IOC Report
Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
Setup.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\pehgyntafdrm\tubpxzvwmyfr.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\rstywrmdprzs\esfowblknspo.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Notepad.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI70442\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI70442\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI70442\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI70442\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI70442\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI70442\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI70442\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI70442\_wmi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI70442\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI70442\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI70442\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI70442\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI70442\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI70442\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI76522\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI76522\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI76522\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI76522\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI76522\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI76522\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI76522\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI76522\_wmi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI76522\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI76522\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI76522\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI76522\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI76522\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI77162\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI77162\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI77162\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI77162\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI77162\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI77162\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI77162\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI77162\_wmi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI77162\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI77162\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI77162\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI77162\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI77162\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80002\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80002\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80002\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80002\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80002\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80002\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80002\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80002\_wmi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80002\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80002\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80002\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80002\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI80002\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\etc test.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\fix.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\hamburger.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\mergedALL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Notepad.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\activate.bat
ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\trxhxvjzqipl.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fix.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\mergedALL.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\_MEI76522\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI77162\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI80002\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_01d0cvix.ge5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0lctof32.pq0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2datam12.qby.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2mn52hdr.v1w.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_345xktk1.xmm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bijmsmsr.m3x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cpcbg10h.xik.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fksusz2j.svt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h5dylcae.bm3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pelnwyak.yfw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qnx5sfkx.lsb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ykagbsvk.oki.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp132B.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp136B.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp136C.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp33E.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp33F.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp340.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp351.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp352.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp353.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp354.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp364.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp365.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp366.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp367.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp378.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp379.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp38A.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp38B.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp38C.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp38D.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp38E.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp38F.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3AF.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3B0.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3B1.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp424D.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp424E.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp428E.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp74D6.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp74E7.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp74E8.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp74E9.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp74FA.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9E89.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp9E8A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA4A6.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA4A7.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA4A8.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA4E7.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA507.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA508.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA509.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA51A.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA51B.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpA52C.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpAF62.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpAF73.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpAF83.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpAF94.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpAFA5.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpAFC5.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpAFD5.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpAFE6.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpAFF7.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpC04.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC24.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC34.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC45.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC46.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC57.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpC77.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD44B.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD44C.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD45D.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD45E.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD45F.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD460.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD461.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD471.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD472.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD473.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD474.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD495.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD496.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD497.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD498.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD499.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD4A9.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD4AA.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD4AB.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD55A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD55B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD56C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD56D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD57D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD59E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD59F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD5AF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD5C0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpE197.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE198.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE1D7.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE1E8.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpE208.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_0dlsmr10.csh.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_k1blilkk.41n.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_vshmfl4f.za4.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_x4hrlidv.enb.ps1
ASCII text, with no line terminators
dropped
There are 171 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Setup.exe
"C:\Users\user\Desktop\Setup.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGcAcQByACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHMAYgBtACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGgAegBiACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGQAagBuACMAPgA="
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\AppData\Local\Temp\hamburger.exe
"C:\Users\user\AppData\Local\Temp\hamburger.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\AppData\Local\Temp\Notepad.exe
"C:\Users\user\AppData\Local\Temp\Notepad.exe"
malicious
C:\Users\user\AppData\Local\Temp\mergedALL.exe
"C:\Users\user\AppData\Local\Temp\mergedALL.exe"
malicious
C:\Users\user\AppData\Local\Temp\etc test.exe
"C:\Users\user\AppData\Local\Temp\etc test.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Users\user\AppData\Local\Temp\fix.exe
"C:\Users\user\AppData\Local\Temp\fix.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\AppData\Local\Temp\Notepad.exe
"C:\Users\user\AppData\Local\Temp\Notepad.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Users\user\activate.bat
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\Notepad.exe
"Notepad.exe"
malicious
C:\Users\user\Notepad.exe
"Notepad.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe delete "OBKZWAPS"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe create "OBKZWAPS" binpath= "C:\ProgramData\rstywrmdprzs\esfowblknspo.exe" start= "auto"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe delete "UPFRTHSI"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe create "UPFRTHSI" binpath= "C:\ProgramData\pehgyntafdrm\tubpxzvwmyfr.exe" start= "auto"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe start "OBKZWAPS"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\ProgramData\rstywrmdprzs\esfowblknspo.exe
C:\ProgramData\rstywrmdprzs\esfowblknspo.exe
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe start "UPFRTHSI"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\ProgramData\pehgyntafdrm\tubpxzvwmyfr.exe
C:\ProgramData\pehgyntafdrm\tubpxzvwmyfr.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\Notepad.exe
"C:\Users\user\Notepad.exe"
malicious
C:\Users\user\Notepad.exe
"C:\Users\user\Notepad.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
conhost.exe
malicious
C:\Users\user\Notepad.exe
"C:\Users\user\Notepad.exe"
malicious
C:\Users\user\Notepad.exe
"C:\Users\user\Notepad.exe"
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im "Notepad.exe"
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
There are 45 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ipinfo.io/ip%appdata%
unknown
malicious
https://api.ipify.orgcookies//settinString.Removeg
unknown
malicious
163.5.160.27:51523
malicious
http://163.5.160.27:51523/
163.5.160.27
malicious
http://nuget.org/NuGet.exe
unknown
https://api.ip.sb/ip
unknown
http://crl.m/
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown
malicious
pool.hashvault.pro
45.76.89.70

IPs

IP
Domain
Country
Malicious
95.179.241.203
unknown
Netherlands
malicious
51.195.206.227
unknown
France
malicious
163.5.160.27
unknown
France
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
DontOfferThroughWUAU
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fix_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fix_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fix_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fix_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fix_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fix_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fix_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fix_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fix_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fix_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fix_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fix_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fix_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fix_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Update64
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2A60000
trusted library allocation
page read and write
malicious
3131000
heap
page read and write
malicious
722000
unkown
page readonly
malicious
140001000
unkown
page execute and read and write
malicious
30F0000
heap
page read and write
malicious
FE2000
unkown
page readonly
malicious
62CF000
heap
page read and write
8E7B000
trusted library allocation
page read and write
22465A04000
heap
page read and write
8E11000
trusted library allocation
page read and write
1B08C687000
heap
page read and write
AADC4FE000
unkown
page readonly
5C10000
trusted library allocation
page execute and read and write
7FF7F052F000
unkown
page read and write
1B08C65A000
heap
page read and write
224659E4000
heap
page read and write
1B08CCAC000
direct allocation
page read and write
5390000
trusted library allocation
page execute and read and write
7721000
trusted library allocation
page read and write
24CE9B60000
heap
page read and write
299D6F80000
trusted library allocation
page read and write
24CE9ED0000
heap
page read and write
2246595E000
heap
page read and write
7FFDF3484000
unkown
page readonly
24676220000
direct allocation
page read and write
93DE000
stack
page read and write
1E8E4440000
heap
page read and write
D2E4BFE000
stack
page read and write
7FF7F051C000
unkown
page readonly
299548B4000
heap
page read and write
74C0000
trusted library allocation
page execute and read and write
333E000
stack
page read and write
860D000
trusted library allocation
page read and write
9E79F3C000
stack
page read and write
6853000
heap
page read and write
9E79FBE000
stack
page read and write
72E9000
heap
page read and write
22465C9A000
heap
page read and write
22465790000
direct allocation
page read and write
299D6FA0000
trusted library allocation
page read and write
1B08C5C0000
direct allocation
page read and write
77CC000
trusted library allocation
page read and write
886E000
heap
page read and write
64B2000
trusted library allocation
page read and write
1E8E42B0000
heap
page read and write
671E000
stack
page read and write
7940000
trusted library allocation
page read and write
299D6F80000
trusted library allocation
page read and write
7FFDF34B3000
unkown
page readonly
233D7850000
heap
page read and write
1D207600000
heap
page read and write
795C000
heap
page read and write
24675A20000
heap
page read and write
465A000
trusted library allocation
page read and write
7FF702BF3000
unkown
page readonly
19324DC8000
heap
page read and write
59EA000
trusted library allocation
page read and write
259EDC88000
heap
page read and write
6CFD000
trusted library allocation
page read and write
7FFE13220000
unkown
page readonly
2564AF80000
heap
page read and write
867D000
stack
page read and write
9112000
trusted library allocation
page read and write
330E000
stack
page read and write
299D6FA0000
trusted library allocation
page read and write
24676258000
direct allocation
page read and write
64B9000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
22465C7C000
direct allocation
page read and write
299D6F80000
trusted library allocation
page read and write
2246597E000
heap
page read and write
7FF7F04F1000
unkown
page execute read
4430000
trusted library allocation
page read and write
22465DE5000
heap
page read and write
19324930000
heap
page read and write
2467624C000
direct allocation
page read and write
299D6F80000
trusted library allocation
page read and write
1B08C620000
heap
page read and write
2564AFA0000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
1E8E42D9000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
FBE000
heap
page read and write
19324ECE000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
140000000
unkown
page read and write
7FFE11EB9000
unkown
page readonly
1B08C6B4000
heap
page read and write
299547B0000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
16C0000
heap
page read and write
19324F20000
direct allocation
page read and write
1B08C6A2000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
193248F9000
heap
page read and write
46B4000
trusted library allocation
page read and write
1B08C970000
heap
page read and write
19324F74000
direct allocation
page read and write
299D6FA0000
trusted library allocation
page read and write
22463F34000
heap
page read and write
F57000
trusted library allocation
page execute and read and write
1701000
heap
page read and write
B25000
heap
page read and write
457F000
trusted library allocation
page read and write
1E46E9B0000
heap
page read and write
24675BEE000
heap
page read and write
19324DC8000
heap
page read and write
1B08C6F2000
heap
page read and write
7BF0000
trusted library allocation
page read and write
24675BA8000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
1B08C65A000
heap
page read and write
769E000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
55FE000
stack
page read and write
299547B0000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
224659BE000
heap
page read and write
2564B102000
heap
page read and write
2564B002000
heap
page read and write
264D8493000
heap
page read and write
7FFDF0D05000
unkown
page write copy
52BE000
stack
page read and write
24676250000
direct allocation
page read and write
299547B0000
trusted library allocation
page read and write
77EE000
stack
page read and write
7FF702BEF000
unkown
page write copy
7FFE0EB20000
unkown
page readonly
7FF702BB1000
unkown
page execute read
7F4B0000
trusted library allocation
page execute and read and write
9E7A27E000
stack
page read and write
1B08C6A5000
heap
page read and write
1932492B000
heap
page read and write
6309000
trusted library allocation
page read and write
22465840000
direct allocation
page read and write
7FF702BB0000
unkown
page readonly
299547B0000
trusted library allocation
page read and write
24674060000
heap
page read and write
2193F620000
heap
page read and write
7FFE11510000
unkown
page readonly
299576F6000
heap
page read and write
19324980000
heap
page read and write
1B08C71B000
heap
page read and write
6B0B000
heap
page read and write
2292A9C0000
heap
page read and write
24676238000
direct allocation
page read and write
7FF702BF3000
unkown
page readonly
224659FE000
heap
page read and write
48A3000
trusted library allocation
page read and write
7FF7010CB000
unkown
page write copy
7FFDF1384000
unkown
page read and write
22465A23000
heap
page read and write
7FFDF37FE000
unkown
page readonly
2246597D000
heap
page read and write
1B08C686000
heap
page read and write
74A0000
trusted library allocation
page read and write
25C562DB000
heap
page read and write
1B08CCFC000
direct allocation
page read and write
1932495A000
heap
page read and write
7FFE10269000
unkown
page readonly
3280000
trusted library allocation
page read and write
794B000
heap
page read and write
9115000
trusted library allocation
page read and write
24675F02000
heap
page read and write
19324916000
heap
page read and write
7FFE120C0000
unkown
page readonly
AADC57E000
stack
page read and write
7FF7A81D1000
unkown
page execute read
7FFE1A470000
unkown
page readonly
12D9000
heap
page read and write
7FF702BB1000
unkown
page execute read
7FFE11522000
unkown
page readonly
22465FC0000
direct allocation
page read and write
6349000
trusted library allocation
page read and write
7FF7ECE49000
unkown
page readonly
1E8E4445000
heap
page read and write
9108000
trusted library allocation
page read and write
DEE000
unkown
page read and write
1B08C6F2000
heap
page read and write
24675C2E000
heap
page read and write
912A000
trusted library allocation
page read and write
22466008000
direct allocation
page read and write
384E000
stack
page read and write
402000
unkown
page readonly
7FFDF13B9000
unkown
page read and write
6340000
trusted library allocation
page read and write
299D6F80000
trusted library allocation
page read and write
1FB24D12000
heap
page read and write
5DE0000
trusted library allocation
page execute and read and write
224659E1000
heap
page read and write
7FFDFB221000
unkown
page execute read
299D6FA0000
trusted library allocation
page read and write
7FF7F04F1000
unkown
page execute read
6350000
trusted library allocation
page execute and read and write
5A00000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
7FFDF37F4000
unkown
page read and write
735E000
stack
page read and write
1B08C717000
heap
page read and write
16BF0E85000
heap
page read and write
7FF68CC60000
unkown
page readonly
46BC000
trusted library allocation
page read and write
7FFE120C6000
unkown
page readonly
4526000
trusted library allocation
page read and write
24675BEB000
heap
page read and write
246760D0000
direct allocation
page read and write
7FFDF10B9000
unkown
page readonly
53A0000
trusted library allocation
page read and write
7FF702BEF000
unkown
page write copy
7FFE13213000
unkown
page readonly
24675AEC000
direct allocation
page read and write
5321000
trusted library allocation
page read and write
AADC87E000
stack
page read and write
6AFF000
heap
page read and write
58D2000
trusted library allocation
page read and write
1FB24D12000
heap
page read and write
19324905000
heap
page read and write
7FFDF3827000
unkown
page write copy
259EDF60000
heap
page read and write
24675C6A000
heap
page read and write
2A99000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
24675BE0000
heap
page read and write
281753C0000
heap
page read and write
1B08CC64000
direct allocation
page read and write
3A22000
trusted library allocation
page read and write
68303DF000
stack
page read and write
7FFE11079000
unkown
page readonly
22465DAA000
heap
page read and write
299547C0000
heap
page read and write
D3B3B5D000
stack
page read and write
7FFE12E10000
unkown
page readonly
7FFE01210000
unkown
page readonly
281753C8000
heap
page read and write
7FFE101E3000
unkown
page readonly
6819000
heap
page read and write
24CE9BE0000
heap
page read and write
224659C6000
heap
page read and write
24675C05000
heap
page read and write
7FF701349000
unkown
page readonly
299D6FA0000
trusted library allocation
page read and write
3A8C000
stack
page read and write
930E000
stack
page read and write
24676254000
direct allocation
page read and write
5990000
trusted library allocation
page read and write
1B08C6B6000
heap
page read and write
1932491E000
heap
page read and write
7FFE12E16000
unkown
page read and write
2DF0000
heap
page read and write
22465A23000
heap
page read and write
63A0000
trusted library allocation
page execute and read and write
2292AC20000
heap
page read and write
1B08C9A2000
heap
page read and write
2995481F000
heap
page read and write
78A3000
trusted library allocation
page read and write
2246596A000
heap
page read and write
25C56590000
heap
page read and write
1B08C6A1000
heap
page read and write
7FFE0C0C5000
unkown
page readonly
299547A0000
heap
page readonly
1B08C6E1000
heap
page read and write
1B08CAC4000
heap
page read and write
6990000
trusted library allocation
page read and write
1B08C6EA000
heap
page read and write
798A000
trusted library allocation
page read and write
64C8000
trusted library allocation
page read and write
11B7000
stack
page read and write
5070000
heap
page execute and read and write
5162B7E000
stack
page read and write
29954EF6000
heap
page read and write
7FFDF0CCE000
unkown
page readonly
1580000
heap
page read and write
7FFDF1040000
unkown
page readonly
120E000
stack
page read and write
7FFE10263000
unkown
page readonly
4490000
trusted library allocation
page read and write
7FFDF0D65000
unkown
page readonly
51DE000
stack
page read and write
7FFE0122C000
unkown
page readonly
299547B0000
trusted library allocation
page read and write
299D6F80000
trusted library allocation
page read and write
4429000
trusted library allocation
page read and write
24675C4E000
heap
page read and write
77C2000
heap
page read and write
7FFDF0C3B000
unkown
page read and write
193248E6000
heap
page read and write
86A0000
trusted library allocation
page read and write
22465834000
heap
page read and write
1B08C69C000
heap
page read and write
19325200000
heap
page read and write
59C6000
trusted library allocation
page read and write
AADCBFE000
stack
page read and write
F46000
trusted library allocation
page execute and read and write
1B08C6B3000
heap
page read and write
1FB24D12000
heap
page read and write
7579000
trusted library allocation
page read and write
7FFE120C1000
unkown
page execute read
767E000
trusted library allocation
page read and write
F29BDFF000
stack
page read and write
1B08C98A000
heap
page read and write
140000000
unkown
page read and write
7FFE0EB61000
unkown
page readonly
4668000
trusted library allocation
page read and write
2961D190000
heap
page read and write
264D8310000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
4674000
trusted library allocation
page read and write
193249B0000
heap
page read and write
4C66B9E000
stack
page read and write
1B08C713000
heap
page read and write
19324DAE000
heap
page read and write
1090000
heap
page read and write
74B0000
heap
page execute and read and write
402000
unkown
page readonly
1E46EC60000
heap
page read and write
F29BCEE000
stack
page read and write
242B36F0000
heap
page read and write
52B0000
heap
page execute and read and write
76CF000
trusted library allocation
page read and write
783F000
trusted library allocation
page read and write
7FF7A81DB000
unkown
page write copy
29954710000
heap
page read and write
B20000
heap
page read and write
2292AA07000
heap
page read and write
24675BEB000
heap
page read and write
22465B80000
direct allocation
page read and write
228717B0000
heap
page read and write
687E000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
24675BD4000
heap
page read and write
7ADE000
stack
page read and write
7FFE0C0BC000
unkown
page readonly
8BA497F000
stack
page read and write
24675BE0000
heap
page read and write
2193F690000
heap
page read and write
7FF68CC61000
unkown
page execute read
224659AB000
heap
page read and write
4F2E000
stack
page read and write
299547B0000
trusted library allocation
page read and write
7FFDF0C3C000
unkown
page write copy
299547B0000
trusted library allocation
page read and write
2CF3A812000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
48CA000
trusted library allocation
page read and write
62BE000
heap
page read and write
5845000
trusted library allocation
page read and write
79E4000
trusted library allocation
page read and write
224659D1000
heap
page read and write
AADC37E000
stack
page read and write
44FD000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
1B08C6E1000
heap
page read and write
19324E24000
heap
page read and write
1A3B000
stack
page read and write
3340000
heap
page readonly
8804000
heap
page read and write
200FDCD2000
heap
page read and write
7FFDF3529000
unkown
page readonly
7BA0000
trusted library allocation
page read and write
224659D1000
heap
page read and write
7FFE014C1000
unkown
page execute read
7FFE11510000
unkown
page readonly
8869000
heap
page read and write
19324E10000
heap
page read and write
7FFE11076000
unkown
page readonly
19324E35000
heap
page read and write
19324F94000
direct allocation
page read and write
4435000
trusted library allocation
page read and write
3648000
heap
page read and write
8B80000
trusted library allocation
page execute and read and write
59B0000
trusted library allocation
page read and write
18B5CFD000
stack
page read and write
19324DD7000
heap
page read and write
79B9000
trusted library allocation
page read and write
C20000
heap
page read and write
22465A0A000
heap
page read and write
24676230000
direct allocation
page read and write
64DE000
stack
page read and write
2193F835000
heap
page read and write
6600000
heap
page read and write
6AF1000
heap
page read and write
4693000
trusted library allocation
page read and write
342F000
stack
page read and write
7331000
heap
page read and write
59D2000
trusted library allocation
page read and write
7FFDF3825000
unkown
page write copy
EC0ABFE000
unkown
page readonly
1620000
trusted library allocation
page read and write
2FEF000
stack
page read and write
4638000
trusted library allocation
page read and write
4E50000
heap
page read and write
7FFDFB79B000
unkown
page read and write
3C65000
trusted library allocation
page read and write
78DB000
trusted library allocation
page read and write
19322E18000
heap
page read and write
11C0000
heap
page read and write
802197F000
stack
page read and write
F55000
trusted library allocation
page execute and read and write
7FFE11BB5000
unkown
page read and write
64AE000
stack
page read and write
124E000
stack
page read and write
7FFE11EA1000
unkown
page execute read
45DA000
trusted library allocation
page read and write
233D7855000
heap
page read and write
7FFE130C6000
unkown
page readonly
18ADFAF000
stack
page read and write
299547B0000
trusted library allocation
page read and write
72CA000
heap
page read and write
8690000
trusted library allocation
page execute and read and write
299547B0000
trusted library allocation
page read and write
31D0000
heap
page read and write
7FFE10262000
unkown
page readonly
19324B00000
direct allocation
page read and write
455B000
trusted library allocation
page read and write
299D6FA0000
trusted library allocation
page read and write
8046000
trusted library allocation
page read and write
193247B5000
heap
page read and write
4C669AE000
stack
page read and write
22465A23000
heap
page read and write
400000
unkown
page readonly
7129000
heap
page read and write
7FFE148E1000
unkown
page execute read
12BE000
stack
page read and write
1670000
heap
page execute and read and write
1B08C6E1000
heap
page read and write
7889000
trusted library allocation
page read and write
771B000
trusted library allocation
page read and write
45D3000
trusted library allocation
page read and write
974E000
stack
page read and write
765A000
trusted library allocation
page read and write
664E000
stack
page read and write
468C000
trusted library allocation
page read and write
3448000
heap
page read and write
31CE000
stack
page read and write
2CF3A812000
heap
page read and write
3370000
trusted library allocation
page read and write
7FFDF31F0000
unkown
page readonly
242B3700000
unkown
page read and write
29958AF6000
heap
page read and write
70F4000
trusted library allocation
page read and write
246761B8000
direct allocation
page read and write
589D000
stack
page read and write
74E0000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
64D5000
trusted library allocation
page read and write
7FFDF376C000
unkown
page write copy
4FF70FE000
stack
page read and write
1FB24D12000
heap
page read and write
7FF7F0531000
unkown
page read and write
7FFE11506000
unkown
page readonly
453F000
trusted library allocation
page read and write
7FFE11503000
unkown
page readonly
7FF702BB1000
unkown
page execute read
3260000
trusted library allocation
page read and write
54EE000
stack
page read and write
19324929000
heap
page read and write
7FF68CC6C000
unkown
page write copy
8DBD000
stack
page read and write
7966000
heap
page read and write
7103000
heap
page read and write
264D9ED0000
heap
page read and write
299547B0000
trusted library allocation
page read and write
193248F9000
heap
page read and write
9119000
trusted library allocation
page read and write
1E8E42D0000
heap
page read and write
7668000
trusted library allocation
page read and write
1B08C6E1000
heap
page read and write
7FF7F0533000
unkown
page readonly
7FF7F0533000
unkown
page readonly
24675BA6000
heap
page read and write
1B08C669000
heap
page read and write
30EF000
stack
page read and write
6DD057E000
stack
page read and write
1B08C69C000
heap
page read and write
1B08CD14000
direct allocation
page read and write
224659B9000
heap
page read and write
12CA000
heap
page read and write
25C563B0000
heap
page read and write
6782000
heap
page read and write
8600000
trusted library allocation
page read and write
6770000
trusted library allocation
page execute and read and write
72A0000
heap
page read and write
7FFE0EB38000
unkown
page readonly
24674243000
heap
page read and write
1D2073F0000
heap
page read and write
7FFE0C0A1000
unkown
page execute read
44DE000
trusted library allocation
page read and write
16BF0E80000
heap
page read and write
193248F9000
heap
page read and write
7FF702BB0000
unkown
page readonly
2BE9DCE0000
heap
page read and write
2CF3A81F000
heap
page read and write
2246596A000
heap
page read and write
656D000
stack
page read and write
264D8493000
heap
page read and write
F07000
heap
page read and write
7FFE10250000
unkown
page readonly
224659C9000
heap
page read and write
7FFE0E183000
unkown
page readonly
7FF7F051C000
unkown
page readonly
DD511E1000
stack
page read and write
299547B0000
trusted library allocation
page read and write
1B08C681000
heap
page read and write
7FF702BF1000
unkown
page read and write
33B6000
trusted library allocation
page read and write
22465E80000
direct allocation
page read and write
1650000
heap
page read and write
78FB000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
1024000
unkown
page readonly
7FF702BDC000
unkown
page readonly
7FFE0E181000
unkown
page read and write
68301E6000
stack
page read and write
299548B9000
heap
page read and write
224659D1000
heap
page read and write
7FFE1A471000
unkown
page execute read
24675FE0000
heap
page read and write
299D6F80000
trusted library allocation
page read and write
7FFE11521000
unkown
page read and write
19324D89000
heap
page read and write
2CF3A812000
heap
page read and write
224659FF000
heap
page read and write
1B08CC58000
direct allocation
page read and write
7FF702BEF000
unkown
page read and write
7FF702BEF000
unkown
page read and write
F2D000
trusted library allocation
page execute and read and write
264D8493000
heap
page read and write
7FFE11529000
unkown
page readonly
242B3420000
heap
page read and write
7FFE11EA0000
unkown
page readonly
24675FBE000
heap
page read and write
1FB24D12000
heap
page read and write
2CF3A80F000
heap
page read and write
54AE000
stack
page read and write
4C661E1000
stack
page read and write
67F5000
heap
page read and write
7FFE110F9000
unkown
page readonly
24675C02000
heap
page read and write
2193F830000
heap
page read and write
22465F74000
direct allocation
page read and write
14078B000
unkown
page execute and read and write
E7FB07F000
stack
page read and write
2564AFB0000
heap
page read and write
44CC000
trusted library allocation
page read and write
24676240000
direct allocation
page read and write
4878000
trusted library allocation
page read and write
4C9C000
stack
page read and write
24675C49000
heap
page read and write
1625000
trusted library allocation
page execute and read and write
46A0000
trusted library allocation
page read and write
860B000
trusted library allocation
page read and write
314E000
stack
page read and write
5B30000
trusted library allocation
page read and write
2564B040000
heap
page read and write
6D70000
trusted library allocation
page read and write
1B08C717000
heap
page read and write
1B08CA57000
heap
page read and write
731B000
stack
page read and write
7FFE130C5000
unkown
page read and write
941E000
stack
page read and write
224659C3000
heap
page read and write
24675C19000
heap
page read and write
2467613C000
direct allocation
page read and write
22465D8A000
heap
page read and write
1B08C6B4000
heap
page read and write
486D000
trusted library allocation
page read and write
2292A9F8000
heap
page read and write
7FFDF34A6000
unkown
page readonly
19324D04000
direct allocation
page read and write
200FDCD2000
heap
page read and write
4FF6CFC000
stack
page read and write
5980000
trusted library allocation
page execute and read and write
7250000
trusted library allocation
page read and write
193247A0000
direct allocation
page read and write
7FCC0000
trusted library allocation
page execute and read and write
802187F000
stack
page read and write
299D6FA0000
trusted library allocation
page read and write
7FF702BDC000
unkown
page readonly
4597000
trusted library allocation
page read and write
458C000
trusted library allocation
page read and write
8D2A000
heap
page read and write
1B08CD08000
direct allocation
page read and write
16BF0DF0000
heap
page read and write
5DDE000
stack
page read and write
19324905000
heap
page read and write
4532000
trusted library allocation
page read and write
299580F6000
heap
page read and write
7FF7ECBC8000
unkown
page readonly
1932494D000
heap
page read and write
24675BF9000
heap
page read and write
5310000
trusted library allocation
page read and write
19324DCE000
heap
page read and write
4538000
trusted library allocation
page read and write
4FF6DFE000
stack
page read and write
7A5E000
stack
page read and write
200FDC60000
heap
page read and write
22465830000
heap
page read and write
7FFE11BB0000
unkown
page readonly
77A0000
trusted library allocation
page execute and read and write
12C0000
heap
page read and write
1B08C99E000
heap
page read and write
7270000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
5D90000
trusted library allocation
page execute and read and write
33F0000
heap
page read and write
24675BF9000
heap
page read and write
24676134000
direct allocation
page read and write
7FFE10261000
unkown
page read and write
224659BE000
heap
page read and write
5342000
trusted library allocation
page read and write
1FB24B50000
heap
page read and write
19324E81000
heap
page read and write
874E000
stack
page read and write
299547B0000
trusted library allocation
page read and write
24CE9B70000
heap
page read and write
264D848F000
heap
page read and write
299547B0000
trusted library allocation
page read and write
1B08C669000
heap
page read and write
795C000
trusted library allocation
page read and write
2995B2F6000
heap
page read and write
19324E19000
heap
page read and write
7750000
trusted library allocation
page read and write
3210000
heap
page read and write
1B08C69F000
heap
page read and write
7FFDF13B7000
unkown
page write copy
1B08CC68000
direct allocation
page read and write
E7FAE7D000
stack
page read and write
7FF702BB0000
unkown
page readonly
72782FF000
stack
page read and write
24675DC0000
direct allocation
page read and write
7FFE1025D000
unkown
page readonly
24675BC1000
heap
page read and write
1FB24C40000
heap
page read and write
76EE000
stack
page read and write
46F4000
trusted library allocation
page read and write
299D6F80000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
1B08CB70000
direct allocation
page read and write
224659BD000
heap
page read and write
24675BF7000
heap
page read and write
224659E1000
heap
page read and write
72EB000
stack
page read and write
452B000
trusted library allocation
page read and write
19324E3A000
heap
page read and write
19324E93000
heap
page read and write
2CF3A812000
heap
page read and write
4843000
trusted library allocation
page read and write
4891000
trusted library allocation
page read and write
1E46EA10000
heap
page read and write
2CF3A812000
heap
page read and write
521E000
stack
page read and write
1D207685000
heap
page read and write
7FF7F04F0000
unkown
page readonly
264D8493000
heap
page read and write
5D80000
trusted library allocation
page read and write
5C20000
trusted library allocation
page execute and read and write
24675C2E000
heap
page read and write
7FFDF0D06000
unkown
page read and write
F20000
trusted library allocation
page read and write
299D6FA0000
trusted library allocation
page read and write
18AE19F000
stack
page read and write
1B08C6F2000
heap
page read and write
24675BE0000
heap
page read and write
7FF7F04F1000
unkown
page execute read
223779F000
stack
page read and write
7FFE10311000
unkown
page read and write
675C000
stack
page read and write
7BB0000
trusted library allocation
page read and write
1080000
unkown
page readonly
1B08C6FF000
heap
page read and write
224659AC000
heap
page read and write
9390000
trusted library allocation
page execute and read and write
16BF0E90000
heap
page read and write
776E000
stack
page read and write
22465997000
heap
page read and write
2246600C000
direct allocation
page read and write
7FFDFB4E0000
unkown
page readonly
720000
unkown
page readonly
67BD000
heap
page read and write
2D78000
stack
page read and write
45AF000
trusted library allocation
page read and write
44B3000
trusted library allocation
page read and write
1B08CAC9000
heap
page read and write
299547B0000
trusted library allocation
page read and write
3279000
trusted library allocation
page read and write
7FFE12E11000
unkown
page execute read
7FFDF3763000
unkown
page write copy
7713000
trusted library allocation
page read and write
1301000
heap
page read and write
F80000
trusted library allocation
page execute and read and write
15FD000
trusted library allocation
page execute and read and write
52D6000
trusted library allocation
page read and write
7FFDF13C5000
unkown
page write copy
22463ECF000
heap
page read and write
28EA000
trusted library allocation
page read and write
8831000
heap
page read and write
200FDCD2000
heap
page read and write
22465A23000
heap
page read and write
7FFE10251000
unkown
page execute read
7FFE101E9000
unkown
page readonly
5C30000
trusted library allocation
page read and write
3394000
trusted library allocation
page read and write
3AC2000
heap
page read and write
1B08C6DA000
heap
page read and write
3263000
trusted library allocation
page execute and read and write
52C0000
trusted library allocation
page read and write
24675C66000
heap
page read and write
28175210000
heap
page read and write
24675EBC000
direct allocation
page read and write
1B08C66B000
heap
page read and write
19324904000
heap
page read and write
2CF3A7F8000
heap
page read and write
2CF3A812000
heap
page read and write
1B08C98A000
heap
page read and write
7FFE10301000
unkown
page execute read
7FFDF0980000
unkown
page readonly
7FFE13209000
unkown
page readonly
7FF701349000
unkown
page readonly
7FFDF0983000
unkown
page readonly
7FFE12E17000
unkown
page readonly
F70000
trusted library allocation
page read and write
9360000
trusted library allocation
page read and write
76B6000
trusted library allocation
page read and write
299D6FA0000
trusted library allocation
page read and write
246761F4000
direct allocation
page read and write
24675C33000
heap
page read and write
7FFE10301000
unkown
page execute read
7FF7010C0000
unkown
page readonly
3380000
heap
page read and write
1B2AA610000
heap
page read and write
299547B0000
trusted library allocation
page read and write
224659B4000
heap
page read and write
77D9000
trusted library allocation
page read and write
1B08CCE0000
direct allocation
page read and write
299547B0000
trusted library allocation
page read and write
2BE9DE75000
heap
page read and write
299547B0000
trusted library allocation
page read and write
299D6F80000
trusted library allocation
page read and write
5460000
trusted library allocation
page execute and read and write
679F000
heap
page read and write
299547B0000
trusted library allocation
page read and write
FE0000
unkown
page readonly
22465940000
heap
page read and write
19324E4F000
heap
page read and write
3C45000
trusted library allocation
page read and write
19324E24000
heap
page read and write
46A4000
trusted library allocation
page read and write
6CD6000
trusted library allocation
page read and write
D2E474B000
stack
page read and write
5C63000
trusted library allocation
page read and write
7FFE11BCD000
unkown
page readonly
7FFDFB79C000
unkown
page write copy
72F1000
heap
page read and write
DCFB3AD000
stack
page read and write
6B34000
heap
page read and write
29954E58000
heap
page read and write
7949000
trusted library allocation
page read and write
24675A30000
heap
page read and write
7FFE13261000
unkown
page read and write
200FDCD2000
heap
page read and write
19324F70000
direct allocation
page read and write
24675BE0000
heap
page read and write
AADC47C000
stack
page read and write
4660000
trusted library allocation
page read and write
1B08C6FF000
heap
page read and write
29954E48000
heap
page read and write
7FFDF128A000
unkown
page read and write
1B08C9A1000
heap
page read and write
19BD000
stack
page read and write
1E46E9D0000
unkown
page read and write
1B08C713000
heap
page read and write
745E000
stack
page read and write
7BE0000
trusted library allocation
page read and write
4554000
trusted library allocation
page read and write
648D000
trusted library allocation
page read and write
64DF000
trusted library allocation
page read and write
1B08C713000
heap
page read and write
224659C6000
heap
page read and write
259EDD80000
heap
page read and write
193247B0000
heap
page read and write
4650000
trusted library allocation
page read and write
193248E8000
heap
page read and write
800D000
stack
page read and write
1932493D000
heap
page read and write
7FFE10268000
unkown
page read and write
AADC3FE000
unkown
page readonly
299D6FA0000
trusted library allocation
page read and write
22466028000
direct allocation
page read and write
264D8492000
heap
page read and write
64F2000
trusted library allocation
page read and write
59E1000
trusted library allocation
page read and write
2995482F000
heap
page read and write
2A8F000
trusted library allocation
page read and write
7FF68CC60000
unkown
page readonly
22465FE4000
direct allocation
page read and write
2BE9DCE9000
heap
page read and write
9370000
trusted library allocation
page execute and read and write
5B40000
trusted library allocation
page read and write
E02000
unkown
page readonly
87B0000
heap
page read and write
24675C33000
heap
page read and write
7585000
trusted library allocation
page read and write
AADCDFE000
unkown
page readonly
19324DCF000
heap
page read and write
24675BF7000
heap
page read and write
64E4000
trusted library allocation
page read and write
7FF7010C1000
unkown
page execute read
7FF702BDC000
unkown
page readonly
7FFE0C0C4000
unkown
page read and write
7FFE0E170000
unkown
page readonly
8E73000
trusted library allocation
page read and write
87B4000
heap
page read and write
8856000
heap
page read and write
4421000
trusted library allocation
page read and write
6CE8000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
19324980000
heap
page read and write
1B08C71A000
heap
page read and write
193249B8000
heap
page read and write
77AE000
stack
page read and write
7976000
heap
page read and write
8E3C000
stack
page read and write
8E7D000
trusted library allocation
page read and write
7CB000
stack
page read and write
1606000
trusted library allocation
page execute and read and write
7FF702BF1000
unkown
page read and write
299547B0000
trusted library allocation
page read and write
24675B70000
direct allocation
page read and write
1B08C971000
heap
page read and write
1DCEB0D0000
heap
page read and write
16BF0DD0000
heap
page read and write
1530000
trusted library allocation
page read and write
3370000
trusted library allocation
page execute and read and write
19324EB5000
heap
page read and write
7FFDF1014000
unkown
page readonly
2995488D000
heap
page read and write
7FF702BB1000
unkown
page execute read
24675BB1000
heap
page read and write
1B08C630000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
1596000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
29954805000
heap
page read and write
1B08C728000
heap
page read and write
200FDCB8000
heap
page read and write
224659FE000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
7FF702BB0000
unkown
page readonly
87BC000
heap
page read and write
1B08CDC0000
heap
page read and write
4D90000
heap
page read and write
1B08AAB0000
heap
page read and write
1FB24D12000
heap
page read and write
7FF702BEF000
unkown
page write copy
1B08CC70000
direct allocation
page read and write
7FF702BB1000
unkown
page execute read
8867000
heap
page read and write
59C1000
trusted library allocation
page read and write
1B08C6B9000
heap
page read and write
398C000
stack
page read and write
7FF7A845D000
unkown
page read and write
19322DC0000
heap
page read and write
1D207680000
heap
page read and write
7FFDF138E000
unkown
page readonly
1B08C6F6000
heap
page read and write
24675BE0000
heap
page read and write
24675C4F000
heap
page read and write
224659A5000
heap
page read and write
401000
unkown
page execute read
6320000
trusted library allocation
page read and write
86FF000
stack
page read and write
912F000
trusted library allocation
page read and write
8B53000
trusted library allocation
page read and write
370E000
stack
page read and write
2CF3A812000
heap
page read and write
18AE38F000
stack
page read and write
7FFE10311000
unkown
page readonly
87A0000
heap
page read and write
2BE9DDE0000
heap
page read and write
1B08C669000
heap
page read and write
7FFE130C6000
unkown
page readonly
299547B0000
trusted library allocation
page read and write
264D8470000
heap
page read and write
7831000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
7FFE1325D000
unkown
page readonly
7FFE101D1000
unkown
page execute read
7FF7ECBC8000
unkown
page readonly
400000
unkown
page readonly
7FFDF1408000
unkown
page read and write
7FF7F052F000
unkown
page write copy
7FFE11BD1000
unkown
page read and write
6342000
trusted library allocation
page read and write
15ED000
trusted library allocation
page execute and read and write
5350000
trusted library allocation
page read and write
1B08C6C6000
heap
page read and write
2BE9DCE6000
heap
page read and write
24675C4F000
heap
page read and write
7700000
trusted library allocation
page read and write
246761E0000
direct allocation
page read and write
24675C2B000
heap
page read and write
7FFE11EB3000
unkown
page readonly
19324917000
heap
page read and write
7FF68CEED000
unkown
page read and write
193248C0000
heap
page read and write
7FFDF12FC000
unkown
page write copy
3388000
heap
page read and write
44EB000
trusted library allocation
page read and write
24675ED0000
heap
page read and write
1B08C6D9000
heap
page read and write
7FF702BEF000
unkown
page read and write
7490000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
7FFDF31F1000
unkown
page execute read
1B08C9AB000
heap
page read and write
224659B4000
heap
page read and write
1DCEAF40000
heap
page read and write
24675C0C000
heap
page read and write
775B000
trusted library allocation
page read and write
2A84000
trusted library allocation
page read and write
299D6FA0000
trusted library allocation
page read and write
2467621C000
direct allocation
page read and write
7FFE13250000
unkown
page readonly
6828000
heap
page read and write
7FFDF0D80000
unkown
page readonly
29954700000
heap
page read and write
2CF3A812000
heap
page read and write
193249B0000
heap
page read and write
2564B802000
trusted library allocation
page read and write
22465A02000
heap
page read and write
29956CF6000
heap
page read and write
2564B000000
heap
page read and write
697C000
stack
page read and write
1B2AA800000
heap
page read and write
7FFDF0CC2000
unkown
page read and write
7FFE0C0A0000
unkown
page readonly
DCFB7FF000
stack
page read and write
19324FCC000
direct allocation
page read and write
19324D52000
heap
page read and write
7941000
heap
page read and write
19322E2E000
heap
page read and write
299D6F80000
trusted library allocation
page read and write
29954DF0000
heap
page read and write
84B4000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
6CDC000
trusted library allocation
page read and write
7FFE130C9000
unkown
page readonly
299D6F80000
trusted library allocation
page read and write
781B000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
D3B3EFF000
stack
page read and write
2961D1F0000
unkown
page read and write
48A9000
trusted library allocation
page read and write
1932495A000
heap
page read and write
5D60000
trusted library allocation
page execute and read and write
7FFDF3824000
unkown
page read and write
299547B0000
trusted library allocation
page read and write
33FE000
heap
page read and write
65C0000
trusted library allocation
page read and write
25C562B0000
heap
page read and write
7255000
trusted library allocation
page read and write
5782000
trusted library allocation
page read and write
24675BC1000
heap
page read and write
7FFDF0CF4000
unkown
page read and write
7847000
trusted library allocation
page read and write
7FFE0C0A0000
unkown
page readonly
299D6FA0000
trusted library allocation
page read and write
200FF640000
heap
page read and write
299548BB000
heap
page read and write
1B08C717000
heap
page read and write
1622000
trusted library allocation
page read and write
19324D10000
heap
page read and write
7FFE0EB44000
unkown
page read and write
7FFE1031C000
unkown
page readonly
5A20000
trusted library allocation
page read and write
7592000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
457A000
trusted library allocation
page read and write
4899000
trusted library allocation
page read and write
14000A000
unkown
page readonly
2CF3A812000
heap
page read and write
1010000
unkown
page readonly
299547B0000
trusted library allocation
page read and write
5162A7C000
stack
page read and write
978E000
stack
page read and write
22871837000
heap
page read and write
2246597D000
heap
page read and write
24676037000
heap
page read and write
224659B2000
heap
page read and write
483D000
trusted library allocation
page read and write
7FFDF3878000
unkown
page read and write
870E000
stack
page read and write
2961CFB9000
heap
page read and write
7FFE11511000
unkown
page execute read
7701000
trusted library allocation
page read and write
1B08C6B4000
heap
page read and write
24675BE2000
heap
page read and write
7FFE11BB6000
unkown
page readonly
7FFE11070000
unkown
page readonly
7FF702BF3000
unkown
page readonly
44659FE000
stack
page read and write
4860000
trusted library allocation
page read and write
7FF7010C0000
unkown
page readonly
1FB24D12000
heap
page read and write
19324DFD000
heap
page read and write
7FF702BB1000
unkown
page execute read
7FFDF34B0000
unkown
page readonly
22463EB0000
heap
page read and write
77C0000
trusted library allocation
page read and write
6CD4000
trusted library allocation
page read and write
193249A1000
heap
page read and write
7970000
heap
page read and write
6D10000
trusted library allocation
page read and write
22465A29000
heap
page read and write
1B08C713000
heap
page read and write
2246601C000
direct allocation
page read and write
6234000
heap
page read and write
7767000
trusted library allocation
page read and write
24675C4F000
heap
page read and write
289E000
stack
page read and write
7FFE11BD2000
unkown
page readonly
22465A04000
heap
page read and write
299547B0000
trusted library allocation
page read and write
446B000
heap
page read and write
22465D17000
heap
page read and write
A95B5E7000
stack
page read and write
18B60FE000
stack
page read and write
299D6FA0000
trusted library allocation
page read and write
1015000
unkown
page readonly
9128000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
328A000
trusted library allocation
page execute and read and write
763E000
stack
page read and write
299D6FA0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
299D6FA0000
trusted library allocation
page read and write
193249A5000
heap
page read and write
32FE000
stack
page read and write
4443000
trusted library allocation
page read and write
E02000
unkown
page readonly
1B08C6B6000
heap
page read and write
1B08ACB0000
heap
page read and write
281752F0000
heap
page read and write
599A000
trusted library allocation
page read and write
4593000
trusted library allocation
page read and write
1B08CA57000
heap
page read and write
7FFE10318000
unkown
page read and write
2CF3A812000
heap
page read and write
7FF7ECBCA000
unkown
page write copy
299D6FA0000
trusted library allocation
page read and write
22465750000
heap
page read and write
224659A5000
heap
page read and write
299547B0000
trusted library allocation
page read and write
7FF702BF3000
unkown
page readonly
6780000
heap
page read and write
224659FE000
heap
page read and write
224659C3000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
7FF702BB0000
unkown
page readonly
484F000
trusted library allocation
page read and write
7FFDFB859000
unkown
page read and write
233D7880000
heap
page read and write
48BD000
trusted library allocation
page read and write
4E57000
heap
page read and write
4681000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
8DFE000
stack
page read and write
24674150000
heap
page read and write
7874000
trusted library allocation
page read and write
18AD7E0000
stack
page read and write
1260000
heap
page read and write
1B08C6CD000
heap
page read and write
3A84000
trusted library allocation
page read and write
4848000
trusted library allocation
page read and write
8B50000
trusted library allocation
page read and write
4C66D8F000
stack
page read and write
680E000
heap
page read and write
299562F6000
heap
page read and write
2564B013000
heap
page read and write
22465A0A000
heap
page read and write
1E46E9D0000
unkown
page read and write
9350000
trusted library allocation
page read and write
22871820000
heap
page read and write
224659F4000
heap
page read and write
193249A6000
heap
page read and write
1FB24D1F000
heap
page read and write
28E0000
trusted library allocation
page read and write
2246597D000
heap
page read and write
935D000
trusted library allocation
page read and write
4483000
trusted library allocation
page read and write
EC0A4FD000
stack
page read and write
4D1E000
stack
page read and write
264D8430000
heap
page read and write
7FFDFB220000
unkown
page readonly
1B08C676000
heap
page read and write
1B08C9AB000
heap
page read and write
60FE000
stack
page read and write
19324D65000
heap
page read and write
299D6F80000
trusted library allocation
page read and write
17B1000
heap
page read and write
65AE000
stack
page read and write
8CFE000
stack
page read and write
7FF702BB0000
unkown
page readonly
7FFE13211000
unkown
page read and write
299D6FA0000
trusted library allocation
page read and write
7FFE11BB3000
unkown
page readonly
1B2AA5F0000
heap
page read and write
7FF7ECBC0000
unkown
page readonly
28F0000
heap
page execute and read and write
35CE000
stack
page read and write
7FF702BB0000
unkown
page readonly
33AE000
trusted library allocation
page read and write
7FFE01221000
unkown
page readonly
7FF702BF1000
unkown
page read and write
F29BCFE000
stack
page read and write
1B08C688000
heap
page read and write
264D8493000
heap
page read and write
7FFE0EB6C000
unkown
page readonly
310E000
stack
page read and write
299547B0000
trusted library allocation
page read and write
7FFE1A474000
unkown
page readonly
9110000
trusted library allocation
page read and write
24675C05000
heap
page read and write
F3D000
trusted library allocation
page execute and read and write
299547B0000
trusted library allocation
page read and write
7A9E000
stack
page read and write
224659CF000
heap
page read and write
1B08C99E000
heap
page read and write
200FDC70000
heap
page readonly
7FF702BDC000
unkown
page readonly
2CF3A812000
heap
page read and write
28E4000
trusted library allocation
page read and write
19324930000
heap
page read and write
24675ED1000
heap
page read and write
52E2000
trusted library allocation
page read and write
7FF702BB0000
unkown
page readonly
45A8000
trusted library allocation
page read and write
7FFE13200000
unkown
page readonly
7FFDFB793000
unkown
page write copy
4830000
trusted library allocation
page read and write
79C3000
trusted library allocation
page read and write
1170000
heap
page read and write
2995A8F6000
heap
page read and write
1B08C625000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
4551000
trusted library allocation
page read and write
19324DB6000
heap
page read and write
2564B043000
heap
page read and write
22465989000
heap
page read and write
1A57000
trusted library allocation
page read and write
1510000
trusted library allocation
page execute and read and write
730B000
heap
page read and write
727D000
trusted library allocation
page read and write
7100000
heap
page read and write
24675C4E000
heap
page read and write
5A2B000
trusted library allocation
page read and write
22465A29000
heap
page read and write
22871730000
heap
page read and write
200FDCD2000
heap
page read and write
7FFE10251000
unkown
page execute read
7FFDF3836000
unkown
page read and write
5995000
trusted library allocation
page read and write
7FFDF06C1000
unkown
page execute read
7FFE11511000
unkown
page execute read
32B0000
trusted library allocation
page read and write
7FFDFB854000
unkown
page read and write
7FFDF0976000
unkown
page readonly
9140000
trusted library allocation
page execute and read and write
7FFE148E0000
unkown
page readonly
2A00000
heap
page read and write
1932495B000
heap
page read and write
242B36F5000
heap
page read and write
7FF702BDC000
unkown
page readonly
7FFDFB857000
unkown
page write copy
781D000
trusted library allocation
page read and write
87A8000
heap
page read and write
19324CF8000
direct allocation
page read and write
62DF000
heap
page read and write
19322E93000
heap
page read and write
1B2AA9C5000
heap
page read and write
28175580000
heap
page read and write
7FF702BF3000
unkown
page readonly
7277F7D000
stack
page read and write
193248FC000
heap
page read and write
1FB24CF8000
heap
page read and write
7FF702BEF000
unkown
page read and write
7FFE13221000
unkown
page execute read
52F1000
trusted library allocation
page read and write
24675C6A000
heap
page read and write
299558F6000
heap
page read and write
1B08C6EE000
heap
page read and write
B40000
heap
page read and write
7FF7A81D1000
unkown
page execute read
7665000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
7FF68CC6B000
unkown
page write copy
1D2075E0000
heap
page read and write
22465FB0000
direct allocation
page read and write
AADC77E000
stack
page read and write
79DB000
trusted library allocation
page read and write
2CF3A812000
heap
page read and write
1DCEB020000
heap
page read and write
7FFE0C0A1000
unkown
page execute read
517F000
stack
page read and write
62FB000
heap
page read and write
3390000
trusted library allocation
page read and write
246761C8000
direct allocation
page read and write
29954E30000
heap
page read and write
1B08C480000
heap
page read and write
7FF702BF3000
unkown
page readonly
24675C2B000
heap
page read and write
1A68000
heap
page read and write
299547B0000
trusted library allocation
page read and write
7FF702BDC000
unkown
page readonly
299547B0000
trusted library allocation
page read and write
1B08C66B000
heap
page read and write
7FF702BB0000
unkown
page readonly
19324E4F000
heap
page read and write
29FE000
stack
page read and write
299D6FA0000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
1B08CCB0000
direct allocation
page read and write
74C0000
heap
page read and write
1404DC000
unkown
page execute and read and write
7FFDF0AC4000
unkown
page readonly
3B45000
trusted library allocation
page read and write
2246597D000
heap
page read and write
19324E03000
heap
page read and write
1B08CCE4000
direct allocation
page read and write
7710000
trusted library allocation
page execute and read and write
454E000
trusted library allocation
page read and write
24675C30000
heap
page read and write
767C000
trusted library allocation
page read and write
7FF702BEF000
unkown
page read and write
22465995000
heap
page read and write
7FF702BDC000
unkown
page readonly
224659AA000
heap
page read and write
7FF7F04F1000
unkown
page execute read
33D0000
trusted library allocation
page read and write
7FFDF35F4000
unkown
page readonly
7FFDF1043000
unkown
page readonly
22463FA2000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
4896000
trusted library allocation
page read and write
224659BE000
heap
page read and write
2193F698000
heap
page read and write
DD513DF000
stack
page read and write
5B90000
trusted library allocation
page read and write
59BB000
trusted library allocation
page read and write
8858000
heap
page read and write
EC0A5FE000
unkown
page readonly
AADC67E000
stack
page read and write
299D6FA0000
trusted library allocation
page read and write
7FF7A81D9000
unkown
page readonly
60EBFE7000
stack
page read and write
7321000
heap
page read and write
7673000
trusted library allocation
page read and write
22465FD4000
direct allocation
page read and write
759A000
trusted library allocation
page read and write
7FF7010C8000
unkown
page readonly
4040DC000
stack
page read and write
22465F78000
direct allocation
page read and write
160A000
trusted library allocation
page execute and read and write
7FF7ECE49000
unkown
page readonly
2BE9DE70000
heap
page read and write
774D000
trusted library allocation
page read and write
780C000
trusted library allocation
page read and write
44E4000
trusted library allocation
page read and write
7FFE0C0C4000
unkown
page read and write
F40000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
200FDCD2000
heap
page read and write
5BA0000
trusted library allocation
page execute and read and write
7FF7F052F000
unkown
page write copy
F00000
heap
page read and write
7B5D000
stack
page read and write
77E1000
trusted library allocation
page read and write
264D8493000
heap
page read and write
45A5000
trusted library allocation
page read and write
19324955000
heap
page read and write
134B000
heap
page read and write
446597C000
stack
page read and write
EC0000
heap
page read and write
7FF702BDC000
unkown
page readonly
1B08C728000
heap
page read and write
7FFDF3895000
unkown
page readonly
5B60000
trusted library allocation
page read and write
4520000
trusted library allocation
page read and write
7FF702BF3000
unkown
page readonly
7FFE11501000
unkown
page execute read
24CE9ED5000
heap
page read and write
7FF7ECBCA000
unkown
page read and write
299547B0000
trusted library allocation
page read and write
299D6FA0000
trusted library allocation
page read and write
299D6F80000
trusted library allocation
page read and write
D50000
trusted library allocation
page read and write
46C8000
trusted library allocation
page read and write
8BA48FF000
stack
page read and write
8700000
trusted library allocation
page read and write
233D7860000
heap
page read and write
1B08CC8C000
direct allocation
page read and write
200FDC80000
heap
page read and write
1E8E41D0000
heap
page read and write
29954770000
direct allocation
page execute read
299547B0000
trusted library allocation
page read and write
2467623C000
direct allocation
page read and write
62EB000
heap
page read and write
2CF3A81F000
heap
page read and write
2292A8C0000
heap
page read and write
22465D7A000
heap
page read and write
64E0000
trusted library allocation
page read and write
19324934000
heap
page read and write
44EF000
trusted library allocation
page read and write
24675BDA000
heap
page read and write
2CF3C200000
heap
page read and write
1E46E9A0000
heap
page read and write
7FF7F052F000
unkown
page read and write
77B5000
trusted library allocation
page read and write
19322DF0000
heap
page read and write
45BB000
trusted library allocation
page read and write
1B08C53C000
direct allocation
page read and write
7FFE11BC1000
unkown
page execute read
7FFE120C9000
unkown
page readonly
7FFDF1184000
unkown
page readonly
C47000
heap
page read and write
299594F6000
heap
page read and write
299547B0000
trusted library allocation
page read and write
7983000
heap
page read and write
7FFE12E16000
unkown
page read and write
1E46EC65000
heap
page read and write
7658000
trusted library allocation
page read and write
7FFDF0CF7000
unkown
page write copy
4041DE000
stack
page read and write
7FF702BB1000
unkown
page execute read
8E3E000
stack
page read and write
7277F6E000
stack
page read and write
60EC1DE000
stack
page read and write
64B0000
trusted library allocation
page read and write
29954745000
heap
page read and write
7FFDF0CC4000
unkown
page read and write
7FFE014DE000
unkown
page readonly
7125000
heap
page read and write
7FFE0EB45000
unkown
page readonly
7FFDF12FB000
unkown
page read and write
7480000
trusted library allocation
page read and write
24675BE3000
heap
page read and write
22465EEC000
direct allocation
page read and write
24675C0A000
heap
page read and write
33E0000
trusted library allocation
page read and write
264D8400000
heap
page read and write
19324930000
heap
page read and write
15E4000
trusted library allocation
page read and write
75FE000
stack
page read and write
7FF7010CA000
unkown
page write copy
24675BF1000
heap
page read and write
2564AFE0000
trusted library allocation
page read and write
75FC000
trusted library allocation
page read and write
380F000
stack
page read and write
1B08C6B5000
heap
page read and write
193248F1000
heap
page read and write
299D6F80000
trusted library allocation
page read and write
1B08C6DA000
heap
page read and write
85F0000
trusted library allocation
page execute and read and write
6AE9000
heap
page read and write
802156C000
stack
page read and write
45CE000
trusted library allocation
page read and write
2CF3A790000
heap
page read and write
2BE9DE80000
unkown
page read and write
16E7000
heap
page read and write
77B2000
trusted library allocation
page read and write
4574000
trusted library allocation
page read and write
7FFE13251000
unkown
page execute read
5A08000
trusted library allocation
page read and write
2CF3A7C0000
heap
page read and write
332E000
stack
page read and write
EC0ACFE000
stack
page read and write
1B08C6B6000
heap
page read and write
52D0000
heap
page execute and read and write
2292A9F0000
heap
page read and write
22465D80000
heap
page read and write
52AD000
stack
page read and write
7FFE12E17000
unkown
page readonly
7FF7A81D9000
unkown
page readonly
7FFDFB82E000
unkown
page readonly
447E000
trusted library allocation
page read and write
7FF7A81DC000
unkown
page write copy
299D6F80000
trusted library allocation
page read and write
89C0000
trusted library allocation
page execute and read and write
59DE000
trusted library allocation
page read and write
749B000
stack
page read and write
7FFDFB855000
unkown
page write copy
C54000
heap
page read and write
299D6F80000
trusted library allocation
page read and write
65CD000
trusted library allocation
page read and write
4465C7E000
stack
page read and write
5A11000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
19324E12000
heap
page read and write
F5B000
trusted library allocation
page execute and read and write
299547B0000
trusted library allocation
page read and write
299D6FA0000
trusted library allocation
page read and write
76C1000
trusted library allocation
page read and write
74B5000
heap
page execute and read and write
7340000
trusted library allocation
page execute and read and write
8D26000
heap
page read and write
7FFDF0CF9000
unkown
page read and write
2BE9DBF0000
heap
page read and write
200FDCD2000
heap
page read and write
7FFDF3829000
unkown
page read and write
200FF630000
heap
page read and write
24675F0B000
heap
page read and write
32EE000
stack
page read and write
7FFE12E11000
unkown
page execute read
299547B0000
trusted library allocation
page read and write
1FB24D0E000
heap
page read and write
D30000
trusted library allocation
page execute and read and write
52D1000
trusted library allocation
page read and write
264D8493000
heap
page read and write
7FFE01211000
unkown
page execute read
22465995000
heap
page read and write
4884000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
22465A02000
heap
page read and write
7FFE0C0B8000
unkown
page readonly
48B1000
trusted library allocation
page read and write
D20000
heap
page read and write
2A7E000
trusted library allocation
page read and write
1B08C713000
heap
page read and write
4870000
trusted library allocation
page read and write
299D6FA0000
trusted library allocation
page read and write
7FFE12E10000
unkown
page readonly
299547B0000
trusted library allocation
page read and write
24675C6A000
heap
page read and write
7330000
heap
page read and write
193248EC000
heap
page read and write
5A48000
trusted library allocation
page read and write
76AB000
trusted library allocation
page read and write
19324F50000
direct allocation
page read and write
24675BC1000
heap
page read and write
7FFE101E8000
unkown
page read and write
630D000
heap
page read and write
11C5000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
65DE000
stack
page read and write
19324FA8000
direct allocation
page read and write
4586000
trusted library allocation
page read and write
7FFDF0D81000
unkown
page execute read
7FF702BB1000
unkown
page execute read
1B08C6E4000
heap
page read and write
1B08C653000
heap
page read and write
1932492B000
heap
page read and write
AADCD7E000
stack
page read and write
7BD0000
trusted library allocation
page read and write
299548B4000
heap
page read and write
259EDF65000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
233D7770000
heap
page read and write
5BC0000
trusted library allocation
page read and write
1B2AA7E0000
heap
page read and write
1B08C6FF000
heap
page read and write
7FFE014D8000
unkown
page read and write
7FF702BB1000
unkown
page execute read
7FFDF0CF5000
unkown
page write copy
1B08C6AE000
heap
page read and write
19324E81000
heap
page read and write
22466018000
direct allocation
page read and write
264D84A0000
heap
page read and write
299D6F80000
trusted library allocation
page read and write
7790000
heap
page read and write
6CF8000
trusted library allocation
page read and write
401000
unkown
page execute read
8750000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
7FFDF36FA000
unkown
page read and write
140009000
unkown
page read and write
16BF0DC0000
heap
page read and write
7FFE1323C000
unkown
page readonly
86A7000
trusted library allocation
page read and write
1B08C66B000
heap
page read and write
22465F68000
direct allocation
page read and write
19324934000
heap
page read and write
7FF702BF1000
unkown
page read and write
7FF702BF3000
unkown
page readonly
8BA487C000
stack
page read and write
7FF7F04F0000
unkown
page readonly
7FFDFB824000
unkown
page read and write
74A1000
trusted library allocation
page read and write
22463EB8000
heap
page read and write
264D8493000
heap
page read and write
4642000
trusted library allocation
page read and write
299D6F80000
trusted library allocation
page read and write
1B08C96C000
direct allocation
page read and write
756B000
trusted library allocation
page read and write
84C4000
trusted library allocation
page read and write
22465C80000
heap
page read and write
7FFDFB559000
unkown
page readonly
5AAD000
trusted library allocation
page read and write
8D3E000
stack
page read and write
4543000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
3295000
trusted library allocation
page execute and read and write
1FB24D12000
heap
page read and write
16BE000
stack
page read and write
1600000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
1B08ABA4000
heap
page read and write
19322E10000
heap
page read and write
89F0000
trusted library allocation
page read and write
7FFDFB856000
unkown
page read and write
2467416E000
heap
page read and write
52E1000
trusted library allocation
page read and write
299D6FA0000
trusted library allocation
page read and write
1B08C71B000
heap
page read and write
7FF7010C1000
unkown
page execute read
2CF3A6A0000
heap
page read and write
5998000
trusted library allocation
page read and write
934E000
stack
page read and write
1B08C66C000
heap
page read and write
797D000
heap
page read and write
22465A23000
heap
page read and write
24675C6A000
heap
page read and write
299547B0000
trusted library allocation
page read and write
77A7000
trusted library allocation
page read and write
2193F520000
heap
page read and write
7FFE014C0000
unkown
page readonly
481C000
trusted library allocation
page read and write
2961D0B0000
heap
page read and write
24675BDA000
heap
page read and write
7FFE014DC000
unkown
page readonly
54F0000
trusted library allocation
page execute and read and write
22465995000
heap
page read and write
22465995000
heap
page read and write
58D0000
trusted library allocation
page read and write
22465FF4000
direct allocation
page read and write
7FFDF09F9000
unkown
page readonly
22465A0A000
heap
page read and write
7FF7010CA000
unkown
page read and write
193247C0000
direct allocation
page read and write
24675F05000
heap
page read and write
7FFDF06C0000
unkown
page readonly
7FF702BEF000
unkown
page write copy
19324D80000
heap
page read and write
8D7E000
stack
page read and write
73DD000
stack
page read and write
24675BC1000
heap
page read and write
140847000
unkown
page read and write
28175585000
heap
page read and write
5436000
trusted library allocation
page read and write
334B000
stack
page read and write
7571000
trusted library allocation
page read and write
44A9000
trusted library allocation
page read and write
1B08CD18000
direct allocation
page read and write
19324DB6000
heap
page read and write
299547B0000
trusted library allocation
page read and write
58C0000
heap
page read and write
443F000
trusted library allocation
page read and write
639E000
stack
page read and write
19324DCB000
heap
page read and write
200FDCD2000
heap
page read and write
19324E3A000
heap
page read and write
1DCEB0C5000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
7928000
trusted library allocation
page read and write
25C560E0000
heap
page read and write
59F0000
trusted library allocation
page read and write
246741D4000
heap
page read and write
4645000
trusted library allocation
page read and write
1B08CBDC000
direct allocation
page read and write
7FFDF376B000
unkown
page read and write
7FFE0122E000
unkown
page readonly
15E3000
trusted library allocation
page execute and read and write
87A4000
heap
page read and write
7FFE148E6000
unkown
page read and write
7FFDF13C6000
unkown
page read and write
7FFDF12F3000
unkown
page write copy
19324980000
heap
page read and write
1B08C4C0000
direct allocation
page read and write
A95B9CF000
stack
page read and write
24675C49000
heap
page read and write
158E000
stack
page read and write
19324911000
heap
page read and write
1420000
heap
page read and write
24675B80000
heap
page read and write
1FB24C70000
heap
page read and write
7FF702BEF000
unkown
page read and write
4497000
trusted library allocation
page read and write
19324D9D000
heap
page read and write
299547B0000
trusted library allocation
page read and write
787E000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
7FFDFB72A000
unkown
page read and write
8610000
trusted library allocation
page read and write
44FF000
trusted library allocation
page read and write
75C9000
trusted library allocation
page read and write
224659D7000
heap
page read and write
299547B0000
trusted library allocation
page read and write
19324941000
heap
page read and write
15D0000
trusted library allocation
page read and write
259EDB90000
heap
page read and write
8BCD000
stack
page read and write
46AE000
trusted library allocation
page read and write
76A8000
trusted library allocation
page read and write
19322DA0000
heap
page read and write
7953000
trusted library allocation
page read and write
772F000
stack
page read and write
945E000
stack
page read and write
193249B8000
heap
page read and write
4BAD000
stack
page read and write
24675EE7000
heap
page read and write
24675BDA000
heap
page read and write
9150000
trusted library allocation
page read and write
25C562BB000
heap
page read and write
1B08C661000
heap
page read and write
543A000
trusted library allocation
page read and write
24675BCC000
heap
page read and write
19A000
stack
page read and write
24676104000
direct allocation
page read and write
299547B0000
trusted library allocation
page read and write
85E0000
heap
page read and write
299548BB000
heap
page read and write
7FFE130C0000
unkown
page readonly
1B08C6FF000
heap
page read and write
140840000
unkown
page execute and read and write
64CF000
trusted library allocation
page read and write
25C562D4000
heap
page read and write
200FDCDF000
heap
page read and write
6B2D000
heap
page read and write
224658BC000
direct allocation
page read and write
3610000
trusted library allocation
page read and write
246761C4000
direct allocation
page read and write
6485000
trusted library allocation
page read and write
24676210000
direct allocation
page read and write
1B08C686000
heap
page read and write
1B08C6DF000
heap
page read and write
6D20000
trusted library allocation
page read and write
5A0C000
trusted library allocation
page read and write
19324FAC000
direct allocation
page read and write
4513000
trusted library allocation
page read and write
224659B7000
heap
page read and write
1B08C720000
heap
page read and write
EC0A6FE000
stack
page read and write
F23000
trusted library allocation
page execute and read and write
44AB000
trusted library allocation
page read and write
19324DD9000
heap
page read and write
36CF000
stack
page read and write
7301000
heap
page read and write
24674140000
heap
page readonly
1E8E43D0000
heap
page read and write
22465D34000
heap
page read and write
1B08C6B6000
heap
page read and write
7FFE130C1000
unkown
page execute read
7FFE11528000
unkown
page read and write
7FFDFB624000
unkown
page readonly
4855000
trusted library allocation
page read and write
19324F90000
direct allocation
page read and write
F90000
trusted library allocation
page read and write
92AF000
stack
page read and write
299547B0000
trusted library allocation
page read and write
299547C9000
heap
page read and write
259EDDA0000
heap
page read and write
6CD2000
trusted library allocation
page read and write
75FD000
stack
page read and write
7FF7F04F0000
unkown
page readonly
46E7000
trusted library allocation
page read and write
193249B8000
heap
page read and write
22465A02000
heap
page read and write
48A7000
trusted library allocation
page read and write
24675C6A000
heap
page read and write
2961CFB6000
heap
page read and write
7FF702BB1000
unkown
page execute read
1932483C000
direct allocation
page read and write
193249A5000
heap
page read and write
6D79000
trusted library allocation
page read and write
661E000
stack
page read and write
7FFDF0CF6000
unkown
page read and write
F30000
trusted library allocation
page read and write
224659E1000
heap
page read and write
C91000
heap
page read and write
44BF000
trusted library allocation
page read and write
233D78F0000
heap
page read and write
224659C9000
heap
page read and write
1A5A000
trusted library allocation
page read and write
7FFE13244000
unkown
page read and write
5846000
trusted library allocation
page read and write
299D6FA0000
trusted library allocation
page read and write
F24000
trusted library allocation
page read and write
16CE000
heap
page read and write
264D83F0000
heap
page readonly
1B08CCA0000
direct allocation
page read and write
1B08CCC0000
direct allocation
page read and write
7FF7F0531000
unkown
page read and write
6850000
heap
page read and write
15E0000
trusted library allocation
page read and write
140007000
unkown
page readonly
1B08C728000
heap
page read and write
7FF7A845E000
unkown
page readonly
3494000
trusted library allocation
page read and write
7FFE0EB3C000
unkown
page readonly
9B000
stack
page read and write
299548BB000
heap
page read and write
65CF000
trusted library allocation
page read and write
7FF7F0533000
unkown
page readonly
28DC000
stack
page read and write
64CA000
trusted library allocation
page read and write
1932490C000
heap
page read and write
7FFE0EB50000
unkown
page readonly
449B000
trusted library allocation
page read and write
24675BA6000
heap
page read and write
7FF702BB0000
unkown
page readonly
24CE9B90000
heap
page read and write
33BD000
trusted library allocation
page read and write
EC0AAFE000
stack
page read and write
7C00000
trusted library allocation
page read and write
19324905000
heap
page read and write
242B3370000
heap
page read and write
19324C10000
direct allocation
page read and write
200FDCD2000
heap
page read and write
7FF702BF3000
unkown
page readonly
1799000
heap
page read and write
7FF68CEEE000
unkown
page readonly
7470000
trusted library allocation
page read and write
1B08C728000
heap
page read and write
486A000
trusted library allocation
page read and write
8740000
trusted library allocation
page read and write
3401000
trusted library allocation
page read and write
EC0A9FE000
unkown
page readonly
22871750000
heap
page read and write
7FFE13238000
unkown
page readonly
299547E0000
heap
page read and write
1FB24D1F000
heap
page read and write
19324E4F000
heap
page read and write
58A0000
heap
page read and write
7FFE0E171000
unkown
page execute read
506E000
stack
page read and write
224659BD000
heap
page read and write
22465C9A000
heap
page read and write
7FF7ECBC0000
unkown
page readonly
769C000
trusted library allocation
page read and write
299D6FA0000
trusted library allocation
page read and write
1DCEB0C0000
heap
page read and write
15CE000
stack
page read and write
7FFE11EB8000
unkown
page read and write
264D84A2000
heap
page read and write
560E000
trusted library allocation
page read and write
5162C7E000
stack
page read and write
7B80000
trusted library allocation
page read and write
3380000
heap
page read and write
264D8492000
heap
page read and write
2564B02B000
heap
page read and write
2193F600000
heap
page read and write
2CF3A780000
heap
page readonly
22465969000
heap
page read and write
19324C7C000
direct allocation
page read and write
19324FC8000
direct allocation
page read and write
299D6F80000
trusted library allocation
page read and write
4687000
trusted library allocation
page read and write
246761FC000
direct allocation
page read and write
1602000
trusted library allocation
page read and write
7FFDF3826000
unkown
page read and write
24674158000
heap
page read and write
29954E50000
heap
page read and write
7FF702BB1000
unkown
page execute read
22465A23000
heap
page read and write
7FF702BDC000
unkown
page readonly
65B0000
trusted library allocation
page execute and read and write
24675BDA000
heap
page read and write
739E000
stack
page read and write
22871828000
heap
page read and write
7FFE1031E000
unkown
page readonly
6805000
heap
page read and write
4567000
trusted library allocation
page read and write
6860000
heap
page read and write
6CDF000
trusted library allocation
page read and write
1B08C6FF000
heap
page read and write
7FFE13201000
unkown
page execute read
1B08C6CD000
heap
page read and write
79CD000
heap
page read and write
228731A0000
heap
page read and write
7FF702BEF000
unkown
page write copy
24675BC1000
heap
page read and write
200FDCD2000
heap
page read and write
1B08C650000
heap
page read and write
19324EA4000
heap
page read and write
7FFE130C0000
unkown
page readonly
1FB266A0000
heap
page read and write
22465970000
heap
page read and write
6DD017C000
stack
page read and write
89D0000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
22465C81000
heap
page read and write
22463D90000
heap
page read and write
1A40000
heap
page read and write
7B1E000
stack
page read and write
7FFE10300000
unkown
page readonly
29954E40000
heap
page read and write
299D6F80000
trusted library allocation
page read and write
224659FE000
heap
page read and write
7FF7ECBC1000
unkown
page execute read
1B08C6F2000
heap
page read and write
299547B0000
trusted library allocation
page read and write
443C000
trusted library allocation
page read and write
7FFE13262000
unkown
page readonly
54FC000
stack
page read and write
1A50000
trusted library allocation
page read and write
4E1C000
stack
page read and write
76D7000
trusted library allocation
page read and write
7FF702BB1000
unkown
page execute read
3A11000
trusted library allocation
page read and write
1B08ABC0000
heap
page read and write
74D0000
trusted library allocation
page execute and read and write
31E0000
heap
page read and write
299547B0000
trusted library allocation
page read and write
24675B9E000
heap
page read and write
264D8493000
heap
page read and write
22463E80000
heap
page read and write
24675BA8000
heap
page read and write
2A11000
trusted library allocation
page read and write
19324FBC000
direct allocation
page read and write
AF8000
stack
page read and write
299547B0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
1B08CD1C000
direct allocation
page read and write
C2E000
heap
page read and write
7BC0000
trusted library allocation
page read and write
318D000
stack
page read and write
7FFDF1425000
unkown
page readonly
ECEDDAE000
stack
page read and write
D2E4AFF000
unkown
page read and write
4401000
trusted library allocation
page read and write
741A000
stack
page read and write
7FFDFB865000
unkown
page write copy
7FF68CC69000
unkown
page readonly
259EDC80000
heap
page read and write
7260000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
79C3000
heap
page read and write
19324DD6000
heap
page read and write
7FFE11071000
unkown
page execute read
1B08C717000
heap
page read and write
140001000
unkown
page execute read
299547B0000
trusted library allocation
page read and write
4DDD000
stack
page read and write
7110000
heap
page read and write
1627000
trusted library allocation
page execute and read and write
1B08C65A000
heap
page read and write
7FFE0C0BC000
unkown
page readonly
22465A02000
heap
page read and write
22375AF000
stack
page read and write
4824000
trusted library allocation
page read and write
44D2000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
7FFDF13B4000
unkown
page read and write
1B08AB33000
heap
page read and write
1B08CA8B000
heap
page read and write
22465F9C000
direct allocation
page read and write
28175310000
heap
page read and write
24675C16000
heap
page read and write
29954836000
heap
page read and write
72C2000
heap
page read and write
7FF68CEEE000
unkown
page readonly
1B08C71B000
heap
page read and write
19322DB0000
heap
page readonly
1B08C6E7000
heap
page read and write
2CF3A812000
heap
page read and write
19324F3C000
direct allocation
page read and write
19FE000
stack
page read and write
22465FF0000
direct allocation
page read and write
87B8000
heap
page read and write
8CB9000
stack
page read and write
44A5000
trusted library allocation
page read and write
7FFDF0954000
unkown
page readonly
7FFE110F0000
unkown
page readonly
1500000
heap
page read and write
D3B3B6E000
stack
page read and write
22465FD0000
direct allocation
page read and write
7FFDF37F1000
unkown
page read and write
4819000
trusted library allocation
page read and write
3A1E000
trusted library allocation
page read and write
7FF702BB0000
unkown
page readonly
2246595E000
heap
page read and write
22465989000
heap
page read and write
1B08ACA0000
heap
page readonly
22465A02000
heap
page read and write
7FF702BF3000
unkown
page readonly
14080D000
unkown
page execute and read and write
465D000
trusted library allocation
page read and write
24675C05000
heap
page read and write
19324E3A000
heap
page read and write
724E000
stack
page read and write
3292000
trusted library allocation
page read and write
45E0000
trusted library allocation
page read and write
6DD047F000
stack
page read and write
7F4C8000
trusted library allocation
page execute and read and write
1B08C870000
direct allocation
page read and write
33B8000
heap
page read and write
1590000
heap
page read and write
58DE000
stack
page read and write
5870000
trusted library allocation
page read and write
79ED000
trusted library allocation
page read and write
7A1E000
stack
page read and write
7FFE11523000
unkown
page readonly
45F9000
trusted library allocation
page read and write
1B08C9AB000
heap
page read and write
22465A13000
heap
page read and write
6220000
heap
page read and write
7FFE101D0000
unkown
page readonly
46F6000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
FB0000
heap
page read and write
326D000
trusted library allocation
page execute and read and write
19324FB8000
direct allocation
page read and write
1B08AACE000
heap
page read and write
79D1000
trusted library allocation
page read and write
1B08C6D9000
heap
page read and write
F52000
trusted library allocation
page read and write
7FFE014D1000
unkown
page readonly
7FFE11BB1000
unkown
page execute read
7FF68CC69000
unkown
page readonly
1B08C6D9000
heap
page read and write
7FF7F0533000
unkown
page readonly
140500000
unkown
page execute and read and write
1190000
heap
page read and write
2467424A000
heap
page read and write
29954750000
heap
page read and write
1640000
trusted library allocation
page read and write
46DB000
trusted library allocation
page read and write
7FF7A845E000
unkown
page readonly
7FFDFB8C5000
unkown
page readonly
19324F5C000
direct allocation
page read and write
29959EF6000
heap
page read and write
5850000
trusted library allocation
page read and write
299D6F80000
trusted library allocation
page read and write
7FF7ECBC1000
unkown
page execute read
31E6000
heap
page read and write
59F3000
trusted library allocation
page read and write
5A04000
trusted library allocation
page read and write
76AE000
trusted library allocation
page read and write
3D55000
heap
page read and write
67E1000
heap
page read and write
6CF1000
trusted library allocation
page read and write
1B08C6DF000
heap
page read and write
1B08C6E4000
heap
page read and write
F42000
trusted library allocation
page read and write
3264000
trusted library allocation
page read and write
2467601C000
heap
page read and write
33AC000
heap
page read and write
6500000
trusted library allocation
page read and write
7FFDFB822000
unkown
page read and write
7FFE13245000
unkown
page readonly
7FFE10300000
unkown
page readonly
299D6F80000
trusted library allocation
page read and write
6CF6000
trusted library allocation
page read and write
29954887000
heap
page read and write
FB7000
heap
page read and write
7817000
trusted library allocation
page read and write
22465A17000
heap
page read and write
7121000
heap
page read and write
74F0000
heap
page read and write
6D30000
trusted library allocation
page read and write
22465D7A000
heap
page read and write
22465A23000
heap
page read and write
24675A70000
direct allocation
page read and write
7FFDFB4E3000
unkown
page readonly
46B1000
trusted library allocation
page read and write
22465A23000
heap
page read and write
53C0000
trusted library allocation
page execute and read and write
2D3C000
stack
page read and write
51BE000
stack
page read and write
683F000
heap
page read and write
8730000
trusted library allocation
page read and write
EC0ADFE000
unkown
page readonly
22465FBC000
direct allocation
page read and write
7FFE12E14000
unkown
page readonly
193249B0000
heap
page read and write
770D000
trusted library allocation
page read and write
394F000
stack
page read and write
24675B9C000
heap
page read and write
1B08AAB8000
heap
page read and write
988F000
stack
page read and write
560B000
trusted library allocation
page read and write
299D6FA0000
trusted library allocation
page read and write
67A5000
heap
page read and write
7703000
trusted library allocation
page read and write
224659AC000
heap
page read and write
228717B5000
heap
page read and write
480C000
trusted library allocation
page read and write
87E2000
heap
page read and write
264D8492000
heap
page read and write
299547B0000
trusted library allocation
page read and write
1B08CD0C000
direct allocation
page read and write
299D6F80000
trusted library allocation
page read and write
8D10000
heap
page read and write
19324934000
heap
page read and write
33B1000
trusted library allocation
page read and write
4044FF000
stack
page read and write
299547B0000
trusted library allocation
page read and write
339B000
trusted library allocation
page read and write
913A000
trusted library allocation
page read and write
86AA000
trusted library allocation
page read and write
242B3360000
heap
page read and write
2292A9A0000
heap
page read and write
884E000
stack
page read and write
5A25000
trusted library allocation
page read and write
7FFDF0C33000
unkown
page write copy
F50000
trusted library allocation
page read and write
7FFDFB4D6000
unkown
page readonly
6262000
heap
page read and write
7F010000
trusted library allocation
page execute and read and write
24675B9D000
heap
page read and write
2246595E000
heap
page read and write
200FDCB0000
heap
page read and write
67E6000
heap
page read and write
1FB24D12000
heap
page read and write
1FB24CF0000
heap
page read and write
1B08C6E1000
heap
page read and write
299547B0000
trusted library allocation
page read and write
3AB0000
heap
page read and write
3350000
trusted library allocation
page execute and read and write
299D6FA0000
trusted library allocation
page read and write
C77D4FD000
stack
page read and write
200FDCD2000
heap
page read and write
2246597D000
heap
page read and write
7FFDF0D48000
unkown
page read and write
A95B7DF000
stack
page read and write
3640000
heap
page read and write
24675FB4000
heap
page read and write
24675C01000
heap
page read and write
1FB24C30000
heap
page readonly
C60000
heap
page read and write
1FB24D12000
heap
page read and write
67FA000
heap
page read and write
299547B0000
trusted library allocation
page read and write
193248F9000
heap
page read and write
AADC9FE000
stack
page read and write
772B000
trusted library allocation
page read and write
1D2074E8000
heap
page read and write
3250000
trusted library allocation
page read and write
19324E20000
heap
page read and write
299D6F80000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
24675C05000
heap
page read and write
1B08C650000
heap
page read and write
7FFDFB4B4000
unkown
page readonly
7FFDF1036000
unkown
page readonly
299547B0000
trusted library allocation
page read and write
24675C6A000
heap
page read and write
1B08C681000
heap
page read and write
802D000
trusted library allocation
page read and write
64F0000
trusted library allocation
page read and write
7FFE148E7000
unkown
page readonly
6D05000
trusted library allocation
page read and write
24CE9BE8000
heap
page read and write
733F000
heap
page read and write
402000
unkown
page readonly
7FF702BB0000
unkown
page readonly
22465D2C000
heap
page read and write
7FFE1A477000
unkown
page readonly
7932000
trusted library allocation
page read and write
200FDCCE000
heap
page read and write
2236DE1000
stack
page read and write
7FFE0EB68000
unkown
page read and write
7FFE0C0B8000
unkown
page readonly
19324934000
heap
page read and write
7FF702BF1000
unkown
page read and write
485C000
trusted library allocation
page read and write
1B08C676000
heap
page read and write
7B60000
trusted library allocation
page read and write
24675C2F000
heap
page read and write
8680000
heap
page read and write
7FF702BDC000
unkown
page readonly
7740000
trusted library allocation
page read and write
193249A1000
heap
page read and write
70DE000
stack
page read and write
2292AC25000
heap
page read and write
264D8492000
heap
page read and write
75D9000
trusted library allocation
page read and write
223798F000
stack
page read and write
7FFE10313000
unkown
page readonly
5420000
trusted library allocation
page read and write
7FFE110F1000
unkown
page execute read
2961CFB0000
heap
page read and write
299547B0000
trusted library allocation
page read and write
193249A1000
heap
page read and write
4699000
trusted library allocation
page read and write
29954740000
heap
page read and write
64DA000
trusted library allocation
page read and write
24675BFE000
heap
page read and write
7FF702BF3000
unkown
page readonly
3360000
trusted library allocation
page read and write
7FF702BEF000
unkown
page write copy
44D7000
trusted library allocation
page read and write
29954820000
heap
page read and write
EC09F2C000
stack
page read and write
7FFE01228000
unkown
page read and write
6D02000
trusted library allocation
page read and write
1B08C715000
heap
page read and write
1B08C713000
heap
page read and write
7FFDF13B6000
unkown
page read and write
2292C4F0000
heap
page read and write
7FFE130C1000
unkown
page execute read
1B08CCC4000
direct allocation
page read and write
7FFE110F6000
unkown
page readonly
89E0000
trusted library allocation
page read and write
67D3000
heap
page read and write
299547B0000
trusted library allocation
page read and write
7FFE0EB6E000
unkown
page readonly
3383000
heap
page read and write
193249A1000
heap
page read and write
7753000
trusted library allocation
page read and write
200FDCD1000
heap
page read and write
19324974000
heap
page read and write
7FFE1151D000
unkown
page readonly
8E79000
trusted library allocation
page read and write
682F000
heap
page read and write
22465989000
heap
page read and write
19324F84000
direct allocation
page read and write
1B2AA9C0000
heap
page read and write
6D60000
trusted library allocation
page read and write
178E000
heap
page read and write
8B40000
trusted library allocation
page read and write
7FF68CC61000
unkown
page execute read
224659AE000
heap
page read and write
7FFDF13B5000
unkown
page write copy
6B06000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
4D5F000
stack
page read and write
70F0000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
1FB24D12000
heap
page read and write
77B8000
trusted library allocation
page read and write
1B08C715000
heap
page read and write
61FE000
stack
page read and write
7FFE148E4000
unkown
page readonly
24675C62000
heap
page read and write
7FFDF0BCA000
unkown
page read and write
913F000
trusted library allocation
page read and write
7825000
trusted library allocation
page read and write
64B5000
trusted library allocation
page read and write
7FF702BF1000
unkown
page read and write
7FF702BF3000
unkown
page readonly
DCFB6FE000
stack
page read and write
45E7000
trusted library allocation
page read and write
19324FC4000
direct allocation
page read and write
9135000
trusted library allocation
page read and write
52CB000
trusted library allocation
page read and write
45C8000
trusted library allocation
page read and write
7FF68CC6B000
unkown
page read and write
200FDCDF000
heap
page read and write
193248E4000
heap
page read and write
19324F60000
direct allocation
page read and write
7FFE0EB21000
unkown
page execute read
5A30000
heap
page execute and read and write
24675C02000
heap
page read and write
62BA000
heap
page read and write
299547B0000
trusted library allocation
page read and write
DD515CF000
stack
page read and write
7FF702BDC000
unkown
page readonly
24675C33000
heap
page read and write
7FFE130C3000
unkown
page readonly
6AD0000
heap
page read and write
299547B0000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
46ED000
trusted library allocation
page read and write
7774000
trusted library allocation
page read and write
1080000
unkown
page readonly
2CF3A812000
heap
page read and write
60EC5BF000
stack
page read and write
3270000
trusted library allocation
page read and write
7FFE10250000
unkown
page readonly
33EE000
trusted library allocation
page read and write
1B08CCD4000
direct allocation
page read and write
7FFDFB866000
unkown
page read and write
777C000
trusted library allocation
page read and write
4621000
trusted library allocation
page read and write
140503000
unkown
page execute and read and write
4507000
trusted library allocation
page read and write
24675BBC000
heap
page read and write
6CEE000
trusted library allocation
page read and write
19324E12000
heap
page read and write
2246602C000
direct allocation
page read and write
5440000
trusted library allocation
page read and write
6495000
trusted library allocation
page read and write
25C561C0000
heap
page read and write
16BF0E98000
heap
page read and write
6815000
heap
page read and write
299D6F80000
trusted library allocation
page read and write
7FF7A81DB000
unkown
page read and write
29954888000
heap
page read and write
2961D1E0000
heap
page read and write
299D6F80000
trusted library allocation
page read and write
200FDCD2000
heap
page read and write
7FFE11500000
unkown
page readonly
7958000
trusted library allocation
page read and write
1FB24D12000
heap
page read and write
1E46EC70000
unkown
page read and write
299547B0000
trusted library allocation
page read and write
22465989000
heap
page read and write
19324D5F000
heap
page read and write
AADBE7B000
stack
page read and write
1FB24D12000
heap
page read and write
19324944000
heap
page read and write
22465D9A000
heap
page read and write
52EE000
trusted library allocation
page read and write
7FFE11505000
unkown
page read and write
AADCAFE000
unkown
page readonly
7FFE0E179000
unkown
page readonly
7FF7F051C000
unkown
page readonly
1B08C713000
heap
page read and write
7FF7010C8000
unkown
page readonly
299547B0000
trusted library allocation
page read and write
7FFE1A476000
unkown
page read and write
233D78F9000
heap
page read and write
224659D7000
heap
page read and write
264D8478000
heap
page read and write
299547B0000
trusted library allocation
page read and write
1A60000
heap
page read and write
7738000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
6A4F000
stack
page read and write
5450000
trusted library allocation
page read and write
25C561E0000
heap
page read and write
299547B0000
trusted library allocation
page read and write
5A2E000
trusted library allocation
page read and write
4816000
trusted library allocation
page read and write
1B08C69B000
heap
page read and write
15F0000
trusted library allocation
page read and write
79E9000
trusted library allocation
page read and write
ECED5E6000
stack
page read and write
24674250000
heap
page read and write
24675FC7000
heap
page read and write
78A9000
trusted library allocation
page read and write
7960000
heap
page read and write
162B000
trusted library allocation
page execute and read and write
24675BF2000
heap
page read and write
46D5000
trusted library allocation
page read and write
22465998000
heap
page read and write
1B08C6AD000
heap
page read and write
22466170000
heap
page read and write
19324BFC000
direct allocation
page read and write
5FFF000
stack
page read and write
7FF7F051C000
unkown
page readonly
448A000
trusted library allocation
page read and write
1B08CA21000
heap
page read and write
EC0A7FE000
unkown
page readonly
2961D1E5000
heap
page read and write
24675A24000
heap
page read and write
4CDC000
stack
page read and write
22466020000
direct allocation
page read and write
7FFE11BC0000
unkown
page readonly
46E0000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
1A66000
heap
page read and write
89A2000
trusted library allocation
page read and write
2246595E000
heap
page read and write
193249BC000
heap
page read and write
440F000
trusted library allocation
page read and write
24676234000
direct allocation
page read and write
24675F14000
heap
page read and write
64F5000
trusted library allocation
page read and write
1585000
heap
page read and write
F2EA74D000
stack
page read and write
5D70000
trusted library allocation
page read and write
6CE4000
trusted library allocation
page read and write
6488000
trusted library allocation
page read and write
7FF7F04F0000
unkown
page readonly
299D6FA0000
trusted library allocation
page read and write
ECEDBBE000
stack
page read and write
2246598E000
heap
page read and write
1B2AA618000
heap
page read and write
631E000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
7FFE12E14000
unkown
page readonly
264D8493000
heap
page read and write
86B0000
heap
page read and write
78B0000
trusted library allocation
page execute and read and write
24675BDA000
heap
page read and write
19324D08000
direct allocation
page read and write
7FF701347000
unkown
page read and write
2CF3A7F0000
heap
page read and write
78E0000
heap
page read and write
7FFDF1382000
unkown
page read and write
24675C6A000
heap
page read and write
22871650000
heap
page read and write
24675C49000
heap
page read and write
200FDCD2000
heap
page read and write
7FFE0EB51000
unkown
page execute read
299547B0000
trusted library allocation
page read and write
3499000
trusted library allocation
page read and write
7FF7A81D0000
unkown
page readonly
1B08CCF8000
direct allocation
page read and write
22463E70000
heap
page readonly
22465F80000
direct allocation
page read and write
17C0000
heap
page read and write
3358000
trusted library allocation
page read and write
7FFE10309000
unkown
page readonly
7FFDFB8A8000
unkown
page read and write
6474000
trusted library allocation
page read and write
22465A13000
heap
page read and write
10BA000
stack
page read and write
299547B0000
trusted library allocation
page read and write
78FF000
heap
page read and write
7897000
trusted library allocation
page read and write
502F000
stack
page read and write
24675C01000
heap
page read and write
18B5DFE000
stack
page read and write
7FFDF3835000
unkown
page write copy
24675C2B000
heap
page read and write
44F9000
trusted library allocation
page read and write
7FF7A81D0000
unkown
page readonly
756E000
trusted library allocation
page read and write
1B08CA3D000
heap
page read and write
1D2074E0000
heap
page read and write
EC0A8FC000
stack
page read and write
1B08C715000
heap
page read and write
1FB24D12000
heap
page read and write
7FFE0C0C5000
unkown
page readonly
7FF702BDC000
unkown
page readonly
22465A0A000
heap
page read and write
649E000
stack
page read and write
68307BF000
stack
page read and write
299D6FA0000
trusted library allocation
page read and write
7652000
trusted library allocation
page read and write
45A2000
trusted library allocation
page read and write
1B08C676000
heap
page read and write
299D6FA0000
trusted library allocation
page read and write
299547B0000
trusted library allocation
page read and write
1610000
heap
page read and write
E7FAF7F000
stack
page read and write
24675C4E000
heap
page read and write
There are 2325 hidden memdumps, click here to show them.