IOC Report
62b1bf60394248d2c743ec6df0935d58e5009c9e04aab.exe

loading gif

Files

File Path
Type
Category
Malicious
62b1bf60394248d2c743ec6df0935d58e5009c9e04aab.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Java\jre-1.8\upfc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\upfc.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\7-Zip\Lang\upfc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\Start Menu\StartMenuExperienceHost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\Start Menu\StartMenuExperienceHost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Recovery\llflCdrMcgGB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\llflCdrMcgGB.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\62b1bf60394248d2c743ec6df0935d58e5009c9e04aab.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\WAeZ9wWpbS.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\pb5w2chy\pb5w2chy.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
malicious
C:\Users\user\Desktop\AHphtSeX.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CUcqaUVf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\FUSHtkHk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PDlWdMMS.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YPnuykix.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jjSkKJFG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rUKsZmvt.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\wlyrJHCD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\llflCdrMcgGB.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\System32\SecurityHealthSystray.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\ea1d8f6d871115
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\Microsoft\Edge\Application\CSC76655AD3B5B14A58A99CB3ECAE1D1A90.TMP
MSVC .res
dropped
C:\Program Files\7-Zip\Lang\ea1d8f6d871115
ASCII text, with very long lines (910), with no line terminators
dropped
C:\Program Files\7-Zip\Lang\upfc.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\55b276f4edf653
ASCII text, with no line terminators
dropped
C:\Recovery\b83e72d5c7bd2d
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\StartMenuExperienceHost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\llflCdrMcgGB.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\upfc.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\9xoH1rvGc8
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\EERJVmti7C
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\FPVtplfwjV
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\G1fqHlPR84
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\GuaAEdheNO
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Ld3wQv6XcO
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Lf13SaWgTu
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\Lz8GlOhUbo
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\RESD41E.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6cc, 10 symbols, created Wed Jul 3 15:44:08 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RESD631.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6e4, 10 symbols, created Wed Jul 3 15:44:09 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RQxNQiaB3w
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\S4JgYSVqKb
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Ul0yixeSy1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\XRbfGtKxff
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\k1wttop3\k1wttop3.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\k1wttop3\k1wttop3.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\k1wttop3\k1wttop3.out
Unicode text, UTF-8 (with BOM) text, with very long lines (327), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\pb5w2chy\pb5w2chy.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\pb5w2chy\pb5w2chy.out
Unicode text, UTF-8 (with BOM) text, with very long lines (342), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\qZrUVSx8Oj
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tfVhKC50lX.bat
DOS batch file, ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\vbwUCvifDl
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\yc70I5nJH6
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\Desktop\c397ed2d1437c4
ASCII text, with very long lines (652), with no line terminators
dropped
C:\Windows\BitLockerDiscoveryVolumeContents\b83e72d5c7bd2d
ASCII text, with very long lines (415), with no line terminators
dropped
C:\Windows\BitLockerDiscoveryVolumeContents\llflCdrMcgGB.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\CSC9D0BE8EB87641DFA2B4851BB05AFB2.TMP
MSVC .res
dropped
\Device\Null
ASCII text
dropped
There are 49 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\62b1bf60394248d2c743ec6df0935d58e5009c9e04aab.exe
"C:\Users\user\Desktop\62b1bf60394248d2c743ec6df0935d58e5009c9e04aab.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\pb5w2chy\pb5w2chy.cmdline"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\k1wttop3\k1wttop3.cmdline"
malicious
C:\Program Files (x86)\Java\jre-1.8\upfc.exe
"C:\Program Files (x86)\java\jre-1.8\upfc.exe"
malicious
C:\Program Files (x86)\Java\jre-1.8\upfc.exe
"C:\Program Files (x86)\java\jre-1.8\upfc.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "llflCdrMcgGBl" /sc MINUTE /mo 8 /tr "'C:\Recovery\llflCdrMcgGB.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "llflCdrMcgGB" /sc ONLOGON /tr "'C:\Recovery\llflCdrMcgGB.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "llflCdrMcgGBl" /sc MINUTE /mo 14 /tr "'C:\Recovery\llflCdrMcgGB.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Application Data\Start Menu\StartMenuExperienceHost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\All Users\Application Data\Start Menu\StartMenuExperienceHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Application Data\Start Menu\StartMenuExperienceHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "llflCdrMcgGBl" /sc MINUTE /mo 6 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\llflCdrMcgGB.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "llflCdrMcgGB" /sc ONLOGON /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\llflCdrMcgGB.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "llflCdrMcgGBl" /sc MINUTE /mo 8 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\llflCdrMcgGB.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Program Files\7-Zip\Lang\upfc.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\upfc.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 5 /tr "'C:\Program Files\7-Zip\Lang\upfc.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "62b1bf60394248d2c743ec6df0935d58e5009c9e04aab6" /sc MINUTE /mo 9 /tr "'C:\Users\user\Desktop\62b1bf60394248d2c743ec6df0935d58e5009c9e04aab.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "62b1bf60394248d2c743ec6df0935d58e5009c9e04aab" /sc ONLOGON /tr "'C:\Users\user\Desktop\62b1bf60394248d2c743ec6df0935d58e5009c9e04aab.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "62b1bf60394248d2c743ec6df0935d58e5009c9e04aab6" /sc MINUTE /mo 6 /tr "'C:\Users\user\Desktop\62b1bf60394248d2c743ec6df0935d58e5009c9e04aab.exe'" /rl HIGHEST /f
malicious
C:\Users\user\Desktop\62b1bf60394248d2c743ec6df0935d58e5009c9e04aab.exe
C:\Users\user\Desktop\62b1bf60394248d2c743ec6df0935d58e5009c9e04aab.exe
malicious
C:\Users\user\Desktop\62b1bf60394248d2c743ec6df0935d58e5009c9e04aab.exe
C:\Users\user\Desktop\62b1bf60394248d2c743ec6df0935d58e5009c9e04aab.exe
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\llflCdrMcgGB.exe
C:\Windows\BitLockerDiscoveryVolumeContents\llflCdrMcgGB.exe
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\llflCdrMcgGB.exe
C:\Windows\BitLockerDiscoveryVolumeContents\llflCdrMcgGB.exe
malicious
C:\ProgramData\Microsoft\Windows\Start Menu\StartMenuExperienceHost.exe
"C:\Users\All Users\Application Data\Start Menu\StartMenuExperienceHost.exe"
malicious
C:\ProgramData\Microsoft\Windows\Start Menu\StartMenuExperienceHost.exe
"C:\Users\All Users\Application Data\Start Menu\StartMenuExperienceHost.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESD41E.tmp" "c:\Program Files (x86)\Microsoft\Edge\Application\CSC76655AD3B5B14A58A99CB3ECAE1D1A90.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESD631.tmp" "c:\Windows\System32\CSC9D0BE8EB87641DFA2B4851BB05AFB2.TMP"
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\WAeZ9wWpbS.bat"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://podval.top/LineToPythonJsLowupdateLongpollWindowsFlower.php
188.114.97.3
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://podval.top/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://podval.top
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
podval.top
188.114.97.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
podval.top
European Union
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
upfc
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
upfc
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
llflCdrMcgGB
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
llflCdrMcgGB
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
StartMenuExperienceHost
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
StartMenuExperienceHost
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
62b1bf60394248d2c743ec6df0935d58e5009c9e04aab
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
62b1bf60394248d2c743ec6df0935d58e5009c9e04aab
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
llflCdrMcgGB
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
llflCdrMcgGB
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
upfc
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\bd8459fcbc3eaeea1822a05a94f783dcf5cdecdd
9b7a2428801754b77e591f809423bf8aa82418af
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\bd8459fcbc3eaeea1822a05a94f783dcf5cdecdd
9b7a2428801754b77e591f809423bf8aa82418af
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12A69000
trusted library allocation
page read and write
malicious
3076000
trusted library allocation
page read and write
malicious
34FF000
trusted library allocation
page read and write
malicious
3B2000
unkown
page readonly
malicious
378E000
trusted library allocation
page read and write
malicious
1881359A000
heap
page read and write
1AF70000
trusted library allocation
page read and write
1B993000
heap
page execute and read and write
2CBC000
trusted library allocation
page read and write
2772002D000
heap
page read and write
1329F000
trusted library allocation
page read and write
1B1E0000
heap
page execute and read and write
136C3000
trusted library allocation
page read and write
296F000
trusted library allocation
page read and write
7FF7C1736000
trusted library allocation
page read and write
1931B340000
heap
page read and write
7FF7C1897000
trusted library allocation
page read and write
311D000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
28113040000
direct allocation
page read and write
2AC2000
trusted library allocation
page read and write
1885000
heap
page read and write
2771FEF0000
heap
page read and write
13E8000
heap
page read and write
13317000
trusted library allocation
page read and write
7FF7C18C0000
trusted library allocation
page execute and read and write
7FF7C186D000
trusted library allocation
page read and write
7FF7C17A0000
trusted library allocation
page execute and read and write
131AE000
trusted library allocation
page read and write
2622F8D0000
heap
page read and write
2622F7F0000
heap
page read and write
7FF7C1C40000
trusted library allocation
page read and write
103C000
heap
page read and write
1720000
heap
page read and write
7FF7C1700000
trusted library allocation
page read and write
27720083000
heap
page read and write
13580000
trusted library allocation
page read and write
1D010000
heap
page read and write
2772008A000
heap
page read and write
193F56B0000
heap
page read and write
7FF7C1880000
trusted library allocation
page read and write
7FF7C1850000
trusted library allocation
page read and write
2CE4000
trusted library allocation
page read and write
168A000
heap
page read and write
7FF7C184C000
trusted library allocation
page read and write
7FF7C184C000
trusted library allocation
page read and write
27720055000
heap
page read and write
1AD8D000
stack
page read and write
2947000
trusted library allocation
page read and write
131A8000
trusted library allocation
page read and write
7FF7C1850000
trusted library allocation
page execute and read and write
3220000
heap
page execute and read and write
34C7000
trusted library allocation
page read and write
7FF7C1674000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
36EB000
trusted library allocation
page read and write
28113100000
direct allocation
page read and write
1B154000
unkown
page readonly
3745000
trusted library allocation
page read and write
7FF7C16A3000
trusted library allocation
page read and write
1800000
trusted library allocation
page read and write
373F000
trusted library allocation
page read and write
13377000
trusted library allocation
page read and write
2811073E000
heap
page read and write
7FF7C1693000
trusted library allocation
page read and write
7FF7C1825000
trusted library allocation
page read and write
7FF7C1720000
trusted library allocation
page read and write
27720038000
heap
page read and write
7FF7C1880000
trusted library allocation
page read and write
8DF000
heap
page read and write
28110839000
direct allocation
page read and write
257F000
stack
page read and write
7FF7C1833000
trusted library allocation
page read and write
7FF7C18B2000
trusted library allocation
page read and write
3448000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
344E000
trusted library allocation
page read and write
1B1F0000
heap
page read and write
7FF7C188C000
trusted library allocation
page read and write
7FF7C1810000
trusted library allocation
page read and write
2622F890000
heap
page read and write
7FF7C16AB000
trusted library allocation
page execute and read and write
1B853000
heap
page read and write
2ADC000
trusted library allocation
page read and write
7FF7C169D000
trusted library allocation
page execute and read and write
278E000
stack
page read and write
7FF7C1830000
trusted library allocation
page read and write
325F000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
28A6000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
144A000
heap
page read and write
135E1000
trusted library allocation
page read and write
1BEFE000
stack
page read and write
7FF7C1864000
trusted library allocation
page read and write
1300000
heap
page read and write
7FF7C17A0000
trusted library allocation
page execute and read and write
2772002C000
heap
page read and write
7FF7C183C000
trusted library allocation
page read and write
2973000
trusted library allocation
page read and write
30FD000
trusted library allocation
page read and write
32BA000
heap
page read and write
1B140000
heap
page read and write
1BFDE000
stack
page read and write
7FF7C1684000
trusted library allocation
page read and write
1B2D5000
heap
page read and write
2F3E000
stack
page read and write
1B4CE000
stack
page read and write
281106FC000
heap
page read and write
1B8A8000
heap
page read and write
1C22F000
stack
page read and write
1935000
heap
page read and write
7FF7C1860000
trusted library allocation
page execute and read and write
AC0000
heap
page read and write
4E8E0FF000
stack
page read and write
7FF7C169D000
trusted library allocation
page execute and read and write
E80000
trusted library allocation
page read and write
29A6000
trusted library allocation
page read and write
7FF7C1833000
trusted library allocation
page read and write
2811309F000
direct allocation
page read and write
277201E0000
heap
page read and write
7FF7C18C0000
trusted library allocation
page read and write
2971000
trusted library allocation
page read and write
28110853000
direct allocation
page read and write
7FF7C1817000
trusted library allocation
page read and write
260F000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
2626000
trusted library allocation
page read and write
7FF7C1840000
trusted library allocation
page execute and read and write
34AC000
trusted library allocation
page read and write
27720019000
heap
page read and write
13371000
trusted library allocation
page read and write
1C26E000
stack
page read and write
27720063000
heap
page read and write
281130E0000
direct allocation
page read and write
7FF7C1674000
trusted library allocation
page read and write
1618000
heap
page read and write
13163000
trusted library allocation
page read and write
2622F89A000
heap
page read and write
2772002C000
heap
page read and write
7FF7C18B0000
trusted library allocation
page read and write
34E1000
trusted library allocation
page read and write
7FF7C1874000
trusted library allocation
page read and write
DE0000
heap
page read and write
7FF7C18AD000
trusted library allocation
page read and write
281106D9000
heap
page read and write
7FF7C16A4000
trusted library allocation
page read and write
1B2C9000
heap
page read and write
26E0000
heap
page execute and read and write
7FF7C1673000
trusted library allocation
page execute and read and write
28110746000
heap
page read and write
2950000
trusted library allocation
page read and write
135DE000
trusted library allocation
page read and write
7FF7C1837000
trusted library allocation
page read and write
B50000
heap
page read and write
2967000
trusted library allocation
page read and write
3755000
trusted library allocation
page read and write
7FF7C18A4000
trusted library allocation
page read and write
28110850000
direct allocation
page read and write
1BA30000
heap
page execute and read and write
7FF7C1874000
trusted library allocation
page read and write
26A5000
trusted library allocation
page read and write
7FF7C1736000
trusted library allocation
page read and write
2622F8D4000
heap
page read and write
7FF7C1885000
trusted library allocation
page read and write
1190000
heap
page read and write
7FF7C1892000
trusted library allocation
page read and write
348E000
trusted library allocation
page read and write
3B0000
unkown
page readonly
5CBC6FF000
stack
page read and write
2FE0000
heap
page execute and read and write
2801000
trusted library allocation
page read and write
7FF7C1B55000
trusted library allocation
page read and write
18B0000
heap
page read and write
7FF7C1660000
trusted library allocation
page read and write
2832000
unkown
page readonly
30F3000
trusted library allocation
page read and write
7FF7C18E3000
trusted library allocation
page read and write
28110750000
heap
page read and write
1B1CE000
stack
page read and write
26DA000
trusted library allocation
page read and write
9899FFF000
stack
page read and write
1BE60000
heap
page read and write
324E000
trusted library allocation
page read and write
A65000
heap
page read and write
1B830000
heap
page read and write
2871000
trusted library allocation
page read and write
7FF7C1860000
trusted library allocation
page read and write
7FF7C1860000
trusted library allocation
page read and write
A50000
heap
page read and write
750000
heap
page read and write
1B8D5000
heap
page read and write
3093000
trusted library allocation
page read and write
7FF7C1756000
trusted library allocation
page execute and read and write
346A000
trusted library allocation
page read and write
7FF7C1672000
trusted library allocation
page read and write
34CA000
trusted library allocation
page read and write
7FF7C1790000
trusted library allocation
page execute and read and write
7FF7C1683000
trusted library allocation
page read and write
2D74F0E000
stack
page read and write
1BF6B000
stack
page read and write
2622FA00000
heap
page read and write
29C0000
trusted library allocation
page read and write
28110857000
direct allocation
page read and write
7FF7C18AD000
trusted library allocation
page read and write
7FF7C1674000
trusted library allocation
page read and write
7FF7C166D000
trusted library allocation
page execute and read and write
1B85F000
stack
page read and write
B00000
trusted library allocation
page read and write
2811072A000
heap
page read and write
7FF7C1750000
trusted library allocation
page execute and read and write
2811070D000
heap
page read and write
2C98000
trusted library allocation
page read and write
1446000
heap
page read and write
1BA2D000
stack
page read and write
ED5000
heap
page read and write
2962000
trusted library allocation
page read and write
7FF7C1860000
trusted library allocation
page read and write
1150000
heap
page read and write
7FF7C17C1000
trusted library allocation
page execute and read and write
1640000
heap
page read and write
7FF7C1818000
trusted library allocation
page read and write
1B82A000
stack
page read and write
1CA77000
stack
page read and write
281106FC000
heap
page read and write
2622FA04000
heap
page read and write
193F56C6000
heap
page read and write
2772004F000
heap
page read and write
1072000
heap
page read and write
29BB000
trusted library allocation
page read and write
187F000
stack
page read and write
26ED000
trusted library allocation
page read and write
31D0000
heap
page read and write
7FF7C1870000
trusted library allocation
page read and write
7FF7C1870000
trusted library allocation
page execute and read and write
7FF7C1830000
trusted library allocation
page execute and read and write
7FF7C16CC000
trusted library allocation
page execute and read and write
166C000
heap
page read and write
1931B1D0000
heap
page read and write
1C550000
heap
page read and write
128E0000
trusted library allocation
page read and write
5CBC77F000
stack
page read and write
1370000
heap
page execute and read and write
295A000
trusted library allocation
page read and write
27720189000
direct allocation
page read and write
7FF7C1746000
trusted library allocation
page execute and read and write
2D74F8F000
stack
page read and write
7FF7C18B4000
trusted library allocation
page read and write
3662000
trusted library allocation
page read and write
12811000
trusted library allocation
page read and write
2772009C000
heap
page read and write
ADF000
heap
page read and write
1C02D000
stack
page read and write
297B000
trusted library allocation
page read and write
7FF7C1B52000
trusted library allocation
page read and write
7FF7C168C000
trusted library allocation
page read and write
16A2000
heap
page read and write
2811074E000
heap
page read and write
7FF7C1688000
trusted library allocation
page read and write
345B000
trusted library allocation
page read and write
13381000
trusted library allocation
page read and write
4E8DFFF000
stack
page read and write
1F562000
trusted library allocation
page read and write
7FF7C1830000
trusted library allocation
page read and write
27FA000
heap
page read and write
1B67C000
stack
page read and write
7FF7C1880000
trusted library allocation
page read and write
7FF7C1B80000
trusted library allocation
page execute and read and write
34B9000
trusted library allocation
page read and write
109B000
heap
page read and write
247A000
heap
page read and write
2772007F000
heap
page read and write
8C5000
heap
page read and write
13311000
trusted library allocation
page read and write
8DE000
stack
page read and write
193F55C0000
heap
page read and write
2811070D000
heap
page read and write
2812000
unkown
page readonly
1BD2E000
stack
page read and write
1B2B9000
heap
page read and write
7FF7C1720000
trusted library allocation
page read and write
7FF7C1694000
trusted library allocation
page read and write
2811086B000
direct allocation
page read and write
7FF7C1690000
trusted library allocation
page read and write
3237000
trusted library allocation
page read and write
28113103000
direct allocation
page read and write
2622F990000
heap
page read and write
281108D0000
heap
page read and write
7FF7C1C70000
trusted library allocation
page read and write
1BB1D000
heap
page read and write
1B22D000
heap
page read and write
14E2000
stack
page read and write
A66A1F5000
stack
page read and write
26CB000
trusted library allocation
page read and write
870000
heap
page read and write
26A0000
heap
page read and write
7FF7C1840000
trusted library allocation
page read and write
1820000
trusted library allocation
page read and write
7FF7C1663000
trusted library allocation
page read and write
15B0000
heap
page read and write
310F000
trusted library allocation
page read and write
7FF7C1885000
trusted library allocation
page read and write
27720098000
heap
page read and write
36E7000
trusted library allocation
page read and write
19BF000
stack
page read and write
3748000
trusted library allocation
page read and write
7FF7C1740000
trusted library allocation
page read and write
14A0000
heap
page read and write
1900000
heap
page read and write
281106D0000
heap
page read and write
7FF7C16BB000
trusted library allocation
page execute and read and write
12587000
trusted library allocation
page read and write
1C1FB000
stack
page read and write
27720067000
heap
page read and write
7FF7C1B4F000
trusted library allocation
page read and write
7FF7C172C000
trusted library allocation
page execute and read and write
3483000
trusted library allocation
page read and write
25FF000
trusted library allocation
page read and write
27721A70000
direct allocation
page read and write
28110752000
heap
page read and write
1BD30000
heap
page read and write
7FF7C1693000
trusted library allocation
page read and write
30A6000
trusted library allocation
page read and write
7FF7C1857000
trusted library allocation
page read and write
7FF7C1828000
trusted library allocation
page read and write
134A1000
trusted library allocation
page read and write
7FF7C170C000
trusted library allocation
page execute and read and write
13D0000
heap
page read and write
1C3F5000
stack
page read and write
1C7F8000
heap
page read and write
1B8EC000
heap
page read and write
368E000
trusted library allocation
page read and write
7FF7C1870000
trusted library allocation
page read and write
281106F9000
heap
page read and write
3240000
trusted library allocation
page read and write
34E3000
trusted library allocation
page read and write
7FF7C168D000
trusted library allocation
page execute and read and write
3105000
trusted library allocation
page read and write
7FF7C16A8000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
7FF7C1884000
trusted library allocation
page read and write
12967000
trusted library allocation
page read and write
1BC2E000
stack
page read and write
7FF7C18A2000
trusted library allocation
page read and write
7FF7C1670000
trusted library allocation
page read and write
BE6000
heap
page read and write
7FF7C1694000
trusted library allocation
page read and write
1C7E3000
heap
page read and write
7FF7C1680000
trusted library allocation
page read and write
7FF7C187C000
trusted library allocation
page read and write
1AF50000
heap
page read and write
296B000
trusted library allocation
page read and write
325D000
trusted library allocation
page read and write
2ADE000
trusted library allocation
page read and write
34B0000
trusted library allocation
page read and write
18813715000
heap
page read and write
7FF7C1840000
trusted library allocation
page read and write
1140000
heap
page read and write
7FF7C184C000
trusted library allocation
page read and write
A40000
heap
page read and write
1CDEA000
stack
page read and write
12807000
trusted library allocation
page read and write
30E7000
trusted library allocation
page read and write
770000
heap
page read and write
998000
heap
page read and write
3261000
trusted library allocation
page read and write
7FF7C1992000
trusted library allocation
page read and write
11E0000
heap
page read and write
26DE000
trusted library allocation
page read and write
1931B1D9000
heap
page read and write
A60000
heap
page read and write
27720075000
heap
page read and write
39587FE000
stack
page read and write
7FF7C1B43000
trusted library allocation
page read and write
2949000
trusted library allocation
page read and write
7FF7C181C000
trusted library allocation
page read and write
27720087000
heap
page read and write
2811071F000
heap
page read and write
7FF7C1C10000
trusted library allocation
page read and write
7FF7C1870000
trusted library allocation
page read and write
7FF7C185C000
trusted library allocation
page read and write
3600000
trusted library allocation
page read and write
27721AF0000
direct allocation
page read and write
7FF7C169D000
trusted library allocation
page execute and read and write
7FF7C18E0000
trusted library allocation
page read and write
12591000
trusted library allocation
page read and write
D3E000
stack
page read and write
7FF7C1710000
trusted library allocation
page read and write
326E000
trusted library allocation
page read and write
7FF7C17C1000
trusted library allocation
page execute and read and write
1BCA0000
heap
page read and write
1751000
heap
page read and write
7FF7C16AC000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
7FF7C1790000
trusted library allocation
page execute and read and write
7FF7C1880000
trusted library allocation
page read and write
1B862000
heap
page read and write
130DF000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
16A0000
heap
page read and write
2622F790000
heap
page read and write
34EC000
trusted library allocation
page read and write
1B9A0000
trusted library section
page readonly
1C570000
heap
page read and write
7FF7C1678000
trusted library allocation
page read and write
7FF7C1B08000
trusted library allocation
page read and write
16CA000
heap
page read and write
27721A5B000
direct allocation
page read and write
1905000
heap
page read and write
A66A5FE000
stack
page read and write
322A000
trusted library allocation
page read and write
7FF7C1673000
trusted library allocation
page execute and read and write
4E8DEFC000
stack
page read and write
28110756000
heap
page read and write
2811070A000
heap
page read and write
2A9A000
trusted library allocation
page read and write
27F0000
heap
page execute and read and write
360B000
trusted library allocation
page read and write
346C000
trusted library allocation
page read and write
7FF7C1819000
trusted library allocation
page read and write
18813598000
heap
page read and write
7FF7C18C0000
trusted library allocation
page read and write
1B853000
heap
page read and write
7FF7C1887000
trusted library allocation
page read and write
2772004A000
heap
page read and write
18D0000
heap
page read and write
7FF7C17B0000
trusted library allocation
page execute and read and write
7FF7C174C000
trusted library allocation
page execute and read and write
F50000
heap
page read and write
7FF7C1740000
trusted library allocation
page execute and read and write
1D035580000
heap
page read and write
1340000
trusted library allocation
page read and write
10D5000
heap
page read and write
7FF7C1668000
trusted library allocation
page read and write
1BE8F000
heap
page read and write
130DB000
trusted library allocation
page read and write
7FF7C1843000
trusted library allocation
page read and write
7FF7C1653000
trusted library allocation
page execute and read and write
7FF7C169D000
trusted library allocation
page execute and read and write
7FF7C186D000
trusted library allocation
page read and write
2622F8D0000
heap
page read and write
28113120000
direct allocation
page read and write
12906000
trusted library allocation
page read and write
2D74E8B000
stack
page read and write
1BD4A000
heap
page read and write
266F000
stack
page read and write
7FF7C18D0000
trusted library allocation
page read and write
E5E000
stack
page read and write
26FE000
trusted library allocation
page read and write
2811308B000
direct allocation
page read and write
7FF7C1860000
trusted library allocation
page read and write
1550000
heap
page read and write
1B84F000
heap
page read and write
7FF7C1870000
trusted library allocation
page read and write
133F0000
trusted library allocation
page read and write
281130A0000
direct allocation
page read and write
7FF7C183C000
trusted library allocation
page read and write
7FF7C1B70000
trusted library allocation
page read and write
7FF7C1838000
trusted library allocation
page read and write
2BDB000
trusted library allocation
page read and write
7FF7C1C90000
trusted library allocation
page read and write
2AAB000
trusted library allocation
page read and write
3E5000
unkown
page readonly
1B320000
heap
page read and write
7FF7C1892000
trusted library allocation
page read and write
1DC85000
heap
page read and write
11E0000
trusted library allocation
page read and write
7FF7C169B000
trusted library allocation
page execute and read and write
1D0355A0000
heap
page read and write
344A000
trusted library allocation
page read and write
29B9000
trusted library allocation
page read and write
281130C0000
direct allocation
page read and write
1B5FF000
stack
page read and write
1B867000
heap
page read and write
345D000
trusted library allocation
page read and write
7FF7C1860000
trusted library allocation
page read and write
7FF7C168D000
trusted library allocation
page execute and read and write
28110810000
direct allocation
page read and write
7FF7C1846000
trusted library allocation
page read and write
105B000
heap
page read and write
1B52E000
stack
page read and write
7FF7C18A0000
trusted library allocation
page execute and read and write
1400000
heap
page execute and read and write
27720083000
heap
page read and write
2D35000
trusted library allocation
page read and write
27720098000
heap
page read and write
7FF7C1837000
trusted library allocation
page read and write
27721A6F000
direct allocation
page read and write
29DC000
trusted library allocation
page read and write
34BB000
trusted library allocation
page read and write
9C0000
trusted library allocation
page read and write
2BAB000
trusted library allocation
page read and write
7FF7C1766000
trusted library allocation
page execute and read and write
1469000
heap
page read and write
2811071A000
heap
page read and write
D40000
heap
page read and write
30EE000
stack
page read and write
286A000
heap
page read and write
27720076000
heap
page read and write
AC8000
heap
page read and write
7FF7C1828000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
34CC000
trusted library allocation
page read and write
277201A3000
direct allocation
page read and write
28110734000
heap
page read and write
12FE000
stack
page read and write
7FF7C18B0000
trusted library allocation
page execute and read and write
288F000
trusted library allocation
page read and write
1300000
heap
page read and write
7FF7C168D000
trusted library allocation
page execute and read and write
7FF7C1730000
trusted library allocation
page execute and read and write
346E000
trusted library allocation
page read and write
7FF7C18D0000
trusted library allocation
page read and write
3546000
trusted library allocation
page read and write
7FF7C18AD000
trusted library allocation
page read and write
34EE000
trusted library allocation
page read and write
3530000
trusted library allocation
page read and write
10D0000
heap
page read and write
7FF7C18E6000
trusted library allocation
page read and write
1323B000
trusted library allocation
page read and write
2AAF000
trusted library allocation
page read and write
2A9F000
trusted library allocation
page read and write
1BEAE000
stack
page read and write
1036000
heap
page read and write
28110750000
heap
page read and write
7FF7C1894000
trusted library allocation
page read and write
7FF7C1756000
trusted library allocation
page execute and read and write
3371000
trusted library allocation
page read and write
31DF000
stack
page read and write
2772003A000
heap
page read and write
27F0000
heap
page read and write
1C06E000
stack
page read and write
7FF7C1824000
trusted library allocation
page read and write
29B4000
trusted library allocation
page read and write
7FF7C1B01000
trusted library allocation
page read and write
900000
heap
page read and write
2CA4000
trusted library allocation
page read and write
7FF7C182A000
trusted library allocation
page read and write
7FF7C16AD000
trusted library allocation
page execute and read and write
13593000
trusted library allocation
page read and write
34CB000
trusted library allocation
page read and write
3742000
trusted library allocation
page read and write
2811073A000
heap
page read and write
16E6000
heap
page read and write
15ED000
heap
page read and write
7FF7C1B60000
trusted library allocation
page read and write
16EC000
heap
page read and write
3109000
trusted library allocation
page read and write
3200000
heap
page execute and read and write
7FF7C1850000
trusted library allocation
page read and write
2E2E000
stack
page read and write
7FF7C16A0000
trusted library allocation
page read and write
1520000
heap
page read and write
3251000
trusted library allocation
page read and write
29EF000
trusted library allocation
page read and write
7FF7C16DC000
trusted library allocation
page execute and read and write
2811075E000
heap
page read and write
7FF7C18A0000
trusted library allocation
page read and write
29B1000
trusted library allocation
page read and write
1BE70000
heap
page read and write
2811071B000
heap
page read and write
9899DFE000
stack
page read and write
A10000
heap
page read and write
7FF7C1663000
trusted library allocation
page execute and read and write
7FF7C1AFE000
trusted library allocation
page read and write
3390000
heap
page execute and read and write
2A9C000
trusted library allocation
page read and write
7FF7C189D000
trusted library allocation
page read and write
A85000
heap
page read and write
27720083000
heap
page read and write
D8F000
stack
page read and write
3B0000
unkown
page readonly
141D000
heap
page read and write
2969000
trusted library allocation
page read and write
7FF7C16B4000
trusted library allocation
page read and write
2F49000
trusted library allocation
page read and write
293C000
trusted library allocation
page read and write
7FF7C168C000
trusted library allocation
page read and write
2807000
trusted library allocation
page read and write
178C000
heap
page read and write
925000
heap
page read and write
7FF7C168D000
trusted library allocation
page execute and read and write
7FF7C1662000
trusted library allocation
page read and write
7FF7C1776000
trusted library allocation
page execute and read and write
15D5000
heap
page read and write
7FF7C16BD000
trusted library allocation
page execute and read and write
28110870000
direct allocation
page read and write
1B990000
heap
page execute and read and write
7FF7C1890000
trusted library allocation
page read and write
1C32F000
stack
page read and write
134BF000
trusted library allocation
page read and write
7FF7C1D20000
trusted library allocation
page read and write
2811070D000
heap
page read and write
7FF7C18A2000
trusted library allocation
page read and write
27720098000
heap
page read and write
7FF7C1B40000
trusted library allocation
page read and write
193F54E0000
heap
page read and write
7FF7C17C1000
trusted library allocation
page execute and read and write
1C1AE000
stack
page read and write
13321000
trusted library allocation
page read and write
7FF7C1880000
trusted library allocation
page read and write
7FF7C18C3000
trusted library allocation
page read and write
7FF7C165D000
trusted library allocation
page execute and read and write
1BCDF000
stack
page read and write
2D32000
trusted library allocation
page read and write
7FF7C171C000
trusted library allocation
page execute and read and write
EF0000
heap
page read and write
1B970000
trusted library section
page read and write
193F56B9000
heap
page read and write
16E0000
heap
page read and write
7FF7C167D000
trusted library allocation
page execute and read and write
1364F000
trusted library allocation
page read and write
7FF7C1890000
trusted library allocation
page read and write
18A0000
trusted library allocation
page read and write
7FF7C1690000
trusted library allocation
page read and write
1B3F0000
heap
page execute and read and write
27720100000
heap
page read and write
7FF7C169B000
trusted library allocation
page execute and read and write
35FE000
trusted library allocation
page read and write
1630000
heap
page read and write
2B20000
trusted library allocation
page read and write
26C9000
trusted library allocation
page read and write
27720160000
direct allocation
page read and write
7FF7C1870000
trusted library allocation
page read and write
2FB0000
heap
page read and write
2A98000
trusted library allocation
page read and write
297E000
trusted library allocation
page read and write
293E000
trusted library allocation
page read and write
7FF7C169C000
trusted library allocation
page read and write
1890000
heap
page read and write
7FF7C1693000
trusted library allocation
page execute and read and write
135D9000
trusted library allocation
page read and write
170A000
heap
page read and write
2E3A000
heap
page read and write
18DA000
heap
page read and write
1A870000
trusted library allocation
page read and write
7FF7C1790000
trusted library allocation
page execute and read and write
7FF7C167D000
trusted library allocation
page execute and read and write
2961000
trusted library allocation
page read and write
7FF7C16A4000
trusted library allocation
page read and write
7FF7C1840000
trusted library allocation
page read and write
1BB00000
heap
page read and write
7FF7C1890000
trusted library allocation
page read and write
1931B160000
heap
page read and write
A20000
heap
page read and write
1B87B000
heap
page read and write
2938000
trusted library allocation
page read and write
28110759000
heap
page read and write
134A7000
trusted library allocation
page read and write
27721A5D000
direct allocation
page read and write
1B5CF000
stack
page read and write
1B2CC000
heap
page read and write
27721AD5000
direct allocation
page read and write
7FF7C1816000
trusted library allocation
page read and write
7FF7C1683000
trusted library allocation
page read and write
7FF7C1710000
trusted library allocation
page execute and read and write
2830000
unkown
page readonly
7FF7C1746000
trusted library allocation
page read and write
141B000
heap
page read and write
2F41000
trusted library allocation
page read and write
35C9000
trusted library allocation
page read and write
131B6000
trusted library allocation
page read and write
7FF7C1673000
trusted library allocation
page execute and read and write
7FF7C1766000
trusted library allocation
page execute and read and write
2772006A000
heap
page read and write
36ED000
trusted library allocation
page read and write
12FD6000
trusted library allocation
page read and write
1B2C0000
heap
page read and write
1500000
heap
page read and write
1C811000
heap
page read and write
7FF7C1890000
trusted library allocation
page read and write
27720045000
heap
page read and write
28113105000
direct allocation
page read and write
28110716000
heap
page read and write
8A8000
heap
page read and write
1B3CE000
stack
page read and write
8A0000
heap
page read and write
7FF7C1830000
trusted library allocation
page read and write
1C12F000
stack
page read and write
361E000
trusted library allocation
page read and write
7FF7C1B24000
trusted library allocation
page read and write
E4F000
stack
page read and write
7FF7C1B80000
trusted library allocation
page execute and read and write
7FF7C1C00000
trusted library allocation
page read and write
344C000
trusted library allocation
page read and write
7FF7C1780000
trusted library allocation
page execute and read and write
3348000
trusted library allocation
page read and write
1DC72000
heap
page read and write
2CB2000
trusted library allocation
page read and write
DD0000
heap
page read and write
2772003C000
heap
page read and write
1505000
heap
page read and write
2827000
trusted library allocation
page read and write
7FF7C1683000
trusted library allocation
page read and write
2F7A000
heap
page read and write
2673000
trusted library allocation
page read and write
2622F8D0000
heap
page read and write
2622F6B0000
heap
page read and write
3228000
trusted library allocation
page read and write
3B2000
unkown
page readonly
277201C0000
direct allocation
page read and write
1681000
heap
page read and write
2811071F000
heap
page read and write
29AF000
trusted library allocation
page read and write
1B86F000
heap
page read and write
10A3000
heap
page read and write
26B0000
trusted library allocation
page read and write
27720081000
heap
page read and write
1380000
trusted library allocation
page read and write
130F7000
trusted library allocation
page read and write
7FF7C1860000
trusted library allocation
page read and write
34BB000
trusted library allocation
page read and write
BA7000
heap
page read and write
1D840000
heap
page read and write
16CF000
stack
page read and write
3472000
trusted library allocation
page read and write
1BF20000
heap
page execute and read and write
7FF7C1720000
trusted library allocation
page execute and read and write
1B848000
heap
page read and write
7FF7C187D000
trusted library allocation
page read and write
7FF7C168C000
trusted library allocation
page read and write
3311000
trusted library allocation
page read and write
9DD000
heap
page read and write
26BC000
trusted library allocation
page read and write
7FF7C1706000
trusted library allocation
page read and write
740000
heap
page read and write
7FF7C168B000
trusted library allocation
page execute and read and write
7FF7C17A0000
trusted library allocation
page execute and read and write
1D0353B0000
heap
page read and write
28110718000
heap
page read and write
7FF7C1890000
trusted library allocation
page execute and read and write
1C67C000
stack
page read and write
27720081000
heap
page read and write
1A8A0000
trusted library allocation
page read and write
7FF7C166D000
trusted library allocation
page execute and read and write
7FF7C1694000
trusted library allocation
page read and write
281106F3000
heap
page read and write
2772009B000
heap
page read and write
7FF7C1C60000
trusted library allocation
page read and write
7FF7C17D1000
trusted library allocation
page execute and read and write
7FF7C18A0000
trusted library allocation
page read and write
1BB2C000
stack
page read and write
1170000
heap
page read and write
1630000
heap
page read and write
7FF7C189D000
trusted library allocation
page read and write
39586FC000
stack
page read and write
7FF7C1850000
trusted library allocation
page execute and read and write
1BCBE000
stack
page read and write
2A8C000
trusted library allocation
page read and write
7FF7C183A000
trusted library allocation
page read and write
7FF7C1833000
trusted library allocation
page read and write
7FF7C1870000
trusted library allocation
page read and write
12F41000
trusted library allocation
page read and write
5CBC67C000
stack
page read and write
12581000
trusted library allocation
page read and write
7FF7C188D000
trusted library allocation
page read and write
7FF7C1684000
trusted library allocation
page read and write
2772006C000
heap
page read and write
EF5000
heap
page read and write
7FF7C169B000
trusted library allocation
page execute and read and write
28112080000
direct allocation
page read and write
2930000
trusted library allocation
page read and write
18813590000
heap
page read and write
7FF7C1810000
trusted library allocation
page read and write
1383000
trusted library allocation
page read and write
34AE000
trusted library allocation
page read and write
1190000
heap
page read and write
586000
unkown
page readonly
2390000
heap
page read and write
7FF7C17B1000
trusted library allocation
page execute and read and write
29D1000
trusted library allocation
page read and write
2A06000
trusted library allocation
page read and write
29DF000
trusted library allocation
page read and write
1C780000
heap
page read and write
2CAC000
trusted library allocation
page read and write
26EB000
trusted library allocation
page read and write
1C858000
heap
page read and write
7FF7C1837000
trusted library allocation
page read and write
27720220000
direct allocation
page read and write
106F000
heap
page read and write
7FF7C189D000
trusted library allocation
page read and write
2A85000
trusted library allocation
page read and write
2A09000
trusted library allocation
page read and write
1B899000
heap
page read and write
1DC50000
heap
page read and write
2D45000
trusted library allocation
page read and write
1A0F000
stack
page read and write
293A000
trusted library allocation
page read and write
7FF7C187D000
trusted library allocation
page read and write
1722000
heap
page read and write
7FF7C168C000
trusted library allocation
page read and write
28A9000
trusted library allocation
page read and write
1B2CE000
stack
page read and write
3050000
trusted library allocation
page read and write
27720039000
heap
page read and write
330E000
stack
page read and write
7FF7C1836000
trusted library allocation
page read and write
3580000
trusted library allocation
page read and write
13101000
trusted library allocation
page read and write
1B8CD000
heap
page read and write
2CE2000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
27720200000
direct allocation
page read and write
28110767000
heap
page read and write
7FF7C1694000
trusted library allocation
page read and write
1405000
heap
page read and write
99B000
heap
page read and write
1D035790000
heap
page read and write
27721A90000
direct allocation
page read and write
7C2000
stack
page read and write
27720063000
heap
page read and write
1BFFE000
stack
page read and write
14A5000
heap
page read and write
2A96000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
7FF7C1756000
trusted library allocation
page execute and read and write
1660000
heap
page read and write
A30000
heap
page read and write
1B4CA000
stack
page read and write
7FF7C1872000
trusted library allocation
page read and write
3481000
trusted library allocation
page read and write
322C000
trusted library allocation
page read and write
AFB000
heap
page read and write
7FF7C186D000
trusted library allocation
page read and write
7FF7C1670000
trusted library allocation
page read and write
27720096000
heap
page read and write
1B849000
heap
page read and write
2811073C000
heap
page read and write
2ACD000
trusted library allocation
page read and write
7FF7C17C1000
trusted library allocation
page execute and read and write
7FF7C183C000
trusted library allocation
page read and write
281120A0000
direct allocation
page read and write
7FF7C168D000
trusted library allocation
page execute and read and write
193F5930000
heap
page read and write
2ABA000
trusted library allocation
page read and write
18813530000
heap
page read and write
920000
heap
page read and write
131F8000
trusted library allocation
page read and write
296D000
trusted library allocation
page read and write
7FF7C1B30000
trusted library allocation
page read and write
7FF7C16AC000
trusted library allocation
page execute and read and write
3310000
trusted library allocation
page read and write
360D000
trusted library allocation
page read and write
3620000
trusted library allocation
page read and write
7FF7C18F0000
trusted library allocation
page execute and read and write
27C0000
heap
page read and write
3470000
trusted library allocation
page read and write
7FF7C1650000
trusted library allocation
page read and write
18B5000
heap
page read and write
1D0353B7000
heap
page read and write
30FB000
trusted library allocation
page read and write
7FF7C1828000
trusted library allocation
page read and write
26D0000
unkown
page readonly
7FF7C18B0000
trusted library allocation
page execute and read and write
2925000
trusted library allocation
page read and write
7FF7C1827000
trusted library allocation
page read and write
1B8E0000
heap
page read and write
1B2E0000
heap
page read and write
332E000
stack
page read and write
1B9B0000
heap
page read and write
1ADFB000
stack
page read and write
7FF7C1C20000
trusted library allocation
page read and write
1B84E000
heap
page read and write
1600000
heap
page read and write
1D0353A0000
heap
page read and write
1B8AD000
heap
page read and write
2811073C000
heap
page read and write
7FF7C16DC000
trusted library allocation
page execute and read and write
1B1E3000
heap
page execute and read and write
7FF7C168D000
trusted library allocation
page execute and read and write
7FF7C19A0000
trusted library allocation
page read and write
7FF7C1B70000
trusted library allocation
page read and write
35DC000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
2AD1000
trusted library allocation
page read and write
1B810000
heap
page read and write
7FF7C1810000
trusted library allocation
page read and write
26C7000
trusted library allocation
page read and write
28110750000
heap
page read and write
2811308D000
direct allocation
page read and write
12B0F000
trusted library allocation
page read and write
7FF7C184C000
trusted library allocation
page read and write
295C000
trusted library allocation
page read and write
14E0000
heap
page read and write
2A8A000
trusted library allocation
page read and write
90C000
heap
page read and write
1B293000
heap
page read and write
11C0000
heap
page read and write
ED0000
heap
page read and write
7FF7C1B10000
trusted library allocation
page read and write
1099000
heap
page read and write
7FF7C1692000
trusted library allocation
page read and write
7FF7C16EC000
trusted library allocation
page execute and read and write
174D000
heap
page read and write
28110709000
heap
page read and write
1666000
heap
page read and write
7FF7C1B76000
trusted library allocation
page read and write
7FF7C1673000
trusted library allocation
page execute and read and write
1B2F0000
heap
page read and write
2A89000
trusted library allocation
page read and write
1A80000
heap
page read and write
32B0000
heap
page read and write
127A3000
trusted library allocation
page read and write
14E2000
stack
page read and write
7FF7C1B50000
trusted library allocation
page read and write
3360000
heap
page read and write
2470000
heap
page read and write
1B8D3000
heap
page read and write
1BAE0000
heap
page read and write
BB9000
heap
page read and write
DFEA3FF000
stack
page read and write
DFEA2FF000
unkown
page read and write
10A0000
heap
page read and write
1BB1B000
heap
page read and write
2772003F000
heap
page read and write
1351F000
trusted library allocation
page read and write
277201A7000
direct allocation
page read and write
2C9C000
trusted library allocation
page read and write
790000
heap
page read and write
7FF7C173C000
trusted library allocation
page execute and read and write
2772008F000
heap
page read and write
1CFF0000
trusted library section
page read and write
307C000
trusted library allocation
page read and write
2D2F000
trusted library allocation
page read and write
3549000
trusted library allocation
page read and write
360F000
trusted library allocation
page read and write
7FF7C1B10000
trusted library allocation
page read and write
7FF7C1B20000
trusted library allocation
page read and write
7FF7C1860000
trusted library allocation
page execute and read and write
1B4FE000
stack
page read and write
1BDA0000
heap
page read and write
2772002A000
heap
page read and write
7FF7C1B60000
trusted library allocation
page read and write
7FF7C1850000
trusted library allocation
page execute and read and write
7FF7C184C000
trusted library allocation
page read and write
2CD8000
trusted library allocation
page read and write
7FF7C1670000
trusted library allocation
page read and write
7FF7C1885000
trusted library allocation
page read and write
308B000
trusted library allocation
page read and write
26FC000
trusted library allocation
page read and write
7FF7C1683000
trusted library allocation
page execute and read and write
2622F8D0000
heap
page read and write
7FF7C167D000
trusted library allocation
page execute and read and write
7FF7C1882000
trusted library allocation
page read and write
702000
stack
page read and write
2629000
trusted library allocation
page read and write
1B83C000
heap
page read and write
3F2000
unkown
page readonly
1B42E000
stack
page read and write
27720240000
direct allocation
page read and write
AE2000
stack
page read and write
2772008A000
heap
page read and write
7FF7C17A0000
trusted library allocation
page execute and read and write
3125000
trusted library allocation
page read and write
7FF7C1884000
trusted library allocation
page read and write
13453000
trusted library allocation
page read and write
7FF7C1847000
trusted library allocation
page read and write
18813710000
heap
page read and write
347F000
trusted library allocation
page read and write
277201BB000
direct allocation
page read and write
7FF7C1726000
trusted library allocation
page read and write
1AEED000
stack
page read and write
2622F7B0000
heap
page read and write
27720008000
heap
page read and write
15B8000
heap
page read and write
35DA000
trusted library allocation
page read and write
B6F000
stack
page read and write
295E000
trusted library allocation
page read and write
7FF7C172C000
trusted library allocation
page execute and read and write
34CE000
trusted library allocation
page read and write
930000
heap
page read and write
1B8E5000
heap
page read and write
A55000
heap
page read and write
35ED000
trusted library allocation
page read and write
1AB0D000
stack
page read and write
2CDA000
trusted library allocation
page read and write
7FF7C1B47000
trusted library allocation
page read and write
25A7000
trusted library allocation
page read and write
2CB8000
trusted library allocation
page read and write
3263000
trusted library allocation
page read and write
35D8000
trusted library allocation
page read and write
907000
heap
page read and write
2987000
trusted library allocation
page read and write
1B2AD000
heap
page read and write
1C53E000
stack
page read and write
7FF7C1890000
trusted library allocation
page read and write
2622F8D0000
heap
page read and write
12E2000
stack
page read and write
2811071F000
heap
page read and write
7FF7C1726000
trusted library allocation
page read and write
7FF7C1850000
trusted library allocation
page read and write
34A7000
trusted library allocation
page read and write
7FF7C1683000
trusted library allocation
page read and write
34AB000
trusted library allocation
page read and write
7FF7C1800000
trusted library allocation
page read and write
12A0B000
trusted library allocation
page read and write
281106A0000
heap
page read and write
1B29F000
heap
page read and write
7FF7C1726000
trusted library allocation
page read and write
2811070B000
heap
page read and write
1315A000
trusted library allocation
page read and write
2ABC000
trusted library allocation
page read and write
C3E000
stack
page read and write
7FF7C181C000
trusted library allocation
page read and write
35E7000
trusted library allocation
page read and write
39588FE000
stack
page read and write
1580000
heap
page execute and read and write
281105A0000
heap
page read and write
1B62E000
stack
page read and write
7FF7C18D0000
trusted library allocation
page execute and read and write
7FF7C18B0000
trusted library allocation
page execute and read and write
1C0AF000
stack
page read and write
326C000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
7FF7C1820000
trusted library allocation
page read and write
7FF7C18A0000
trusted library allocation
page read and write
7FF7C1C00000
trusted library allocation
page read and write
35F0000
trusted library allocation
page read and write
130EF000
trusted library allocation
page read and write
26A9000
trusted library allocation
page read and write
1B168000
heap
page read and write
1B243000
heap
page read and write
EA0000
trusted library allocation
page read and write
7FF7C1880000
trusted library allocation
page read and write
1BFAF000
stack
page read and write
2400000
heap
page execute and read and write
7FF7C1CA0000
trusted library allocation
page execute and read and write
7FF7C1890000
trusted library allocation
page read and write
7FF7C18A0000
trusted library allocation
page read and write
129AF000
trusted library allocation
page read and write
281120E0000
heap
page read and write
7FF7C1810000
trusted library allocation
page read and write
12971000
trusted library allocation
page read and write
3239000
trusted library allocation
page read and write
1B8FD000
heap
page read and write
1BAEA000
heap
page read and write
1C77D000
stack
page read and write
7FF7C1C80000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
285A000
heap
page read and write
7FF4C4950000
trusted library allocation
page execute and read and write
324C000
trusted library allocation
page read and write
35EB000
trusted library allocation
page read and write
2AD3000
trusted library allocation
page read and write
1635000
heap
page read and write
28110765000
heap
page read and write
7FF7C1B28000
trusted library allocation
page read and write
7FF7C1820000
trusted library allocation
page read and write
7FF7C17B0000
trusted library allocation
page execute and read and write
7FF7C18A0000
trusted library allocation
page read and write
AE8000
heap
page read and write
7FF7C1C50000
trusted library allocation
page read and write
7FF7C189D000
trusted library allocation
page read and write
26BA000
trusted library allocation
page read and write
7FF7C1698000
trusted library allocation
page read and write
1BAD0000
heap
page read and write
9E4000
heap
page read and write
26F1000
trusted library allocation
page read and write
7FF7C1892000
trusted library allocation
page read and write
7FF7C1730000
trusted library allocation
page execute and read and write
7FF7C1716000
trusted library allocation
page read and write
7FF7C1B49000
trusted library allocation
page read and write
7FF7C16CC000
trusted library allocation
page execute and read and write
7FF7C1664000
trusted library allocation
page read and write
7FF7C1694000
trusted library allocation
page read and write
2CFE000
trusted library allocation
page read and write
277202A0000
heap
page read and write
1BC90000
heap
page execute and read and write
7FF7C1B20000
trusted library allocation
page read and write
9899BF5000
stack
page read and write
7FF7C1840000
trusted library allocation
page read and write
34A8000
trusted library allocation
page read and write
323B000
trusted library allocation
page read and write
13C0000
heap
page read and write
27721AD3000
direct allocation
page read and write
27720047000
heap
page read and write
1BABE000
stack
page read and write
7FF7C16CC000
trusted library allocation
page execute and read and write
1C576000
heap
page read and write
13FB000
heap
page read and write
1B140000
unkown
page readonly
28113080000
direct allocation
page read and write
1AF66000
heap
page read and write
3113000
trusted library allocation
page read and write
1ABFE000
heap
page read and write
1B0C0000
heap
page execute and read and write
7FF7C1688000
trusted library allocation
page read and write
28110752000
heap
page read and write
27720036000
heap
page read and write
1C07E000
stack
page read and write
13C5000
heap
page read and write
3593000
trusted library allocation
page read and write
7FF7C1683000
trusted library allocation
page execute and read and write
1CEE8000
stack
page read and write
2848000
unkown
page readonly
7FF7C169D000
trusted library allocation
page execute and read and write
2811071F000
heap
page read and write
130EA000
trusted library allocation
page read and write
1B2C6000
heap
page read and write
3F6000
unkown
page readonly
7FF7C1806000
trusted library allocation
page read and write
12871000
trusted library allocation
page read and write
35DE000
trusted library allocation
page read and write
7FF7C1680000
trusted library allocation
page read and write
34C1000
trusted library allocation
page read and write
35C5000
trusted library allocation
page read and write
7FF7C1674000
trusted library allocation
page read and write
D7E000
stack
page read and write
1860000
heap
page read and write
3490000
trusted library allocation
page read and write
7FF7C167D000
trusted library allocation
page execute and read and write
7FF7C168D000
trusted library allocation
page execute and read and write
15CB000
heap
page read and write
950000
heap
page read and write
16A0000
trusted library allocation
page read and write
7FF7C18B0000
trusted library allocation
page read and write
BBD000
heap
page read and write
3064000
trusted library allocation
page read and write
1610000
heap
page read and write
7FF7C1863000
trusted library allocation
page read and write
A66A3FE000
stack
page read and write
27720081000
heap
page read and write
7FF7C18E0000
trusted library allocation
page read and write
7FF7C1860000
trusted library allocation
page read and write
12660000
trusted library allocation
page read and write
12A23000
trusted library allocation
page read and write
1C16E000
stack
page read and write
7FF7C167C000
trusted library allocation
page read and write
28110680000
heap
page read and write
7FF7C1690000
trusted library allocation
page read and write
7FF7C16AD000
trusted library allocation
page execute and read and write
1C2F5000
stack
page read and write
34A9000
trusted library allocation
page read and write
34B0000
trusted library allocation
page read and write
DFE9F1C000
stack
page read and write
2CA6000
trusted library allocation
page read and write
309E000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
B28000
heap
page read and write
27721AD0000
direct allocation
page read and write
7FF7C18A0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
7FF7C1850000
trusted library allocation
page execute and read and write
134B1000
trusted library allocation
page read and write
287F000
trusted library allocation
page read and write
277201A0000
direct allocation
page read and write
7FF7C18C8000
trusted library allocation
page read and write
1B2BF000
heap
page read and write
1DC40000
heap
page read and write
7FF7C1770000
trusted library allocation
page execute and read and write
7FF7C1870000
trusted library allocation
page read and write
7FF7C1890000
trusted library allocation
page read and write
160E000
stack
page read and write
296B000
trusted library allocation
page read and write
7FF7C18B0000
trusted library allocation
page execute and read and write
13533000
trusted library allocation
page read and write
16CF000
heap
page read and write
13E0000
heap
page read and write
7FF7C1730000
trusted library allocation
page execute and read and write
7FF7C1864000
trusted library allocation
page read and write
7FF7C1874000
trusted library allocation
page read and write
35FA000
trusted library allocation
page read and write
2ABE000
trusted library allocation
page read and write
F55000
heap
page read and write
18C0000
trusted library allocation
page read and write
12B83000
trusted library allocation
page read and write
1B72A000
stack
page read and write
2E30000
heap
page read and write
7FF7C1652000
trusted library allocation
page read and write
7FF7C1672000
trusted library allocation
page read and write
2811070D000
heap
page read and write
7FF7C17B1000
trusted library allocation
page execute and read and write
34DD000
trusted library allocation
page read and write
970000
heap
page read and write
7FF7C18A0000
trusted library allocation
page read and write
1B2ED000
heap
page read and write
7FF7C1895000
trusted library allocation
page read and write
3461000
trusted library allocation
page read and write
8DB000
heap
page read and write
12BC7000
trusted library allocation
page read and write
7FF7C1836000
trusted library allocation
page read and write
7FF7C167D000
trusted library allocation
page execute and read and write
281106FC000
heap
page read and write
1C36F000
stack
page read and write
2850000
heap
page read and write
34D2000
trusted library allocation
page read and write
7FF7C167B000
trusted library allocation
page execute and read and write
1030000
heap
page read and write
26D2000
unkown
page readonly
9E0000
trusted library allocation
page read and write
1B837000
heap
page read and write
7FF7C1892000
trusted library allocation
page read and write
12961000
trusted library allocation
page read and write
BBB000
heap
page read and write
28110734000
heap
page read and write
A80000
heap
page read and write
1B88D000
heap
page read and write
27721A50000
direct allocation
page read and write
7FF7C1874000
trusted library allocation
page read and write
1931B080000
heap
page read and write
7FF7C1673000
trusted library allocation
page read and write
14E2000
stack
page read and write
352F000
trusted library allocation
page read and write
7FF7C1880000
trusted library allocation
page read and write
7FF7C1874000
trusted library allocation
page read and write
7FF7C185C000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
7FF7C17A0000
trusted library allocation
page execute and read and write
27720087000
heap
page read and write
2879000
trusted library allocation
page read and write
12A40000
trusted library allocation
page read and write
1000000
heap
page read and write
7FF7C172C000
trusted library allocation
page execute and read and write
16B0000
heap
page read and write
7FF7C1B00000
trusted library allocation
page read and write
3613000
trusted library allocation
page read and write
988000
heap
page read and write
18813510000
heap
page read and write
7FF7C167D000
trusted library allocation
page execute and read and write
7FF7C1698000
trusted library allocation
page read and write
349E000
stack
page read and write
1B130000
heap
page execute and read and write
7FF7C166C000
trusted library allocation
page read and write
2581000
trusted library allocation
page read and write
34AA000
trusted library allocation
page read and write
7E0000
trusted library allocation
page read and write
18813430000
heap
page read and write
7FF7C1720000
trusted library allocation
page read and write
3459000
trusted library allocation
page read and write
26B8000
trusted library allocation
page read and write
1B8FD000
stack
page read and write
2811070F000
heap
page read and write
7FF7C1726000
trusted library allocation
page read and write
2860000
heap
page read and write
7FF7C1820000
trusted library allocation
page read and write
7FF7C1684000
trusted library allocation
page read and write
28110767000
heap
page read and write
B88000
heap
page read and write
AE5000
heap
page read and write
26BE000
trusted library allocation
page read and write
7FF7C1736000
trusted library allocation
page execute and read and write
2810000
trusted library allocation
page read and write
9B1000
heap
page read and write
7FF7C1654000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
7FF7C1840000
trusted library allocation
page read and write
27720024000
heap
page read and write
7FF7C1C30000
trusted library allocation
page read and write
322E000
trusted library allocation
page read and write
1B8C9000
heap
page read and write
AFD000
heap
page read and write
7FF7C1840000
trusted library allocation
page read and write
7FF7C188D000
trusted library allocation
page read and write
12801000
trusted library allocation
page read and write
27721C40000
heap
page read and write
1B2EA000
heap
page read and write
1360000
trusted library allocation
page read and write
35E9000
trusted library allocation
page read and write
26DC000
trusted library allocation
page read and write
7FF7C1B22000
trusted library allocation
page read and write
1325C000
trusted library allocation
page read and write
7FF7C18DB000
trusted library allocation
page read and write
2CC4000
trusted library allocation
page read and write
7FF7C1992000
trusted library allocation
page read and write
2AA9000
trusted library allocation
page read and write
28113060000
direct allocation
page read and write
130F1000
trusted library allocation
page read and write
2772003C000
heap
page read and write
7FF7C16CC000
trusted library allocation
page execute and read and write
17DC000
heap
page read and write
27721AB0000
direct allocation
page read and write
28110767000
heap
page read and write
1B142000
unkown
page readonly
34DE000
trusted library allocation
page read and write
34E5000
trusted library allocation
page read and write
7FF7C1B30000
trusted library allocation
page read and write
7FF7C1880000
trusted library allocation
page read and write
7FF7C1674000
trusted library allocation
page read and write
13317000
trusted library allocation
page read and write
2811070A000
heap
page read and write
2772004F000
heap
page read and write
1BBBE000
stack
page read and write
297C000
trusted library allocation
page read and write
1A85000
heap
page read and write
7FF7C1688000
trusted library allocation
page read and write
28F3000
trusted library allocation
page read and write
1931B180000
heap
page read and write
1B6FF000
stack
page read and write
2809000
trusted library allocation
page read and write
B80000
heap
page read and write
1BD20000
heap
page read and write
1930000
heap
page read and write
2F70000
heap
page read and write
1272F000
trusted library allocation
page read and write
2622F8C0000
heap
page read and write
28110725000
heap
page read and write
35FC000
trusted library allocation
page read and write
2772004F000
heap
page read and write
A69000
heap
page read and write
131D0000
trusted library allocation
page read and write
2771FFD0000
heap
page read and write
1C801000
heap
page read and write
2CEF000
trusted library allocation
page read and write
850000
heap
page read and write
17BF000
stack
page read and write
7FF7C1C10000
trusted library allocation
page execute and read and write
830000
heap
page read and write
7FF7C1682000
trusted library allocation
page read and write
7FF7C17B1000
trusted library allocation
page execute and read and write
1B271000
heap
page read and write
2929000
trusted library allocation
page read and write
7FF7C1730000
trusted library allocation
page read and write
1880000
heap
page read and write
32B0000
trusted library allocation
page read and write
294B000
trusted library allocation
page read and write
3522000
trusted library allocation
page read and write
1B8B7000
heap
page read and write
7FF7C189D000
trusted library allocation
page read and write
7FF7C1690000
trusted library allocation
page read and write
27720068000
heap
page read and write
295E000
stack
page read and write
7FF7C16B0000
trusted library allocation
page read and write
1AF4F000
stack
page read and write
27720260000
direct allocation
page read and write
7FF7C1850000
trusted library allocation
page read and write
185F000
stack
page read and write
7FF7C18F0000
trusted library allocation
page execute and read and write
25D4000
trusted library allocation
page read and write
7FF7C186D000
trusted library allocation
page read and write
34BF000
trusted library allocation
page read and write
7FF7C1688000
trusted library allocation
page read and write
7FF7C1826000
trusted library allocation
page read and write
7FF7C1854000
trusted library allocation
page read and write
7FF7C1790000
trusted library allocation
page execute and read and write
B26000
heap
page read and write
193F55E0000
heap
page read and write
15EB000
heap
page read and write
26F3000
trusted library allocation
page read and write
7FF7C169D000
trusted library allocation
page execute and read and write
1B3CE000
stack
page read and write
1B2B3000
heap
page read and write
7FF7C16BC000
trusted library allocation
page execute and read and write
11A0000
heap
page read and write
2CC2000
trusted library allocation
page read and write
1616000
heap
page read and write
1B89D000
stack
page read and write
2ACB000
trusted library allocation
page read and write
7FF7C188D000
trusted library allocation
page read and write
36F7000
trusted library allocation
page read and write
336A000
heap
page read and write
13313000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
9B3000
heap
page read and write
750000
heap
page read and write
3446000
trusted library allocation
page read and write
28110759000
heap
page read and write
136AB000
trusted library allocation
page read and write
1BDDE000
stack
page read and write
30E9000
trusted library allocation
page read and write
7FF7C18B0000
trusted library allocation
page read and write
2772005A000
heap
page read and write
2D3B000
trusted library allocation
page read and write
175E000
heap
page read and write
28110890000
heap
page read and write
2BDF000
trusted library allocation
page read and write
2AB1000
trusted library allocation
page read and write
130A7000
trusted library allocation
page read and write
7FF7C1887000
trusted library allocation
page read and write
281B000
trusted library allocation
page read and write
7FF7C1890000
trusted library allocation
page read and write
170C000
heap
page read and write
7FF7C18C0000
trusted library allocation
page execute and read and write
7FF7C1887000
trusted library allocation
page read and write
7FF7C17F0000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
7FF7C169C000
trusted library allocation
page read and write
2680000
heap
page execute and read and write
7FF7C1B4C000
trusted library allocation
page read and write
7FF7C1B47000
trusted library allocation
page read and write
7FF7C1756000
trusted library allocation
page execute and read and write
27EE000
stack
page read and write
2CF5000
trusted library allocation
page read and write
393B000
trusted library allocation
page read and write
1BEDE000
stack
page read and write
A60000
heap
page read and write
1C0FE000
stack
page read and write
27A0000
heap
page execute and read and write
351F000
trusted library allocation
page read and write
7FF7C1847000
trusted library allocation
page read and write
280B000
trusted library allocation
page read and write
2854000
trusted library allocation
page read and write
27720000000
heap
page read and write
34F4000
trusted library allocation
page read and write
7FF7C1850000
trusted library allocation
page read and write
16B5000
heap
page read and write
2810000
unkown
page readonly
There are 1387 hidden memdumps, click here to show them.