write
402C000
trusted library allocation
page read and write
1800000
heap
page read and write
4F81000
heap
page read and write
5B81000
trusted library allocation
page read and write
55E0000
direct allocation
page execute and read and write
C000064000
direct allocation
page read and write
C0B000
stack
page read and write
23221000
heap
page read and write
187A8540000
heap
page read and write
FF43FFE000
stack
page read and write
9B0000
heap
page read and write
236EA000
heap
page read and write
4F81000
heap
page read and write
640C000
stack
page read and write
2823000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
C000128000
direct allocation
page read and write
50EF000
stack
page read and write
331D000
trusted library allocation
page read and write
4FCF000
stack
page read and write
E2000
unkown
page write copy
1F256430000
heap
page read and write
54C0000
trusted library allocation
page read and write
27E58FA4000
direct allocation
page read and write
2818000
trusted library allocation
page read and write
1613000
heap
page read and write
E0F000
heap
page read and write
4F81000
heap
page read and write
25F0000
trusted library allocation
page read and write
877000
unkown
page readonly
200B9F02000
heap
page read and write
1496EB70000
trusted library allocation
page read and write
402A000
trusted library allocation
page read and write
B6E000
stack
page read and write
7FF67FDC0000
unkown
page read and write
18A9000
heap
page read and write
399F000
stack
page read and write
1BFF93A0000
trusted library allocation
page read and write
11EB000
heap
page read and write
1496F577000
heap
page read and write
C000004000
direct allocation
page read and write
236DF000
heap
page read and write
2749000
trusted library allocation
page read and write
1337000
heap
page read and write
47BF000
stack
page read and write
1505000
heap
page read and write
43B6000
heap
page read and write
200BF070000
trusted library allocation
page read and write
1496FA32000
heap
page read and write
236C3000
heap
page read and write
3CE8000
trusted library allocation
page read and write
187A8444000
heap
page read and write
430E000
stack
page read and write
24733EF000
stack
page read and write
3F4A000
trusted library allocation
page read and write
E2D000
trusted library allocation
page execute and read and write
1496FA4B000
heap
page read and write
5438000
trusted library allocation
page read and write
1496EC2F000
heap
page read and write
130A000
heap
page read and write
49F1000
heap
page read and write
5EA9000
heap
page read and write
1496F581000
heap
page read and write
595C000
stack
page read and write
4F81000
heap
page read and write
5390000
trusted library allocation
page read and write
1496ECD4000
heap
page read and write
5630000
trusted library allocation
page execute and read and write
6BBDE000
unkown
page read and write
C000018000
direct allocation
page read and write
1496EC4F000
heap
page read and write
126E000
stack
page read and write
5140000
direct allocation
page execute and read and write
1496ED13000
heap
page read and write
1496F579000
heap
page read and write
D54000
heap
page read and write
5580000
direct allocation
page execute and read and write
200BEE40000
trusted library allocation
page read and write
3F45000
trusted library allocation
page read and write
150000
unkown
page readonly
843000
trusted library allocation
page execute and read and write
40CC000
trusted library allocation
page read and write
438E000
stack
page read and write
23221000
heap
page read and write
2D46000
trusted library allocation
page read and write
412F000
trusted library allocation
page read and write
1496F559000
heap
page read and write
F41107E000
stack
page read and write
3F3F000
stack
page read and write
1654000
heap
page read and write
200B968C000
heap
page read and write
1496F509000
heap
page read and write
2BEE000
stack
page read and write
3D79000
trusted library allocation
page read and write
200BF0E0000
trusted library allocation
page read and write
55B0000
direct allocation
page execute and read and write
461F000
stack
page read and write
1333000
heap
page read and write
25C0000
trusted library allocation
page read and write
638D000
heap
page read and write
40D2000
trusted library allocation
page read and write
4F81000
heap
page read and write
1496FA4D000
heap
page read and write
1195000
trusted library allocation
page execute and read and write
4F81000
heap
page read and write
E2000
unkown
page write copy
3A3F000
stack
page read and write
2CF0000
direct allocation
page read and write
3E22000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
200BEBD0000
trusted library allocation
page read and write
72E2000
trusted library allocation
page read and write
200BEC60000
trusted library allocation
page read and write
1197000
heap
page read and write
1300000
heap
page read and write
2857000
trusted library allocation
page read and write
1496F582000
heap
page read and write
7FF67FE00000
unkown
page write copy
5730000
heap
page read and write
251E000
stack
page read and write
61EB4000
direct allocation
page read and write
4760000
heap
page read and write
1496FAF3000
heap
page read and write
1F256638000
heap
page read and write
236E3000
heap
page read and write
1496F510000
heap
page read and write
2CE0000
heap
page read and write
25E7000
trusted library allocation
page execute and read and write
1880000
heap
page read and write
532B000
trusted library allocation
page read and write
2E9A000
trusted library allocation
page read and write
D54000
heap
page read and write
5220000
trusted library allocation
page read and write
7C71000
heap
page read and write
1164000
trusted library allocation
page read and write
98E000
heap
page read and write
2FF0000
trusted library allocation
page read and write
23485000
heap
page read and write
187A8350000
heap
page read and write
307F000
heap
page read and write
3C77000
trusted library allocation
page read and write
5590000
direct allocation
page execute and read and write
38FC000
stack
page read and write
1F256672000
heap
page read and write
FF443FF000
stack
page read and write
411F000
trusted library allocation
page read and write
200BED0B000
heap
page read and write
18EE000
heap
page read and write
4E80000
direct allocation
page read and write
F90000
heap
page read and write
2FBC000
trusted library allocation
page read and write
3E0C000
trusted library allocation
page read and write
2E6E000
trusted library allocation
page read and write
6B0E000
stack
page read and write
6B90000
heap
page read and write
110E000
stack
page read and write
236B6000
heap
page read and write
41BF000
trusted library allocation
page read and write
A5B000
heap
page read and write
11D0000
heap
page read and write
C000144000
direct allocation
page read and write
11A6000
heap
page read and write
13B0000
heap
page read and write
1BFF9C02000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page execute and read and write
49F1000
heap
page read and write
132E000
heap
page read and write
151C000
stack
page read and write
11C0000
trusted library allocation
page read and write
234EC000
heap
page read and write
673B000
heap
page read and write
686E000
stack
page read and write
B47000
unkown
page execute and write copy
5C30000
trusted library allocation
page read and write
88C000
unkown
page readonly
82EFC7E000
stack
page readonly
3C21000
trusted library allocation
page read and write
1496ED02000
heap
page read and write
27E59010000
direct allocation
page read and write
55E0000
trusted library allocation
page read and write
2F1E000
trusted library allocation
page read and write
1099000
heap
page read and write
987000
heap
page read and write
6EB0000
trusted library allocation
page read and write
7312000
trusted library allocation
page read and write
59A0000
heap
page read and write
2E4C000
trusted library allocation
page read and write
733F000
trusted library allocation
page read and write
5E51000
heap
page read and write
3A3E000
stack
page read and write
2338A000
heap
page read and write
1328000
heap
page read and write
1531000
heap
page read and write
6EE5000
trusted library allocation
page read and write
C0000F7000
direct allocation
page read and write
630F000
heap
page read and write
512B000
trusted library allocation
page read and write
7210000
trusted library allocation
page read and write
27E7E500000
direct allocation
page read and write
2842000
trusted library allocation
page read and write
7FF67FDEE000
unkown
page read and write
4C70000
heap
page execute and read and write
1496F57E000
heap
page read and write
774E000
stack
page read and write
7344000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
696E000
stack
page read and write
4172000
trusted library allocation
page read and write
1496F585000
heap
page read and write
1342000
heap
page read and write
6EDA0000
unkown
page readonly
C000160000
direct allocation
page read and write
1BFF9444000
heap
page read and write
3D20000
trusted library allocation
page read and write
3D13000
trusted library allocation
page read and write
1050000
heap
page read and write
61ECD000
direct allocation
page readonly
2BC0000
trusted library allocation
page read and write
424F000
stack
page read and write
6CE3F000
unkown
page write copy
742B000
trusted library allocation
page read and write
3FE3000
trusted library allocation
page read and write
3003000
trusted library allocation
page read and write
6AE4000
trusted library allocation
page read and write
23221000
heap
page read and write
100F000
heap
page read and write
4D40000
trusted library allocation
page read and write
E24000
heap
page read and write
40CF000
trusted library allocation
page read and write
9F0000
heap
page read and write
50A0000
direct allocation
page execute and read and write
E9000
unkown
page readonly
402000
remote allocation
page execute and read and write
61ED0000
direct allocation
page read and write
3D7E000
trusted library allocation
page read and write
1447000
trusted library allocation
page execute and read and write
39C192C000
stack
page read and write
1210000
heap
page read and write
307F000
heap
page read and write
1496F50E000
heap
page read and write
6C48000
heap
page read and write
2F20000
heap
page read and write
30E5000
heap
page read and write
25BD000
trusted library allocation
page execute and read and write
539B000
trusted library allocation
page read and write
388E000
stack
page read and write
27E59030000
direct allocation
page read and write
54B0000
trusted library allocation
page read and write
10F0000
heap
page read and write
1337000
heap
page read and write
1496FACA000
heap
page read and write
3E9C000
trusted library allocation
page read and write
F40000
heap
page read and write
8704000
heap
page read and write
605E000
stack
page read and write
49F1000
heap
page read and write
200BEC55000
heap
page read and write
4CFF000
stack
page read and write
25CC000
heap
page read and write
5141000
trusted library allocation
page read and write
5185000
trusted library allocation
page read and write
2698000
trusted library allocation
page read and write
7FF680192000
unkown
page write copy
5EC4000
heap
page read and write
1496F55A000
heap
page read and write
10E2000
heap
page read and write
3DFA000
trusted library allocation
page read and write
371F000
stack
page read and write
400000
unkown
page execute and read and write
1210000
trusted library allocation
page read and write
4F81000
heap
page read and write
200BECDE000
heap
page read and write
3A40000
heap
page read and write
1BA8B470000
heap
page read and write
3F7E000
stack
page read and write
4155000
trusted library allocation
page read and write
17F0000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
118A000
trusted library allocation
page execute and read and write
4F81000
heap
page read and write
1496FC12000
heap
page read and write
768F000
stack
page read and write
5120000
direct allocation
page execute and read and write
1496F591000
heap
page read and write
809C000
stack
page read and write
41AF000
trusted library allocation
page read and write
4F81000
heap
page read and write
732000
unkown
page read and write
577B000
stack
page read and write
6D6F000
heap
page read and write
25BE000
heap
page execute and read and write
116E000
heap
page read and write
18E6000
heap
page read and write
3CED000
trusted library allocation
page read and write
44C000
remote allocation
page execute and read and write
50C6000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page execute and read and write
1340000
heap
page read and write
629E000
stack
page read and write
53B0000
heap
page read and write
49F1000
heap
page read and write
2A6E000
trusted library allocation
page read and write
3900000
remote allocation
page read and write
31F2000
trusted library allocation
page read and write
236B0000
heap
page read and write
25F4000
trusted library allocation
page read and write
6F60000
heap
page read and write
2BC5000
trusted library allocation
page read and write
307F000
heap
page read and write
B45000
unkown
page execute and read and write
6C74000
heap
page read and write
1450000
heap
page read and write
C000110000
direct allocation
page read and write
3CCB000
trusted library allocation
page read and write
1496EC82000
heap
page read and write
2FDE000
stack
page read and write
2AD0000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
1154000
trusted library allocation
page read and write
2F49000
trusted library allocation
page read and write
1654000
heap
page read and write
9D0000
heap
page read and write
11EA000
heap
page read and write
6E90000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
10E6000
heap
page read and write
241F000
stack
page read and write
FF447FC000
stack
page read and write
49F1000
heap
page read and write
632B000
heap
page read and write
42FF000
stack
page read and write
940000
heap
page read and write
7F5F000
stack
page read and write
375E000
stack
page read and write
A0C000
heap
page read and write
40E3000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
187A8540000
heap
page read and write
268E000
stack
page read and write
2CEF000
stack
page read and write
3A7E000
stack
page read and write
3185000
trusted library allocation
page read and write
71FE000
stack
page read and write
5C20000
heap
page read and write
4178000
trusted library allocation
page read and write
3F5A000
trusted library allocation
page read and write
1496F3A0000
remote allocation
page read and write
1835000
heap
page read and write
4EF1000
direct allocation
page read and write
2801000
trusted library allocation
page read and write
38FF000
stack
page read and write
652D000
trusted library allocation
page read and write
200BED02000
heap
page read and write
287C000
trusted library allocation
page read and write
3DD9000
trusted library allocation
page read and write
200B9729000
heap
page read and write
200BEEA0000
remote allocation
page read and write
5E72000
heap
page read and write
550B000
trusted library allocation
page read and write
1BA8BB70000
remote allocation
page read and write
E4000
unkown
page write copy
1328000
heap
page read and write
C000016000
direct allocation
page read and write
131E000
stack
page read and write
28E3000
trusted library allocation
page read and write
C0007E5000
direct allocation
page read and write
2640000
trusted library allocation
page read and write
51B0000
direct allocation
page execute and read and write
1210000
heap
page read and write
234EC000
heap
page read and write
40C0000
heap
page read and write
3EBF000
trusted library allocation
page read and write
C000134000
direct allocation
page read and write
1030000
trusted library allocation
page execute and read and write
A22000
heap
page read and write
117B000
trusted library allocation
page execute and read and write
C0001A3000
direct allocation
page read and write
1D1B0000
heap
page read and write
FF439FF000
stack
page read and write
6FF9000
heap
page read and write
1319000
heap
page read and write
1654000
heap
page read and write
416C000
trusted library allocation
page read and write
EBE000
stack
page read and write
1654000
heap
page read and write
493F000
stack
page read and write
5490000
trusted library allocation
page execute and read and write
4089000
trusted library allocation
page read and write
5110000
direct allocation
page execute and read and write
2EF2000
trusted library allocation
page read and write
6D10000
heap
page read and write
49F1000
heap
page read and write
910000
heap
page read and write
236D9000
heap
page read and write
6E23000
heap
page read and write
5490000
heap
page read and write
DE0000
unkown
page read and write
3C23000
trusted library allocation
page read and write
117D000
trusted library allocation
page execute and read and write
10DE000
heap
page read and write
6EE5000
heap
page read and write
1654000
heap
page read and write
5170000
direct allocation
page execute and read and write
3E8F000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
4C60000
heap
page read and write
1654000
heap
page read and write
6B36000
trusted library allocation
page read and write
1304000
heap
page read and write
543A000
trusted library allocation
page read and write
236EC000
heap
page read and write
634A000
heap
page read and write
5B30000
remote allocation
page read and write
5352000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
B7F000
stack
page read and write
6130000
trusted library allocation
page read and write
200BEB02000
trusted library allocation
page read and write
DE0000
heap
page read and write
965000
unkown
page readonly
11FE000
stack
page read and write
3E55000
trusted library allocation
page read and write
4162000
trusted library allocation
page read and write
1496F415000
heap
page read and write
C000100000
direct allocation
page read and write
289D000
trusted library allocation
page read and write
6ECC000
stack
page read and write
55DE000
stack
page read and write
1496FACC000
heap
page read and write
892000
trusted library allocation
page read and write
1496ECA0000
heap
page read and write
F60000
direct allocation
page execute and read and write
82EFB7E000
unkown
page readonly
4F81000
heap
page read and write
4F90000
heap
page read and write
187A840A000
heap
page read and write
403F000
stack
page read and write
F7D000
stack
page read and write
200B9613000
heap
page read and write
108B000
heap
page read and write
1496F56D000
heap
page read and write
61E00000
direct allocation
page execute and read and write
11D5000
heap
page read and write
1055000
heap
page read and write
49F1000
heap
page read and write
187A8530000
heap
page read and write
4CF1000
trusted library allocation
page read and write
42B000
unkown
page write copy
1320000
trusted library allocation
page read and write
31BE000
stack
page read and write
1165000
heap
page read and write
556E000
trusted library allocation
page read and write
435697E000
unkown
page readonly
25E2000
trusted library allocation
page read and write
7200000
trusted library allocation
page execute and read and write
236CD000
heap
page read and write
625000
remote allocation
page execute and read and write
151000
unkown
page execute read
2AAC000
stack
page read and write
400000
remote allocation
page execute and read and write
430000
unkown
page write copy
429E000
stack
page read and write
1BFF9455000
heap
page read and write
54D0000
heap
page read and write
319000
stack
page read and write
6300000
trusted library allocation
page execute and read and write
23251000
heap
page read and write
DDD000
unkown
page readonly
120B000
heap
page read and write
28B9000
trusted library allocation
page read and write
652A000
trusted library allocation
page read and write
3ED0000
heap
page read and write
640000
unkown
page readonly
7079000
trusted library allocation
page read and write
85D000
trusted library allocation
page execute and read and write
37FD000
stack
page read and write
236CC000
heap
page read and write
1496F574000
heap
page read and write
4A10000
heap
page read and write
7218000
trusted library allocation
page read and write
C000010000
direct allocation
page read and write
320F000
stack
page read and write
1496F57A000
heap
page read and write
18BE000
heap
page read and write
389E000
stack
page read and write
2325C000
heap
page read and write
6DD2000
heap
page read and write
236EA000
heap
page read and write
D80000
heap
page read and write
4085000
trusted library allocation
page read and write
3EA3000
trusted library allocation
page read and write
4F81000
heap
page read and write
232EF000
heap
page read and write
40F8000
trusted library allocation
page read and write
407F000
stack
page read and write
1496FB12000
heap
page read and write
3E64000
trusted library allocation
page read and write
2848000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
5E9D000
heap
page read and write
2D17000
heap
page read and write
367F000
stack
page read and write
190E000
heap
page read and write
40C0000
trusted library allocation
page read and write
2E06000
trusted library allocation
page read and write
1803E010000
heap
page read and write
3C4A000
trusted library allocation
page read and write
10C0000
direct allocation
page read and write
734000
unkown
page write copy
2FFD000
trusted library allocation
page read and write
C000154000
direct allocation
page read and write
117B000
stack
page read and write
189C000
heap
page read and write
18FD000
heap
page read and write
5271000
trusted library allocation
page read and write
8200000
heap
page read and write
EFD000
stack
page read and write
12EE000
heap
page read and write
3C8E000
stack
page read and write
200C0000000
heap
page read and write
50DE000
trusted library allocation
page read and write
40DA000
trusted library allocation
page read and write
3B0E000
stack
page read and write
4E5D000
stack
page read and write
40E0000
heap
page read and write
6AE0000
trusted library allocation
page read and write
200B96BA000
heap
page read and write
10DE000
stack
page read and write
3CCE000
trusted library allocation
page read and write
47FF000
stack
page read and write
C00000C000
direct allocation
page read and write
6AAC000
stack
page read and write
80000
unkown
page readonly
1855000
heap
page read and write
1328000
heap
page read and write
BDC000
stack
page read and write
1297000
heap
page read and write
4CDB000
trusted library allocation
page read and write
DA0000
unkown
page readonly
49F1000
heap
page read and write
1190000
trusted library allocation
page read and write
6F5E000
stack
page read and write
1D2B2000
heap
page read and write
236DF000
heap
page read and write
974000
unkown
page readonly
5202000
trusted library allocation
page read and write
543E000
stack
page read and write
6D60000
heap
page read and write
126E000
stack
page read and write
49F1000
heap
page read and write
4F81000
heap
page read and write
D54000
heap
page read and write
3DE000
stack
page read and write
236B5000
heap
page read and write
1540000
heap
page read and write
236DE000
heap
page read and write
51F0000
heap
page read and write
404E000
trusted library allocation
page read and write
51BA000
trusted library allocation
page read and write
18E6000
heap
page read and write
3D3E000
trusted library allocation
page read and write
2B63000
trusted library allocation
page read and write
36591000
heap
page read and write
3C26000
trusted library allocation
page read and write
27F7000
trusted library allocation
page read and write
3C4B000
trusted library allocation
page read and write
10C0000
direct allocation
page read and write
2E90000
trusted library allocation
page read and write
200BEE30000
trusted library allocation
page read and write
236E5000
heap
page read and write
4FA0000
direct allocation
page read and write
50CE000
trusted library allocation
page read and write
6F77000
heap
page read and write
73CE000
stack
page read and write
6EE4000
heap
page read and write
537E000
trusted library allocation
page read and write
3E16000
trusted library allocation
page read and write
1337000
heap
page read and write
50ED000
trusted library allocation
page read and write
3F6B000
trusted library allocation
page read and write
1496F57D000
heap
page read and write
57D0000
trusted library allocation
page execute and read and write
6357000
heap
page read and write
897000
trusted library allocation
page execute and read and write
1212000
trusted library allocation
page read and write
320C000
trusted library allocation
page read and write
4F81000
heap
page read and write
2D1D000
trusted library allocation
page read and write
3152000
trusted library allocation
page read and write
1309000
heap
page read and write
200BEC5B000
heap
page read and write
5AF0000
trusted library allocation
page read and write
2CF1000
trusted library allocation
page read and write
2F24000
heap
page read and write
3E82000
trusted library allocation
page read and write
236EA000
heap
page read and write
7FF67FDC3000
unkown
page read and write
4DB5000
heap
page read and write
6B715000
unkown
page read and write
69AE000
stack
page read and write
4F81000
heap
page read and write
4185000
trusted library allocation
page read and write
4F81000
heap
page read and write
2BF6000
trusted library allocation
page read and write
DDC000
stack
page read and write
12C0000
heap
page read and write
6D0000
unkown
page readonly
1496FA43000
heap
page read and write
61E01000
direct allocation
page execute read
2B32000
trusted library allocation
page read and write
7FF67FDFC000
unkown
page write copy
C000142000
direct allocation
page read and write
4163000
trusted library allocation
page read and write
1654000
heap
page read and write
C52B31D000
stack
page read and write
545E000
stack
page read and write
60C0000
trusted library allocation
page read and write
1F256510000
trusted library allocation
page read and write
18FF000
heap
page read and write
5CC0000
trusted library allocation
page read and write
BC0000
heap
page read and write
9B4000
heap
page read and write
1496F554000
heap
page read and write
2F22000
trusted library allocation
page read and write
4C40000
trusted library section
page readonly
1496FA6A000
heap
page read and write
1F256900000
heap
page read and write
2FCA000
trusted library allocation
page read and write
5250000
heap
page execute and read and write
544E000
stack
page read and write
5551000
trusted library allocation
page read and write
4F81000
heap
page read and write
8916000
heap
page read and write
1496F507000
heap
page read and write
5210000
trusted library allocation
page execute and read and write
C000097000
direct allocation
page read and write
6D50000
heap
page read and write
411D000
trusted library allocation
page read and write
1F256602000
unkown
page read and write
1F256802000
heap
page read and write
6D40000
trusted library allocation
page execute and read and write
2BAE000
stack
page read and write
C000126000
direct allocation
page read and write
56D0000
heap
page read and write
425F000
stack
page read and write
D54000
heap
page read and write
3671000
trusted library allocation
page read and write
286000
unkown
page readonly
880000
heap
page read and write
7361000
heap
page read and write
187A8431000
heap
page read and write
1496ED3C000
heap
page read and write
89BF000
stack
page read and write
853000
trusted library allocation
page read and write
2FBA000
trusted library allocation
page read and write
7FF6D02F9000
unkown
page readonly
63B9000
heap
page read and write
412F000
trusted library allocation
page read and write
23F4000
heap
page read and write
5B30000
remote allocation
page read and write
4BBF000
stack
page read and write
200B96B7000
heap
page read and write
1BA8B45B000
heap
page read and write
3350000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
8C5E000
stack
page read and write
6D90000
heap
page read and write
E24000
trusted library allocation
page read and write
4D18000
trusted library allocation
page read and write
2D47000
heap
page read and write
236CD000
heap
page read and write
1496F529000
heap
page read and write
27E58D70000
heap
page read and write
1496F58B000
heap
page read and write
1496EC74000
heap
page read and write
709F000
trusted library allocation
page read and write
F40EFFE000
stack
page read and write
3EF1000
trusted library allocation
page read and write
1496F56E000
heap
page read and write
11DE000
stack
page read and write
3DB5000
trusted library allocation
page read and write
14F2000
heap
page read and write
C00015C000
direct allocation
page read and write
C52B67F000
stack
page read and write
10FD000
stack
page read and write
200B965B000
heap
page read and write
56E0000
trusted library allocation
page execute and read and write
1654000
heap
page read and write
3EDE000
stack
page read and write
7FF6D02FE000
unkown
page readonly
3371000
trusted library allocation
page read and write
171E000
stack
page read and write
27E58FAB000
direct allocation
page read and write
3376000
trusted library allocation
page read and write
516A000
trusted library allocation
page read and write
C00013A000
direct allocation
page read and write
51C0000
direct allocation
page execute and read and write
98B000
heap
page read and write
1200000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
13CF000
stack
page read and write
14E0000
heap
page execute and read and write
307F000
heap
page read and write
1496F559000
heap
page read and write
4F81000
heap
page read and write
1220000
heap
page read and write
42B000
unkown
page read and write
1496EB40000
heap
page read and write
1496F557000
heap
page read and write
C00010A000
direct allocation
page read and write
30DB000
trusted library allocation
page read and write
3C33000
trusted library allocation
page read and write
D0000
unkown
page readonly
335B000
trusted library allocation
page read and write
5491000
trusted library allocation
page read and write
3D5F000
stack
page read and write
1496F557000
heap
page read and write
B76000
heap
page read and write
3D36000
trusted library allocation
page read and write
49F1000
heap
page read and write
1496F595000
heap
page read and write
236CE000
heap
page read and write
1496F555000
heap
page read and write
5C80000
trusted library allocation
page read and write
1160000
heap
page read and write
3470000
trusted library allocation
page read and write
EE5000
heap
page read and write
1496F580000
heap
page read and write
23D0000
direct allocation
page execute and read and write
1820000
heap
page read and write
1496ED3C000
heap
page read and write
C000112000
direct allocation
page read and write
38FD000
stack
page read and write
2347D000
heap
page read and write
C000152000
direct allocation
page read and write
25B4000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
5471000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
260E000
trusted library allocation
page read and write
3018000
trusted library allocation
page read and write
3E21000
trusted library allocation
page read and write
4F81000
heap
page read and write
5F28000
heap
page read and write
44AF000
stack
page read and write
1496FB23000
heap
page read and write
5824000
heap
page read and write
A55000
heap
page read and write
1496FA8C000
heap
page read and write
900000
heap
page read and write
1ECFD0F8000
heap
page read and write
261D000
trusted library allocation
page read and write
DFD000
stack
page read and write
236EC000
heap
page read and write
2831000
trusted library allocation
page read and write
2FC1000
trusted library allocation
page read and write
9B3000
unkown
page execute and read and write
56A0000
trusted library allocation
page execute and read and write
FB0000
heap
page read and write
3F94000
trusted library allocation
page read and write
4F81000
heap
page read and write
25B6FF000
stack
page read and write
324D000
trusted library allocation
page read and write
DFE000
stack
page read and write
2C60000
heap
page read and write
3CC9000
trusted library allocation
page read and write
132E000
heap
page read and write
8F3E000
stack
page read and write
1050000
heap
page read and write
130A000
heap
page read and write
C3A000
stack
page read and write
959000
heap
page read and write
7EE40000
trusted library allocation
page execute and read and write
1496F574000
heap
page read and write
4103000
trusted library allocation
page read and write
29DB000
trusted library allocation
page read and write
6EDBF000
unkown
page readonly
413B000
trusted library allocation
page read and write
187A8540000
heap
page read and write
7FF680192000
unkown
page write copy
A7E000
heap
page read and write
2F13000
trusted library allocation
page read and write
A5F000
stack
page read and write
3145000
trusted library allocation
page read and write
6BE4000
heap
page read and write
2D7F000
trusted library allocation
page read and write
51F3000
heap
page read and write
12C6000
heap
page read and write
3D79000
trusted library allocation
page read and write
7F9F0000
trusted library allocation
page execute and read and write
1496ED3B000
heap
page read and write
3190000
trusted library allocation
page read and write
980000
heap
page read and write
10C2000
heap
page read and write
2600000
trusted library allocation
page read and write
99B000
unkown
page execute and read and write
23293000
heap
page read and write
C00001E000
direct allocation
page read and write
1460000
heap
page read and write
14A6000
heap
page read and write
1280000
heap
page read and write
3CD3000
trusted library allocation
page read and write
1496FAFE000
heap
page read and write
297A000
trusted library allocation
page read and write
236D0000
heap
page read and write
4F81000
heap
page read and write
311E000
stack
page read and write
1654000
heap
page read and write
2AAE000
stack
page read and write
114E000
stack
page read and write
3DD4000
trusted library allocation
page read and write
2CF0000
direct allocation
page read and write
2370000
heap
page read and write
5650000
trusted library allocation
page read and write
200BEB59000
trusted library allocation
page read and write
2CF0000
direct allocation
page read and write
6747000
heap
page read and write
488F000
stack
page read and write
960000
unkown
page readonly
1F256639000
heap
page read and write
1190000
trusted library allocation
page read and write
1164000
heap
page read and write
17817F20000
heap
page read and write
200BEC00000
heap
page read and write
602F000
stack
page read and write
1083000
unkown
page execute read
200B9F1A000
heap
page read and write
F6E000
stack
page read and write
5610000
direct allocation
page execute and read and write
CFD000
stack
page read and write
6EE0000
trusted library allocation
page read and write
1654000
heap
page read and write
739000
unkown
page readonly
200BEA70000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
5590000
direct allocation
page execute and read and write
40C6000
trusted library allocation
page read and write
2FCF000
trusted library allocation
page read and write
80000
unkown
page readonly
E9C000
heap
page read and write
140E000
stack
page read and write
200BEC62000
heap
page read and write
910000
heap
page read and write
5366000
trusted library allocation
page read and write
3010000
heap
page read and write
3C1A000
trusted library allocation
page read and write
1496F56B000
heap
page read and write
457F000
stack
page read and write
2E4F000
trusted library allocation
page read and write
318B000
trusted library allocation
page read and write
7450000
trusted library allocation
page execute and read and write
14A0000
heap
page read and write
5124000
trusted library allocation
page read and write
7C75000
heap
page read and write
1F0000
heap
page read and write
EDE000
heap
page read and write
11F0000
heap
page read and write
2FB5000
trusted library allocation
page read and write
1074000
trusted library allocation
page read and write
200BA100000
trusted library allocation
page read and write
140F000
stack
page read and write
7FF67FDBB000
unkown
page read and write
6ED1000
heap
page read and write
53D0000
trusted library allocation
page read and write
5600000
direct allocation
page execute and read and write
10E7000
unkown
page execute and write copy
4F81000
heap
page read and write
3FCF000
stack
page read and write
200B9628000
heap
page read and write
7FF680130000
unkown
page read and write
1BA8BB70000
remote allocation
page read and write
5130000
direct allocation
page execute and read and write
4F81000
heap
page read and write
1496F552000
heap
page read and write
9B4000
unkown
page execute and write copy
4182000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
27E58E50000
heap
page read and write
6EA0000
trusted library allocation
page execute and read and write
1496F557000
heap
page read and write
2E5C000
trusted library allocation
page read and write
233D0000
heap
page read and write
4F81000
heap
page read and write
1496ED3C000
heap
page read and write
4F81000
heap
page read and write
5341000
trusted library allocation
page read and write
4F81000
heap
page read and write
6763000
heap
page read and write
4D7D000
stack
page read and write
144C000
stack
page read and write
2650000
trusted library allocation
page read and write
5C70000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
406F000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
2CF0000
direct allocation
page read and write
50D2000
trusted library allocation
page read and write
236EA000
heap
page read and write
1496F556000
heap
page read and write
1803E070000
heap
page read and write
78DE000
stack
page read and write
5324000
trusted library allocation
page read and write
410E000
stack
page read and write
1654000
heap
page read and write
4356A7E000
unkown
page readonly
10FA000
stack
page read and write
41D0000
heap
page read and write
573C000
stack
page read and write
49F1000
heap
page read and write
390000
heap
page read and write
5190000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
5F99000
heap
page read and write
236B6000
heap
page read and write
E46000
trusted library allocation
page execute and read and write
408D000
trusted library allocation
page read and write
9B3000
unkown
page execute and write copy
1496FB02000
heap
page read and write
545F000
stack
page read and write
1BA8B3F0000
heap
page read and write
2885000
trusted library allocation
page read and write
6B0000
unkown
page read and write
1654000
heap
page read and write
4CDE000
trusted library allocation
page read and write
49F1000
heap
page read and write
27EC000
trusted library allocation
page read and write
1F256638000
heap
page read and write
1520000
heap
page read and write
40BC000
trusted library allocation
page read and write
2FF6000
trusted library allocation
page read and write
3D88000
trusted library allocation
page read and write
F40EEFE000
unkown
page readonly
474F000
stack
page read and write
49F1000
heap
page read and write
200B962B000
heap
page read and write
D54000
heap
page read and write
2E67000
trusted library allocation
page read and write
1330000
trusted library allocation
page execute and read and write
3D75000
trusted library allocation
page read and write
D54000
heap
page read and write
C51000
unkown
page execute and write copy
1654000
heap
page read and write
C000030000
direct allocation
page read and write
200BEB30000
trusted library allocation
page read and write
3248000
trusted library allocation
page read and write
200B9520000
heap
page read and write
5BB0000
trusted library allocation
page read and write
3D4F000
stack
page read and write
82EF4CB000
stack
page read and write
4C10000
trusted library allocation
page read and write
2325C000
heap
page read and write
C00003C000
direct allocation
page read and write
4F81000
heap
page read and write
134E000
heap
page read and write
6B0000
unkown
page read and write
1496F58B000
heap
page read and write
127E000
stack
page read and write
1351000
heap
page read and write
77CE000
stack
page read and write
247336F000
stack
page read and write
147F000
stack
page read and write
6050000
heap
page read and write
C00032A000
direct allocation
page read and write
3C69000
trusted library allocation
page read and write
3CCE000
trusted library allocation
page read and write
6F80000
heap
page read and write
2DF8000
trusted library allocation
page read and write
5F83000
heap
page read and write
10C0000
direct allocation
page read and write
17817F40000
heap
page read and write
1496EC6E000
heap
page read and write
6EDB6000
unkown
page readonly
1496F588000
heap
page read and write
C000037000
direct allocation
page read and write
1170000
trusted library allocation
page read and write
7072000
trusted library allocation
page read and write
779E000
stack
page read and write
33DA000
trusted library allocation
page read and write
6742000
heap
page read and write
582D000
stack
page read and write
960000
heap
page read and write
3C33000
trusted library allocation
page read and write
236EA000
heap
page read and write
2F74000
trusted library allocation
page read and write
357E000
stack
page read and write
1500000
heap
page read and write
236D0000
heap
page read and write
200B969E000
heap
page read and write
187A8444000
heap
page read and write
1496FB23000
heap
page read and write
42A6000
heap
page read and write
CF7000
stack
page read and write
4E6C000
stack
page read and write
4BFE000
stack
page read and write
1BA8B413000
heap
page read and write
615E000
stack
page read and write
17F0000
direct allocation
page read and write
2AC0000
trusted library allocation
page read and write
1496F3A0000
remote allocation
page read and write
3D38000
trusted library allocation
page read and write
513E000
trusted library allocation
page read and write
1803E097000
heap
page read and write
4DD0000
heap
page read and write
1337000
heap
page read and write
52DE000
stack
page read and write
48CE000
stack
page read and write
51A2000
trusted library allocation
page read and write
712D000
stack
page read and write
414E000
stack
page read and write
12EE000
heap
page read and write
62FB000
heap
page read and write
C00017E000
direct allocation
page read and write
54B0000
trusted library allocation
page read and write
6BEF000
stack
page read and write
5395000
trusted library allocation
page read and write
3186000
trusted library allocation
page read and write
7440000
trusted library allocation
page execute and read and write
1328000
heap
page read and write
4F81000
heap
page read and write
6CDD000
stack
page read and write
2918000
trusted library allocation
page read and write
8211000
heap
page read and write
1496FADD000
heap
page read and write
23750000
heap
page read and write
517E000
trusted library allocation
page read and write
6DDC000
stack
page read and write
1057000
heap
page read and write
1496FAA3000
heap
page read and write
35DF000
stack
page read and write
200BEB30000
trusted library allocation
page read and write
A60000
heap
page read and write
8216000
heap
page read and write
FF445FF000
stack
page read and write
2FFB000
trusted library allocation
page read and write
1F256813000
heap
page read and write
3EFF000
trusted library allocation
page read and write
17F0000
direct allocation
page read and write
1496ED3C000
heap
page read and write
7FF6D02FC000
unkown
page read and write
5040000
direct allocation
page execute and read and write
5350000
heap
page read and write
23E0000
direct allocation
page read and write
4F81000
heap
page read and write
1496F55D000
heap
page read and write
4035000
trusted library allocation
page read and write
4F81000
heap
page read and write
6FB3000
heap
page read and write
1329000
heap
page read and write
4F81000
heap
page read and write
23232000
heap
page read and write
2EE6000
trusted library allocation
page read and write
C000047000
direct allocation
page read and write
55D0000
direct allocation
page execute and read and write
200BEB00000
trusted library allocation
page read and write
3E9F000
stack
page read and write
72BD000
stack
page read and write
638A000
heap
page read and write
19C000
stack
page read and write
27E7E4C0000
direct allocation
page read and write
5BA1000
trusted library allocation
page read and write
2347E000
heap
page read and write
891000
unkown
page execute and read and write
2736000
trusted library allocation
page read and write
3EBA000
trusted library allocation
page read and write
200B9706000
heap
page read and write
6ED0000
heap
page read and write
1F256900000
heap
page read and write
236EC000
heap
page read and write
289B000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
2D40000
heap
page read and write
8EFF000
stack
page read and write
282D000
trusted library allocation
page read and write
1351000
heap
page read and write
7088000
trusted library allocation
page read and write
2E83000
trusted library allocation
page read and write
1803E0A2000
heap
page read and write
50CB000
trusted library allocation
page read and write
6CE40000
unkown
page read and write
12FD000
heap
page read and write
25C3000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
4090000
trusted library allocation
page read and write
51BB000
stack
page read and write
3C01000
trusted library allocation
page read and write
1496F52A000
heap
page read and write
10C0000
direct allocation
page read and write
1342000
heap
page read and write
25D2000
trusted library allocation
page read and write
88FC000
stack
page read and write
1060000
heap
page read and write
B45000
unkown
page execute and read and write
716F000
stack
page read and write
434E000
stack
page read and write
25DA000
trusted library allocation
page execute and read and write
6D8A000
heap
page read and write
606E000
stack
page read and write
5335000
trusted library allocation
page read and write
2660000
heap
page execute and read and write
6B717000
unkown
page readonly
F4110FE000
unkown
page readonly
7FF67FE04000
unkown
page readonly
6B0000
unkown
page readonly
325E000
stack
page read and write
1C64F000
stack
page read and write
1496F527000
heap
page read and write
2C00000
heap
page read and write
25EB000
trusted library allocation
page execute and read and write
28AE000
trusted library allocation
page read and write
5F2E000
stack
page read and write
3EDB000
trusted library allocation
page read and write
234B000
unkown
page readonly
3FF0000
trusted library allocation
page read and write
1496F567000
heap
page read and write
200B96FF000
heap
page read and write
401000
unkown
page execute read
5010000
direct allocation
page execute and read and write
98B000
heap
page read and write
17F0000
direct allocation
page read and write
885000
heap
page read and write
EC0000
heap
page read and write
5170000
trusted library allocation
page read and write
3701000
heap
page read and write
10C0000
direct allocation
page read and write
10FD000
stack
page read and write
132F000
heap
page read and write
56E0000
heap
page read and write
3BBE000
stack
page read and write
3D30000
trusted library allocation
page read and write
1F256600000
unkown
page read and write
6EDA1000
unkown
page execute read
3C0A000
trusted library allocation
page read and write
4F81000
heap
page read and write
1496ECDA000
heap
page read and write
2D2D000
stack
page read and write
152A000
heap
page read and write
1BFF9270000
heap
page read and write
49F1000
heap
page read and write
2510000
unclassified section
page read and write
4F81000
heap
page read and write
D54000
heap
page read and write
8C9E000
stack
page read and write
10C0000
direct allocation
page read and write
5E24000
heap
page read and write
4F81000
heap
page read and write
200BEEA0000
remote allocation
page read and write
6FAB000
heap
page read and write
1496ED1B000
heap
page read and write
3D1A000
trusted library allocation
page read and write
12FA000
heap
page read and write
49F1000
heap
page read and write
30FC000
trusted library allocation
page read and write
100E000
stack
page read and write
200BEC50000
trusted library allocation
page read and write
27E590E0000
heap
page read and write
264E000
stack
page read and write
1654000
heap
page read and write
200B9F13000
heap
page read and write
3057000
heap
page read and write
3F84000
trusted library allocation
page read and write
1218000
heap
page read and write
2FBF000
stack
page read and write
4135000
trusted library allocation
page read and write
182B000
heap
page read and write
5040000
heap
page execute and read and write
234B000
unkown
page readonly
5190000
direct allocation
page execute and read and write
36BE000
stack
page read and write
10A4000
trusted library allocation
page read and write
39CE000
stack
page read and write
E30000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
1100000
heap
page read and write
49F1000
heap
page read and write
6B6D1000
unkown
page execute read
DA0000
heap
page read and write
30B8000
trusted library allocation
page read and write
236DE000
heap
page read and write
3E66000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
1803FDF2000
heap
page read and write
C00009C000
direct allocation
page read and write
4B20000
heap
page read and write
35ED000
stack
page read and write
5435000
trusted library allocation
page read and write
6B9E000
stack
page read and write
E5C000
stack
page read and write
5BBB000
trusted library allocation
page read and write
7860000
heap
page read and write
A82000
unkown
page readonly
791E000
stack
page read and write
304E000
trusted library allocation
page read and write
FAE000
stack
page read and write
49F1000
heap
page read and write
E55000
trusted library allocation
page execute and read and write
1221000
heap
page read and write
1496EC7E000
heap
page read and write
6B1000
unkown
page execute and write copy
4390000
heap
page read and write
3CB6000
trusted library allocation
page read and write
6BB51000
unkown
page execute read
6E5C000
stack
page read and write
230000
unkown
page readonly
4A0E000
stack
page read and write
1192000
heap
page read and write
80E000
stack
page read and write
C000180000
direct allocation
page read and write
11F4000
trusted library allocation
page read and write
3D7E000
trusted library allocation
page read and write
FD0000
heap
page read and write
3CA8000
trusted library allocation
page read and write
862000
trusted library allocation
page read and write
6F60000
heap
page read and write
1496FC13000
heap
page read and write
4D90000
heap
page read and write
186E000
heap
page read and write
C9B000
stack
page read and write
236C7000
heap
page read and write
415E000
stack
page read and write
3013000
trusted library allocation
page read and write
1496ED1B000
heap
page read and write
2846000
trusted library allocation
page read and write
25AFFB000
stack
page read and write
7060000
trusted library allocation
page read and write
5412000
trusted library allocation
page read and write
5225000
trusted library allocation
page read and write
1496ED1B000
heap
page read and write
18E6000
heap
page read and write
D54000
heap
page read and write
5130000
direct allocation
page execute and read and write
637B000
heap
page read and write
1080000
heap
page read and write
5060000
direct allocation
page execute and read and write
1496F55F000
heap
page read and write
EF0000
heap
page read and write
1ECFCFF0000
heap
page read and write
336E000
stack
page read and write
EE0000
heap
page read and write
12DD000
heap
page read and write
1496FA7B000
heap
page read and write
DFE000
heap
page read and write
61ECC000
direct allocation
page read and write
14F0000
trusted library allocation
page execute and read and write
3DFF000
stack
page read and write
712000
unkown
page execute and read and write
4F81000
heap
page read and write
121E000
stack
page read and write
1496F576000
heap
page read and write
99B000
unkown
page execute and read and write
2E78000
trusted library allocation
page read and write
40F000
unkown
page readonly
17DE000
stack
page read and write
1654000
heap
page read and write
49F1000
heap
page read and write
5540000
heap
page read and write
40BE000
stack
page read and write
236C4000
heap
page read and write
49C697E000
unkown
page read and write
11B0000
trusted library allocation
page read and write
2CF0000
direct allocation
page read and write
2655000
trusted library allocation
page read and write
4193000
trusted library allocation
page read and write
844000
trusted library allocation
page read and write
23271000
heap
page read and write
200BEAF0000
trusted library allocation
page read and write
2814000
trusted library allocation
page read and write
3E3E000
stack
page read and write
4FE0000
direct allocation
page execute and read and write
23750000
heap
page read and write
1496FABB000
heap
page read and write
2325C000
heap
page read and write
41C5000
trusted library allocation
page read and write
5476000
trusted library allocation
page read and write
40D2000
trusted library allocation
page read and write
25AA000
heap
page read and write
12CF000
stack
page read and write
1510000
heap
page read and write
1195000
heap
page read and write
754E000
stack
page read and write
7F9B000
stack
page read and write
6E94000
trusted library allocation
page read and write
2A6E000
stack
page read and write
6F7000
stack
page read and write
520E000
stack
page read and write
679C000
heap
page read and write
1654000
heap
page read and write
5A1D000
stack
page read and write
385F000
trusted library allocation
page read and write
1F256913000
heap
page read and write
408B000
trusted library allocation
page read and write
4EC0000
heap
page read and write
2E47000
trusted library allocation
page read and write
74A000
heap
page read and write
3FD1000
trusted library allocation
page read and write
1353000
heap
page read and write
5830000
trusted library allocation
page execute and read and write
6DBF000
heap
page read and write
10D0000
heap
page read and write
1496F950000
remote allocation
page read and write
6FB0000
trusted library allocation
page execute and read and write
758E000
stack
page read and write
1496F574000
heap
page read and write
6530000
trusted library allocation
page execute and read and write
154E000
heap
page read and write
11E0000
heap
page read and write
9B0000
heap
page read and write
1496FA97000
heap
page read and write
41C8000
trusted library allocation
page read and write
6CFD000
stack
page read and write
5560000
trusted library allocation
page read and write
719000
unkown
page read and write
6D4F000
stack
page read and write
7850000
heap
page read and write
18E0000
heap
page read and write
4C50000
heap
page read and write
401D000
trusted library allocation
page read and write
F80000
heap
page read and write
CF9000
stack
page read and write
27E7E4D0000
direct allocation
page read and write
740E000
stack
page read and write
8901000
heap
page read and write
3EBA000
trusted library allocation
page read and write
307E000
heap
page read and write
1654000
heap
page read and write
2E9B000
stack
page read and write
236EC000
heap
page read and write
730000
heap
page read and write
29AB000
trusted library allocation
page read and write
3B80000
remote allocation
page read and write
60D0000
trusted library allocation
page execute and read and write
7FF68018E000
unkown
page read and write
300C000
trusted library allocation
page read and write
650C000
stack
page read and write
4F5E000
stack
page read and write
7FF67FDBF000
unkown
page write copy
1CC0C000
stack
page read and write
11FD000
trusted library allocation
page execute and read and write
5090000
direct allocation
page execute and read and write
438F000
stack
page read and write
1654000
heap
page read and write
35AE000
stack
page read and write
49F1000
heap
page read and write
3ACF000
stack
page read and write
1496F593000
heap
page read and write
125E000
heap
page read and write
6D82000
heap
page read and write
77DE000
stack
page read and write
49F1000
heap
page read and write
2D5E000
stack
page read and write
6D00000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
3352000
trusted library allocation
page read and write
200B9713000
heap
page read and write
1F256410000
heap
page read and write
187A86F4000
heap
page read and write
1110000
heap
page read and write
131E000
stack
page read and write
2D10000
heap
page read and write
25D6000
trusted library allocation
page execute and read and write
5B8A000
trusted library allocation
page read and write
7FF6D02F0000
unkown
page readonly
12EA000
heap
page read and write
1220000
heap
page read and write
6BBCD000
unkown
page readonly
1CD4D000
stack
page read and write
5B50000
trusted library allocation
page read and write
1496EC7D000
heap
page read and write
1496EA60000
heap
page read and write
2EDC000
trusted library allocation
page read and write
62EB000
heap
page read and write
12C8000
heap
page read and write
1496F593000
heap
page read and write
42A5000
heap
page read and write
4143000
trusted library allocation
page read and write
3C1F000
stack
page read and write
49F1000
heap
page read and write
54A0000
trusted library allocation
page read and write
187A842F000
heap
page read and write
E2000
unkown
page read and write
D0000
unkown
page readonly
25FB000
trusted library allocation
page read and write
C000022000
direct allocation
page read and write
4F81000
heap
page read and write
2BC0000
heap
page execute and read and write
12AD000
stack
page read and write
654000
unkown
page write copy
307F000
heap
page read and write
4110000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
51F0000
heap
page read and write
11E0000
heap
page read and write
23380000
heap
page read and write
4F81000
heap
page read and write
17F0000
direct allocation
page read and write
56DF000
stack
page read and write
232DD000
heap
page read and write
8D9E000
stack
page read and write
5260000
trusted library allocation
page read and write
14FF000
stack
page read and write
840000
trusted library allocation
page read and write
C000196000
direct allocation
page read and write
5556000
trusted library allocation
page read and write
4F81000
heap
page read and write
51AE000
trusted library allocation
page read and write
DE7000
heap
page read and write
3355000
trusted library allocation
page read and write
C00015A000
direct allocation
page read and write
4F81000
heap
page read and write
200B9693000
heap
page read and write
6B1000
unkown
page execute and write copy
C00013E000
direct allocation
page read and write
254F000
stack
page read and write
5400000
heap
page read and write
5146000
trusted library allocation
page read and write
3ECE000
stack
page read and write
56DE000
heap
page read and write
1496F529000
heap
page read and write
FE0000
heap
page read and write
7310000
trusted library allocation
page read and write
41BC000
trusted library allocation
page read and write
1800000
heap
page read and write
1496F559000
heap
page read and write
6BEE000
stack
page read and write
3F33000
trusted library allocation
page read and write
282F000
trusted library allocation
page read and write
28C5000
trusted library allocation
page read and write
200B9E00000
heap
page read and write
3EE8000
trusted library allocation
page read and write
6BFC000
stack
page read and write
3B80000
remote allocation
page read and write
489F000
stack
page read and write
179E000
stack
page read and write
1496FAD3000
heap
page read and write
133C000
heap
page read and write
C000029000
direct allocation
page read and write
1496F55A000
heap
page read and write
1225000
trusted library allocation
page execute and read and write
6D64000
heap
page read and write
50C0000
trusted library allocation
page read and write
236C3000
heap
page read and write
43DE000
stack
page read and write
54F0000
trusted library allocation
page read and write
1496EC9C000
heap
page read and write
CF3000
stack
page read and write
4010000
trusted library allocation
page read and write
C00096A000
direct allocation
page read and write
150B000
heap
page read and write
1496F52A000
heap
page read and write
40B3000
trusted library allocation
page read and write
153B000
heap
page read and write
659000
unkown
page readonly
1803E077000
heap
page read and write
1BFF9402000
heap
page read and write
2CEC000
trusted library allocation
page read and write
740000
heap
page read and write
5990000
heap
page read and write
9D0000
heap
page read and write
1496ED1B000
heap
page read and write
30FB000
trusted library allocation
page read and write
200B9717000
heap
page read and write
C000086000
direct allocation
page read and write
236E3000
heap
page read and write
5570000
direct allocation
page execute and read and write
1496FB05000
heap
page read and write
14B9000
stack
page read and write
2E62000
trusted library allocation
page read and write
153F000
unkown
page readonly
1654000
heap
page read and write
2DCF000
stack
page read and write
27E59002000
direct allocation
page read and write
5B6E000
stack
page read and write
6B80000
trusted library allocation
page read and write
17F0000
direct allocation
page read and write
7CF08FB000
stack
page read and write
50B0000
direct allocation
page execute and read and write
4B10000
heap
page read and write
30F0000
trusted library allocation
page read and write
3133000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
12DD000
heap
page read and write
3851000
trusted library allocation
page read and write
2816000
trusted library allocation
page read and write
8919000
heap
page read and write
4ABE000
stack
page read and write
54AE000
trusted library allocation
page read and write
5F0000
unkown
page readonly
3CA0000
trusted library allocation
page read and write
3E5E000
trusted library allocation
page read and write
2F29000
trusted library allocation
page read and write
173000
unkown
page readonly
18C2000
heap
page read and write
200BEB40000
trusted library allocation
page read and write
640000
unkown
page readonly
7875000
heap
page read and write
5390000
trusted library allocation
page read and write
2891000
trusted library allocation
page read and write
200B96FF000
heap
page read and write
6EB5000
trusted library allocation
page read and write
133C000
heap
page read and write
4B21000
heap
page read and write
C0007E5000
direct allocation
page read and write
43B0000
heap
page read and write
34AE000
stack
page read and write
109D000
stack
page read and write
4170000
trusted library allocation
page read and write
46FE000
stack
page read and write
5028000
trusted library allocation
page read and write
C000052000
direct allocation
page read and write
54C0000
trusted library allocation
page read and write
2CF0000
direct allocation
page read and write
412C000
trusted library allocation
page read and write
1300000
heap
page read and write
2E4F000
stack
page read and write
3331000
trusted library allocation
page read and write
3DE6000
trusted library allocation
page read and write
3231000
trusted library allocation
page read and write
4F81000
heap
page read and write
5F25000
heap
page read and write
3D74000
trusted library allocation
page read and write
49F1000
heap
page read and write
3CF9000
trusted library allocation
page read and write
140F000
stack
page read and write
5531000
trusted library allocation
page read and write
5770000
trusted library allocation
page execute and read and write
7FF68018F000
unkown
page write copy
187A8500000
heap
page read and write
30C9000
trusted library allocation
page read and write
5011000
direct allocation
page read and write
2C27000
trusted library allocation
page read and write
BDC000
stack
page read and write
5590000
direct allocation
page execute and read and write
128E000
heap
page read and write
479E000
stack
page read and write
4F81000
heap
page read and write
1496F595000
heap
page read and write
10BB000
heap
page read and write
414A000
trusted library allocation
page read and write
200B9676000
heap
page read and write
1496F55C000
heap
page read and write
3219000
trusted library allocation
page read and write
54D0000
trusted library allocation
page execute and read and write
7350000
trusted library allocation
page read and write
18DF000
heap
page read and write
49F1000
heap
page read and write
4169000
trusted library allocation
page read and write
17F0000
direct allocation
page read and write
178182B5000
heap
page read and write
5750000
trusted library allocation
page execute and read and write
62D0000
heap
page read and write
4136000
trusted library allocation
page read and write
27E590E5000
heap
page read and write
40D9000
trusted library allocation
page read and write
C00010C000
direct allocation
page read and write
50C4000
trusted library allocation
page read and write
49F1000
heap
page read and write
3E8B000
trusted library allocation
page read and write
7FF680189000
unkown
page read and write
1ECFD3C0000
heap
page read and write
173000
unkown
page readonly
1496F578000
heap
page read and write
3C28000
trusted library allocation
page read and write
4DDC000
stack
page read and write
413B000
trusted library allocation
page read and write
795E000
stack
page read and write
200BEC4D000
heap
page read and write
1496F55A000
heap
page read and write
55A0000
direct allocation
page execute and read and write
49F1000
heap
page read and write
1337000
heap
page read and write
120D000
trusted library allocation
page execute and read and write
1153000
heap
page read and write
1496F55A000
heap
page read and write
7360000
heap
page read and write
70B2000
trusted library allocation
page read and write
96B000
stack
page read and write
1BA8BB70000
remote allocation
page read and write
3177000
trusted library allocation
page read and write
49F1000
heap
page read and write
C00015E000
direct allocation
page read and write
4356879000
stack
page read and write
23220000
heap
page read and write
C00019D000
direct allocation
page read and write
4F81000
heap
page read and write
61ED4000
direct allocation
page readonly
1496F557000
heap
page read and write
17F0000
direct allocation
page read and write
F4109F9000
stack
page read and write
1119000
heap
page read and write
5580000
trusted library allocation
page read and write
200BEC1F000
heap
page read and write
3E61000
trusted library allocation
page read and write
FF43BFF000
stack
page read and write
E5000
unkown
page read and write
5F46000
heap
page read and write
49F1000
heap
page read and write
49F1000
heap
page read and write
FF43DFE000
stack
page read and write
8EBE000
stack
page read and write
3EF9000
trusted library allocation
page read and write
736E000
heap
page read and write
F40F8FE000
unkown
page readonly
1F256902000
heap
page read and write
50E6000
trusted library allocation
page read and write
8B5E000
stack
page read and write
6360000
trusted library allocation
page read and write
3D10000
trusted library allocation
page read and write
5050000
direct allocation
page execute and read and write
407000
remote allocation
page execute and read and write
49F1000
heap
page read and write
28C1000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
3FF5000
trusted library allocation
page read and write
3CDB000
trusted library allocation
page read and write
4F81000
heap
page read and write
71B000
unkown
page execute and read and write
5620000
trusted library allocation
page read and write
2327E000
heap
page read and write
5130000
direct allocation
page execute and read and write
4F81000
heap
page read and write
28BF000
trusted library allocation
page read and write
866000
trusted library allocation
page execute and read and write
27E59080000
direct allocation
page read and write
49F1000
heap
page read and write
1000000
heap
page read and write
18E0000
heap
page read and write
3364000
trusted library allocation
page read and write
1803E305000
heap
page read and write
1020000
heap
page read and write
49F1000
heap
page read and write
1654000
heap
page read and write
1496FABA000
heap
page read and write
3C64000
trusted library allocation
page read and write
3C5D000
trusted library allocation
page read and write
DB5000
unkown
page read and write
3CE2000
trusted library allocation
page read and write
5516000
trusted library allocation
page read and write
27E59000000
direct allocation
page read and write
14AA000
heap
page read and write
49F1000
heap
page read and write
128E000
stack
page read and write
7FF6801B9000
unkown
page readonly
1496ED1B000
heap
page read and write
282B000
trusted library allocation
page read and write
1BA8B3E0000
heap
page read and write
1BA8B502000
heap
page read and write
4DB0000
trusted library allocation
page execute and read and write
2325C000
heap
page read and write
4CF6000
trusted library allocation
page read and write
7FD60000
trusted library allocation
page execute and read and write
4F80000
heap
page read and write
539E000
trusted library allocation
page read and write
2FDC000
trusted library allocation
page read and write
CFD000
stack
page read and write
4760000
heap
page read and write
1325000
trusted library allocation
page read and write
18EE000
heap
page read and write
4F81000
heap
page read and write
27CD000
trusted library allocation
page read and write
2325C000
heap
page read and write
2325B000
heap
page read and write
3C25000
trusted library allocation
page read and write
12CE000
stack
page read and write
3EF7000
trusted library allocation
page read and write
C00004E000
direct allocation
page read and write
6F9E000
stack
page read and write
187A8444000
heap
page read and write
4357A7E000
unkown
page readonly
82EF8FE000
stack
page read and write
5010000
direct allocation
page execute and read and write
4093000
trusted library allocation
page read and write
1496F578000
heap
page read and write
151000
unkown
page execute read
C00012A000
direct allocation
page read and write
49F1000
heap
page read and write
1496FAC6000
heap
page read and write
1602000
heap
page read and write
3800000
trusted library allocation
page read and write
1127000
heap
page read and write
40EE000
trusted library allocation
page read and write
C00050E000
direct allocation
page read and write
287A000
trusted library allocation
page read and write
4177000
trusted library allocation
page read and write
40D5000
trusted library allocation
page read and write
F37000
stack
page read and write
6BB50000
unkown
page readonly
94A000
stack
page read and write
5010000
direct allocation
page execute and read and write
C000114000
direct allocation
page read and write
317F000
trusted library allocation
page read and write
1CEFE000
stack
page read and write
17F000
unkown
page write copy
4E7E000
stack
page read and write
49D0000
heap
page read and write
6FF0000
trusted library allocation
page read and write
411F000
stack
page read and write
C50000
unkown
page readonly
17F0000
direct allocation
page read and write
200BEBF0000
trusted library allocation
page read and write
3C56000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
200BA440000
trusted library allocation
page read and write
5F32000
heap
page read and write
7FF6D02F0000
unkown
page readonly
49DF000
stack
page read and write
6EC8000
trusted library allocation
page read and write
E33000
heap
page read and write
1140000
heap
page read and write
7340000
trusted library allocation
page read and write
E0E000
stack
page read and write
46F0000
heap
page read and write
2622000
trusted library allocation
page read and write
60E0000
trusted library allocation
page execute and read and write
5460000
trusted library allocation
page execute and read and write
237B6000
heap
page read and write
C000041000
direct allocation
page read and write
4075000
trusted library allocation
page read and write
28C7000
trusted library allocation
page read and write
6CC60000
unkown
page readonly
144B000
trusted library allocation
page execute and read and write
E31000
unkown
page execute and read and write
4010000
trusted library allocation
page read and write
4B30000
trusted library allocation
page execute and read and write
200BECFF000
heap
page read and write
1496ECB3000
heap
page read and write
1496FB12000
heap
page read and write
3F78000
trusted library allocation
page read and write
1496FC00000
heap
page read and write
49F1000
heap
page read and write
1259000
heap
page read and write
1159000
heap
page read and write
1ECFCF10000
heap
page read and write
F40EDF7000
stack
page read and write
23486000
heap
page read and write
2D84000
trusted library allocation
page read and write
7CF0AFF000
stack
page read and write
3D74000
trusted library allocation
page read and write
E20000
unkown
page execute read
34CE000
stack
page read and write
153A000
heap
page read and write
3CA3000
trusted library allocation
page read and write
1496FADD000
heap
page read and write
1177000
trusted library allocation
page execute and read and write
1803DFE0000
heap
page read and write
1496F578000
heap
page read and write
5F0000
unkown
page readonly
12C8000
heap
page read and write
2FD7000
trusted library allocation
page read and write
1496FC02000
heap
page read and write
7FF67FDBB000
unkown
page write copy
10DA000
heap
page read and write
1197000
trusted library allocation
page execute and read and write
6EF0000
trusted library allocation
page read and write
318B000
trusted library allocation
page read and write
8B0000
trusted library allocation
page read and write
236EB000
heap
page read and write
37BF000
stack
page read and write
5E83000
heap
page read and write
5160000
trusted library allocation
page read and write
6E47000
heap
page read and write
4CE2000
trusted library allocation
page read and write
200B9679000
heap
page read and write
182E000
heap
page read and write
C000056000
direct allocation
page read and write
4175000
trusted library allocation
page read and write
307F000
heap
page read and write
11DB000
heap
page read and write
2A9F000
trusted library allocation
page read and write
4CFD000
trusted library allocation
page read and write
6770000
heap
page read and write
3F71000
trusted library allocation
page read and write
1496F556000
heap
page read and write
68C0000
heap
page read and write
4D02000
trusted library allocation
page read and write
41C000
unkown
page readonly
1496F55C000
heap
page read and write
C00008C000
direct allocation
page read and write
1496F593000
heap
page read and write
1803E0A2000
heap
page read and write
6CEE000
stack
page read and write
153F000
unkown
page readonly
236E9000
heap
page read and write
409A000
trusted library allocation
page read and write
A18000
heap
page read and write
32AC000
heap
page read and write
15F0000
heap
page read and write
1654000
heap
page read and write
C000035000
direct allocation
page read and write
1182000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
E9000
unkown
page readonly
FF441FF000
stack
page read and write
3E11000
trusted library allocation
page read and write
41BF000
stack
page read and write
236CD000
heap
page read and write
45AF000
stack
page read and write
5080000
direct allocation
page execute and read and write
2D30000
heap
page read and write
1216000
trusted library allocation
page execute and read and write
3092000
trusted library allocation
page read and write
10A3000
trusted library allocation
page execute and read and write
1496ED4D000
heap
page read and write
200B9671000
heap
page read and write
1496EC2B000
heap
page read and write
5500000
trusted library allocation
page execute and read and write
1D1B1000
heap
page read and write
49F1000
heap
page read and write
95E000
stack
page read and write
49F1000
heap
page read and write
200B9F04000
heap
page read and write
23221000
heap
page read and write
7430000
trusted library allocation
page read and write
3F87000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
6510000
trusted library allocation
page read and write
F40EA7B000
stack
page read and write
D2B000
stack
page read and write
C52B39F000
stack
page read and write
F3B000
unkown
page execute and read and write
C000156000
direct allocation
page read and write
DF0000
heap
page read and write
4F81000
heap
page read and write
4140000
trusted library allocation
page read and write
1496FAA1000
heap
page read and write
5590000
trusted library allocation
page execute and read and write
307F000
heap
page read and write
2BE1000
trusted library allocation
page read and write
E7C000
stack
page read and write
7E5D000
stack
page read and write
74E000
heap
page read and write
1868000
heap
page read and write
DB9000
unkown
page readonly
2440000
heap
page read and write
720000
unkown
page readonly
41CB000
trusted library allocation
page read and write
236D9000
heap
page read and write
E4000
unkown
page write copy
18D8000
heap
page read and write
236DE000
heap
page read and write
334C000
trusted library allocation
page read and write
1496FC02000
heap
page read and write
3326000
trusted library allocation
page read and write
619E000
stack
page read and write
6D7C000
heap
page read and write
2B94000
trusted library allocation
page read and write
11D0000
heap
page read and write
63BB000
heap
page read and write
5B1D000
stack
page read and write
32BF000
stack
page read and write
1790000
heap
page read and write
4F81000
heap
page read and write
3D71000
trusted library allocation
page read and write
6B33000
trusted library allocation
page read and write
637000
remote allocation
page execute and read and write
27F9000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
5F60000
heap
page read and write
4E80000
direct allocation
page read and write
3C82000
trusted library allocation
page read and write
370E000
stack
page read and write
6EDF000
trusted library allocation
page read and write
10FD000
stack
page read and write
5370000
trusted library allocation
page read and write
6382000
heap
page read and write
187A8433000
heap
page read and write
1496F55B000
heap
page read and write
1496FADB000
heap
page read and write
1BA8B400000
heap
page read and write
1600000
heap
page read and write
5E7B000
heap
page read and write
49F1000
heap
page read and write
62EC000
stack
page read and write
1496F540000
heap
page read and write
5D40000
heap
page read and write
5F5F000
stack
page read and write
343E000
stack
page read and write
23D0000
direct allocation
page execute and read and write
236EC000
heap
page read and write
1496EC96000
heap
page read and write
28B3000
trusted library allocation
page read and write
1D2B0000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
1496F55D000
heap
page read and write
1496F58A000
heap
page read and write
1803E097000
heap
page read and write
450E000
stack
page read and write
8BC000
unkown
page readonly
DB9000
unkown
page readonly
39C19AE000
stack
page read and write
51D0000
trusted library allocation
page read and write
236D0000
heap
page read and write
7066000
trusted library allocation
page read and write
2BBE000
stack
page read and write
CBB000
unkown
page execute and read and write
51B1000
trusted library allocation
page read and write
DB2000
unkown
page write copy
6E80000
heap
page read and write
70A4000
trusted library allocation
page read and write
2D10000
heap
page execute and read and write
2ED7000
trusted library allocation
page read and write
49F1000
heap
page read and write
48DE000
stack
page read and write
1496ED3C000
heap
page read and write
2C8A000
trusted library allocation
page read and write
35CF000
stack
page read and write
12E1000
heap
page read and write
360E000
stack
page read and write
200B9600000
heap
page read and write
41FE000
stack
page read and write
7CF09FF000
unkown
page read and write
130A000
heap
page read and write
502A000
trusted library allocation
page read and write
6F70000
heap
page read and write
C0007F0000
direct allocation
page read and write
27F1000
trusted library allocation
page read and write
40DE000
trusted library allocation
page read and write
522A000
trusted library allocation
page read and write
2640000
heap
page read and write
6B0000
unkown
page readonly
62C0000
trusted library allocation
page execute and read and write
1496ED3B000
heap
page read and write
7FF67FBC0000
unkown
page readonly
DE7000
heap
page read and write
F4105FB000
stack
page read and write
659000
unkown
page readonly
2BAF000
stack
page read and write
34DE000
stack
page read and write
18EA000
heap
page read and write
2BE0000
trusted library allocation
page read and write
5590000
direct allocation
page execute and read and write
183F000
heap
page read and write
1496FA5A000
heap
page read and write
4A00000
heap
page read and write
55F0000
trusted library allocation
page read and write
10C0000
direct allocation
page read and write
DE0000
heap
page read and write
353F000
stack
page read and write
1496FB02000
heap
page read and write
23238000
heap
page read and write
5AD0000
heap
page execute and read and write
12E3000
heap
page read and write
2CBB000
trusted library allocation
page read and write
122B000
trusted library allocation
page execute and read and write
60B0000
trusted library allocation
page read and write
187A8444000
heap
page read and write
4F81000
heap
page read and write
7184000
trusted library allocation
page read and write
1496FAB2000
heap
page read and write
8900000
heap
page read and write
1654000
heap
page read and write
2C99000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
5F5A000
heap
page read and write
9F6000
heap
page read and write
2CF0000
direct allocation
page read and write
3BEF000
trusted library allocation
page read and write
A3A000
heap
page read and write
28AA000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
AE9000
unkown
page readonly
200BEB44000
trusted library allocation
page read and write
1330000
heap
page read and write
2322B000
heap
page read and write
1654000
heap
page read and write
236E3000
heap
page read and write
45BF000
stack
page read and write
1F256902000
heap
page read and write
ECE000
heap
page read and write
1312000
heap
page read and write
23226000
heap
page read and write
3F4F000
trusted library allocation
page read and write
32A0000
heap
page read and write
1496F500000
heap
page read and write
37BF000
stack
page read and write
236DE000
heap
page read and write
321F000
stack
page read and write
18E0000
heap
page read and write
18C2000
heap
page read and write
C0001A1000
direct allocation
page read and write
4D3E000
stack
page read and write
10C0000
direct allocation
page read and write
3C70000
trusted library allocation
page read and write
534D000
trusted library allocation
page read and write
C00009E000
direct allocation
page read and write
40F7000
trusted library allocation
page read and write
E5000
unkown
page read and write
6EDBD000
unkown
page read and write
1654000
heap
page read and write
234B0000
heap
page read and write
1496ECDA000
heap
page read and write
1496F55C000
heap
page read and write
5330000
trusted library allocation
page read and write
1496F572000
heap
page read and write
13DF000
stack
page read and write
1BA8B3C0000
heap
page read and write
719000
unkown
page write copy
3071000
heap
page read and write
3C0F000
stack
page read and write
1496ED1B000
heap
page read and write
D50000
unkown
page readonly
1CD000
unkown
page readonly
D99000
stack
page read and write
4B21000
heap
page read and write
476D000
stack
page read and write
17817FB0000
heap
page read and write
950000
heap
page read and write
636B000
heap
page read and write
6C4E000
stack
page read and write
1BFF9400000
heap
page read and write
1311000
heap
page read and write
1496F574000
heap
page read and write
2C01000
trusted library allocation
page read and write
1496EBF0000
remote allocation
page read and write
3F64000
trusted library allocation
page read and write
23F0000
heap
page read and write
1496F556000
heap
page read and write
3F81000
trusted library allocation
page read and write
6EB9000
trusted library allocation
page read and write
430000
unkown
page read and write
264F000
trusted library allocation
page read and write
25AE000
heap
page read and write
1144000
trusted library allocation
page read and write
4CD6000
trusted library allocation
page read and write
6ECA000
trusted library allocation
page read and write
1496ED3C000
heap
page read and write
50E1000
trusted library allocation
page read and write
25E5000
trusted library allocation
page execute and read and write
E3A000
stack
page read and write
200BEBD0000
trusted library allocation
page read and write
28C9000
trusted library allocation
page read and write
1654000
heap
page read and write
1496F580000
heap
page read and write
130E000
heap
page read and write
C00010E000
direct allocation
page read and write
49F1000
heap
page read and write
4B0F000
stack
page read and write
1496F553000
heap
page read and write
2949000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
15FF000
stack
page read and write
4DA0000
trusted library allocation
page read and write
4751000
heap
page read and write
200BEBE0000
trusted library allocation
page read and write
23298000
heap
page read and write
1496F579000
heap
page read and write
3D33000
trusted library allocation
page read and write
3C2E000
trusted library allocation
page read and write
187A8444000
heap
page read and write
132E000
heap
page read and write
5040000
trusted library allocation
page read and write
4F0E000
stack
page read and write
3179000
trusted library allocation
page read and write
3C83000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
1654000
heap
page read and write
2734000
trusted library allocation
page read and write
1BFF942B000
heap
page read and write
17F0000
direct allocation
page read and write
5B7E000
trusted library allocation
page read and write
3D8E000
stack
page read and write
27E59004000
direct allocation
page read and write
C000150000
direct allocation
page read and write
1496ED4D000
heap
page read and write
3CC5000
trusted library allocation
page read and write
3CC1000
trusted library allocation
page read and write
49F1000
heap
page read and write
870000
heap
page read and write
150000
unkown
page readonly
1496F507000
heap
page read and write
FF437FD000
stack
page read and write
5E01000
heap
page read and write
4F81000
heap
page read and write
6030000
heap
page read and write
533E000
trusted library allocation
page read and write
4ECB000
stack
page read and write
5E3E000
heap
page read and write
B70000
heap
page read and write
200BED13000
heap
page read and write
447E000
stack
page read and write
C000002000
direct allocation
page read and write
FDE000
heap
page read and write
4F81000
heap
page read and write
7FF6D02FC000
unkown
page write copy
55DF000
stack
page read and write
49F1000
heap
page read and write
4021000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
443F000
stack
page read and write
5AE0000
trusted library allocation
page execute and read and write
1496ED1A000
heap
page read and write
422E000
stack
page read and write
5F7F000
heap
page read and write
3F89000
trusted library allocation
page read and write
187A8270000
heap
page read and write
71A0000
trusted library allocation
page execute and read and write
1496EC3F000
heap
page read and write
140F000
stack
page read and write
860000
trusted library allocation
page read and write
96F000
unkown
page execute and read and write
3D43000
trusted library allocation
page read and write
8AF000
unkown
page write copy
6FA0000
trusted library allocation
page read and write
134D000
heap
page read and write
5BA6000
trusted library allocation
page read and write
3CA6000
trusted library allocation
page read and write
1BA8B42B000
heap
page read and write
4F81000
heap
page read and write
709A000
trusted library allocation
page read and write
2D60000
heap
page read and write
2E2D000
trusted library allocation
page read and write
32FB000
stack
page read and write
6CE45000
unkown
page readonly
DCE000
stack
page read and write
68B0000
heap
page read and write
6B7C000
stack
page read and write
1496F510000
heap
page read and write
1496FA81000
heap
page read and write
688E000
stack
page read and write
102E000
stack
page read and write
421000
remote allocation
page execute and read and write
1496F529000
heap
page read and write
7300000
trusted library allocation
page execute and read and write
49F1000
heap
page read and write
5740000
trusted library allocation
page read and write
384F000
stack
page read and write
49F1000
heap
page read and write
2327C000
heap
page read and write
1220000
trusted library allocation
page read and write
238E000
stack
page read and write
2F3A000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
6CDFF000
unkown
page readonly
288F000
trusted library allocation
page read and write
3CAF000
trusted library allocation
page read and write
1216000
heap
page read and write
401E000
stack
page read and write
5400000
direct allocation
page read and write
5B90000
trusted library allocation
page read and write
3D93000
trusted library allocation
page read and write
715B000
stack
page read and write
49CC000
stack
page read and write
6E20000
heap
page read and write
1874000
heap
page read and write
DE7000
heap
page read and write
2CEF000
stack
page read and write
7095000
trusted library allocation
page read and write
3244000
trusted library allocation
page read and write
4068000
trusted library allocation
page read and write
2630000
trusted library allocation
page read and write
4D25000
trusted library allocation
page read and write
677E000
heap
page read and write
3E58000
trusted library allocation
page read and write
1613000
heap
page read and write
5070000
direct allocation
page execute and read and write
17817E40000
heap
page read and write
652000
unkown
page write copy
43B5000
heap
page read and write
DA0000
unkown
page readonly
6ACF000
stack
page read and write
1135000
heap
page read and write
49CF000
stack
page read and write
1496F578000
heap
page read and write
4F81000
heap
page read and write
144F000
stack
page read and write
465E000
stack
page read and write
2F2A000
trusted library allocation
page read and write
1546000
heap
page read and write
1BA8B422000
heap
page read and write
30D4000
trusted library allocation
page read and write
2EE4000
trusted library allocation
page read and write
C000078000
direct allocation
page read and write
5310000
trusted library allocation
page read and write
27E59082000
direct allocation
page read and write
1BFF9290000
heap
page read and write
49F1000
heap
page read and write
3CAE000
trusted library allocation
page read and write
12A1000
heap
page read and write
1BA8B402000
heap
page read and write
3334000
trusted library allocation
page read and write
F53000
unkown
page execute and read and write
5180000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
2E3B000
trusted library allocation
page read and write
96F000
unkown
page execute and read and write
2C74000
trusted library allocation
page read and write
2774000
trusted library allocation
page read and write
7360000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
7EFD0000
trusted library allocation
page execute and read and write
D0A000
stack
page read and write
56B0000
trusted library allocation
page execute and read and write
3C6E000
trusted library allocation
page read and write
133C000
heap
page read and write
6610000
heap
page read and write
C000075000
direct allocation
page read and write
3D8B000
trusted library allocation
page read and write
11CE000
stack
page read and write
3002000
trusted library allocation
page read and write
393E000
stack
page read and write
3CB5000
trusted library allocation
page read and write
2E04000
heap
page read and write
68C5000
heap
page read and write
4F81000
heap
page read and write
4F81000
heap
page read and write
3388000
trusted library allocation
page read and write
DA1000
unkown
page execute read
3EB5000
trusted library allocation
page read and write
903E000
stack
page read and write
5B5B000
trusted library allocation
page read and write
25B3000
trusted library allocation
page execute and read and write
D54000
heap
page read and write
4F81000
heap
page read and write
14FD000
heap
page read and write
1807000
heap
page read and write
14A0000
heap
page read and write
B7A000
heap
page read and write
2AAE000
stack
page read and write
4750000
heap
page read and write
937000
unkown
page read and write
49F1000
heap
page read and write
11D0000
heap
page read and write
1827000
heap
page read and write
6757000
heap
page read and write
488C000
stack
page read and write
49F1000
heap
page read and write
44CF000
stack
page read and write
C000172000
direct allocation
page read and write
4F81000
heap
page read and write
9B3000
unkown
page execute and write copy
54A5000
trusted library allocation
page read and write
12D0000
heap
page read and write
5B30000
remote allocation
page read and write
1440000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
55C0000
direct allocation
page execute and read and write
419E000
trusted library allocation
page read and write
6EDBD000
unkown
page read and write
1496F579000
heap
page read and write
4F81000
heap
page read and write
D0000
unkown
page readonly
71B000
unkown
page execute and read and write
4F81000
heap
page read and write
6110000
trusted library allocation
page execute and read and write
602E000
stack
page read and write
A50000
heap
page read and write
49F1000
heap
page read and write
10C0000
direct allocation
page read and write
5180000
direct allocation
page execute and read and write
2ECB000
stack
page read and write
2CF0000
direct allocation
page read and write
318F000
trusted library allocation
page read and write
F40F0FE000
unkown
page readonly
719000
unkown
page read and write
44DF000
stack
page read and write
41D3000
trusted library allocation
page read and write
49F1000
heap
page read and write
5130000
direct allocation
page execute and read and write
5590000
direct allocation
page execute and read and write
236CB000
heap
page read and write
D54000
heap
page read and write
49F1000
heap
page read and write
49F0000
heap
page read and write
236EA000
heap
page read and write
1496FAB6000
heap
page read and write
236B1000
heap
page read and write
3181000
trusted library allocation
page read and write
5820000
heap
page read and write
236D0000
heap
page read and write
5030000
direct allocation
page execute and read and write
708F000
trusted library allocation
page read and write
1351000
heap
page read and write
2D4B000
heap
page read and write
C000198000
direct allocation
page read and write
5471000
direct allocation
page read and write
1320000
heap
page execute and read and write
18E3000
heap
page read and write
1496F57A000
heap
page read and write
307E000
heap
page read and write
18EA000
heap
page read and write
1200000
trusted library allocation
page execute and read and write
4B21000
heap
page read and write
4F81000
heap
page read and write
C000102000
direct allocation
page read and write
880000
unkown
page readonly
1496ED4D000
heap
page read and write
D54000
heap
page read and write
53F0000
heap
page execute and read and write
5FFD000
stack
page read and write
59A000
stack
page read and write
1ECFD0F0000
heap
page read and write
4088000
trusted library allocation
page read and write
2FE4000
trusted library allocation
page read and write
4124000
trusted library allocation
page read and write
49F1000
heap
page read and write
6001000
heap
page read and write
2CF0000
direct allocation
page read and write
1D1B1000
heap
page read and write
1192000
trusted library allocation
page read and write
1654000
heap
page read and write
5E5E000
stack
page read and write
7FF680185000
unkown
page read and write
5165000
trusted library allocation
page read and write
6324000
heap
page read and write
200B9E15000
heap
page read and write
200BA620000
trusted library allocation
page read and write
2EE9000
trusted library allocation
page read and write
49F1000
heap
page read and write
49F1000
heap
page read and write
601E000
stack
page read and write
1496FB02000
heap
page read and write
3D9E000
stack
page read and write
1496ECD2000
heap
page read and write
3D5F000
trusted library allocation
page read and write
7FF67FDFF000
unkown
page read and write
4CD4000
trusted library allocation
page read and write
187A8530000
heap
page read and write
4A1E000
stack
page read and write
48CC000
stack
page read and write
735000
unkown
page read and write
1803DFF0000
heap
page read and write
2FEB000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page execute and read and write
3C10000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
5010000
direct allocation
page execute and read and write
6ECE000
stack
page read and write
4AD0000
trusted library allocation
page read and write
D00000
heap
page read and write
4156000
trusted library allocation
page read and write
1F25662B000
heap
page read and write
17F0000
direct allocation
page read and write
1654000
heap
page read and write
27E58FA0000
direct allocation
page read and write
5EE0000
heap
page read and write
6F5C000
stack
page read and write
1650000
heap
page read and write
200B9689000
heap
page read and write
585E000
stack
page read and write
1163000
trusted library allocation
page execute and read and write
C000124000
direct allocation
page read and write
93C000
stack
page read and write
3E48000
trusted library allocation
page read and write
7FF67FE02000
unkown
page read and write
6730000
heap
page read and write
1BA8BB50000
trusted library allocation
page read and write
946000
unkown
page read and write
1F256800000
heap
page read and write
3D2A000
trusted library allocation
page read and write
405E000
trusted library allocation
page read and write
49F1000
heap
page read and write
200BEB00000
trusted library allocation
page read and write
200BECC4000
heap
page read and write
346F000
stack
page read and write
A12000
heap
page read and write
2B01000
trusted library allocation
page read and write
72F0000
heap
page read and write
200B9550000
heap
page read and write
554F000
stack
page read and write
49F1000
heap
page read and write
4D20000
trusted library allocation
page read and write
C000084000
direct allocation
page read and write
1496FA0C000
heap
page read and write
1F256613000
unkown
page read and write
68C6000
heap
page read and write
153D000
heap
page read and write
3EDE000
stack
page read and write
1496F552000
heap
page read and write
1012000
heap
page read and write
5678000
stack
page read and write
18EE000
heap
page read and write
825E000
stack
page read and write
5400000
direct allocation
page read and write
1829000
heap
page read and write
5BBE000
trusted library allocation
page read and write
187A86F0000
heap
page read and write
3D40000
trusted library allocation
page read and write
1803E09F000
heap
page read and write
200BEAE0000
trusted library allocation
page read and write
63CA000
heap
page read and write
A80000
unkown
page readonly
4F81000
heap
page read and write
1803E09F000
heap
page read and write
D90000
heap
page read and write
2D0F000
stack
page read and write
E4A000
trusted library allocation
page execute and read and write
30DB000
trusted library allocation
page read and write
1654000
heap
page read and write
5E8F000
heap
page read and write
5010000
heap
page read and write
27E58E70000
heap
page read and write
25A0000
trusted library allocation
page read and write
460F000
stack
page read and write
448000
remote allocation
page execute and read and write
5160000
direct allocation
page execute and read and write
6737000
heap
page read and write
4DAB000
stack
page read and write
5790000
trusted library allocation
page read and write
1F256700000
trusted library allocation
page read and write
4F81000
heap
page read and write
1070000
heap
page read and write
49F1000
heap
page read and write
2FE3000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
49C687D000
stack
page read and write
B47000
unkown
page execute and write copy
D54000
heap
page read and write
2CF7000
trusted library allocation
page read and write
1319000
heap
page read and write
3DCD000
trusted library allocation
page read and write
1214000
heap
page read and write
3FB7000
trusted library allocation
page read and write
1496ED4D000
heap
page read and write
1F256702000
trusted library allocation
page read and write
963000
heap
page read and write
57B0000
trusted library allocation
page read and write
3C79000
trusted library allocation
page read and write
27FF000
trusted library allocation
page read and write
DA0000
unkown
page readonly
5EB3000
heap
page read and write
10E5000
unkown
page execute and read and write
1496F586000
heap
page read and write
E28000
heap
page read and write
2F25000
trusted library allocation
page read and write
4356E7E000
unkown
page readonly
4F81000
heap
page read and write
1496F554000
heap
page read and write
2740000
heap
page execute and read and write
3E76000
trusted library allocation
page read and write
3FEA000
trusted library allocation
page read and write
236CF000
heap
page read and write
200BECC2000
heap
page read and write
3C8A000
trusted library allocation
page read and write
8F7000
stack
page read and write
49F1000
heap
page read and write
279F000
stack
page read and write
6ED5000
trusted library allocation
page read and write
581E000
stack
page read and write
3C93000
trusted library allocation
page read and write
1350000
heap
page read and write
3CBF000
stack
page read and write
118E000
stack
page read and write
1610000
heap
page read and write
9A6000
unkown
page execute and read and write
3C01000
trusted library allocation
page read and write
95A000
unkown
page read and write
1496EC00000
heap
page read and write
C0006E0000
direct allocation
page read and write
1312000
heap
page read and write
2CF0000
direct allocation
page read and write
7FF680157000
unkown
page read and write
13A0000
trusted library allocation
page execute and read and write
4F81000
heap
page read and write
7070000
trusted library allocation
page read and write
1CD8E000
stack
page read and write
E2E000
stack
page read and write
548E000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
14AE000
heap
page read and write
6B30000
trusted library allocation
page read and write
5130000
direct allocation
page execute and read and write
361E000
stack
page read and write
556B000
trusted library allocation
page read and write
DF2000
unkown
page execute read
56D0000
trusted library allocation
page read and write
49F1000
heap
page read and write
2EFF000
trusted library allocation
page read and write
4CDC000
stack
page read and write
348F000
stack
page read and write
2671000
trusted library allocation
page read and write
3FAB000
trusted library allocation
page read and write
D75000
heap
page read and write
1311000
heap
page read and write
1180000
trusted library allocation
page read and write
2FE9000
trusted library allocation
page read and write
1496FA53000
heap
page read and write
1040000
trusted library allocation
page read and write
187A8433000
heap
page read and write
7FF67FDC1000
unkown
page write copy
1329000
heap
page read and write
17817FF0000
heap
page read and write
349F000
stack
page read and write
5130000
heap
page read and write
130F000
heap
page read and write
E57000
trusted library allocation
page execute and read and write
2D77000
trusted library allocation
page read and write
40B000
unkown
page execute read
70A0000
trusted library allocation
page read and write
930000
unkown
page readonly
6FCF000
stack
page read and write
2611000
trusted library allocation
page read and write
80000
unkown
page readonly
7FF6D02F9000
unkown
page readonly
200BEC2C000
heap
page read and write
DF0000
heap
page read and write
2DFD000
trusted library allocation
page read and write
23BE000
stack
page read and write
F45000
heap
page read and write
10AD000
trusted library allocation
page execute and read and write
4F91000
heap
page read and write
2897000
trusted library allocation
page read and write
70B5000
trusted library allocation
page read and write
49F1000
heap
page read and write
236DF000
heap
page read and write
552E000
trusted library allocation
page read and write
1D1B1000
heap
page read and write
6513000
trusted library allocation
page read and write
428E000
stack
page read and write
200BECCA000
heap
page read and write
200BEB01000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page read and write
1496F56F000
heap
page read and write
1F256913000
heap
page read and write
5010000
direct allocation
page execute and read and write
1496FA13000
heap
page read and write
1143000
trusted library allocation
page execute and read and write
82EFA7D000
stack
page read and write
C000120000
direct allocation
page read and write
7370000
heap
page read and write
5500000
trusted library allocation
page read and write
2812000
trusted library allocation
page read and write
1496FB02000
heap
page read and write
5590000
direct allocation
page execute and read and write
1496F554000
heap
page read and write
891000
unkown
page execute and read and write
DA0000
unkown
page readonly
1354000
heap
page read and write
61AE000
stack
page read and write
23231000
heap
page read and write
236DE000
heap
page read and write
3189000
trusted library allocation
page read and write
478E000
stack
page read and write
D54000
heap
page read and write
54E0000
heap
page execute and read and write
1170000
trusted library allocation
page read and write
3CFF000
trusted library allocation
page read and write
116D000
trusted library allocation
page execute and read and write
49F1000
heap
page read and write
1496F563000
heap
page read and write
132F000
heap
page read and write
2CF0000
direct allocation
page read and write
249E000
stack
page read and write
7FF67FDEF000
unkown
page write copy
6020000
trusted library allocation
page execute and read and write
1496F57C000
heap
page read and write
315F000
trusted library allocation
page read and write
3FB8000
trusted library allocation
page read and write
1496F557000
heap
page read and write
1496FA88000
heap
page read and write
4C20000
trusted library allocation
page execute and read and write
D70000
heap
page read and write
C000164000
direct allocation
page read and write
C000012000
direct allocation
page read and write
1654000
heap
page read and write
4B40000
trusted library allocation
page read and write
236EC000
heap
page read and write
1496FAEE000
heap
page read and write
400A000
trusted library allocation
page read and write
1496FAD7000
heap
page read and write
538F000
stack
page read and write
23221000
heap
page read and write
8A3000
unkown
page readonly
49F1000
heap
page read and write
4F81000
heap
page read and write
418C000
trusted library allocation
page read and write
1CE8F000
stack
page read and write
970000
trusted library allocation
page execute and read and write
11F0000
trusted library allocation
page read and write
3C31000
trusted library allocation
page read and write
2620000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
D54000
heap
page read and write
2F79000
trusted library allocation
page read and write
1BFF9413000
heap
page read and write
14FA000
stack
page read and write
1901000
heap
page read and write
5347000
trusted library allocation
page read and write
5280000
heap
page read and write
D8C000
stack
page read and write
150F000
stack
page read and write
1D04E000
stack
page read and write
63BF000
heap
page read and write
5420000
trusted library allocation
page execute and read and write
32F6000
trusted library allocation
page read and write
25B0000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
E2000
unkown
page read and write
3F12000
trusted library allocation
page read and write
200B9702000
heap
page read and write
4DB0000
heap
page read and write
1337000
heap
page read and write
119B000
trusted library allocation
page execute and read and write
1F256724000
heap
page read and write
40AF000
trusted library allocation
page read and write
5228000
trusted library allocation
page read and write
4F81000
heap
page read and write
9B3000
unkown
page execute and read and write
97C000
stack
page read and write
C000118000
direct allocation
page read and write
200BEB40000
trusted library allocation
page read and write
1496F533000
heap
page read and write
3ED4000
trusted library allocation
page read and write
2FAB000
trusted library allocation
page read and write
7C60000
heap
page read and write
2FC3000
trusted library allocation
page read and write
49F1000
heap
page read and write
5100000
direct allocation
page execute and read and write
C000166000
direct allocation
page read and write
3871000
trusted library allocation
page read and write
616E000
stack
page read and write
15C0000
heap
page read and write
283C000
trusted library allocation
page read and write
80DE000
stack
page read and write
4053000
trusted library allocation
page read and write
2CF0000
direct allocation
page read and write
C00006A000
direct allocation
page read and write
F410AFE000
unkown
page readonly
53C0000
trusted library allocation
page read and write
1496F530000
heap
page read and write
184D000
heap
page read and write
6036000
heap
page read and write
435797C000
stack
page read and write
4138000
trusted library allocation
page read and write
F4106FE000
unkown
page readonly
380000
heap
page read and write
4049000
trusted library allocation
page read and write
D37000
stack
page read and write
3E0000
heap
page read and write
5043000
heap
page execute and read and write
3FE0000
trusted library allocation
page read and write
2BDE000
stack
page read and write
4CEE000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
27E58E90000
heap
page read and write
2C58000
trusted library allocation
page read and write
4F81000
heap
page read and write
1ECFD3C4000
heap
page read and write
640C000
stack
page read and write
2520000
heap
page read and write
F46000
unkown
page execute and read and write
5B72000
trusted library allocation
page read and write
1250000
heap
page read and write
415C000
trusted library allocation
page read and write
1496F53B000
heap
page read and write
200BEB20000
trusted library allocation
page read and write
A0E000
heap
page read and write
2616000
trusted library allocation
page read and write
236C3000
heap
page read and write
3F2C000
trusted library allocation
page read and write
DF0000
heap
page read and write
417A000
trusted library allocation
page read and write
18A1000
heap
page read and write
6398000
heap
page read and write
872000
unkown
page readonly
1496FA00000
heap
page read and write
1496F57C000
heap
page read and write
1496F575000
heap
page read and write
2E52000
trusted library allocation
page read and write
236B5000
heap
page read and write
1D1B1000
heap
page read and write
2328F000
heap
page read and write
1496F52C000
heap
page read and write
236D0000
heap
page read and write
236EA000
heap
page read and write
4F81000
heap
page read and write
6BBE2000
unkown
page readonly
4C00000
heap
page read and write
7FF6D02F1000
unkown
page execute read
2876000
trusted library allocation
page read and write
7871000
heap
page read and write
303B000
stack
page read and write
284C000
trusted library allocation
page read and write
7370000
heap
page read and write
51C0000
trusted library allocation
page read and write
881000
unkown
page execute read
5EED000
heap
page read and write
10DC000
heap
page read and write
18FC000
heap
page read and write
28B5000
trusted library allocation
page read and write
3D70000
trusted library allocation
page read and write
54A0000
trusted library allocation
page execute and read and write
2863000
trusted library allocation
page read and write
3FDF000
stack
page read and write
FD9000
heap
page read and write
1496F400000
heap
page read and write
132F000
heap
page read and write
1311000
heap
page read and write
6014000
heap
page read and write
710000
heap
page read and write
84D000
trusted library allocation
page execute and read and write
3219000
trusted library allocation
page read and write
1654000
heap
page read and write
1186000
trusted library allocation
page execute and read and write
6FED000
heap
page read and write
1342000
heap
page read and write
250E000
stack
page read and write
6CC61000
unkown
page execute read
49F1000
heap
page read and write
1CD000
unkown
page readonly
4F81000
heap
page read and write
27F5000
trusted library allocation
page read and write
5283000
heap
page read and write
43CE000
stack
page read and write
25E0000
trusted library allocation
page read and write
63A6000
heap
page read and write
6C0F000
stack
page read and write
3E05000
trusted library allocation
page read and write
C000014000
direct allocation
page read and write
5E16000
heap
page read and write
407F000
trusted library allocation
page read and write
4E3F000
stack
page read and write
439F000
stack
page read and write
30E5000
trusted library allocation
page read and write
49F1000
heap
page read and write
2630000
trusted library allocation
page read and write
2F02000
trusted library allocation
page read and write
6C86000
heap
page read and write
3ECA000
trusted library allocation
page read and write
C000174000
direct allocation
page read and write
9C0000
heap
page read and write
236D0000
heap
page read and write
7FF67FDC4000
unkown
page write copy
2F17000
trusted library allocation
page read and write
1803E0A0000
heap
page read and write
49F1000
heap
page read and write
7780000
trusted library allocation
page read and write
C000027000
direct allocation
page read and write
17F0000
direct allocation
page read and write
4F81000
heap
page read and write
498E000
stack
page read and write
40A6000
trusted library allocation
page read and write
4F81000
heap
page read and write
25D0000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
1496EA40000
heap
page read and write
6B6E7000
unkown
page readonly
1077000
heap
page read and write
5380000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
There are 3584 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://iplogger.co/1lLub