IOC Report
ptKNiAaGus.exe

loading gif

Files

File Path
Type
Category
Malicious
ptKNiAaGus.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\Videos\xdwdMicrosoft PowerPoint Host.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Videos\xdwdPutty.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\xdwdPutty.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xdwdMicrosoft Paint.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xdwdPutty.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\z4wwumki.3zg.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bualqehm.tg1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kvdx4sk4.juy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ofa54sbh.fmc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yyfizagb.qiw.psm1
ASCII text, with no line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ptKNiAaGus.exe
"C:\Users\user\Desktop\ptKNiAaGus.exe"
malicious
C:\Windows\System32\cmd.exe
"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Avast Antivirus" /tr "C:\Users\user\xdwdPutty.exe" & exit
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Avast Antivirus" /tr "C:\Users\user\xdwdPutty.exe"
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Google Drive" /tr "C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe" /RL HIGHEST & exit
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c start /b powershell ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pto2q1ow.nf5.exe"' & exit
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /create /f /sc minute /mo 5 /tn "Google Drive" /tr "C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe" /RL HIGHEST
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pto2q1ow.nf5.exe"'
malicious
C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe
"C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pto2q1ow.nf5.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pto2q1ow.nf5.exe"
malicious
C:\Windows\System32\cmd.exe
"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "OpenOffice" /tr "C:\Users\user\Videos\xdwdMicrosoft PowerPoint Host.exe" & exit
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "OpenOffice" /tr "C:\Users\user\Videos\xdwdMicrosoft PowerPoint Host.exe"
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c start /b powershell ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\z4wwumki.3zg.exe"' & exit
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\z4wwumki.3zg.exe"'
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\z4wwumki.3zg.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\z4wwumki.3zg.exe"
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
malicious
C:\Users\user\xdwdPutty.exe
"C:\Users\user\xdwdPutty.exe"
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft PowerPoint Host.exe" /RL HIGHEST & exit
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft PowerPoint Host.exe" /RL HIGHEST
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
malicious
C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe
"C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe"
malicious
C:\Windows\System32\cmd.exe
"CMD" /c scHTaSks /Run /I /TN "Avast Antivirus"
malicious
C:\Windows\System32\schtasks.exe
scHTaSks /Run /I /TN "Avast Antivirus"
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
malicious
C:\Users\user\xdwdPutty.exe
C:\Users\user\xdwdPutty.exe
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
malicious
C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe
"C:\Users\user\AppData\Roaming\xdwdMicrosoft Paint.exe"
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
malicious
C:\Windows\System32\cmd.exe
"CMD" /c scHTaSks /Run /I /TN "Avast Antivirus"
malicious
C:\Windows\System32\schtasks.exe
scHTaSks /Run /I /TN "Avast Antivirus"
malicious
C:\Users\user\xdwdPutty.exe
C:\Users\user\xdwdPutty.exe
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
malicious
C:\Windows\System32\schtasks.exe
SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Azure DevOps" /tr "C:\Users\user\Videos\xdwdMicrosoft PowerPoint Host.exe" /RL HIGHEST & exit
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Corel PaintShop Pro" /tr "C:\Users\user\Videos\xdwdPutty.exe" /RL HIGHEST & exit
malicious
C:\Windows\System32\cmd.exe
"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Microsoft Word" /tr "C:\Users\user\xdwdPutty.exe" /RL HIGHEST & exit
malicious
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 78 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://pastebin.c
unknown
https://pastebin.com/raw/Lmb
unknown
https://pastebin.com/raw/Lm
unknown
https://pastebin.com/raw/LmbvnzZ
unknown
https://pastebin.com/raw/Lmbvn
unknown
https://pastebin.com/raw
unknown
https://pastebin.com/raw/Lmbvnz
unknown
https://pastebin.com/raw/LmbvnzZM
104.20.3.235
https://pastebin.com/raw/Lmbv
unknown
http://www.quovadis.bm0
unknown
https://ocsp.quovadi
unknown
https://pastebin.com/raw/
unknown
http://icanhazip.com/
104.16.185.241
https://pastebin.com/r
unknown
https://ocsp.quovadisoffshore.com0
unknown
https://pastebin.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://pastebin.com/raw/L
unknown
https://pastebin.com
unknown
https://pastebin.com/ra
unknown
https://pastebin.co
unknown
https://aka.ms/odirm=C:
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
q-policies.gl.at.ply.gg
147.185.221.18
malicious
pastebin.com
104.20.3.235
malicious
icanhazip.com
104.16.185.241

IPs

IP
Domain
Country
Malicious
104.20.3.235
pastebin.com
United States
malicious
147.185.221.18
q-policies.gl.at.ply.gg
United States
malicious
104.16.185.241
icanhazip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE
hwid
malicious
HKEY_CURRENT_USER\SOFTWARE
D396F3C20883A3B71244C87C537595108010239E4E17E6C09BCA83EA5A475677
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
RequireSignedAppInit_DLLs
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
xdwdsystegregre
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
AppInit_DLLs
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
LoadAppInit_DLLs
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
unknown
Userinit
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Microsoft Visual Studio
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ptKNiAaGus_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\pto2q1ow_RASMANCS
FileDirectory
There are 83 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1B989000
heap
page read and write
1C74B000
stack
page read and write
30D7000
trusted library allocation
page read and write
1B300000
heap
page read and write
2E12000
trusted library allocation
page read and write
1C34A000
stack
page read and write
1B828000
heap
page read and write
30D4000
trusted library allocation
page read and write
279B000
trusted library allocation
page read and write
1D854000
heap
page read and write
F37000
heap
page read and write
303E000
trusted library allocation
page read and write
2DE6000
trusted library allocation
page read and write
E3679FE000
unkown
page read and write
2572000
trusted library allocation
page read and write
2561000
trusted library allocation
page read and write
3360000
trusted library allocation
page read and write
25B23230000
heap
page read and write
7E0000
heap
page read and write
1B9AE000
heap
page read and write
2E3B000
trusted library allocation
page read and write
12D0000
heap
page read and write
1B30B000
heap
page read and write
FC0000
heap
page read and write
839000
heap
page read and write
950000
heap
page read and write
2E23000
trusted library allocation
page read and write
BDC71C000
stack
page read and write
2E16000
trusted library allocation
page read and write
7FFF60E4D000
trusted library allocation
page execute and read and write
2FF6000
trusted library allocation
page read and write
26CF000
trusted library allocation
page read and write
2182E8A0000
heap
page read and write
293D1700000
heap
page read and write
1CEE72C0000
heap
page read and write
7FFF610AD000
trusted library allocation
page read and write
37ED000
trusted library allocation
page read and write
A6B9DFE000
unkown
page read and write
12538000
trusted library allocation
page read and write
3661AFE000
unkown
page read and write
1C58F000
stack
page read and write
25B22FF0000
heap
page read and write
7FFF60E4D000
trusted library allocation
page execute and read and write
2D20000
heap
page execute and read and write
270E000
trusted library allocation
page read and write
CB0000
heap
page read and write
7FFF610A0000
trusted library allocation
page read and write
7FFF61060000
trusted library allocation
page read and write
3362000
trusted library allocation
page read and write
3123000
trusted library allocation
page read and write
141D000
heap
page read and write
2731000
trusted library allocation
page read and write
21FE95D0000
heap
page read and write
1E5D0000
heap
page read and write
2BA156A0000
heap
page read and write
1F4D2869000
heap
page read and write
284B000
trusted library allocation
page read and write
18FE000
stack
page read and write
7FFF60E30000
trusted library allocation
page read and write
ED0000
heap
page read and write
1C8809C8000
heap
page read and write
906AFF000
unkown
page read and write
601000
heap
page read and write
3043000
trusted library allocation
page read and write
271E000
trusted library allocation
page read and write
1E3FD000
heap
page read and write
906CFF000
stack
page read and write
17B4CCBB000
heap
page read and write
2495EC20000
heap
page read and write
332D000
trusted library allocation
page read and write
DEE000
stack
page read and write
11E0000
heap
page read and write
6CD3BFE000
stack
page read and write
28A4000
trusted library allocation
page read and write
11C5000
heap
page read and write
2ED6000
trusted library allocation
page read and write
2BA156AB000
heap
page read and write
21FE9820000
heap
page read and write
21FE9940000
heap
page read and write
2DF4000
trusted library allocation
page read and write
337E000
trusted library allocation
page read and write
379C000
trusted library allocation
page read and write
3145000
trusted library allocation
page read and write
289E000
trusted library allocation
page read and write
2630000
trusted library allocation
page read and write
13158000
trusted library allocation
page read and write
2ED4000
trusted library allocation
page read and write
2BA15A49000
heap
page read and write
5079CFF000
stack
page read and write
28C7000
trusted library allocation
page read and write
3577000
trusted library allocation
page read and write
1B782000
heap
page read and write
2495EF00000
heap
page read and write
290D000
trusted library allocation
page read and write
1B76E000
stack
page read and write
269B000
trusted library allocation
page read and write
7FFF60EF0000
trusted library allocation
page execute and read and write
382D000
trusted library allocation
page read and write
3433000
trusted library allocation
page read and write
7FFF60FF0000
trusted library allocation
page execute and read and write
305D000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
A33000
heap
page read and write
2892000
trusted library allocation
page read and write
316C000
trusted library allocation
page read and write
2EC1000
trusted library allocation
page read and write
137D2CA9000
heap
page read and write
18849EB0000
heap
page read and write
7FFF60FD0000
trusted library allocation
page read and write
1B982000
heap
page read and write
318D000
trusted library allocation
page read and write
3230000
heap
page execute and read and write
7FFF60EE6000
trusted library allocation
page read and write
1C459B79000
heap
page read and write
1B40E000
heap
page read and write
2F9C000
trusted library allocation
page read and write
12F84000
trusted library allocation
page read and write
31F9000
trusted library allocation
page read and write
980000
heap
page read and write
29CA000
trusted library allocation
page read and write
1306B000
trusted library allocation
page read and write
2898000
trusted library allocation
page read and write
3165000
trusted library allocation
page read and write
322A000
trusted library allocation
page read and write
7FFF60E24000
trusted library allocation
page read and write
27DF000
trusted library allocation
page read and write
31DB000
trusted library allocation
page read and write
7FFF60E60000
trusted library allocation
page read and write
3515000
trusted library allocation
page read and write
385A000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
28B1000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
1B86E000
stack
page read and write
1B836000
heap
page read and write
3491000
trusted library allocation
page read and write
2601000
trusted library allocation
page read and write
31C9000
trusted library allocation
page read and write
3795000
trusted library allocation
page read and write
304A000
trusted library allocation
page read and write
349A000
trusted library allocation
page read and write
260A000
trusted library allocation
page read and write
29DD000
trusted library allocation
page read and write
B54000
stack
page read and write
3035000
trusted library allocation
page read and write
609000
heap
page read and write
17B4CF59000
heap
page read and write
1B994000
heap
page read and write
32C1000
trusted library allocation
page read and write
7FFF60EE0000
trusted library allocation
page read and write
1915000
heap
page read and write
13CE000
stack
page read and write
318C000
trusted library allocation
page read and write
2977000
trusted library allocation
page read and write
1C880BE9000
heap
page read and write
289C000
trusted library allocation
page read and write
2EAE000
trusted library allocation
page read and write
21FE9939000
heap
page read and write
7FFF60FE0000
trusted library allocation
page read and write
2DE3000
trusted library allocation
page read and write
1D658000
heap
page read and write
1C880900000
heap
page read and write
357B000
trusted library allocation
page read and write
21ECAFC000
stack
page read and write
2E6D000
stack
page read and write
3478000
trusted library allocation
page read and write
287C000
trusted library allocation
page read and write
2647000
trusted library allocation
page read and write
30A3000
trusted library allocation
page read and write
27BF000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
7FFF60FC0000
trusted library allocation
page read and write
1BAA8000
stack
page read and write
283E000
trusted library allocation
page read and write
1BDAE000
stack
page read and write
1CEE7250000
heap
page read and write
3535000
trusted library allocation
page read and write
2765000
trusted library allocation
page read and write
1BD5A000
heap
page read and write
1BD4E000
stack
page read and write
FAC06FC000
stack
page read and write
2E7F000
trusted library allocation
page read and write
2A14000
trusted library allocation
page read and write
61D000
heap
page read and write
3050000
trusted library allocation
page read and write
1C84B000
stack
page read and write
306E000
trusted library allocation
page read and write
3378000
trusted library allocation
page read and write
25B23130000
heap
page read and write
137D2B57000
heap
page read and write
3804000
trusted library allocation
page read and write
60F000
heap
page read and write
270A000
trusted library allocation
page read and write
7FFF61000000
trusted library allocation
page execute and read and write
332B000
trusted library allocation
page read and write
1D44CDF0000
heap
page read and write
297E000
trusted library allocation
page read and write
26DD000
trusted library allocation
page read and write
2DEE000
trusted library allocation
page read and write
296E000
trusted library allocation
page read and write
7FFF60E40000
trusted library allocation
page read and write
30F4000
trusted library allocation
page read and write
1BE13000
heap
page read and write
7FFF60FA9000
trusted library allocation
page read and write
3519000
trusted library allocation
page read and write
3537000
trusted library allocation
page read and write
1BD9D000
heap
page read and write
25FF000
trusted library allocation
page read and write
3295000
trusted library allocation
page read and write
3349000
trusted library allocation
page read and write
35D1000
trusted library allocation
page read and write
262134A0000
heap
page read and write
C4F000
heap
page read and write
7FFF60FE0000
trusted library allocation
page read and write
29D3000
trusted library allocation
page read and write
7FFF60E43000
trusted library allocation
page execute and read and write
1B78C000
heap
page read and write
3457000
trusted library allocation
page read and write
2025BA80000
heap
page read and write
28F3000
trusted library allocation
page read and write
885000
heap
page read and write
2751000
trusted library allocation
page read and write
11F0000
heap
page read and write
1C459B75000
heap
page read and write
31E6000
trusted library allocation
page read and write
2F16000
trusted library allocation
page read and write
7FFF60E23000
trusted library allocation
page read and write
2CA1000
trusted library allocation
page read and write
E40000
heap
page read and write
1BFDA000
heap
page read and write
F0B000
heap
page read and write
1C24F000
stack
page read and write
2847000
trusted library allocation
page read and write
1A3609F6000
heap
page read and write
24369E70000
heap
page read and write
3190000
trusted library allocation
page read and write
D38000
heap
page read and write
1B13A000
heap
page read and write
7FFF60F00000
trusted library allocation
page execute and read and write
1C887FF000
stack
page read and write
279B000
trusted library allocation
page read and write
28BE000
trusted library allocation
page read and write
346E000
trusted library allocation
page read and write
5079BFE000
stack
page read and write
28BD000
trusted library allocation
page read and write
281E000
trusted library allocation
page read and write
3168000
trusted library allocation
page read and write
2560000
heap
page read and write
2945000
trusted library allocation
page read and write
37C1000
trusted library allocation
page read and write
984000
stack
page read and write
14E0000
heap
page read and write
274F000
trusted library allocation
page read and write
344F000
trusted library allocation
page read and write
1B413000
heap
page read and write
13B6000
heap
page read and write
3504000
trusted library allocation
page read and write
2923000
trusted library allocation
page read and write
318B000
trusted library allocation
page read and write
335A000
trusted library allocation
page read and write
1B11D000
heap
page read and write
1B1AE000
stack
page read and write
38C4000
trusted library allocation
page read and write
7FFF60E20000
trusted library allocation
page read and write
12DC3000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
895000
heap
page read and write
32A1000
trusted library allocation
page read and write
7FFF60ECC000
trusted library allocation
page execute and read and write
379F000
trusted library allocation
page read and write
A30000
heap
page read and write
1C6DD000
stack
page read and write
1CE4A000
stack
page read and write
975000
heap
page read and write
38DD000
trusted library allocation
page read and write
34A3000
trusted library allocation
page read and write
14CE000
stack
page read and write
322C000
trusted library allocation
page read and write
114E000
stack
page read and write
2643000
trusted library allocation
page read and write
36E63FE000
unkown
page read and write
7D2000
unkown
page readonly
7FFF60E33000
trusted library allocation
page execute and read and write
2DDF000
trusted library allocation
page read and write
3493000
trusted library allocation
page read and write
127E8000
trusted library allocation
page read and write
12D22000
trusted library allocation
page read and write
2EAE000
stack
page read and write
1B107000
heap
page read and write
1B3D0000
heap
page read and write
27E1000
trusted library allocation
page read and write
21FE9930000
heap
page read and write
316E000
trusted library allocation
page read and write
1180000
trusted library allocation
page read and write
2F12000
trusted library allocation
page read and write
351E000
trusted library allocation
page read and write
347C000
trusted library allocation
page read and write
33FA000
trusted library allocation
page read and write
1B77A000
heap
page read and write
10D0000
heap
page read and write
7FFF60FC0000
trusted library allocation
page read and write
1C459B70000
heap
page read and write
28B5000
trusted library allocation
page read and write
24369CF0000
heap
page read and write
DF0000
trusted library allocation
page read and write
1DF49C50000
heap
page read and write
1BAC0000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
1D6D8000
heap
page read and write
2909000
trusted library allocation
page read and write
323E000
trusted library allocation
page read and write
34E2000
trusted library allocation
page read and write
17B4CF50000
heap
page read and write
3263000
trusted library allocation
page read and write
2E72000
trusted library allocation
page read and write
12531000
trusted library allocation
page read and write
26FB000
trusted library allocation
page read and write
2867000
trusted library allocation
page read and write
7FFF60FE0000
trusted library allocation
page read and write
2C90000
heap
page execute and read and write
7FFF60F56000
trusted library allocation
page execute and read and write
313A000
trusted library allocation
page read and write
1E286000
heap
page read and write
1E3CF000
heap
page read and write
2E07000
trusted library allocation
page read and write
7FFF60E9C000
trusted library allocation
page execute and read and write
7FFF60EF0000
trusted library allocation
page execute and read and write
1F79E070000
heap
page read and write
31B4000
trusted library allocation
page read and write
1A360B40000
heap
page read and write
2FBE000
trusted library allocation
page read and write
3151000
trusted library allocation
page read and write
33D0000
heap
page execute and read and write
3183000
trusted library allocation
page read and write
1BD1E000
stack
page read and write
1D44D119000
heap
page read and write
1E079000
heap
page read and write
2EC7000
trusted library allocation
page read and write
28EB000
trusted library allocation
page read and write
2FCF000
trusted library allocation
page read and write
7FFF60E40000
trusted library allocation
page read and write
7FFF60E5D000
trusted library allocation
page execute and read and write
1A360830000
heap
page read and write
32C9000
trusted library allocation
page read and write
1B819000
heap
page read and write
2725000
trusted library allocation
page read and write
31FD000
trusted library allocation
page read and write
3228000
trusted library allocation
page read and write
7FFF60EEC000
trusted library allocation
page execute and read and write
2E92000
trusted library allocation
page read and write
2FD1000
trusted library allocation
page read and write
2619000
trusted library allocation
page read and write
24369AB0000
heap
page read and write
3440000
trusted library allocation
page read and write
2182E6C0000
heap
page read and write
2614000
trusted library allocation
page read and write
CEE000
stack
page read and write
3265000
trusted library allocation
page read and write
1DF49A4B000
heap
page read and write
1C884FC000
stack
page read and write
1DF2D000
heap
page read and write
31EA000
trusted library allocation
page read and write
A6B9CFC000
stack
page read and write
3692000
trusted library allocation
page read and write
2025B825000
heap
page read and write
305B000
trusted library allocation
page read and write
7FFF60FD2000
trusted library allocation
page read and write
1B6DD000
stack
page read and write
1A360CC9000
heap
page read and write
1C0F3000
heap
page read and write
3451000
trusted library allocation
page read and write
7FFF61000000
trusted library allocation
page read and write
2ED2000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
387C000
trusted library allocation
page read and write
7FFF60E3D000
trusted library allocation
page execute and read and write
A6B9FFE000
stack
page read and write
3869000
trusted library allocation
page read and write
1B3AF000
stack
page read and write
3601000
trusted library allocation
page read and write
2650000
trusted library allocation
page read and write
7FFF60E00000
trusted library allocation
page read and write
1E3E9000
heap
page read and write
2E4A000
trusted library allocation
page read and write
BFC000
heap
page read and write
1C40A000
stack
page read and write
7FFF60E8C000
trusted library allocation
page execute and read and write
1B991000
heap
page read and write
3276000
trusted library allocation
page read and write
1F79DBF0000
heap
page read and write
3832000
trusted library allocation
page read and write
1150000
heap
page read and write
7FFF60E4D000
trusted library allocation
page execute and read and write
BBE000
stack
page read and write
3231000
trusted library allocation
page read and write
1F4D2890000
heap
page read and write
7FFF60F26000
trusted library allocation
page execute and read and write
2FCC000
trusted library allocation
page read and write
308E000
trusted library allocation
page read and write
5A4000
stack
page read and write
72AA8FF000
stack
page read and write
276B000
trusted library allocation
page read and write
7FFF60F5A000
trusted library allocation
page execute and read and write
12F0D000
trusted library allocation
page read and write
7FFF60E1D000
trusted library allocation
page execute and read and write
25B9000
trusted library allocation
page read and write
34E0000
trusted library allocation
page read and write
32A3000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
3003000
trusted library allocation
page read and write
1BDEA000
heap
page read and write
F81000
heap
page read and write
7FFF60E4B000
trusted library allocation
page execute and read and write
29BB000
trusted library allocation
page read and write
2754000
trusted library allocation
page read and write
12D20000
trusted library allocation
page read and write
3802000
trusted library allocation
page read and write
7FFF60F00000
trusted library allocation
page execute and read and write
1C031000
heap
page read and write
317B000
trusted library allocation
page read and write
7FFF60F06000
trusted library allocation
page execute and read and write
1BC1E000
stack
page read and write
1C50C000
stack
page read and write
280D000
trusted library allocation
page read and write
2F3C000
trusted library allocation
page read and write
26FD000
trusted library allocation
page read and write
319C000
trusted library allocation
page read and write
2F5D000
trusted library allocation
page read and write
1B8D2000
heap
page read and write
7FFF60E20000
trusted library allocation
page read and write
30F7000
trusted library allocation
page read and write
2721000
trusted library allocation
page read and write
282E000
trusted library allocation
page read and write
25F4000
trusted library allocation
page read and write
2FCE000
trusted library allocation
page read and write
1C04C000
stack
page read and write
1BD60000
heap
page read and write
7FFF60FE0000
trusted library allocation
page read and write
3307000
trusted library allocation
page read and write
15F5000
heap
page read and write
1CB49704000
heap
page read and write
137D000
heap
page read and write
7FFF60E3B000
trusted library allocation
page execute and read and write
137D2CA9000
heap
page read and write
13169000
trusted library allocation
page read and write
343C000
trusted library allocation
page read and write
7FFF60E50000
trusted library allocation
page read and write
2EF2000
trusted library allocation
page read and write
2FEE000
trusted library allocation
page read and write
25E2000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
7FFF60E40000
trusted library allocation
page read and write
A5F000
heap
page read and write
27EE000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
2E48000
trusted library allocation
page read and write
B14000
stack
page read and write
7FFF60E2D000
trusted library allocation
page execute and read and write
2885000
trusted library allocation
page read and write
1C459B79000
heap
page read and write
274E000
trusted library allocation
page read and write
32A7000
trusted library allocation
page read and write
1C780000
heap
page read and write
25B233D0000
heap
page read and write
1884A079000
heap
page read and write
7FFF60FC0000
trusted library allocation
page read and write
1C98A000
stack
page read and write
28E2000
trusted library allocation
page read and write
1CEE72CB000
heap
page read and write
1BB00000
heap
page read and write
1B770000
heap
page read and write
2F4F000
trusted library allocation
page read and write
1C4598C0000
heap
page read and write
31A3000
trusted library allocation
page read and write
26213656000
heap
page read and write
1C03E000
heap
page read and write
7FFF60E8C000
trusted library allocation
page execute and read and write
26EB000
trusted library allocation
page read and write
31A1000
trusted library allocation
page read and write
7FFF60F30000
trusted library allocation
page execute and read and write
7FFF61010000
trusted library allocation
page execute and read and write
7FE000
heap
page read and write
1CEE75D0000
heap
page read and write
32E3000
trusted library allocation
page read and write
EFE000
heap
page read and write
2612000
trusted library allocation
page read and write
FAB000
heap
page read and write
17B4CF54000
heap
page read and write
272E000
trusted library allocation
page read and write
3253000
trusted library allocation
page read and write
7FFF60E40000
trusted library allocation
page read and write
7FFF61040000
trusted library allocation
page read and write
31CD000
trusted library allocation
page read and write
92B75FF000
stack
page read and write
17B4CCD8000
heap
page read and write
12D0000
heap
page read and write
27FE000
trusted library allocation
page read and write
CB4000
heap
page read and write
A8532FE000
unkown
page read and write
2EB2000
trusted library allocation
page read and write
2330000
heap
page execute and read and write
294A000
trusted library allocation
page read and write
337C000
trusted library allocation
page read and write
2855000
trusted library allocation
page read and write
3314000
trusted library allocation
page read and write
7FFF60FD5000
trusted library allocation
page read and write
2F6B000
trusted library allocation
page read and write
314D000
trusted library allocation
page read and write
32D2000
trusted library allocation
page read and write
35BF000
trusted library allocation
page read and write
2799000
trusted library allocation
page read and write
28DA000
trusted library allocation
page read and write
1D6BA000
heap
page read and write
7FFF60FF0000
trusted library allocation
page read and write
286B000
trusted library allocation
page read and write
1B432000
heap
page read and write
2750000
trusted library allocation
page read and write
7FFF60FD0000
trusted library allocation
page read and write
3847000
trusted library allocation
page read and write
92B73FE000
unkown
page read and write
1BFAF000
stack
page read and write
3731000
trusted library allocation
page read and write
1A360AD0000
heap
page read and write
347A000
trusted library allocation
page read and write
7FFF60E44000
trusted library allocation
page read and write
31BC000
trusted library allocation
page read and write
2182E830000
heap
page read and write
31D9000
trusted library allocation
page read and write
2927000
trusted library allocation
page read and write
A01F6FC000
stack
page read and write
26A7000
trusted library allocation
page read and write
37F1000
trusted library allocation
page read and write
3415000
trusted library allocation
page read and write
26F7000
trusted library allocation
page read and write
7FFF60E23000
trusted library allocation
page execute and read and write
2583000
trusted library allocation
page read and write
293D170B000
heap
page read and write
E80000
heap
page read and write
278E000
trusted library allocation
page read and write
F0E000
heap
page read and write
27E3000
trusted library allocation
page read and write
1734000
heap
page read and write
3557000
trusted library allocation
page read and write
B9C000
heap
page read and write
3208000
trusted library allocation
page read and write
3079000
trusted library allocation
page read and write
2495EBB0000
heap
page read and write
1490000
heap
page read and write
3072000
trusted library allocation
page read and write
347E000
trusted library allocation
page read and write
2959000
trusted library allocation
page read and write
3526000
trusted library allocation
page read and write
2FD4000
trusted library allocation
page read and write
1BDA1000
heap
page read and write
C55000
heap
page read and write
3140000
heap
page read and write
26213630000
heap
page read and write
333A000
trusted library allocation
page read and write
FC4000
heap
page read and write
28DE000
trusted library allocation
page read and write
3187000
trusted library allocation
page read and write
260E000
trusted library allocation
page read and write
25F0000
trusted library allocation
page read and write
29CC000
trusted library allocation
page read and write
8D0000
heap
page read and write
2920000
trusted library allocation
page read and write
1DF49A40000
heap
page read and write
3382000
trusted library allocation
page read and write
3158000
trusted library allocation
page read and write
3853000
trusted library allocation
page read and write
1884A075000
heap
page read and write
3517000
trusted library allocation
page read and write
7FFF60E54000
trusted library allocation
page read and write
7FFF60EE0000
trusted library allocation
page read and write
F50000
unkown
page readonly
7FFF60FE0000
trusted library allocation
page read and write
2FCD000
trusted library allocation
page read and write
BD2000
heap
page read and write
7FFF60E04000
trusted library allocation
page read and write
12D1B000
trusted library allocation
page read and write
EF8000
heap
page read and write
29F6000
trusted library allocation
page read and write
29B9000
trusted library allocation
page read and write
C46000
heap
page read and write
2736000
trusted library allocation
page read and write
2F3E000
trusted library allocation
page read and write
7FFF60E30000
trusted library allocation
page read and write
2926000
trusted library allocation
page read and write
1B56E000
stack
page read and write
1BC4E000
stack
page read and write
7FFF60EF0000
trusted library allocation
page read and write
386B000
trusted library allocation
page read and write
1DF49B40000
heap
page read and write
356A000
trusted library allocation
page read and write
26CD000
trusted library allocation
page read and write
272D000
trusted library allocation
page read and write
1ACD0000
trusted library allocation
page read and write
1D64C000
heap
page read and write
BD05EFB000
stack
page read and write
2687000
trusted library allocation
page read and write
324E000
trusted library allocation
page read and write
30B2000
trusted library allocation
page read and write
2804000
trusted library allocation
page read and write
2820000
trusted library allocation
page read and write
2F61000
trusted library allocation
page read and write
2F2B000
trusted library allocation
page read and write
7FFF60F40000
trusted library allocation
page execute and read and write
25CE000
trusted library allocation
page read and write
2182EA09000
heap
page read and write
2853000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
2837000
trusted library allocation
page read and write
29F2000
trusted library allocation
page read and write
1CB49850000
heap
page read and write
36617AB000
stack
page read and write
37D7000
trusted library allocation
page read and write
7FFF60E33000
trusted library allocation
page execute and read and write
1F4D26FB000
heap
page read and write
35CE000
trusted library allocation
page read and write
1B950000
heap
page read and write
30BF000
trusted library allocation
page read and write
263F000
trusted library allocation
page read and write
32F6000
trusted library allocation
page read and write
347E000
trusted library allocation
page read and write
324A000
trusted library allocation
page read and write
E40000
heap
page read and write
1D6DF000
heap
page read and write
1BD50000
heap
page read and write
35E2000
trusted library allocation
page read and write
2761000
trusted library allocation
page read and write
37AA000
trusted library allocation
page read and write
2C80000
heap
page execute and read and write
377D000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
7FFF60E30000
trusted library allocation
page read and write
299B000
trusted library allocation
page read and write
7FFF60FB0000
trusted library allocation
page read and write
3125000
trusted library allocation
page read and write
2FA0000
heap
page execute and read and write
12F4B000
trusted library allocation
page read and write
C05000
heap
page read and write
138D000
heap
page read and write
7FFF610A6000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
27D2000
trusted library allocation
page read and write
1E17E000
heap
page read and write
1C788000
heap
page read and write
25DB000
trusted library allocation
page read and write
3522000
trusted library allocation
page read and write
35BD000
trusted library allocation
page read and write
7FFF61080000
trusted library allocation
page read and write
357D000
trusted library allocation
page read and write
248E000
stack
page read and write
7FFF60FD6000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
28EF000
trusted library allocation
page read and write
2832000
trusted library allocation
page read and write
2C8D000
stack
page read and write
1CA8C000
stack
page read and write
2659000
trusted library allocation
page read and write
1B970000
heap
page read and write
28A0000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
2630000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
1D78C000
heap
page read and write
7FFF60FDB000
trusted library allocation
page read and write
1B8CE000
stack
page read and write
35CA000
trusted library allocation
page read and write
262135F0000
heap
page read and write
2E3D000
trusted library allocation
page read and write
1C8809E6000
heap
page read and write
7FFF60E50000
trusted library allocation
page read and write
7FFF60E13000
trusted library allocation
page execute and read and write
1A3609F4000
heap
page read and write
11E4000
heap
page read and write
275F000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
2624000
trusted library allocation
page read and write
3826000
trusted library allocation
page read and write
1BB1E000
stack
page read and write
2735000
trusted library allocation
page read and write
2849000
trusted library allocation
page read and write
25B233D5000
heap
page read and write
1E1C6000
heap
page read and write
25A3000
trusted library allocation
page read and write
321D000
trusted library allocation
page read and write
E20000
heap
page read and write
27F5000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
1B9B1000
heap
page read and write
137D2B30000
heap
page read and write
2495EDF0000
heap
page read and write
2803000
trusted library allocation
page read and write
2634000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
3553000
trusted library allocation
page read and write
7FFF60FD0000
trusted library allocation
page read and write
3285000
trusted library allocation
page read and write
2A7F000
trusted library allocation
page read and write
7FFF60E43000
trusted library allocation
page execute and read and write
297D000
trusted library allocation
page read and write
27D2000
trusted library allocation
page read and write
3413000
trusted library allocation
page read and write
12F34000
trusted library allocation
page read and write
2752000
trusted library allocation
page read and write
12FB8000
trusted library allocation
page read and write
1730000
heap
page read and write
3290000
trusted library allocation
page read and write
37A1000
trusted library allocation
page read and write
1D44D110000
heap
page read and write
7FFF60F20000
trusted library allocation
page execute and read and write
92B74FE000
stack
page read and write
2E70000
trusted library allocation
page read and write
34AF000
trusted library allocation
page read and write
7FFF60E3D000
trusted library allocation
page execute and read and write
7FFF60E4D000
trusted library allocation
page execute and read and write
29BD000
trusted library allocation
page read and write
305A000
trusted library allocation
page read and write
93B0CFF000
stack
page read and write
13EE000
stack
page read and write
1B9AE000
heap
page read and write
7FFF60FC0000
trusted library allocation
page read and write
2694000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
C49000
heap
page read and write
325F000
trusted library allocation
page read and write
2887000
trusted library allocation
page read and write
880000
heap
page read and write
360C000
trusted library allocation
page read and write
2711000
trusted library allocation
page read and write
34C0000
trusted library allocation
page read and write
44BD5FF000
stack
page read and write
FC9000
heap
page read and write
2182E6CD000
heap
page read and write
1BD58000
heap
page read and write
1BC09000
stack
page read and write
F95000
heap
page read and write
30AE000
trusted library allocation
page read and write
3797000
trusted library allocation
page read and write
2592000
trusted library allocation
page read and write
1B81C000
heap
page read and write
960000
heap
page read and write
1C8809C0000
heap
page read and write
1B2E0000
heap
page read and write
7FFF60E64000
trusted library allocation
page read and write
10F4000
stack
page read and write
3250000
heap
page read and write
3167000
trusted library allocation
page read and write
FD0000
heap
page read and write
1B9A9000
heap
page read and write
24369E65000
heap
page read and write
38E2000
trusted library allocation
page read and write
1CB496B5000
heap
page read and write
359D000
trusted library allocation
page read and write
316A000
trusted library allocation
page read and write
35A8000
trusted library allocation
page read and write
ABE000
stack
page read and write
7FFF60E5D000
trusted library allocation
page execute and read and write
7FFF61050000
trusted library allocation
page read and write
320C000
trusted library allocation
page read and write
3469000
trusted library allocation
page read and write
2F3A000
trusted library allocation
page read and write
277E000
trusted library allocation
page read and write
318E000
trusted library allocation
page read and write
7FFF60E4B000
trusted library allocation
page execute and read and write
1B973000
heap
page read and write
1D638000
heap
page read and write
3599000
trusted library allocation
page read and write
7FFF60EF0000
trusted library allocation
page execute and read and write
3612000
trusted library allocation
page read and write
2182E6E3000
heap
page read and write
2865000
trusted library allocation
page read and write
2903000
trusted library allocation
page read and write
1E1BE000
heap
page read and write
1C066000
heap
page read and write
25FD000
trusted library allocation
page read and write
7E0000
heap
page read and write
2834000
trusted library allocation
page read and write
1D6C4000
heap
page read and write
313C000
trusted library allocation
page read and write
12B0000
heap
page read and write
F63000
trusted library allocation
page read and write
2EAD000
stack
page read and write
3059000
trusted library allocation
page read and write
FCD000
heap
page read and write
2ED9000
trusted library allocation
page read and write
7FFF60E7C000
trusted library allocation
page execute and read and write
28E2000
trusted library allocation
page read and write
1CEE72E4000
heap
page read and write
1F79DE0B000
heap
page read and write
1C880BE9000
heap
page read and write
1B99B000
heap
page read and write
2869000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
254E000
trusted library allocation
page read and write
30F2000
trusted library allocation
page read and write
2FB1000
trusted library allocation
page read and write
1B125000
heap
page read and write
299D000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
7FFF60FC9000
trusted library allocation
page read and write
18849B60000
heap
page read and write
3292000
trusted library allocation
page read and write
2F14000
trusted library allocation
page read and write
2EBF000
trusted library allocation
page read and write
7FFF60E44000
trusted library allocation
page read and write
26A5000
trusted library allocation
page read and write
1CEE75D9000
heap
page read and write
27BB000
trusted library allocation
page read and write
2182EA00000
heap
page read and write
7FFF60E1D000
trusted library allocation
page execute and read and write
12F16000
trusted library allocation
page read and write
25AD000
trusted library allocation
page read and write
61B000
heap
page read and write
25EC000
trusted library allocation
page read and write
288B000
trusted library allocation
page read and write
1BAD0000
trusted library section
page read and write
2EF4000
trusted library allocation
page read and write
2876000
trusted library allocation
page read and write
7FFF60E2B000
trusted library allocation
page execute and read and write
1C14E000
stack
page read and write
3338000
trusted library allocation
page read and write
2495EE60000
heap
page read and write
33FE000
trusted library allocation
page read and write
1DF20000
heap
page read and write
337A000
trusted library allocation
page read and write
7FFF61033000
trusted library allocation
page read and write
15F0000
heap
page read and write
17FE000
stack
page read and write
1F79DF70000
heap
page read and write
7FFF60EC0000
trusted library allocation
page execute and read and write
7FFF60F16000
trusted library allocation
page execute and read and write
12BA000
heap
page read and write
2917000
trusted library allocation
page read and write
7FFF60EBC000
trusted library allocation
page execute and read and write
2E5D000
trusted library allocation
page read and write
28A7000
trusted library allocation
page read and write
329F000
trusted library allocation
page read and write
34FE000
trusted library allocation
page read and write
2999000
trusted library allocation
page read and write
2025B824000
heap
page read and write
1C880BF0000
heap
page read and write
38B7000
trusted library allocation
page read and write
26C7000
trusted library allocation
page read and write
EF0000
heap
page read and write
1C640000
heap
page read and write
1E083000
heap
page read and write
17B4CCD3000
heap
page read and write
26AD000
trusted library allocation
page read and write
28A5000
trusted library allocation
page read and write
1F4D2865000
heap
page read and write
13E4000
heap
page read and write
31EE000
trusted library allocation
page read and write
F7F000
heap
page read and write
3400000
trusted library allocation
page read and write
7FFF60E53000
trusted library allocation
page read and write
1C54D000
stack
page read and write
1AABD000
stack
page read and write
271B000
trusted library allocation
page read and write
1CB496B9000
heap
page read and write
3092000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
17B4CCB0000
heap
page read and write
35F4000
trusted library allocation
page read and write
308C000
trusted library allocation
page read and write
2763000
trusted library allocation
page read and write
12ED5000
trusted library allocation
page read and write
1B800000
heap
page execute and read and write
1DF49A64000
heap
page read and write
1F4D26F0000
heap
page read and write
27B2000
trusted library allocation
page read and write
1D044FF000
stack
page read and write
2925000
trusted library allocation
page read and write
18849DD4000
heap
page read and write
FAC07FF000
unkown
page read and write
C0000
heap
page read and write
32FC000
trusted library allocation
page read and write
296A000
trusted library allocation
page read and write
2771000
trusted library allocation
page read and write
7FFF60E23000
trusted library allocation
page execute and read and write
1203000
trusted library allocation
page read and write
137D2CA9000
heap
page read and write
333C000
trusted library allocation
page read and write
7FFF60FF0000
trusted library allocation
page read and write
27D9000
trusted library allocation
page read and write
72AA7FF000
unkown
page read and write
336F000
trusted library allocation
page read and write
3453000
trusted library allocation
page read and write
29E3000
trusted library allocation
page read and write
2787000
trusted library allocation
page read and write
1884A079000
heap
page read and write
12FD2000
trusted library allocation
page read and write
266E000
stack
page read and write
137D2CA4000
heap
page read and write
1B985000
heap
page read and write
2574000
trusted library allocation
page read and write
2F18000
trusted library allocation
page read and write
1BD44000
heap
page read and write
2859000
trusted library allocation
page read and write
105A000
stack
page read and write
27AE000
trusted library allocation
page read and write
137D2D20000
heap
page read and write
2F58000
trusted library allocation
page read and write
12D5000
heap
page read and write
1F4D2716000
heap
page read and write
2E7B000
trusted library allocation
page read and write
CBE000
stack
page read and write
3170000
trusted library allocation
page read and write
104D000
heap
page read and write
131CF000
trusted library allocation
page read and write
34BE000
trusted library allocation
page read and write
1B3ED000
heap
page read and write
1B79A000
heap
page read and write
2F5A000
trusted library allocation
page read and write
7FFF61010000
trusted library allocation
page execute and read and write
359B000
trusted library allocation
page read and write
3575000
trusted library allocation
page read and write
1B1BF000
stack
page read and write
3305000
trusted library allocation
page read and write
1299000
heap
page read and write
276B000
trusted library allocation
page read and write
314B000
trusted library allocation
page read and write
1C6EA000
stack
page read and write
7FFF60E3D000
trusted library allocation
page execute and read and write
1B959000
heap
page read and write
6DD000
heap
page read and write
3070000
trusted library allocation
page read and write
17B4CF59000
heap
page read and write
3270000
trusted library allocation
page read and write
1F79DD30000
heap
page read and write
2EF6000
trusted library allocation
page read and write
1A3609DB000
heap
page read and write
F8D000
heap
page read and write
24369AD4000
heap
page read and write
2955000
trusted library allocation
page read and write
28B9000
trusted library allocation
page read and write
3482000
trusted library allocation
page read and write
25FB000
trusted library allocation
page read and write
F79000
heap
page read and write
324C000
trusted library allocation
page read and write
25D1000
trusted library allocation
page read and write
E367AFF000
stack
page read and write
28FC000
trusted library allocation
page read and write
38BC000
trusted library allocation
page read and write
2811000
trusted library allocation
page read and write
261B000
trusted library allocation
page read and write
7FFF60E43000
trusted library allocation
page read and write
26DA000
trusted library allocation
page read and write
7FFF60F50000
trusted library allocation
page execute and read and write
1E1E4000
heap
page read and write
7FFF60E43000
trusted library allocation
page read and write
3511000
trusted library allocation
page read and write
1B9C9000
heap
page read and write
2FDF000
trusted library allocation
page read and write
1CB8A000
stack
page read and write
1B96D000
stack
page read and write
3455000
trusted library allocation
page read and write
1CB496B9000
heap
page read and write
2733000
trusted library allocation
page read and write
54490FB000
stack
page read and write
1B143000
heap
page read and write
44BD6FE000
stack
page read and write
1E060000
heap
page read and write
AE8000
heap
page read and write
2CA0000
heap
page read and write
9B5000
heap
page read and write
334F000
trusted library allocation
page read and write
3858000
trusted library allocation
page read and write
2E39000
trusted library allocation
page read and write
E10000
heap
page read and write
2933000
trusted library allocation
page read and write
26BA000
trusted library allocation
page read and write
1D44D119000
heap
page read and write
3684000
trusted library allocation
page read and write
24369AD6000
heap
page read and write
3824000
trusted library allocation
page read and write
21FE965B000
heap
page read and write
272F000
trusted library allocation
page read and write
7FFF60E5B000
trusted library allocation
page execute and read and write
347C000
trusted library allocation
page read and write
1D44D190000
heap
page read and write
3090000
trusted library allocation
page read and write
2F38000
trusted library allocation
page read and write
2769000
trusted library allocation
page read and write
7FFF60F26000
trusted library allocation
page execute and read and write
2654000
trusted library allocation
page read and write
3593000
trusted library allocation
page read and write
28F5000
trusted library allocation
page read and write
2F8F000
trusted library allocation
page read and write
3156000
trusted library allocation
page read and write
35BB000
trusted library allocation
page read and write
3870000
trusted library allocation
page read and write
32D6000
trusted library allocation
page read and write
28DC000
trusted library allocation
page read and write
21FE9935000
heap
page read and write
7FFF60FDB000
trusted library allocation
page read and write
2E74000
trusted library allocation
page read and write
D80000
heap
page read and write
7FFF60F50000
trusted library allocation
page execute and read and write
BDCCFF000
stack
page read and write
ADA000
heap
page read and write
60B000
heap
page read and write
1BD2C000
heap
page read and write
21FE9674000
heap
page read and write
1BD51000
heap
page read and write
3435000
trusted library allocation
page read and write
27DD000
trusted library allocation
page read and write
1B3D4000
heap
page read and write
31AB000
trusted library allocation
page read and write
26F1000
trusted library allocation
page read and write
D60000
heap
page read and write
38A6000
trusted library allocation
page read and write
17B4CF59000
heap
page read and write
1B9EB000
heap
page read and write
268F000
trusted library allocation
page read and write
760000
unkown
page readonly
7FFF60FA2000
trusted library allocation
page read and write
CAE000
heap
page read and write
256E000
trusted library allocation
page read and write
3588000
trusted library allocation
page read and write
1B9E9000
heap
page read and write
11C0000
heap
page read and write
1B2C6000
heap
page read and write
28E4000
trusted library allocation
page read and write
1B315000
heap
page read and write
21ECCFF000
stack
page read and write
2902000
trusted library allocation
page read and write
2531000
trusted library allocation
page read and write
1C885FF000
unkown
page read and write
333E000
trusted library allocation
page read and write
3422000
trusted library allocation
page read and write
2FAF000
trusted library allocation
page read and write
9F6000
heap
page read and write
1D44D050000
heap
page read and write
135C000
heap
page read and write
286B000
trusted library allocation
page read and write
1B965000
heap
page read and write
1B862000
heap
page read and write
1B97E000
stack
page read and write
2FB3000
trusted library allocation
page read and write
1BE0E000
stack
page read and write
1200000
trusted library allocation
page read and write
31AE000
trusted library allocation
page read and write
31BD000
trusted library allocation
page read and write
26213810000
heap
page read and write
1BFEE000
heap
page read and write
3012000
trusted library allocation
page read and write
28F1000
trusted library allocation
page read and write
1020000
heap
page read and write
293D1724000
heap
page read and write
1B960000
heap
page read and write
8C8000
heap
page read and write
325D000
trusted library allocation
page read and write
11E0000
heap
page read and write
10CE000
stack
page read and write
28EF000
trusted library allocation
page read and write
1B8E4000
heap
page read and write
1B989000
heap
page read and write
1C5AE000
stack
page read and write
34DC000
trusted library allocation
page read and write
1CB496B0000
heap
page read and write
30F0000
heap
page execute and read and write
2DB1000
trusted library allocation
page read and write
1B0BE000
stack
page read and write
7D9000
heap
page read and write
35EC000
trusted library allocation
page read and write
1C007000
heap
page read and write
32C7000
trusted library allocation
page read and write
E15000
heap
page read and write
349E000
trusted library allocation
page read and write
303F000
trusted library allocation
page read and write
35F2000
trusted library allocation
page read and write
274E000
stack
page read and write
27E1000
trusted library allocation
page read and write
380E000
trusted library allocation
page read and write
3744000
trusted library allocation
page read and write
334B000
trusted library allocation
page read and write
3559000
trusted library allocation
page read and write
30D2000
trusted library allocation
page read and write
1390000
heap
page read and write
F4055FE000
stack
page read and write
38D0000
trusted library allocation
page read and write
2E7D000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
1BDA1000
heap
page read and write
1C099000
heap
page read and write
31C3000
trusted library allocation
page read and write
32A5000
trusted library allocation
page read and write
2844000
trusted library allocation
page read and write
2596000
trusted library allocation
page read and write
2380000
heap
page read and write
7FFF60FE0000
trusted library allocation
page read and write
3103000
trusted library allocation
page read and write
7FFF60EF6000
trusted library allocation
page execute and read and write
12BD000
heap
page read and write
7FFF60E0D000
trusted library allocation
page execute and read and write
2935000
trusted library allocation
page read and write
C85000
heap
page read and write
1DF49BD5000
heap
page read and write
1B131000
heap
page read and write
1F4D27F0000
heap
page read and write
1E3C0000
heap
page read and write
3470000
trusted library allocation
page read and write
25AB000
trusted library allocation
page read and write
2636000
trusted library allocation
page read and write
287C000
trusted library allocation
page read and write
1D03FCC000
stack
page read and write
12F18000
trusted library allocation
page read and write
BD061FF000
stack
page read and write
1B8F1000
heap
page read and write
1DF49A66000
heap
page read and write
1B66B000
stack
page read and write
18849DB0000
heap
page read and write
A8533FF000
stack
page read and write
130AF000
trusted library allocation
page read and write
1340000
heap
page read and write
2F49000
trusted library allocation
page read and write
2734000
trusted library allocation
page read and write
28C9000
trusted library allocation
page read and write
28AB000
trusted library allocation
page read and write
7FFF60E24000
trusted library allocation
page read and write
104A000
heap
page read and write
2554000
trusted library allocation
page read and write
137D2CB0000
heap
page read and write
34DE000
trusted library allocation
page read and write
288B000
trusted library allocation
page read and write
1F4D2869000
heap
page read and write
26E9000
trusted library allocation
page read and write
7FFF60E33000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
2495EC2B000
heap
page read and write
27EC000
trusted library allocation
page read and write
93B078C000
stack
page read and write
26F0000
trusted library allocation
page read and write
34ED000
trusted library allocation
page read and write
2EEF000
stack
page read and write
7FFF60E6B000
trusted library allocation
page execute and read and write
C82000
heap
page read and write
37A3000
trusted library allocation
page read and write
300C000
trusted library allocation
page read and write
24369E60000
heap
page read and write
2997000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
7FFF60E5C000
trusted library allocation
page execute and read and write
1B980000
heap
page read and write
3220000
heap
page read and write
2FF0000
trusted library allocation
page read and write
2F67000
trusted library allocation
page read and write
2563000
trusted library allocation
page read and write
1CA4A000
stack
page read and write
80B000
heap
page read and write
2696000
trusted library allocation
page read and write
7FFF60ED0000
trusted library allocation
page read and write
2FB5000
trusted library allocation
page read and write
3445000
trusted library allocation
page read and write
304E000
trusted library allocation
page read and write
2BA15870000
heap
page read and write
352F000
trusted library allocation
page read and write
3274000
trusted library allocation
page read and write
1C8809CD000
heap
page read and write
2813000
trusted library allocation
page read and write
2520000
heap
page execute and read and write
11E5000
heap
page read and write
1C459750000
heap
page read and write
FAC09FF000
stack
page read and write
32E5000
trusted library allocation
page read and write
2BA15A40000
heap
page read and write
BD060FE000
stack
page read and write
1A3609D0000
heap
page read and write
24D0000
trusted library allocation
page read and write
7FFF60E20000
trusted library allocation
page read and write
2856000
trusted library allocation
page read and write
1B90E000
heap
page read and write
2FB1000
trusted library allocation
page read and write
31B2000
trusted library allocation
page read and write
2025B829000
heap
page read and write
570000
heap
page read and write
1C4598CB000
heap
page read and write
3566000
trusted library allocation
page read and write
137D2CA0000
heap
page read and write
3568000
trusted library allocation
page read and write
346B000
trusted library allocation
page read and write
31D7000
trusted library allocation
page read and write
1B406000
heap
page read and write
12F64000
trusted library allocation
page read and write
27CE000
trusted library allocation
page read and write
3883000
trusted library allocation
page read and write
1B9A3000
heap
page read and write
CC0000
heap
page read and write
6F4000
stack
page read and write
E10000
heap
page read and write
30B5000
trusted library allocation
page read and write
2D60000
heap
page read and write
1C4598E4000
heap
page read and write
3892000
trusted library allocation
page read and write
286D000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
7FFF60EFC000
trusted library allocation
page execute and read and write
7FFF60E4D000
trusted library allocation
page execute and read and write
F6C000
heap
page read and write
133E1000
trusted library allocation
page read and write
7FFF60E10000
trusted library allocation
page read and write
30BD000
trusted library allocation
page read and write
2DCE000
trusted library allocation
page read and write
12D2000
heap
page read and write
2790000
trusted library allocation
page read and write
2182EA05000
heap
page read and write
13B0000
heap
page read and write
348D000
trusted library allocation
page read and write
378E000
trusted library allocation
page read and write
1BD71000
heap
page read and write
1E06D000
heap
page read and write
7DE000
stack
page read and write
1D043FE000
stack
page read and write
2802000
trusted library allocation
page read and write
35CC000
trusted library allocation
page read and write
274C000
trusted library allocation
page read and write
2E6C000
trusted library allocation
page read and write
18849DD6000
heap
page read and write
25A1000
trusted library allocation
page read and write
135A000
heap
page read and write
349C000
trusted library allocation
page read and write
3403000
trusted library allocation
page read and write
2713000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
305F000
trusted library allocation
page read and write
27FF000
trusted library allocation
page read and write
1B982000
heap
page read and write
1CEE7490000
heap
page read and write
3116000
trusted library allocation
page read and write
7FFF60E9C000
trusted library allocation
page execute and read and write
31F7000
trusted library allocation
page read and write
955000
heap
page read and write
34F3000
trusted library allocation
page read and write
F59000
heap
page read and write
2F69000
trusted library allocation
page read and write
3336000
trusted library allocation
page read and write
360A000
trusted library allocation
page read and write
1920000
heap
page read and write
35DF000
trusted library allocation
page read and write
1C010000
heap
page read and write
1BD7C000
heap
page read and write
31FF000
trusted library allocation
page read and write
6A2000
heap
page read and write
2988000
trusted library allocation
page read and write
2FFF000
trusted library allocation
page read and write
2A0C000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
2EF8000
trusted library allocation
page read and write
262135F9000
heap
page read and write
ED0000
heap
page read and write
2BA15A49000
heap
page read and write
1C886FE000
stack
page read and write
2881000
trusted library allocation
page read and write
28CD000
trusted library allocation
page read and write
3169000
trusted library allocation
page read and write
284D000
trusted library allocation
page read and write
1C880BE0000
heap
page read and write
1C1DD000
heap
page read and write
6CD377C000
stack
page read and write
34F5000
trusted library allocation
page read and write
2709000
trusted library allocation
page read and write
262E000
trusted library allocation
page read and write
279F000
trusted library allocation
page read and write
1B906000
heap
page read and write
3579000
trusted library allocation
page read and write
381B000
trusted library allocation
page read and write
2937000
trusted library allocation
page read and write
1BD5F000
heap
page read and write
2771000
trusted library allocation
page read and write
3172000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
1B3DC000
heap
page read and write
1C78B000
heap
page read and write
261F000
trusted library allocation
page read and write
3564000
trusted library allocation
page read and write
37BC000
trusted library allocation
page read and write
295C000
trusted library allocation
page read and write
27C0000
trusted library allocation
page read and write
3195000
trusted library allocation
page read and write
7FFF60E43000
trusted library allocation
page read and write
331A000
trusted library allocation
page read and write
31CB000
trusted library allocation
page read and write
340D000
trusted library allocation
page read and write
3025000
trusted library allocation
page read and write
F40510B000
stack
page read and write
890000
heap
page read and write
1C059000
stack
page read and write
2874000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
3723000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
1D69F000
heap
page read and write
270D000
trusted library allocation
page read and write
2827000
trusted library allocation
page read and write
1A360CC0000
heap
page read and write
1CEE75D5000
heap
page read and write
26BE000
trusted library allocation
page read and write
7FFF60E33000
trusted library allocation
page execute and read and write
7FFF60FA0000
trusted library allocation
page read and write
5079AFF000
unkown
page read and write
1B816000
heap
page read and write
21FE9939000
heap
page read and write
7FFF60F40000
trusted library allocation
page execute and read and write
2948000
trusted library allocation
page read and write
26ED000
trusted library allocation
page read and write
1C93E000
stack
page read and write
287A000
trusted library allocation
page read and write
320E000
trusted library allocation
page read and write
1C30E000
stack
page read and write
1B0FE000
stack
page read and write
1B76F000
stack
page read and write
1AEFF000
stack
page read and write
470000
heap
page read and write
7FFF60EE0000
trusted library allocation
page execute and read and write
99E000
stack
page read and write
2F80000
trusted library allocation
page read and write
1E1B2000
heap
page read and write
2025B829000
heap
page read and write
2DD2000
trusted library allocation
page read and write
293D1AB5000
heap
page read and write
819000
unkown
page readonly
2F6D000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
7FFF60E34000
trusted library allocation
page read and write
1E172000
heap
page read and write
2495EED4000
heap
page read and write
F8B000
heap
page read and write
37B4000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
7FFF60EEC000
trusted library allocation
page execute and read and write
2FCA000
trusted library allocation
page read and write
289B000
trusted library allocation
page read and write
1BD0E000
stack
page read and write
310000
heap
page read and write
2025B829000
heap
page read and write
1B02C000
heap
page read and write
31B1000
trusted library allocation
page read and write
72AA9FF000
stack
page read and write
7FFF60FF0000
trusted library allocation
page read and write
1DF2F000
heap
page read and write
38BE000
trusted library allocation
page read and write
1CB497E0000
heap
page read and write
25CA000
trusted library allocation
page read and write
297B000
trusted library allocation
page read and write
319D000
trusted library allocation
page read and write
1383000
heap
page read and write
3424000
trusted library allocation
page read and write
24369E69000
heap
page read and write
2E59000
trusted library allocation
page read and write
307D000
trusted library allocation
page read and write
28DE000
trusted library allocation
page read and write
17B4CCD7000
heap
page read and write
2678000
trusted library allocation
page read and write
29C1000
trusted library allocation
page read and write
2689000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
36E65FF000
stack
page read and write
3610000
trusted library allocation
page read and write
130B6000
trusted library allocation
page read and write
278A000
trusted library allocation
page read and write
7FFF60E2D000
trusted library allocation
page execute and read and write
7FFF60EC0000
trusted library allocation
page read and write
13CE000
stack
page read and write
2980000
trusted library allocation
page read and write
9B0000
heap
page read and write
2FE1000
trusted library allocation
page read and write
A1E000
heap
page read and write
3843000
trusted library allocation
page read and write
93B0AFF000
unkown
page read and write
35A6000
trusted library allocation
page read and write
13F0000
heap
page read and write
2966000
trusted library allocation
page read and write
1B9E4000
heap
page read and write
25C8000
trusted library allocation
page read and write
2909000
trusted library allocation
page read and write
25B233D9000
heap
page read and write
1B95E000
heap
page read and write
2896000
trusted library allocation
page read and write
10CE000
stack
page read and write
137D2B53000
heap
page read and write
2765000
trusted library allocation
page read and write
7FFF60FD9000
trusted library allocation
page read and write
1B16B000
heap
page read and write
7FFF60FD5000
trusted library allocation
page read and write
54493FF000
stack
page read and write
30C1000
trusted library allocation
page read and write
27DB000
trusted library allocation
page read and write
970000
heap
page read and write
27FD000
trusted library allocation
page read and write
17B4CF55000
heap
page read and write
1CB49706000
heap
page read and write
3007000
trusted library allocation
page read and write
13030000
trusted library allocation
page read and write
28AF000
trusted library allocation
page read and write
2EC3000
trusted library allocation
page read and write
2495EED9000
heap
page read and write
12DB8000
trusted library allocation
page read and write
1B979000
heap
page read and write
30C3000
trusted library allocation
page read and write
1CB496E0000
heap
page read and write
B96000
heap
page read and write
7FFF60E34000
trusted library allocation
page read and write
A01F7FE000
unkown
page read and write
1B439000
stack
page read and write
7FFF60FF1000
trusted library allocation
page read and write
32D8000
trusted library allocation
page read and write
31B3000
trusted library allocation
page read and write
2906000
trusted library allocation
page read and write
1B2D0000
heap
page read and write
7FFF60FD0000
trusted library allocation
page read and write
1B87E000
stack
page read and write
3840000
trusted library allocation
page read and write
FAC08FF000
stack
page read and write
FA1000
heap
page read and write
7FFF60E33000
trusted library allocation
page read and write
2BA156C4000
heap
page read and write
1B157000
heap
page read and write
12F8C000
trusted library allocation
page read and write
2878000
trusted library allocation
page read and write
1DF49BE0000
heap
page read and write
2900000
trusted library allocation
page read and write
25B232A0000
heap
page read and write
1B100000
heap
page read and write
2710000
trusted library allocation
page read and write
319A000
trusted library allocation
page read and write
1C459B80000
heap
page read and write
27A1000
trusted library allocation
page read and write
3894000
trusted library allocation
page read and write
CF4000
stack
page read and write
2BA155A0000
heap
page read and write
2BA15610000
heap
page read and write
2995000
trusted library allocation
page read and write
2FDB000
trusted library allocation
page read and write
15FE000
stack
page read and write
FB9000
heap
page read and write
16FE000
stack
page read and write
1D86D000
heap
page read and write
6C2000
heap
page read and write
2F27000
trusted library allocation
page read and write
380000
heap
page read and write
7FFF60E6D000
trusted library allocation
page execute and read and write
90671C000
stack
page read and write
133E8000
trusted library allocation
page read and write
1B81F000
heap
page read and write
1B9AE000
heap
page read and write
6CD3CFF000
stack
page read and write
299F000
trusted library allocation
page read and write
1C459A30000
heap
page read and write
26AB000
trusted library allocation
page read and write
2025B863000
heap
page read and write
2816000
trusted library allocation
page read and write
3309000
trusted library allocation
page read and write
7FFF60F60000
trusted library allocation
page execute and read and write
A6B9EFE000
stack
page read and write
2182E6C7000
heap
page read and write
31CF000
trusted library allocation
page read and write
131F7000
trusted library allocation
page read and write
27AA000
trusted library allocation
page read and write
2A03000
trusted library allocation
page read and write
2495EED9000
heap
page read and write
12F8C000
trusted library allocation
page read and write
7FFF60E50000
trusted library allocation
page read and write
7FFF60E3D000
trusted library allocation
page execute and read and write
2577000
trusted library allocation
page read and write
126F1000
trusted library allocation
page read and write
1D44CF74000
heap
page read and write
1B33D000
stack
page read and write
2812000
trusted library allocation
page read and write
2641000
trusted library allocation
page read and write
7FFF60E8C000
trusted library allocation
page execute and read and write
279D000
trusted library allocation
page read and write
7FFF60E60000
trusted library allocation
page read and write
12F8A000
trusted library allocation
page read and write
3272000
trusted library allocation
page read and write
25B233E0000
heap
page read and write
28E6000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
3437000
trusted library allocation
page read and write
1DF49BD9000
heap
page read and write
1C648000
heap
page read and write
1B3F5000
heap
page read and write
25B233D9000
heap
page read and write
1F79E075000
heap
page read and write
80E000
heap
page read and write
127E1000
trusted library allocation
page read and write
7FFF60E34000
trusted library allocation
page read and write
1A360BB0000
heap
page read and write
7FFF60EF0000
trusted library allocation
page read and write
268D000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
12CA000
stack
page read and write
7FFF60FA5000
trusted library allocation
page read and write
137D29C0000
heap
page read and write
1C1B9000
heap
page read and write
1740000
heap
page read and write
2979000
trusted library allocation
page read and write
2F11000
trusted library allocation
page read and write
2863000
trusted library allocation
page read and write
7FFF60E5D000
trusted library allocation
page execute and read and write
D00000
unkown
page readonly
38B2000
trusted library allocation
page read and write
990000
trusted library allocation
page read and write
1CEE75E0000
heap
page read and write
1CEE71E0000
heap
page read and write
284F000
trusted library allocation
page read and write
1C4599C0000
heap
page read and write
7FFF6104B000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
293D1AB9000
heap
page read and write
BEE000
stack
page read and write
31A2000
trusted library allocation
page read and write
1C010000
heap
page read and write
2F89000
trusted library allocation
page read and write
906BFE000
stack
page read and write
7FFF60FD9000
trusted library allocation
page read and write
1B6E9000
stack
page read and write
14AD000
heap
page read and write
35DB000
trusted library allocation
page read and write
2025B848000
heap
page read and write
2968000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
12C3000
heap
page read and write
26D8000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
1150000
heap
page read and write
1B9A1000
heap
page read and write
7FFF60E6B000
trusted library allocation
page execute and read and write
54492FE000
stack
page read and write
1B177000
heap
page read and write
1D44CF5B000
heap
page read and write
2A01000
trusted library allocation
page read and write
7FFF60EB0000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
37DC000
trusted library allocation
page read and write
3118000
trusted library allocation
page read and write
2672000
trusted library allocation
page read and write
3037000
trusted library allocation
page read and write
12CA1000
trusted library allocation
page read and write
1423000
heap
page read and write
ED9000
heap
page read and write
3127000
trusted library allocation
page read and write
7FFF60E5D000
trusted library allocation
page execute and read and write
C10000
trusted library allocation
page read and write
DD0000
heap
page read and write
3614000
trusted library allocation
page read and write
2779000
trusted library allocation
page read and write
25B23154000
heap
page read and write
1F4D2714000
heap
page read and write
376A000
trusted library allocation
page read and write
1C4598E6000
heap
page read and write
126F8000
trusted library allocation
page read and write
1AC7D000
stack
page read and write
1C029000
heap
page read and write
348F000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
7FFF61067000
trusted library allocation
page read and write
271C000
trusted library allocation
page read and write
2DE1000
trusted library allocation
page read and write
338B000
trusted library allocation
page read and write
7FFF60E5D000
trusted library allocation
page execute and read and write
262135F9000
heap
page read and write
2BA15A45000
heap
page read and write
2182E7C0000
heap
page read and write
2788000
trusted library allocation
page read and write
7FFF60E44000
trusted library allocation
page read and write
374C000
trusted library allocation
page read and write
894000
heap
page read and write
270B000
trusted library allocation
page read and write
1CEE75D9000
heap
page read and write
1D042FF000
unkown
page read and write
1B31B000
heap
page read and write
1B93F000
heap
page read and write
1C044000
heap
page read and write
2E01000
trusted library allocation
page read and write
1F79DE00000
heap
page read and write
27D8000
trusted library allocation
page read and write
2E03000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
2F36000
trusted library allocation
page read and write
32DB000
trusted library allocation
page read and write
2A0E000
trusted library allocation
page read and write
2BC0000
trusted library allocation
page read and write
3061000
trusted library allocation
page read and write
1BD4E000
heap
page read and write
2025BAF0000
heap
page read and write
27FC000
trusted library allocation
page read and write
2692000
trusted library allocation
page read and write
1DF49BD0000
heap
page read and write
3877000
trusted library allocation
page read and write
72AA6FC000
stack
page read and write
1C4AE000
stack
page read and write
1BF26000
heap
page read and write
7FFF60EDC000
trusted library allocation
page execute and read and write
3597000
trusted library allocation
page read and write
2698000
trusted library allocation
page read and write
2676000
trusted library allocation
page read and write
25BD000
trusted library allocation
page read and write
2830000
trusted library allocation
page read and write
1B3E4000
heap
page read and write
3489000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
284F000
trusted library allocation
page read and write
E45000
heap
page read and write
270F000
trusted library allocation
page read and write
BDCBFF000
stack
page read and write
2652000
trusted library allocation
page read and write
2F00000
heap
page execute and read and write
261D000
trusted library allocation
page read and write
1C8807C0000
heap
page read and write
7FFF60E30000
trusted library allocation
page read and write
3329000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
2495EC43000
heap
page read and write
2EB4000
trusted library allocation
page read and write
2F2D000
trusted library allocation
page read and write
7FFF60EFC000
trusted library allocation
page execute and read and write
277B000
trusted library allocation
page read and write
349E000
trusted library allocation
page read and write
1302000
heap
page read and write
274D000
trusted library allocation
page read and write
316E000
trusted library allocation
page read and write
1BD73000
heap
page read and write
2878000
trusted library allocation
page read and write
1B6CE000
stack
page read and write
31D2000
trusted library allocation
page read and write
38D5000
trusted library allocation
page read and write
3192000
trusted library allocation
page read and write
308A000
trusted library allocation
page read and write
3442000
trusted library allocation
page read and write
B90000
heap
page read and write
1319F000
trusted library allocation
page read and write
3555000
trusted library allocation
page read and write
1C0A2000
heap
page read and write
1D630000
heap
page read and write
7FFF61090000
trusted library allocation
page read and write
7FFF60E14000
trusted library allocation
page read and write
93B0BFE000
stack
page read and write
2640000
heap
page execute and read and write
316B000
trusted library allocation
page read and write
21ECBFF000
unkown
page read and write
25B2313B000
heap
page read and write
320A000
trusted library allocation
page read and write
327F000
trusted library allocation
page read and write
37B9000
trusted library allocation
page read and write
137D2B3B000
heap
page read and write
2F8D000
trusted library allocation
page read and write
2BA158E0000
heap
page read and write
7FFF61020000
trusted library allocation
page read and write
1B2FA000
heap
page read and write
2842000
trusted library allocation
page read and write
1B7F2000
heap
page read and write
14E5000
heap
page read and write
28F8000
trusted library allocation
page read and write
1E06F000
heap
page read and write
16FE000
stack
page read and write
25BB000
trusted library allocation
page read and write
271F000
trusted library allocation
page read and write
2F74000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
1B77F000
stack
page read and write
7FFF61020000
trusted library allocation
page execute and read and write
2B80000
heap
page read and write
762000
unkown
page readonly
14FE000
stack
page read and write
1BE60000
heap
page read and write
3138000
trusted library allocation
page read and write
2DD4000
trusted library allocation
page read and write
27D0000
heap
page read and write
1C000000
heap
page read and write
317D000
trusted library allocation
page read and write
368D000
trusted library allocation
page read and write
1B2C2000
heap
page read and write
3533000
trusted library allocation
page read and write
268B000
trusted library allocation
page read and write
293D1960000
heap
page read and write
9F0000
heap
page read and write
7FFF60ED0000
trusted library allocation
page execute and read and write
7FFF60E7C000
trusted library allocation
page execute and read and write
14A2000
heap
page read and write
24369A30000
heap
page read and write
7FFF60EF6000
trusted library allocation
page read and write
2025BA10000
heap
page read and write
2833000
trusted library allocation
page read and write
301F000
trusted library allocation
page read and write
1B8D6000
heap
page read and write
3303000
trusted library allocation
page read and write
2587000
trusted library allocation
page read and write
7D0000
heap
page read and write
1B790000
heap
page read and write
1F79DE26000
heap
page read and write
28AE000
trusted library allocation
page read and write
92B72FC000
stack
page read and write
7FFF60E5B000
trusted library allocation
page execute and read and write
D3C000
heap
page read and write
1D80C000
heap
page read and write
2DA0000
heap
page read and write
1314000
stack
page read and write
27C3000
trusted library allocation
page read and write
1F79DE24000
heap
page read and write
7FFF61070000
trusted library allocation
page read and write
7FFF60F56000
trusted library allocation
page execute and read and write
A5D000
heap
page read and write
25AF000
trusted library allocation
page read and write
896000
heap
page read and write
137D2B58000
heap
page read and write
25DD000
trusted library allocation
page read and write
1BD6A000
heap
page read and write
2495EED5000
heap
page read and write
2A76000
trusted library allocation
page read and write
296C000
trusted library allocation
page read and write
2025B780000
heap
page read and write
A35000
heap
page read and write
25D9000
trusted library allocation
page read and write
1030000
heap
page read and write
F4056FF000
stack
page read and write
1F4D2540000
heap
page read and write
7FFF60FE0000
trusted library allocation
page read and write
1D44D120000
heap
page read and write
348D000
trusted library allocation
page read and write
32D4000
trusted library allocation
page read and write
1BD20000
heap
page read and write
291C000
trusted library allocation
page read and write
3147000
trusted library allocation
page read and write
3426000
trusted library allocation
page read and write
11CA000
stack
page read and write
2621000
trusted library allocation
page read and write
17B4CF60000
heap
page read and write
1F4000
stack
page read and write
319E000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
2E1F000
trusted library allocation
page read and write
2755000
trusted library allocation
page read and write
1BF3D000
heap
page read and write
7FFF61030000
trusted library allocation
page read and write
27B9000
trusted library allocation
page read and write
270C000
trusted library allocation
page read and write
2785000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
30AC000
trusted library allocation
page read and write
25B7000
trusted library allocation
page read and write
2BD9000
heap
page read and write
1CB496EB000
heap
page read and write
A852F3B000
stack
page read and write
7FFF60E2D000
trusted library allocation
page execute and read and write
2EA4000
trusted library allocation
page read and write
1F4D2860000
heap
page read and write
1B962000
heap
page read and write
2581000
trusted library allocation
page read and write
1CB4E000
stack
page read and write
341E000
trusted library allocation
page read and write
1D683000
heap
page read and write
7FFF60FC5000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
1D44CF50000
heap
page read and write
500000
heap
page read and write
29EE000
trusted library allocation
page read and write
7FFF60E3D000
trusted library allocation
page execute and read and write
32EB000
trusted library allocation
page read and write
2915000
trusted library allocation
page read and write
335E000
trusted library allocation
page read and write
1B996000
heap
page read and write
1290000
heap
page read and write
7FFF60FB0000
trusted library allocation
page read and write
1011000
heap
page read and write
2552000
trusted library allocation
page read and write
2775000
trusted library allocation
page read and write
3052000
trusted library allocation
page read and write
816000
unkown
page readonly
304E000
stack
page read and write
5E0000
heap
page read and write
2610000
trusted library allocation
page read and write
7FFF60F06000
trusted library allocation
page execute and read and write
21FE9677000
heap
page read and write
2F5D000
trusted library allocation
page read and write
1C1D0000
heap
page read and write
2867000
trusted library allocation
page read and write
1D844000
heap
page read and write
1C880AC0000
heap
page read and write
2929000
trusted library allocation
page read and write
37C4000
trusted library allocation
page read and write
2953000
trusted library allocation
page read and write
32C3000
trusted library allocation
page read and write
2E8E000
trusted library allocation
page read and write
2E3F000
trusted library allocation
page read and write
276D000
trusted library allocation
page read and write
A9E000
stack
page read and write
7FFF60E4D000
trusted library allocation
page execute and read and write
AE2000
heap
page read and write
13151000
trusted library allocation
page read and write
2912000
trusted library allocation
page read and write
27D0000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
7FFF60EE0000
trusted library allocation
page execute and read and write
3757000
trusted library allocation
page read and write
E367BFF000
stack
page read and write
30CE000
trusted library allocation
page read and write
35C8000
trusted library allocation
page read and write
2182E520000
heap
page read and write
12BF000
heap
page read and write
1B2C0000
heap
page read and write
2FDE000
trusted library allocation
page read and write
347A000
trusted library allocation
page read and write
1D84A000
heap
page read and write
21FE9560000
heap
page read and write
F50000
heap
page read and write
28BB000
trusted library allocation
page read and write
27BD000
trusted library allocation
page read and write
300E000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page read and write
1B9BA000
heap
page read and write
1D841000
heap
page read and write
1CB494A0000
heap
page read and write
2723000
trusted library allocation
page read and write
2931000
trusted library allocation
page read and write
12F11000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
1580000
heap
page read and write
507971B000
stack
page read and write
31DC000
trusted library allocation
page read and write
1BFF8000
heap
page read and write
33FE000
trusted library allocation
page read and write
28A9000
trusted library allocation
page read and write
1296000
heap
page read and write
7FFF60E4D000
trusted library allocation
page execute and read and write
6CD3AFE000
unkown
page read and write
C40000
heap
page read and write
26F5000
trusted library allocation
page read and write
1B423000
heap
page read and write
293D1AB9000
heap
page read and write
286F000
trusted library allocation
page read and write
1DF49BD9000
heap
page read and write
288D000
trusted library allocation
page read and write
3219000
trusted library allocation
page read and write
F5A000
stack
page read and write
DD0000
heap
page read and write
273E000
trusted library allocation
page read and write
850000
heap
page read and write
1B3B8000
heap
page read and write
2E81000
trusted library allocation
page read and write
2817000
trusted library allocation
page read and write
1B42D000
heap
page read and write
326E000
trusted library allocation
page read and write
3539000
trusted library allocation
page read and write
B90000
heap
page read and write
7FFF60EE6000
trusted library allocation
page execute and read and write
3048000
trusted library allocation
page read and write
2801000
trusted library allocation
page read and write
1910000
heap
page read and write
13DE000
heap
page read and write
7FFF60E42000
trusted library allocation
page read and write
2566000
trusted library allocation
page read and write
BFE000
heap
page read and write
280E000
trusted library allocation
page read and write
27F0000
trusted library allocation
page read and write
BDCAFF000
unkown
page read and write
3316000
trusted library allocation
page read and write
3790000
trusted library allocation
page read and write
2656000
trusted library allocation
page read and write
315B000
trusted library allocation
page read and write
1B2AF000
stack
page read and write
2846000
trusted library allocation
page read and write
1BEAF000
stack
page read and write
7FFF60F50000
trusted library allocation
page execute and read and write
3114000
trusted library allocation
page read and write
32E9000
trusted library allocation
page read and write
296F000
trusted library allocation
page read and write
7D0000
unkown
page readonly
2741000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
342F000
trusted library allocation
page read and write
7FFF60FE5000
trusted library allocation
page read and write
2FE3000
trusted library allocation
page read and write
1BCB9000
stack
page read and write
7FFF60F5A000
trusted library allocation
page execute and read and write
2824000
trusted library allocation
page read and write
18849D10000
heap
page read and write
37D0000
trusted library allocation
page read and write
24369ABB000
heap
page read and write
2025B868000
heap
page read and write
2FD3000
trusted library allocation
page read and write
1F79E079000
heap
page read and write
2835000
trusted library allocation
page read and write
34BA000
trusted library allocation
page read and write
24369C80000
heap
page read and write
2E5B000
trusted library allocation
page read and write
1AFFE000
stack
page read and write
2DCC000
trusted library allocation
page read and write
1AF40000
trusted library allocation
page read and write
3661BFF000
stack
page read and write
1B2DB000
heap
page read and write
287A000
trusted library allocation
page read and write
83B000
heap
page read and write
2928000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
7F8000
heap
page read and write
7FFF60E53000
trusted library allocation
page read and write
1E160000
heap
page read and write
35EE000
trusted library allocation
page read and write
7FFF60F60000
trusted library allocation
page execute and read and write
A24000
heap
page read and write
E3678FB000
stack
page read and write
F93000
heap
page read and write
1B8D0000
heap
page read and write
1B96E000
stack
page read and write
2854000
trusted library allocation
page read and write
31E8000
trusted library allocation
page read and write
3507000
trusted library allocation
page read and write
255F000
trusted library allocation
page read and write
34E4000
trusted library allocation
page read and write
28BA000
trusted library allocation
page read and write
7FFF60E54000
trusted library allocation
page read and write
2260000
trusted library allocation
page read and write
1C94F000
stack
page read and write
2F4D000
trusted library allocation
page read and write
1BD46000
heap
page read and write
2674000
trusted library allocation
page read and write
2957000
trusted library allocation
page read and write
F4054FF000
unkown
page read and write
7FFF60E6D000
trusted library allocation
page execute and read and write
7FFF60E03000
trusted library allocation
page execute and read and write
2745000
trusted library allocation
page read and write
2025B867000
heap
page read and write
2FA0000
trusted library allocation
page read and write
27F2000
trusted library allocation
page read and write
260C000
trusted library allocation
page read and write
1D44CF78000
heap
page read and write
3136000
trusted library allocation
page read and write
262135F5000
heap
page read and write
F60000
trusted library allocation
page read and write
2550000
trusted library allocation
page read and write
1B3E6000
heap
page read and write
2025B820000
heap
page read and write
1A360CC5000
heap
page read and write
3595000
trusted library allocation
page read and write
1BFD0000
heap
page read and write
1C025000
heap
page read and write
2F8B000
trusted library allocation
page read and write
2621363B000
heap
page read and write
275E000
trusted library allocation
page read and write
273F000
trusted library allocation
page read and write
26B8000
trusted library allocation
page read and write
7FFF60E6C000
trusted library allocation
page execute and read and write
7FFF60FE5000
trusted library allocation
page read and write
28C2000
trusted library allocation
page read and write
2025B840000
heap
page read and write
3021000
trusted library allocation
page read and write
13F2000
heap
page read and write
2E37000
trusted library allocation
page read and write
29A8000
trusted library allocation
page read and write
26E0000
heap
page execute and read and write
2FCB000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
606000
heap
page read and write
2DE3000
trusted library allocation
page read and write
12F24000
trusted library allocation
page read and write
262137A0000
heap
page read and write
2767000
trusted library allocation
page read and write
26E7000
trusted library allocation
page read and write
A20000
heap
page read and write
7FFF61000000
trusted library allocation
page read and write
2E94000
trusted library allocation
page read and write
2843000
trusted library allocation
page read and write
25B1000
trusted library allocation
page read and write
1B9BB000
heap
page read and write
259F000
trusted library allocation
page read and write
137D2C30000
heap
page read and write
34BC000
trusted library allocation
page read and write
36E64FF000
stack
page read and write
7FF49AA00000
trusted library allocation
page execute and read and write
287E000
trusted library allocation
page read and write
2F9E000
trusted library allocation
page read and write
2182EA09000
heap
page read and write
1CB50000
unkown
page readonly
2F47000
trusted library allocation
page read and write
17B4CB20000
heap
page read and write
1B2BE000
stack
page read and write
7FFF60E2D000
trusted library allocation
page execute and read and write
7FFF610B0000
trusted library allocation
page execute and read and write
335C000
trusted library allocation
page read and write
1B99A000
heap
page read and write
12FB1000
trusted library allocation
page read and write
290F000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
31AF000
trusted library allocation
page read and write
1B7CB000
stack
page read and write
2632000
trusted library allocation
page read and write
28F3000
trusted library allocation
page read and write
3001000
trusted library allocation
page read and write
37C9000
trusted library allocation
page read and write
7FFF60FE7000
trusted library allocation
page read and write
9FC000
heap
page read and write
3495000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
18849DBB000
heap
page read and write
2A16000
trusted library allocation
page read and write
7FFF60E13000
trusted library allocation
page read and write
2495EED9000
heap
page read and write
2922000
trusted library allocation
page read and write
33FC000
trusted library allocation
page read and write
21ECDFF000
stack
page read and write
254C000
trusted library allocation
page read and write
1C096000
heap
page read and write
3762000
trusted library allocation
page read and write
647000
heap
page read and write
27CC000
trusted library allocation
page read and write
1D661000
heap
page read and write
1A360CC9000
heap
page read and write
7FFF60E3D000
trusted library allocation
page execute and read and write
31C1000
trusted library allocation
page read and write
33E1000
trusted library allocation
page read and write
2769000
trusted library allocation
page read and write
28CB000
trusted library allocation
page read and write
1420000
heap
page read and write
37FB000
trusted library allocation
page read and write
12DCB000
trusted library allocation
page read and write
3283000
trusted library allocation
page read and write
34EF000
trusted library allocation
page read and write
1E3ED000
heap
page read and write
7FFF60F16000
trusted library allocation
page execute and read and write
18849CA0000
heap
page read and write
3181000
trusted library allocation
page read and write
44BD4FF000
unkown
page read and write
3189000
trusted library allocation
page read and write
1F4D2680000
heap
page read and write
44BD18C000
stack
page read and write
3287000
trusted library allocation
page read and write
31BF000
trusted library allocation
page read and write
29BF000
trusted library allocation
page read and write
7FFF610C0000
trusted library allocation
page read and write
6D6000
heap
page read and write
28BC000
trusted library allocation
page read and write
2A12000
trusted library allocation
page read and write
2E8A000
trusted library allocation
page read and write
2E5F000
trusted library allocation
page read and write
29DF000
trusted library allocation
page read and write
32C5000
trusted library allocation
page read and write
31EC000
trusted library allocation
page read and write
2280000
trusted library allocation
page read and write
2B7E000
stack
page read and write
2F1A000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
288D000
trusted library allocation
page read and write
2F25000
trusted library allocation
page read and write
7FFF60FC2000
trusted library allocation
page read and write
1CB495E0000
heap
page read and write
1C8809E4000
heap
page read and write
293D1AB0000
heap
page read and write
1BFD2000
heap
page read and write
38DA000
trusted library allocation
page read and write
12A5000
heap
page read and write
325B000
trusted library allocation
page read and write
54491FF000
unkown
page read and write
2DD0000
trusted library allocation
page read and write
330B000
trusted library allocation
page read and write
2DAE000
stack
page read and write
1E182000
heap
page read and write
24369E69000
heap
page read and write
2814000
trusted library allocation
page read and write
26B6000
trusted library allocation
page read and write
F91000
heap
page read and write
1C44C000
stack
page read and write
25BF000
trusted library allocation
page read and write
1BD80000
heap
page execute and read and write
3531000
trusted library allocation
page read and write
30EE000
trusted library allocation
page read and write
12CE000
stack
page read and write
C84000
heap
page read and write
276F000
trusted library allocation
page read and write
1F79DF00000
heap
page read and write
1BDE8000
heap
page read and write
A31000
heap
page read and write
1BB40000
heap
page execute and read and write
26F9000
trusted library allocation
page read and write
21FE9650000
heap
page read and write
17B4CDB0000
heap
page read and write
8D0000
heap
page read and write
1F79E079000
heap
page read and write
36E62FC000
stack
page read and write
306A000
trusted library allocation
page read and write
274B000
trusted library allocation
page read and write
7FFF60F16000
trusted library allocation
page execute and read and write
293D1690000
heap
page read and write
2E8C000
trusted library allocation
page read and write
7FFF60FB9000
trusted library allocation
page read and write
322E000
trusted library allocation
page read and write
293D1620000
heap
page read and write
5E7000
heap
page read and write
2FF4000
trusted library allocation
page read and write
1C5D0000
heap
page read and write
2670000
trusted library allocation
page read and write
29CE000
trusted library allocation
page read and write
7FFF60FD0000
trusted library allocation
page read and write
2777000
trusted library allocation
page read and write
1424000
heap
page read and write
F7B000
heap
page read and write
38AB000
trusted library allocation
page read and write
2FF1000
trusted library allocation
page read and write
12DB8000
trusted library allocation
page read and write
1884A070000
heap
page read and write
25A9000
trusted library allocation
page read and write
137D2CA5000
heap
page read and write
3838000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
BD05FFF000
unkown
page read and write
1C88A000
stack
page read and write
2DF7000
trusted library allocation
page read and write
335F000
stack
page read and write
293D18D0000
heap
page read and write
1C084000
heap
page read and write
2594000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
27CA000
trusted library allocation
page read and write
1AD6D000
stack
page read and write
1C5CF000
stack
page read and write
26213654000
heap
page read and write
2495EED0000
heap
page read and write
1BD65000
heap
page read and write
12EE000
stack
page read and write
C79000
heap
page read and write
C5B000
heap
page read and write
258E000
trusted library allocation
page read and write
35F0000
trusted library allocation
page read and write
A01F8FE000
stack
page read and write
3134000
trusted library allocation
page read and write
7FFF60FD0000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
26213730000
heap
page read and write
3524000
trusted library allocation
page read and write
290B000
trusted library allocation
page read and write
12DB1000
trusted library allocation
page read and write
17B4CE20000
heap
page read and write
1BFB4000
heap
page read and write
7FFF60FD9000
trusted library allocation
page read and write
307B000
trusted library allocation
page read and write
1C1F0000
heap
page execute and read and write
1E1D1000
heap
page read and write
26C9000
trusted library allocation
page read and write
1DF498D0000
heap
page read and write
12CE000
heap
page read and write
348F000
trusted library allocation
page read and write
25F2000
trusted library allocation
page read and write
2EB6000
trusted library allocation
page read and write
7FFF60FF0000
trusted library allocation
page read and write
7FFF60FE9000
trusted library allocation
page read and write
12FC000
heap
page read and write
292B000
trusted library allocation
page read and write
1BFE7000
heap
page read and write
28B7000
trusted library allocation
page read and write
12B3000
heap
page read and write
303B000
trusted library allocation
page read and write
There are 2144 hidden memdumps, click here to show them.