IOC Report
FileApp.exe

loading gif

Files

File Path
Type
Category
Malicious
FileApp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\jewkkwnf\jewkkwnf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\xprfjygruytr\etzpikspwykg.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\userEHJKFCGHID.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\userFBKKJEBFID.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\ExtreamFanV6\ExtreamFanV6.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FileApp.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\66c6fcb30b9dd_123p[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\66d60cd3ce002_SeparatelyDied[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\66d72df86b9f3_crypted[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\66d58b1858bcb_crypted[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\66d70775c548d_v[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\66d70775c548d_v[2].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\66d7077a2064d_l[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\66d59ef9d4404_premium[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\66d707730e9bf_s[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\66d1b7f7f3765_Front[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\66d70e8640404_trics[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\lamp[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\627000\Legitimate.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\PowerExpertNNT\PowerExpertNNT.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\5Qs0KV98dc5QrQIgi5l7CPu5.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\B4LiZFzJ_IAKzmYhwI_ve0Iy.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\DSN_5xuwaC5nkP_MHzd7lLTl.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\ZYgCMtJP3wxddinn5Sa3IKJH.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\g5YPTfbb3UXQYqfB9k0rJePl.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\kPy9KuGWnhtidoY4IdmVbiaT.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\l6BAwR4854FJ5LVXvo8GWfAt.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\m9GWTeQylsPUCcnTEkTCS8lf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\pO77aCusXJv6mYqR0srms9ou.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\uht_7KlzJBHoKg010MzYxndX.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\xNc0eiwaHinah8TaPUA3TuXZ.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\CAAKKFHCFIECAAAKEGCFIEHDAK
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\CFBFHIEB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\ECFHIJKJKFIDHJKFBGHCGCAEBF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EHCFBFBAEBKJKEBGCAEH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GHJEGCAEGIIIDHIEBKEB
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\HIJJEGDB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IIEBKJECFCFB\EBAKFI
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\IIEBKJECFCFB\FIDGDA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IIEBKJECFCFB\FIJJKE
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JDGHIIJKEBGIDHIDBKJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KEBFHIJECFIDGDGCGHCGIIECAF
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\KKFBFCAFCBKFIEBFHIDBAKJJJJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage user DataBase, version 0x620, checksum 0xc1191b29, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_l6BAwR4854FJ5LVX_82339dabe1454458e4b35fe78f21d4d1d43bdf1_fa394b7d_6e5f7ac7-01e0-4b31-9526-a1c3e751ffc2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER44F.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Sep 4 15:37:29 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7376.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7655.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER809.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC4E.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE404.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE974.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF1D.tmp.txt
data
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 05:47:16 2023, atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\B4LiZFzJ_IAKzmYhwI_ve0Iy.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DSN_5xuwaC5nkP_MHzd7lLTl.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ExtreamFanV6.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ZYgCMtJP3wxddinn5Sa3IKJH.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\jewkkwnf.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\pO77aCusXJv6mYqR0srms9ou.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\xNc0eiwaHinah8TaPUA3TuXZ.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\download[1].txt
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Accessing
data
dropped
C:\Users\user\AppData\Local\Temp\Brisbane
data
dropped
C:\Users\user\AppData\Local\Temp\Command
ASCII text, with very long lines (1418), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Command.bat (copy)
ASCII text, with very long lines (1418), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Compressed
data
dropped
C:\Users\user\AppData\Local\Temp\Developers
data
dropped
C:\Users\user\AppData\Local\Temp\Hospital
data
dropped
C:\Users\user\AppData\Local\Temp\Hosting
data
dropped
C:\Users\user\AppData\Local\Temp\Itsa
data
dropped
C:\Users\user\AppData\Local\Temp\Major
data
dropped
C:\Users\user\AppData\Local\Temp\Pace
data
dropped
C:\Users\user\AppData\Local\Temp\Po
data
dropped
C:\Users\user\AppData\Local\Temp\Proved
data
dropped
C:\Users\user\AppData\Local\Temp\Reaches
data
dropped
C:\Users\user\AppData\Local\Temp\Resolutions
data
dropped
C:\Users\user\AppData\Local\Temp\Shares
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp142.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpFE44.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Write
data
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\twekgmwoe\slrmrjyhe
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNNT.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Archive, ctime=Wed Sep 4 14:37:34 2024, mtime=Wed Sep 4 14:37:34 2024, atime=Wed Sep 4 14:37:15 2024, length=8684256, window=hide
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 96 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FileApp.exe
"C:\Users\user\Desktop\FileApp.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\Documents\iofolko5\ZYgCMtJP3wxddinn5Sa3IKJH.exe
C:\Users\user\Documents\iofolko5\ZYgCMtJP3wxddinn5Sa3IKJH.exe
malicious
C:\Users\user\Documents\iofolko5\l6BAwR4854FJ5LVXvo8GWfAt.exe
C:\Users\user\Documents\iofolko5\l6BAwR4854FJ5LVXvo8GWfAt.exe
malicious
C:\Users\user\Documents\iofolko5\kPy9KuGWnhtidoY4IdmVbiaT.exe
C:\Users\user\Documents\iofolko5\kPy9KuGWnhtidoY4IdmVbiaT.exe
malicious
C:\Users\user\Documents\iofolko5\xNc0eiwaHinah8TaPUA3TuXZ.exe
C:\Users\user\Documents\iofolko5\xNc0eiwaHinah8TaPUA3TuXZ.exe
malicious
C:\Users\user\Documents\iofolko5\B4LiZFzJ_IAKzmYhwI_ve0Iy.exe
C:\Users\user\Documents\iofolko5\B4LiZFzJ_IAKzmYhwI_ve0Iy.exe
malicious
C:\Users\user\Documents\iofolko5\DSN_5xuwaC5nkP_MHzd7lLTl.exe
C:\Users\user\Documents\iofolko5\DSN_5xuwaC5nkP_MHzd7lLTl.exe
malicious
C:\Users\user\Documents\iofolko5\uht_7KlzJBHoKg010MzYxndX.exe
C:\Users\user\Documents\iofolko5\uht_7KlzJBHoKg010MzYxndX.exe
malicious
C:\Users\user\Documents\iofolko5\m9GWTeQylsPUCcnTEkTCS8lf.exe
C:\Users\user\Documents\iofolko5\m9GWTeQylsPUCcnTEkTCS8lf.exe
malicious
C:\Users\user\Documents\iofolko5\5Qs0KV98dc5QrQIgi5l7CPu5.exe
C:\Users\user\Documents\iofolko5\5Qs0KV98dc5QrQIgi5l7CPu5.exe
malicious
C:\Users\user\Documents\iofolko5\g5YPTfbb3UXQYqfB9k0rJePl.exe
C:\Users\user\Documents\iofolko5\g5YPTfbb3UXQYqfB9k0rJePl.exe
malicious
C:\Users\user\Documents\iofolko5\pO77aCusXJv6mYqR0srms9ou.exe
C:\Users\user\Documents\iofolko5\pO77aCusXJv6mYqR0srms9ou.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k move Command Command.bat & Command.bat & exit
malicious
C:\Users\user\Documents\iofolko5\B4LiZFzJ_IAKzmYhwI_ve0Iy.exe
"C:\Users\user\Documents\iofolko5\B4LiZFzJ_IAKzmYhwI_ve0Iy.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\jewkkwnf\jewkkwnf.exe
C:\ProgramData\jewkkwnf\jewkkwnf.exe
malicious
C:\ProgramData\jewkkwnf\jewkkwnf.exe
C:\ProgramData\jewkkwnf\jewkkwnf.exe
malicious
C:\Users\user\AppData\Local\ExtreamFanV6\ExtreamFanV6.exe
"C:\Users\user\AppData\Local\ExtreamFanV6\ExtreamFanV6.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userFBKKJEBFID.exe"
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userEHJKFCGHID.exe"
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
malicious
C:\Users\user\AppData\Local\ExtreamFanV6\ExtreamFanV6.exe
"C:\Users\user\AppData\Local\ExtreamFanV6\ExtreamFanV6.exe"
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
malicious
C:\Users\user\AppData\Local\ExtreamFanV6\ExtreamFanV6.exe
"C:\Users\user\AppData\Local\ExtreamFanV6\ExtreamFanV6.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5644 -ip 5644
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5644 -s 824
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 41 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://147.45.68.138/nss3.dll
147.45.68.138
malicious
http://46.8.231.109/c4754d4f680ead72.php
46.8.231.109
malicious
http://46.8.231.109/1309cdeb8f4c8736/msvcp140.dll
46.8.231.109
malicious
147.45.47.36:30035
malicious
https://t.me/edm0d
malicious
http://185.215.113.100/
unknown
malicious
http://185.215.113.100
unknown
malicious
http://46.8.231.109/1309cdeb8f4c8736/softokn3.dll
46.8.231.109
malicious
http://147.45.68.138/vcruntime140.dll
147.45.68.138
malicious
https://steamcommunity.com/profiles/76561199768374681
malicious
http://147.45.68.138/mozglue.dll
147.45.68.138
malicious
http://46.8.231.109/1309cdeb8f4c8736/freebl3.dll
46.8.231.109
malicious
locatedblsoqp.shop
malicious
caffegclasiqwp.shop
malicious
millyscroqwp.shop
malicious
http://46.8.231.109/1309cdeb8f4c8736/mozglue.dll
46.8.231.109
malicious
http://147.45.68.138/freebl3.dll
147.45.68.138
malicious
traineiwnqo.shop
malicious
http://62.133.61.172:80/api/twofish.php_
unknown
https://file-link-iota.vercel.app:80/downloadynamic
unknown
http://147.45.44.104/yuop/66d72df86b9f3_crypted.exe#1yy3GtoRvFKon$
unknown
https://steamcommunity.com/profiles/76561199768374681i11ihttps://t.me/edm0dMozilla/5.0
unknown
http://147.45.44.104/prog/66d70e8640404_trics.exely.
unknown
http://147.45.44.104/yuop/66d59ef9d4404_premium.exe#upusB9b
unknown
https://iplogger.org/X~
unknown
http://147.45.44.104/revada/66c6fcb30b9dd_123p.exe
147.45.44.104
https://github.com/golang/protobuf/issues/1609):
unknown
http://62.133.61.172:80/api/twofish.php
unknown
http://147.45.44.104/yuop/66d72df86b9f3_crypted.exe#1
147.45.44.104
http://147.45.44.104/prog/66d70e8640404_trics.exeeYH
unknown
http://147.45.44.104/prog/66d7077a2064d_l.exe
147.45.44.104
https://youtransfer.net/EO
unknown
http://147.45.44.104/yuop/66d59ef9d4404_premium.exe#upusm
unknown
http://147.45.44.104/revada/66c6fcb30b9dd_123p.exev
unknown
https://api64.ipify.org:443/?format=json
unknown
http://154.216.17.178/edge/msconfig32.exe#pendXOp
unknown
http://gacan.zapto.org_DEBUG.zip/c
unknown
http://147.45.44.104/prog/66d70775c548d_v.exe#space
147.45.44.104
http://147.45.44.104/yuop/66d59ef9d4404_premium.exe#upusce
unknown
http://147.45.44.104/prog/66d70e8640404_trics.exeC:
unknown
http://147.45.44.104/yuop/66d59ef9d4404_premium.exe#upus0DVJtBG
unknown
http://147.45.44.104/malesa/66d1b7f7f3765_Front.exe1aH
unknown
http://147.45.44.104/malesa/66d1b7f7f3765_Front.exe1n
unknown
http://147.45.44.104/yuop/66d60cd3ce002_SeparatelyDied.exe#sun
147.45.44.104
http://147.45.44.104/prog/66d707730e9bf_s.exe#spacecryptol
unknown
https://ipinfo.io/widget/demo/8.46.123.33EK
unknown
http://62.133.61.172/api/twofish.php:
unknown
http://147.45.68.138:80hellohttps://t.me/edm0di11iMozilla/5.0
unknown
http://147.45.44.104/prog/66d70775c548d_v.exe#spacell
unknown
http://147.45.68.138:80
unknown
http://147.45.44.104/revada/66c6fcb30b9dd_123p.exeK
unknown
http://147.45.44.104/revada/66c6fcb30b9dd_123p.exeQH
unknown
http://147.45.44.104/prog/66d70775c548d_v.exe#spaceE-
unknown
http://62.133.61.172/api/twofish.php(
unknown
http://147.45.44.104/yuop/66d59ef9d4404_premium.exe#upusC:
unknown
http://147.45.44.104/malesa/66d1b7f7f3765_Front.exeC:
unknown
https://api.ip.sb/ip
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://62.133.61.172:80/api/crazyfish.php
unknown
https://api.datamarket.azure.com/data.ashx/
unknown
http://185.215.113.100/e2b1563c6670f193.php/
unknown
https://manage.windowsazure.com/publishsettings/indextls:
unknown
http://147.45.44.104/malesa/66d1b7f7f3765_Front.exeiH
unknown
http://185.215.113.100/e2b1563c6670f193.php2
unknown
http://31.41.244.9/nokia/lamp.exeyJ
unknown
https://iplogger.org/1nhuM4.js
104.26.2.46
https://github.com/dotnet/wpf
unknown
https://youtransfer.net/handler/download?action=download&download_id=uuVCUDm6&private_id=cb726802f5fcca567315ff7c87e27582&url=https%253A%252F%252Fyoutransfer.net%252FuuVCUDm6%252Fcb726802f5fcca567315ff7c87e27582
158.69.225.124
http://240902180529931.tyr.zont16.com/
unknown
http://31.41.244.9/nokia/lamp.exeyE
unknown
https://condedqpwqm.shop/api)M
unknown
https://file-link-iota.vercel.app/download
76.76.21.98
http://147.45.44.104/yuop/66d60cd3ce002_SeparatelyDied.exe#sun3tn?
unknown
https://iplogger.org/-
unknown
http://147.45.44.104/prog/66d70e8640404_trics.exee
unknown
http://62.133.61.172/
unknown
https://datamarket.azure.com/embedded/consent?client_id=
unknown
https://vault.azure.net/mysql.database.azure.comhttps://cosmos.azure.comSetConsoleCursorPositionstre
unknown
http://147.45.44.104/malesa/66d1b7f7f3765_Front.exe1.
unknown
http://147.45.44.104/yuop/66d60cd3ce002_SeparatelyDied.exe#sun?
unknown
http://www.winimage.com/zLibDllm_object
unknown
https://ipinfo.io/
unknown
https://datamarket.azure.com/embedded/resultrhttps://datamarket.accesscontrol.windows.net/v2/OAuth2-
unknown
http://147.45.44.104/yuop/66d59ef9d4404_premium.exe#upus;
unknown
http://147.45.44.104/yuop/66d59ef9d4404_premium.exe#upusmt
unknown
http://147.45.44.104/prog/66d707730e9bf_s.exe#spacexin)HS
unknown
http://147.45.44.104/yuop/66d60cd3ce002_SeparatelyDied.exe#sun3
unknown
https://manage.windowsazure.us/publishsettings/indexcrypto/rsa:
unknown
https://iplogger.org/1nhuM4.js4
unknown
http://62.133.61.172/7O
unknown
http://176.111.174.109/bobr1
unknown
http://147.45.44.104/revada/66c6fcb30b9dd_123p.exeC:
unknown
https://ipinfo.io/https://ipgeolocation.io/::
unknown
https://datamarket.azure.com/embedded/catalog?client_id=
unknown
http://147.45.44.104/malesa/66d1b7f7f3765_Front.exe5-i
unknown
https://github.com/go-sql-driver/mysql/wiki/old_passwords0001020304050607080910111213141516171819202
unknown
http://147.45.44.104/yuop/66d58b1858bcb_crypted.exe#xinto
unknown
http://62.133.61.172/api/crazyfish.php
unknown
http://html4/loose.dtd
unknown
https://ipinfo.io:443/widget/demo/8.46.123.33
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
stamppreewntnq.shop
188.114.97.3
malicious
condedqpwqm.shop
172.67.146.35
malicious
locatedblsoqp.shop
unknown
malicious
traineiwnqo.shop
unknown
malicious
youtransfer.net
158.69.225.124
ipinfo.io
34.117.59.81
file-link-iota.vercel.app
76.76.21.98
iplogger.org
104.26.2.46
api64.ipify.org
104.237.62.213
240902180529931.tyr.zont16.com
unknown

IPs

IP
Domain
Country
Malicious
46.8.231.109
unknown
Russian Federation
malicious
185.215.113.100
unknown
Portugal
malicious
62.133.61.172
unknown
Russian Federation
malicious
147.45.68.138
unknown
Russian Federation
malicious
188.114.97.3
stamppreewntnq.shop
European Union
malicious
172.67.146.35
condedqpwqm.shop
United States
malicious
147.45.47.36
unknown
Russian Federation
malicious
77.105.164.24
unknown
Russian Federation
malicious
34.117.59.81
ipinfo.io
United States
176.111.174.109
unknown
Russian Federation
147.45.44.104
unknown
Russian Federation
158.69.225.124
youtransfer.net
Canada
104.26.2.46
iplogger.org
United States
31.41.244.9
unknown
Russian Federation
104.237.62.213
api64.ipify.org
United States
154.216.17.178
unknown
Seychelles
76.76.21.98
file-link-iota.vercel.app
United States
127.0.0.1
unknown
unknown
There are 8 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\4072
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\4072
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\4072
CreationTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
ProgramId
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
FileId
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
LowerCaseLongPath
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
LongPathHash
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
Name
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
OriginalFileName
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
Publisher
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
Version
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
BinFileVersion
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
BinaryType
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
ProductName
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
ProductVersion
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
LinkDate
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
BinProductVersion
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
AppxPackageFullName
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
AppxPackageRelativeId
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
Size
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
Language
\REGISTRY\A\{44839173-1423-6cdb-f699-5f5ee16998e5}\Root\InventoryApplicationFile\l6bawr4854fj5lvx|a3736859a914b1c0
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ExtreamFanV6
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
148E000
heap
page read and write
malicious
108A000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2380000
direct allocation
page read and write
malicious
4295000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
33C5000
trusted library allocation
page read and write
malicious
2060000
direct allocation
page read and write
malicious
1B50000
direct allocation
page read and write
malicious
24EC000
direct allocation
page read and write
malicious
1A50000
direct allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
18EC000
direct allocation
page read and write
malicious
40E5000
trusted library allocation
page read and write
malicious
148A000
heap
page read and write
4D1000
remote allocation
page execute and read and write
24222202000
unkown
page read and write
4951000
trusted library allocation
page read and write
800000
heap
page read and write
5EA6000
trusted library allocation
page read and write
2201F000
stack
page read and write
30C0000
trusted library allocation
page read and write
38A0000
trusted library allocation
page read and write
5D19000
trusted library allocation
page read and write
3387000
trusted library allocation
page read and write
790000
heap
page read and write
4FA0000
trusted library allocation
page read and write
5844000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
3870000
trusted library allocation
page read and write
5B24000
heap
page read and write
14E0000
trusted library allocation
page read and write
31B1000
heap
page read and write
2B93000
trusted library allocation
page read and write
3A15000
trusted library allocation
page read and write
1732B000
heap
page read and write
10EB000
heap
page read and write
1330000
trusted library allocation
page read and write
3D53000
heap
page read and write
13FD000
unkown
page readonly
223FD000
stack
page read and write
3846000
trusted library allocation
page read and write
2F9E000
stack
page read and write
2948000
trusted library allocation
page read and write
4938000
trusted library allocation
page read and write
5A7000
remote allocation
page execute and read and write
13AE000
heap
page read and write
5ADE000
stack
page read and write
180E000
direct allocation
page read and write
6EC7000
heap
page read and write
307C000
stack
page read and write
4B25000
trusted library allocation
page read and write
30E2000
trusted library allocation
page execute and read and write
6480000
trusted library allocation
page execute and read and write
692000
unkown
page readonly
C1F000
heap
page read and write
62000
unkown
page readonly
1980000
direct allocation
page read and write
CF3000
unkown
page execute and read and write
15A3000
heap
page read and write
214A000
direct allocation
page read and write
1D79E000
stack
page read and write
A0E000
stack
page read and write
20F4000
direct allocation
page read and write
7130000
trusted library allocation
page read and write
ED5000
heap
page read and write
177F000
stack
page read and write
5986000
trusted library allocation
page read and write
34AF000
stack
page read and write
1D3DF000
stack
page read and write
5A7E000
stack
page read and write
3350000
trusted library allocation
page read and write
330F000
stack
page read and write
23733E2B000
heap
page read and write
14B0000
trusted library allocation
page read and write
4EA1000
heap
page read and write
1940000
direct allocation
page read and write
390C000
trusted library allocation
page read and write
1330000
heap
page read and write
31C0000
heap
page read and write
5940000
trusted library allocation
page read and write
32A0000
heap
page read and write
27463000
heap
page read and write
4EA1000
heap
page read and write
48AD000
trusted library allocation
page read and write
2BBF000
trusted library allocation
page read and write
3306000
trusted library allocation
page read and write
1B7D000
heap
page read and write
513F000
heap
page read and write
704A000
trusted library allocation
page read and write
1520000
heap
page read and write
1876000
direct allocation
page read and write
1687000
heap
page read and write
4EA1000
heap
page read and write
208E000
direct allocation
page read and write
1810000
direct allocation
page read and write
5E20000
trusted library allocation
page execute and read and write
3310000
heap
page read and write
14E6000
trusted library allocation
page execute and read and write
75CE000
stack
page read and write
1337000
trusted library allocation
page execute and read and write
104F000
stack
page read and write
140000000
unkown
page readonly
4EA1000
heap
page read and write
1490000
heap
page read and write
22610000
heap
page read and write
3090000
trusted library allocation
page read and write
17C0000
heap
page read and write
1926000
direct allocation
page read and write
12EE000
heap
page read and write
631F000
stack
page read and write
400000
remote allocation
page execute and read and write
23733DF0000
trusted library allocation
page read and write
48FF000
trusted library allocation
page read and write
3ACF000
trusted library allocation
page read and write
16C8000
heap
page read and write
386C000
trusted library allocation
page read and write
54A0000
direct allocation
page execute and read and write
44DD000
stack
page read and write
2F90000
heap
page read and write
A50000
trusted library allocation
page read and write
3325000
trusted library allocation
page read and write
9232000
heap
page read and write
174E0000
heap
page read and write
1303000
trusted library allocation
page execute and read and write
7A8000
unkown
page read and write
237393A0000
trusted library allocation
page read and write
67B4000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
26C4000
trusted library allocation
page read and write
1D9E000
stack
page read and write
23739656000
heap
page read and write
2052000
direct allocation
page read and write
180C000
direct allocation
page read and write
303C000
stack
page read and write
1C80000
heap
page read and write
3221000
trusted library allocation
page read and write
130A000
heap
page read and write
1EDD000
stack
page read and write
61FF000
stack
page read and write
30E3000
trusted library allocation
page read and write
6A180000
unkown
page readonly
1460000
heap
page read and write
20E0000
trusted library allocation
page read and write
22DE000
direct allocation
page read and write
201C000
direct allocation
page read and write
56F4000
trusted library allocation
page read and write
13AB000
heap
page read and write
14ACE000
stack
page read and write
6179000
trusted library allocation
page read and write
1607000
trusted library allocation
page execute and read and write
A64000
trusted library allocation
page read and write
31DE000
stack
page read and write
2373471A000
heap
page read and write
4DC3000
heap
page execute and read and write
56E0000
trusted library allocation
page execute and read and write
1040000
unkown
page readonly
35DE000
stack
page read and write
16F0000
trusted library allocation
page read and write
58B2000
trusted library allocation
page read and write
736E000
stack
page read and write
2C79000
trusted library allocation
page read and write
45DE000
stack
page read and write
17DD000
stack
page read and write
30D0000
heap
page execute and read and write
AA5000
trusted library allocation
page execute and read and write
1C2F000
heap
page read and write
30D0000
heap
page execute and read and write
502E000
stack
page read and write
3AB0000
trusted library allocation
page read and write
32DF000
trusted library allocation
page read and write
F89000
unkown
page readonly
2D10000
trusted library allocation
page read and write
113B000
unkown
page execute and write copy
272E000
trusted library allocation
page read and write
13D4000
heap
page read and write
2D40000
trusted library allocation
page read and write
1480000
heap
page read and write
4EA1000
heap
page read and write
3830000
trusted library allocation
page execute and read and write
F80000
unkown
page readonly
1350000
trusted library allocation
page read and write
6087000
trusted library allocation
page read and write
BB0000
heap
page read and write
5AB4000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
1480000
heap
page read and write
770E000
stack
page read and write
18CF000
stack
page read and write
23734530000
trusted library section
page read and write
16CD05F0000
heap
page read and write
237394A0000
trusted library allocation
page read and write
4CE0000
heap
page read and write
24222400000
trusted library allocation
page read and write
1211000
heap
page read and write
CBC000
stack
page read and write
E02000
trusted library allocation
page read and write
720000
heap
page read and write
12D7000
unkown
page execute and write copy
CBA000
heap
page read and write
1806000
direct allocation
page read and write
520E000
stack
page read and write
DF7000
heap
page read and write
5068000
heap
page read and write
496B000
trusted library allocation
page read and write
190000
heap
page read and write
2FA0000
trusted library allocation
page read and write
1F0000
heap
page read and write
D24000
unkown
page execute and read and write
13FC000
unkown
page write copy
1750000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
69D0F000
unkown
page readonly
2DBF000
stack
page read and write
4822000
trusted library allocation
page read and write
FD38F7E000
stack
page read and write
7A2000
unkown
page read and write
8B6000
unkown
page readonly
5D00000
trusted library section
page read and write
2086000
direct allocation
page read and write
4EA1000
heap
page read and write
4828000
trusted library allocation
page read and write
61F0000
heap
page execute and read and write
1D19E000
stack
page read and write
24222600000
heap
page read and write
4EA1000
heap
page read and write
18C0000
heap
page execute and read and write
237396E0000
heap
page read and write
23C2000
trusted library allocation
page execute and read and write
1930000
direct allocation
page read and write
2F2F000
stack
page read and write
E10000
heap
page read and write
1FFDD2E0000
heap
page read and write
14C3000
trusted library allocation
page execute and read and write
5370000
trusted library allocation
page read and write
BB0000
unkown
page readonly
A11000
unkown
page execute read
3318000
trusted library allocation
page read and write
31B3000
heap
page read and write
535C000
stack
page read and write
3361000
heap
page read and write
1A0000
heap
page read and write
2C5E000
trusted library allocation
page read and write
14FD000
stack
page read and write
14C4000
trusted library allocation
page read and write
7A52000
trusted library allocation
page read and write
69D50000
unkown
page read and write
6460000
trusted library allocation
page read and write
CB25F0D000
stack
page read and write
237393B4000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
5127000
heap
page read and write
17EF000
stack
page read and write
141F000
heap
page read and write
27DE000
stack
page read and write
EEB000
stack
page read and write
A11000
unkown
page execute read
2094000
trusted library allocation
page read and write
48CE000
stack
page read and write
6160000
trusted library allocation
page read and write
4030AD000
stack
page read and write
15CD000
trusted library allocation
page execute and read and write
58B0000
trusted library allocation
page read and write
2058000
direct allocation
page read and write
922F000
heap
page read and write
4EA1000
heap
page read and write
22E7000
direct allocation
page read and write
596E000
stack
page read and write
2082000
direct allocation
page read and write
273E1000
heap
page read and write
3D5C000
heap
page read and write
1902000
direct allocation
page read and write
1B5A000
trusted library allocation
page execute and read and write
20EC000
direct allocation
page read and write
54BE000
stack
page read and write
C3B000
stack
page read and write
28DD000
stack
page read and write
4EA1000
heap
page read and write
13F0000
heap
page read and write
18EE000
stack
page read and write
5756000
trusted library allocation
page read and write
3A55000
trusted library allocation
page read and write
4BFE000
stack
page read and write
23739694000
heap
page read and write
13A0000
heap
page read and write
C61000
unkown
page execute and write copy
D4E000
heap
page read and write
574E000
stack
page read and write
20D6000
direct allocation
page read and write
273A0000
heap
page read and write
2F80000
trusted library allocation
page read and write
4567000
trusted library allocation
page read and write
4A9A000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page read and write
323F000
unkown
page read and write
14A8E000
stack
page read and write
5B9000
remote allocation
page execute and read and write
B50000
trusted library allocation
page execute and read and write
209A000
direct allocation
page read and write
1B81000
heap
page read and write
2D2F000
trusted library allocation
page read and write
2422222B000
heap
page read and write
23739700000
heap
page read and write
31BF000
heap
page read and write
60B9000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
16CD0510000
heap
page read and write
4ADF000
stack
page read and write
1714000
trusted library allocation
page read and write
1938000
direct allocation
page read and write
F8B000
unkown
page readonly
32FD000
trusted library allocation
page read and write
D1D000
heap
page read and write
4C4000
remote allocation
page execute and read and write
408000
unkown
page readonly
3A8A000
trusted library allocation
page read and write
200C000
direct allocation
page read and write
3A9E000
trusted library allocation
page read and write
101E000
unkown
page read and write
6E32000
heap
page read and write
5715000
trusted library allocation
page read and write
23739440000
trusted library allocation
page read and write
2B4D000
stack
page read and write
7500000
heap
page read and write
1560000
heap
page read and write
588E000
stack
page read and write
5BBE000
stack
page read and write
15D7000
trusted library allocation
page execute and read and write
51DE000
stack
page read and write
6730000
trusted library allocation
page read and write
1ACA000
direct allocation
page read and write
6763000
trusted library allocation
page read and write
3A4A000
trusted library allocation
page read and write
2254D000
direct allocation
page read and write
FA1000
unkown
page readonly
1B67000
heap
page read and write
13E000
stack
page read and write
504E000
stack
page read and write
13D5000
stack
page read and write
15E3000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
1020000
heap
page read and write
1880000
heap
page read and write
61CE000
stack
page read and write
33B7000
heap
page read and write
4841000
trusted library allocation
page read and write
2014000
direct allocation
page read and write
18D0000
heap
page read and write
FD395FE000
unkown
page readonly
1600000
trusted library allocation
page read and write
561F000
stack
page read and write
DB0000
heap
page read and write
62F0000
trusted library allocation
page execute and read and write
1AA8000
direct allocation
page read and write
5287000
heap
page read and write
1610000
trusted library allocation
page read and write
21332000
heap
page read and write
15DB000
trusted library allocation
page execute and read and write
378E000
stack
page read and write
3890000
trusted library allocation
page read and write
6230000
trusted library allocation
page read and write
FE1000
unkown
page write copy
717E000
stack
page read and write
237352E0000
trusted library allocation
page read and write
133B000
stack
page read and write
2D36000
trusted library allocation
page read and write
8F7000
stack
page read and write
2271F000
stack
page read and write
4FB000
stack
page read and write
5A85000
trusted library allocation
page read and write
4EA1000
heap
page read and write
17744000
heap
page read and write
A10000
unkown
page readonly
61D1000
trusted library allocation
page read and write
C5E000
heap
page read and write
1DA3C000
stack
page read and write
50FD000
heap
page read and write
140CAB000
unkown
page readonly
2096000
direct allocation
page read and write
4EA1000
heap
page read and write
13AE000
stack
page read and write
1345000
unkown
page read and write
2CA5000
trusted library allocation
page read and write
17E0000
heap
page read and write
1542000
heap
page read and write
4EA1000
heap
page read and write
5002000
trusted library allocation
page read and write
1904000
direct allocation
page read and write
5E96000
trusted library allocation
page read and write
FD38EFE000
unkown
page readonly
4EA1000
heap
page read and write
5EBE000
stack
page read and write
31D5000
trusted library allocation
page read and write
AA2000
trusted library allocation
page read and write
E38000
heap
page read and write
6E84000
heap
page read and write
1380000
heap
page read and write
586000
heap
page read and write
3A7D000
trusted library allocation
page read and write
4EA1000
heap
page read and write
FDA000
unkown
page write copy
3327000
trusted library allocation
page read and write
16F6000
trusted library allocation
page read and write
179E000
stack
page read and write
594E000
stack
page read and write
1565000
heap
page read and write
2C9F000
trusted library allocation
page read and write
33D1000
trusted library allocation
page read and write
3D9D000
heap
page read and write
592000
remote allocation
page execute and read and write
3A37000
trusted library allocation
page read and write
1D93E000
stack
page read and write
18F0000
heap
page read and write
69D55000
unkown
page readonly
1D9BE000
stack
page read and write
14B5000
heap
page read and write
FC5000
unkown
page readonly
184E000
stack
page read and write
724000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
D31000
heap
page read and write
3D5E000
stack
page read and write
1A70000
heap
page read and write
DC0000
trusted library allocation
page read and write
1364000
heap
page read and write
1500000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
1890000
direct allocation
page read and write
2B87000
trusted library allocation
page read and write
F97000
unkown
page readonly
6E3D000
heap
page read and write
FD384FE000
unkown
page readonly
6ECF000
stack
page read and write
3160000
heap
page execute and read and write
17762000
heap
page read and write
A63000
trusted library allocation
page execute and read and write
23734F10000
trusted library section
page readonly
22F0000
direct allocation
page read and write
56A0000
trusted library allocation
page read and write
3D40000
heap
page read and write
3DCE000
heap
page read and write
2024000
direct allocation
page read and write
5FFE000
stack
page read and write
1440000
heap
page read and write
1417000
heap
page read and write
14C0000
trusted library allocation
page read and write
237393B0000
trusted library allocation
page read and write
103F000
unkown
page write copy
30E1000
trusted library allocation
page read and write
3855000
trusted library allocation
page read and write
526000
heap
page read and write
F61000
unkown
page readonly
5B90000
heap
page execute and read and write
26D0000
trusted library allocation
page read and write
5A9F000
trusted library allocation
page read and write
18FD000
stack
page read and write
CFF000
unkown
page execute and read and write
1F5000
heap
page read and write
15A6000
trusted library allocation
page read and write
209C000
direct allocation
page read and write
58A0000
trusted library allocation
page execute and read and write
631000
unkown
page execute read
69B71000
unkown
page execute read
9A4F000
stack
page read and write
5283000
heap
page read and write
237396E8000
heap
page read and write
11D6000
stack
page read and write
30A0000
trusted library allocation
page read and write
D85000
heap
page read and write
1370000
heap
page read and write
15A9000
heap
page read and write
704F000
trusted library allocation
page read and write
12B6000
heap
page read and write
624F000
stack
page read and write
4DC0000
remote allocation
page read and write
5870000
trusted library allocation
page execute and read and write
1450000
heap
page read and write
4EA1000
heap
page read and write
180E000
stack
page read and write
1D7C9000
heap
page read and write
74F0000
trusted library allocation
page execute and read and write
FC5000
unkown
page readonly
5790000
trusted library allocation
page read and write
4778000
trusted library allocation
page read and write
30C0000
heap
page execute and read and write
6E70000
heap
page read and write
61ED3000
direct allocation
page read and write
88F000
stack
page read and write
2EBE000
stack
page read and write
2026000
direct allocation
page read and write
1278000
direct allocation
page read and write
24222315000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
493000
remote allocation
page execute and read and write
4EA1000
heap
page read and write
6760000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
24222238000
heap
page read and write
1808000
direct allocation
page read and write
230E000
direct allocation
page read and write
651000
remote allocation
page execute and read and write
1676000
heap
page read and write
20A0000
trusted library allocation
page read and write
192A000
direct allocation
page read and write
456000
remote allocation
page execute and read and write
490C000
stack
page read and write
61EB4000
direct allocation
page read and write
5B8E000
stack
page read and write
D89000
heap
page read and write
3D1F000
stack
page read and write
59F0000
heap
page execute and read and write
4EA1000
heap
page read and write
4EA1000
heap
page read and write
371F000
stack
page read and write
4EB0000
heap
page read and write
1419000
heap
page read and write
57C0000
trusted library allocation
page read and write
159D000
trusted library allocation
page execute and read and write
20CC000
direct allocation
page read and write
FE5000
stack
page read and write
201A000
direct allocation
page read and write
1617000
heap
page read and write
435F000
stack
page read and write
1464000
unkown
page readonly
15C0000
trusted library allocation
page read and write
38A0000
trusted library allocation
page read and write
1DC9E000
stack
page read and write
585F000
trusted library allocation
page read and write
1534000
heap
page read and write
18A0000
direct allocation
page read and write
C4C000
heap
page read and write
1450000
heap
page read and write
26E5000
trusted library allocation
page read and write
E14000
unkown
page readonly
FD38CFE000
unkown
page readonly
5EA4000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
4FB000
stack
page read and write
1210000
heap
page read and write
144B000
heap
page read and write
237352B1000
trusted library allocation
page read and write
5AA7000
trusted library allocation
page read and write
CB25F8F000
stack
page read and write
24E0000
heap
page read and write
1BD1000
heap
page read and write
33A1000
trusted library allocation
page read and write
606E000
trusted library allocation
page read and write
61F0000
trusted library allocation
page read and write
15E2000
heap
page read and write
3384000
trusted library allocation
page read and write
69D4E000
unkown
page read and write
C60000
unkown
page read and write
317F000
stack
page read and write
141968000
unkown
page readonly
5CFE000
stack
page read and write
33CF000
trusted library allocation
page read and write
1916000
direct allocation
page read and write
1300000
trusted library allocation
page read and write
2373970C000
heap
page read and write
14BCF000
stack
page read and write
5AE5000
trusted library allocation
page read and write
17A0000
trusted library allocation
page execute and read and write
2DBF000
stack
page read and write
FD38B7E000
stack
page read and write
1FFDD4C0000
heap
page read and write
56EF000
stack
page read and write
18A4000
direct allocation
page read and write
3D4F000
heap
page read and write
271E000
trusted library allocation
page read and write
1880000
heap
page read and write
2FF0000
heap
page read and write
147E000
stack
page read and write
1580000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
1464000
unkown
page readonly
39C1000
trusted library allocation
page read and write
3327000
heap
page read and write
77F000
stack
page read and write
437000
remote allocation
page execute and read and write
40312F000
stack
page read and write
1FDF000
stack
page read and write
49F000
remote allocation
page execute and read and write
294E000
trusted library allocation
page read and write
222BE000
stack
page read and write
12D6000
unkown
page execute and read and write
6E4D000
heap
page read and write
C24000
unkown
page readonly
146D000
unkown
page readonly
232E000
stack
page read and write
3230000
trusted library allocation
page read and write
FD37FF7000
stack
page read and write
763B000
stack
page read and write
1480000
heap
page read and write
299E000
trusted library allocation
page read and write
1631000
heap
page read and write
13CA000
heap
page read and write
61EB7000
direct allocation
page readonly
9E6000
heap
page read and write
211C000
direct allocation
page read and write
52AE000
stack
page read and write
1EE000
stack
page read and write
185E000
direct allocation
page read and write
538F000
stack
page read and write
2000000
direct allocation
page read and write
18AA000
direct allocation
page read and write
322C000
trusted library allocation
page read and write
237394D0000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
294A000
trusted library allocation
page read and write
598E000
stack
page read and write
B60000
trusted library allocation
page read and write
2040000
direct allocation
page read and write
1670000
trusted library allocation
page execute and read and write
F46000
unkown
page readonly
23739510000
remote allocation
page read and write
15FE000
heap
page read and write
5E4F000
stack
page read and write
24222100000
heap
page read and write
247E000
stack
page read and write
3374000
trusted library allocation
page read and write
117D000
stack
page read and write
50112CD000
stack
page read and write
15C0000
trusted library allocation
page read and write
6200000
heap
page read and write
13E0000
heap
page read and write
4EA1000
heap
page read and write
27402000
heap
page read and write
5846000
trusted library allocation
page read and write
B4C000
stack
page read and write
237396FC000
heap
page read and write
1A20000
heap
page read and write
4EA1000
heap
page read and write
13E9000
heap
page read and write
495000
remote allocation
page execute and read and write
2328000
direct allocation
page read and write
4EA1000
heap
page read and write
2747A000
heap
page read and write
21D3000
direct allocation
page read and write
2956000
trusted library allocation
page read and write
6290000
trusted library allocation
page execute and read and write
6766000
trusted library allocation
page read and write
1934000
direct allocation
page read and write
38B0000
heap
page read and write
714000
trusted library allocation
page read and write
4EA1000
heap
page read and write
1540000
trusted library allocation
page execute and read and write
15C6000
trusted library allocation
page execute and read and write
125E000
stack
page read and write
1023000
unkown
page read and write
F77000
unkown
page readonly
4EA1000
heap
page read and write
19A000
stack
page read and write
18CD000
stack
page read and write
41E9000
trusted library allocation
page read and write
24222613000
heap
page read and write
223BF000
stack
page read and write
296F000
trusted library allocation
page read and write
1882000
direct allocation
page read and write
2213F000
stack
page read and write
18CE000
stack
page read and write
3230000
direct allocation
page read and write
C27000
heap
page read and write
F42000
unkown
page readonly
234C000
direct allocation
page read and write
4E6D000
stack
page read and write
12E8000
heap
page read and write
532E000
stack
page read and write
40B000
unkown
page read and write
31D1000
trusted library allocation
page read and write
3382000
trusted library allocation
page read and write
50D8000
trusted library allocation
page read and write
23733DC0000
heap
page read and write
16AC000
stack
page read and write
23739650000
heap
page read and write
32F9000
trusted library allocation
page read and write
14000A000
unkown
page readonly
334E000
trusted library allocation
page read and write
49C1000
trusted library allocation
page read and write
191A000
direct allocation
page read and write
2291000
direct allocation
page read and write
1906000
direct allocation
page read and write
790000
heap
page read and write
107C000
heap
page read and write
F87000
unkown
page readonly
5780000
trusted library allocation
page read and write
6E51000
heap
page read and write
5D6E000
stack
page read and write
63F000
remote allocation
page execute and read and write
2F70000
trusted library allocation
page read and write
55B2000
trusted library allocation
page read and write
C60000
unkown
page readonly
52B000
heap
page read and write
2BB4000
trusted library allocation
page read and write
1A80000
heap
page read and write
9261000
heap
page read and write
5050000
heap
page read and write
2032000
direct allocation
page read and write
33A3000
trusted library allocation
page read and write
11D0000
heap
page read and write
3230000
direct allocation
page read and write
54D000
remote allocation
page execute and read and write
6EE9000
heap
page read and write
1AA0000
direct allocation
page read and write
51DE000
stack
page read and write
60000
unkown
page readonly
15E6000
heap
page read and write
CB2647F000
stack
page read and write
55E0000
trusted library allocation
page read and write
333B000
trusted library allocation
page read and write
DDB000
trusted library allocation
page read and write
FA4000
unkown
page readonly
163E000
heap
page read and write
3177000
heap
page read and write
501134F000
stack
page read and write
5768000
trusted library allocation
page read and write
10DB000
stack
page read and write
187E000
direct allocation
page read and write
1780000
trusted library allocation
page execute and read and write
F9F000
unkown
page readonly
540000
heap
page read and write
69D4F000
unkown
page write copy
31B6000
heap
page read and write
1FE0000
heap
page read and write
FD388FE000
unkown
page readonly
2B8E000
stack
page read and write
337E000
heap
page read and write
4D00000
heap
page read and write
1D65F000
stack
page read and write
237393A0000
trusted library allocation
page read and write
3842000
trusted library allocation
page read and write
4A83000
trusted library allocation
page read and write
550000
heap
page read and write
31A0000
trusted library allocation
page read and write
318B000
heap
page read and write
172FD000
stack
page read and write
35FE000
stack
page read and write
56F0000
trusted library allocation
page execute and read and write
4E9F000
stack
page read and write
EA6000
heap
page read and write
1B00D000
stack
page read and write
152B000
heap
page read and write
13C6000
heap
page read and write
43BD000
trusted library allocation
page read and write
6EBB000
heap
page read and write
30E1000
trusted library allocation
page read and write
C3E000
heap
page read and write
4D50000
heap
page read and write
31B1000
heap
page read and write
339F000
trusted library allocation
page read and write
16CD0348000
heap
page read and write
CB2657E000
stack
page read and write
31AF000
stack
page read and write
55D2000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
4EA1000
heap
page read and write
FD380FE000
unkown
page readonly
1733C000
heap
page read and write
E0000
unkown
page readonly
FD3907E000
stack
page read and write
545F000
stack
page read and write
32F3000
trusted library allocation
page read and write
1A6EF000
stack
page read and write
31B3000
heap
page read and write
EE0000
heap
page read and write
315F000
trusted library allocation
page read and write
6300000
trusted library allocation
page execute and read and write
61E01000
direct allocation
page execute read
2020000
direct allocation
page read and write
3E5F000
stack
page read and write
2BC6000
trusted library allocation
page read and write
2C8D000
stack
page read and write
23734F40000
trusted library section
page readonly
29CE000
unkown
page read and write
1455000
unkown
page readonly
1AB5000
heap
page read and write
40E1000
trusted library allocation
page read and write
2280000
direct allocation
page read and write
449F000
stack
page read and write
40D1000
trusted library allocation
page read and write
6EF1000
heap
page read and write
5A83000
trusted library allocation
page read and write
5ABE000
stack
page read and write
7060000
trusted library allocation
page read and write
DB0000
heap
page read and write
FD382FE000
unkown
page readonly
4EA1000
heap
page read and write
2968000
trusted library allocation
page read and write
182F000
stack
page read and write
DEE000
trusted library allocation
page read and write
1AB2000
direct allocation
page read and write
1B89000
heap
page read and write
6270000
trusted library allocation
page read and write
135E000
stack
page read and write
16AE000
stack
page read and write
61ECD000
direct allocation
page readonly
1314000
heap
page read and write
479D000
trusted library allocation
page read and write
20D4000
direct allocation
page read and write
5A6F000
stack
page read and write
2972000
trusted library allocation
page read and write
C3A000
unkown
page readonly
1479000
heap
page read and write
22540000
direct allocation
page read and write
4174000
trusted library allocation
page read and write
565E000
stack
page read and write
112C000
unkown
page execute and read and write
3A3D000
trusted library allocation
page read and write
51C4000
trusted library allocation
page read and write
2292000
trusted library allocation
page execute and read and write
6733000
trusted library allocation
page read and write
1D7AD000
direct allocation
page readonly
4A54000
trusted library allocation
page read and write
FFB000
stack
page read and write
4DD0000
heap
page read and write
11DE000
heap
page read and write
24222602000
heap
page read and write
6217000
heap
page read and write
5FFE000
stack
page read and write
5642000
trusted library allocation
page read and write
DB9000
heap
page read and write
220E000
stack
page read and write
C10000
heap
page read and write
FD38FFE000
unkown
page readonly
2220000
heap
page read and write
1910000
direct allocation
page read and write
5DBF000
stack
page read and write
7035000
trusted library allocation
page read and write
1AA2000
direct allocation
page read and write
23739350000
trusted library allocation
page read and write
5A36000
heap
page read and write
229C000
direct allocation
page read and write
4C1F000
stack
page read and write
22EE000
direct allocation
page read and write
14E0000
heap
page read and write
3395000
trusted library allocation
page read and write
F9C000
unkown
page readonly
5A3F000
heap
page read and write
49C9000
trusted library allocation
page read and write
1B10C000
stack
page read and write
15D0000
heap
page read and write
33E4000
trusted library allocation
page read and write
F94000
unkown
page readonly
5DAE000
stack
page read and write
1558000
heap
page read and write
3293000
trusted library allocation
page read and write
BB2000
unkown
page readonly
A70000
trusted library allocation
page read and write
13ED000
heap
page read and write
1590000
trusted library allocation
page read and write
6280000
trusted library allocation
page read and write
6E81000
heap
page read and write
385E000
trusted library allocation
page read and write
B6A000
heap
page read and write
3196000
heap
page read and write
BA2000
unkown
page readonly
2373471A000
heap
page read and write
76CF000
stack
page read and write
E2C000
heap
page read and write
1731A000
heap
page read and write
3316000
trusted library allocation
page read and write
2577000
direct allocation
page read and write
26090B60000
heap
page read and write
B30000
heap
page read and write
151B000
trusted library allocation
page execute and read and write
26E0000
trusted library allocation
page read and write
5ED9000
trusted library allocation
page read and write
D88000
stack
page read and write
21E40000
heap
page read and write
33D3000
trusted library allocation
page read and write
FD381FE000
stack
page read and write
512A000
heap
page read and write
5AD9000
trusted library allocation
page read and write
309E000
stack
page read and write
103A000
unkown
page read and write
1BA5FFD0000
heap
page read and write
CB0000
heap
page read and write
17B6000
stack
page read and write
FD391FE000
unkown
page readonly
5930000
heap
page read and write
23C1000
trusted library allocation
page read and write
3660000
heap
page read and write
4B1E000
stack
page read and write
23733F13000
heap
page read and write
2293000
trusted library allocation
page read and write
6070000
trusted library allocation
page execute and read and write
5D20000
trusted library section
page read and write
AA7000
trusted library allocation
page execute and read and write
395F000
stack
page read and write
4F2D000
stack
page read and write
3171000
trusted library allocation
page read and write
1892000
direct allocation
page read and write
7039000
trusted library allocation
page read and write
2008000
direct allocation
page read and write
237394B0000
trusted library allocation
page read and write
5D1E000
stack
page read and write
F80000
unkown
page readonly
FDA000
unkown
page read and write
DC0000
heap
page read and write
26090D70000
heap
page read and write
5706000
trusted library allocation
page read and write
4EA1000
heap
page read and write
3363000
trusted library allocation
page read and write
DEE000
heap
page read and write
62A0000
trusted library allocation
page execute and read and write
515E000
heap
page read and write
23739360000
trusted library allocation
page read and write
14E000
stack
page read and write
144E000
unkown
page readonly
139D000
unkown
page read and write
33C2000
trusted library allocation
page read and write
237392E0000
trusted library allocation
page read and write
1880000
heap
page execute and read and write
54A0000
direct allocation
page execute and read and write
161B000
heap
page read and write
4A15000
trusted library allocation
page read and write
5CA0000
heap
page read and write
4EA1000
heap
page read and write
3A4C000
trusted library allocation
page read and write
1900000
direct allocation
page read and write
424347F000
stack
page read and write
23739390000
trusted library allocation
page read and write
1306000
heap
page read and write
2B85000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
2373965A000
heap
page read and write
4EA1000
heap
page read and write
2038000
direct allocation
page read and write
3180000
heap
page read and write
5CDE000
heap
page read and write
F25000
heap
page read and write
3303000
trusted library allocation
page read and write
1510000
heap
page read and write
13D4000
trusted library allocation
page read and write
212F000
stack
page read and write
3150000
trusted library allocation
page read and write
5EB2000
trusted library allocation
page read and write
40DF000
stack
page read and write
59E6000
trusted library allocation
page read and write
31F0000
heap
page read and write
320E000
stack
page read and write
15CD000
trusted library allocation
page execute and read and write
5C0000
heap
page read and write
571D000
trusted library allocation
page read and write
1466000
heap
page read and write
11F6000
heap
page read and write
2743C000
heap
page read and write
5BC0000
trusted library allocation
page execute and read and write
190E000
heap
page read and write
1440000
heap
page read and write
1BA5FFF0000
heap
page read and write
23733E95000
heap
page read and write
2305000
direct allocation
page read and write
1150000
heap
page read and write
541000
heap
page read and write
4292000
trusted library allocation
page read and write
33BA000
trusted library allocation
page read and write
183A000
direct allocation
page read and write
57D0000
heap
page read and write
58C000
heap
page read and write
23733E7D000
heap
page read and write
14CD000
trusted library allocation
page execute and read and write
237396CC000
heap
page read and write
4E0D000
stack
page read and write
1560000
direct allocation
page read and write
295D000
trusted library allocation
page read and write
3863000
trusted library allocation
page read and write
56FB000
trusted library allocation
page read and write
73AE000
stack
page read and write
31CF000
stack
page read and write
8B6000
unkown
page readonly
206C000
direct allocation
page read and write
925A000
heap
page read and write
36DB000
trusted library allocation
page execute and read and write
580000
heap
page read and write
4EA1000
heap
page read and write
662E000
stack
page read and write
1B2B0000
heap
page read and write
3378000
trusted library allocation
page read and write
2373962C000
heap
page read and write
33B4000
trusted library allocation
page read and write
561E000
stack
page read and write
1550000
heap
page read and write
50A2000
heap
page read and write
24E4000
direct allocation
page read and write
C0E000
stack
page read and write
1954000
direct allocation
page read and write
A80000
trusted library allocation
page read and write
21F1D000
stack
page read and write
3A59000
trusted library allocation
page read and write
3192000
heap
page read and write
26090EA5000
heap
page read and write
638E000
stack
page read and write
4E70000
trusted library allocation
page read and write
FA1000
unkown
page readonly
1336000
stack
page read and write
5940000
heap
page read and write
94000
unkown
page readonly
4EA1000
heap
page read and write
289C000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
21B7F000
stack
page read and write
38D0000
trusted library allocation
page read and write
DD4000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
1605000
heap
page read and write
40B000
unkown
page write copy
7AC000
stack
page read and write
31EC000
stack
page read and write
13EA000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
2710000
trusted library allocation
page read and write
1690000
heap
page read and write
2D4C000
trusted library allocation
page read and write
3885000
trusted library allocation
page read and write
2022000
direct allocation
page read and write
23734602000
heap
page read and write
400000
remote allocation
page execute and read and write
6A1FD000
unkown
page readonly
5CD1000
heap
page read and write
2F30000
heap
page read and write
319D000
stack
page read and write
5996000
trusted library allocation
page read and write
3404000
trusted library allocation
page read and write
1866000
direct allocation
page read and write
13FD000
unkown
page readonly
810000
unkown
page read and write
3610000
heap
page read and write
2373A000000
heap
page read and write
1AC6000
direct allocation
page read and write
2254F000
direct allocation
page read and write
26090EA0000
heap
page read and write
1394000
heap
page read and write
3ABA000
trusted library allocation
page read and write
6EEF000
heap
page read and write
1B50000
trusted library allocation
page read and write
1AC8000
direct allocation
page read and write
5AAE000
trusted library allocation
page read and write
3333000
trusted library allocation
page read and write
296B000
trusted library allocation
page read and write
2C4D000
trusted library allocation
page read and write
5622000
trusted library allocation
page read and write
4DC0000
remote allocation
page read and write
1594000
trusted library allocation
page read and write
5ABE000
stack
page read and write
5320000
direct allocation
page read and write
1912000
trusted library allocation
page read and write
E4D000
unkown
page readonly
150E000
heap
page read and write
3C1E000
stack
page read and write
6A20E000
unkown
page read and write
1D55E000
stack
page read and write
1FFDD2C0000
heap
page read and write
331A000
trusted library allocation
page read and write
334D000
heap
page read and write
373E000
stack
page read and write
2F6C000
stack
page read and write
9B0000
heap
page read and write
5360000
trusted library allocation
page read and write
23734E30000
trusted library allocation
page read and write
63E000
remote allocation
page execute and read and write
41F000
unkown
page read and write
16EE000
stack
page read and write
123C000
stack
page read and write
4D62000
trusted library allocation
page read and write
5AFD000
stack
page read and write
5320000
direct allocation
page read and write
DF1000
trusted library allocation
page read and write
337E000
trusted library allocation
page read and write
1B14E000
stack
page read and write
6165000
trusted library allocation
page read and write
1656000
heap
page read and write
5ED6000
trusted library allocation
page read and write
69EF000
stack
page read and write
203A000
direct allocation
page read and write
E52000
unkown
page readonly
9234000
heap
page read and write
4D60000
trusted library allocation
page read and write
16CD05F5000
heap
page read and write
5E30000
trusted library allocation
page read and write
17CE000
stack
page read and write
2C86000
trusted library allocation
page read and write
231C000
direct allocation
page read and write
C3B000
heap
page read and write
5118000
trusted library allocation
page read and write
212F000
direct allocation
page read and write
30BE000
stack
page read and write
145F000
stack
page read and write
5B4D000
stack
page read and write
690000
unkown
page readonly
1338000
stack
page read and write
A82000
trusted library allocation
page read and write
1D0000
trusted library allocation
page read and write
3080000
heap
page read and write
4EA1000
heap
page read and write
2818000
trusted library allocation
page read and write
334A000
trusted library allocation
page read and write
DF6000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
41E1000
trusted library allocation
page read and write
3D88000
heap
page read and write
21330000
heap
page read and write
873000
unkown
page readonly
21CBF000
stack
page read and write
2F6B000
stack
page read and write
2336000
direct allocation
page read and write
32AE000
stack
page read and write
228C000
direct allocation
page read and write
3A71000
trusted library allocation
page read and write
55EE000
stack
page read and write
186E000
stack
page read and write
3A9F000
stack
page read and write
1326000
trusted library allocation
page execute and read and write
33CB000
trusted library allocation
page read and write
FD389FB000
stack
page read and write
6A212000
unkown
page readonly
5B8D000
stack
page read and write
22580000
direct allocation
page read and write
1D7AA000
direct allocation
page readonly
C30000
heap
page read and write
22AC000
direct allocation
page read and write
12E0000
heap
page read and write
5CF4000
trusted library allocation
page read and write
2118000
direct allocation
page read and write
4EA1000
heap
page read and write
24222213000
unkown
page read and write
3848000
trusted library allocation
page read and write
483F000
stack
page read and write
3878000
trusted library allocation
page read and write
3FDE000
stack
page read and write
EDD000
unkown
page readonly
310E000
stack
page read and write
1AE1D000
stack
page read and write
1D41E000
stack
page read and write
6770000
trusted library allocation
page execute and read and write
4E78000
trusted library allocation
page read and write
3AA9000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
23733E79000
heap
page read and write
181C000
direct allocation
page read and write
194E000
direct allocation
page read and write
13F0000
heap
page read and write
5EE5000
trusted library allocation
page read and write
A86000
trusted library allocation
page execute and read and write
4B93000
trusted library allocation
page read and write
18B2000
direct allocation
page read and write
D81000
heap
page read and write
2610000
direct allocation
page read and write
1500000
heap
page read and write
546E000
stack
page read and write
13C0000
heap
page read and write
26090C70000
heap
page read and write
1888000
direct allocation
page read and write
4E2D000
stack
page read and write
AA0000
trusted library allocation
page read and write
4EA1000
heap
page read and write
7070000
trusted library allocation
page execute and read and write
FD39B7E000
stack
page read and write
584000
heap
page read and write
5A7E000
stack
page read and write
4E60000
trusted library allocation
page read and write
21A0000
direct allocation
page read and write
5690000
trusted library allocation
page read and write
6EED000
heap
page read and write
337C000
trusted library allocation
page read and write
621E000
stack
page read and write
55DC000
trusted library allocation
page read and write
700000
trusted library allocation
page read and write
24222272000
unkown
page read and write
3231000
trusted library allocation
page read and write
305E000
stack
page read and write
371E000
stack
page read and write
5B10000
heap
page read and write
12AE000
stack
page read and write
23739510000
remote allocation
page read and write
31D5000
trusted library allocation
page read and write
576000
heap
page read and write
144E000
unkown
page readonly
1B95000
heap
page read and write
1080000
heap
page read and write
6094000
trusted library allocation
page read and write
23739370000
trusted library allocation
page read and write
BA0000
unkown
page readonly
537E000
stack
page read and write
506000
heap
page read and write
18D0000
heap
page read and write
56A2000
trusted library allocation
page read and write
F9F000
unkown
page readonly
5D0000
heap
page read and write
4FD000
remote allocation
page execute and read and write
562E000
stack
page read and write
1663000
heap
page read and write
5770000
trusted library allocation
page read and write
218FF000
stack
page read and write
3230000
direct allocation
page read and write
157E000
stack
page read and write
F20000
heap
page read and write
51B0000
trusted library allocation
page read and write
13A9000
unkown
page write copy
22542000
direct allocation
page read and write
264A000
direct allocation
page read and write
13B0000
heap
page read and write
2122000
direct allocation
page read and write
3257000
heap
page read and write
9A50000
unclassified section
page read and write
449000
remote allocation
page execute and read and write
382E000
stack
page read and write
6ECF000
heap
page read and write
6177000
trusted library allocation
page read and write
5742000
trusted library allocation
page read and write
30D1000
trusted library allocation
page read and write
26BF000
stack
page read and write
F97000
unkown
page readonly
2353000
direct allocation
page read and write
190C000
direct allocation
page read and write
3230000
direct allocation
page read and write
34140000
heap
page read and write
15F0000
heap
page read and write
1100000
heap
page read and write
DB5000
heap
page read and write
141933000
unkown
page execute read
5E00000
heap
page read and write
780000
heap
page read and write
13AB000
unkown
page read and write
439E000
stack
page read and write
15B6000
heap
page read and write
23739600000
heap
page read and write
5750000
trusted library allocation
page read and write
5A00000
heap
page read and write
4EA1000
heap
page read and write
E9B000
stack
page read and write
28D4000
trusted library allocation
page read and write
545000
heap
page read and write
4DC0000
remote allocation
page read and write
1AD4000
direct allocation
page read and write
1D76D000
direct allocation
page execute read
A6D000
trusted library allocation
page execute and read and write
1310000
heap
page read and write
225E000
stack
page read and write
14EE000
stack
page read and write
E6D000
unkown
page readonly
5952000
trusted library allocation
page read and write
13E0000
heap
page read and write
5490000
direct allocation
page execute and read and write
638000
remote allocation
page execute and read and write
2114000
direct allocation
page read and write
3140000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
40D9000
trusted library allocation
page read and write
1371000
heap
page read and write
1B10000
trusted library allocation
page read and write
50B4000
heap
page read and write
2760000
heap
page read and write
2373961F000
heap
page read and write
1D7AF000
direct allocation
page readonly
DB8000
stack
page read and write
21E60000
direct allocation
page read and write
34BF000
stack
page read and write
720000
trusted library allocation
page read and write
608A000
trusted library allocation
page read and write
237396C3000
heap
page read and write
1BA5FFF8000
heap
page read and write
433000
unkown
page read and write
20CA000
direct allocation
page read and write
7048000
trusted library allocation
page read and write
473E000
stack
page read and write
653E000
stack
page read and write
5D4E000
stack
page read and write
16CD0530000
heap
page read and write
1D568000
direct allocation
page execute read
1914000
direct allocation
page read and write
587E000
stack
page read and write
26F0000
trusted library allocation
page read and write
187D000
stack
page read and write
5EC0000
trusted library allocation
page read and write
A2E000
stack
page read and write
1848000
direct allocation
page read and write
DFD000
trusted library allocation
page read and write
5EF0000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
1520000
heap
page read and write
1B40000
heap
page read and write
55BF000
stack
page read and write
6A181000
unkown
page execute read
4EA1000
heap
page read and write
20F2000
direct allocation
page read and write
E7F000
unkown
page readonly
2296000
direct allocation
page read and write
190E000
direct allocation
page read and write
319C000
heap
page read and write
FE0000
unkown
page read and write
1036000
unkown
page read and write
61AB000
trusted library allocation
page read and write
2CDF000
stack
page read and write
33BD000
trusted library allocation
page read and write
1380000
heap
page read and write
EA0000
unkown
page execute and read and write
1074000
heap
page read and write
1260000
heap
page read and write
2D1D000
trusted library allocation
page read and write
123B000
stack
page read and write
237396E3000
heap
page read and write
15F1000
heap
page read and write
7032000
trusted library allocation
page read and write
55B8000
trusted library allocation
page read and write
1703000
trusted library allocation
page execute and read and write
1C88000
heap
page read and write
74AE000
stack
page read and write
1874000
direct allocation
page read and write
1BA60245000
heap
page read and write
4D0000
trusted library allocation
page read and write
D7D000
heap
page read and write
2330000
direct allocation
page read and write
22500000
direct allocation
page read and write
BAA000
heap
page read and write
2EED000
stack
page read and write
AAB000
trusted library allocation
page execute and read and write
1670000
heap
page read and write
C13000
heap
page read and write
500000
heap
page read and write
9B000
stack
page read and write
190A000
direct allocation
page read and write
5983000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
15A3000
trusted library allocation
page read and write
1880000
direct allocation
page read and write
B98000
heap
page read and write
13C5000
heap
page read and write
1D29F000
stack
page read and write
2064000
direct allocation
page read and write
5890000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
1920000
heap
page read and write
648F000
stack
page read and write
5740000
trusted library allocation
page read and write
14E3000
trusted library allocation
page execute and read and write
5271000
heap
page read and write
16A8000
heap
page read and write
1180000
heap
page read and write
1593000
trusted library allocation
page execute and read and write
237396F8000
heap
page read and write
15C4000
trusted library allocation
page read and write
FD38E7E000
stack
page read and write
17AE000
stack
page read and write
4EA1000
heap
page read and write
12F7000
stack
page read and write
DA8000
heap
page read and write
401000
unkown
page execute read
133B000
heap
page read and write
23734700000
heap
page read and write
30A6000
trusted library allocation
page read and write
6200000
trusted library allocation
page read and write
3230000
direct allocation
page read and write
6168000
trusted library allocation
page read and write
2227E000
stack
page read and write
2136B000
heap
page read and write
13E7000
unkown
page read and write
21CFD000
stack
page read and write
385B000
trusted library allocation
page read and write
1D561000
direct allocation
page execute read
4CFF000
stack
page read and write
23733E9F000
heap
page read and write
924E000
heap
page read and write
1BA600F0000
heap
page read and write
142E000
heap
page read and write
6210000
trusted library allocation
page read and write
4212000
trusted library allocation
page read and write
1630000
heap
page read and write
1FFDD0D0000
heap
page read and write
20CB000
trusted library allocation
page execute and read and write
548E000
stack
page read and write
1780B000
heap
page read and write
14F6000
trusted library allocation
page read and write
6260000
heap
page read and write
331C000
trusted library allocation
page read and write
1A10000
heap
page read and write
31B0000
trusted library allocation
page read and write
4B02000
trusted library allocation
page read and write
100B000
unkown
page write copy
3352000
trusted library allocation
page read and write
6175000
trusted library allocation
page read and write
1730000
trusted library allocation
page read and write
305E000
stack
page read and write
319C000
heap
page read and write
442E000
stack
page read and write
804000
heap
page read and write
384C000
trusted library allocation
page read and write
5A00000
heap
page execute and read and write
23C3000
trusted library allocation
page read and write
F40000
unkown
page readonly
3085000
heap
page read and write
336D000
heap
page read and write
2FB0000
heap
page read and write
8A0000
heap
page read and write
705A000
trusted library allocation
page read and write
9241000
heap
page read and write
2CE4000
trusted library allocation
page read and write
21BBE000
stack
page read and write
5900000
trusted library section
page readonly
4D5F000
stack
page read and write
5BEE000
trusted library allocation
page read and write
1588000
heap
page read and write
61F5000
trusted library allocation
page read and write
3862000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
39CF000
stack
page read and write
5F60000
trusted library allocation
page execute and read and write
8E0000
heap
page read and write
35BE000
stack
page read and write
345F000
stack
page read and write
FD38D7E000
stack
page read and write
24222300000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
B2F000
stack
page read and write
F94000
unkown
page readonly
319E000
stack
page read and write
5A9B000
trusted library allocation
page read and write
33D5000
trusted library allocation
page read and write
5ECF000
trusted library allocation
page read and write
14FE000
stack
page read and write
20EE000
direct allocation
page read and write
192C000
direct allocation
page read and write
476000
remote allocation
page execute and read and write
13C5000
unkown
page read and write
1858000
direct allocation
page read and write
4EA1000
heap
page read and write
23734901000
trusted library allocation
page read and write
4221000
trusted library allocation
page read and write
1872000
direct allocation
page read and write
61ED4000
direct allocation
page readonly
5910000
heap
page read and write
56B000
remote allocation
page execute and read and write
23739663000
heap
page read and write
5AF000
heap
page read and write
23734F50000
trusted library section
page readonly
9227000
heap
page read and write
140CE2000
unkown
page read and write
21355000
heap
page read and write
1321000
heap
page read and write
DD0000
trusted library allocation
page read and write
B60000
heap
page read and write
303C000
stack
page read and write
97E000
stack
page read and write
2E50000
heap
page read and write
5610000
heap
page execute and read and write
322A000
heap
page read and write
1D0000
heap
page read and write
28A2000
trusted library allocation
page read and write
3196000
heap
page read and write
15B4000
heap
page read and write
748D000
stack
page read and write
320F000
heap
page read and write
227E000
direct allocation
page read and write
1886000
direct allocation
page read and write
551E000
stack
page read and write
3292000
trusted library allocation
page execute and read and write
12C000
stack
page read and write
1D6C6000
direct allocation
page execute read
1715E000
stack
page read and write
FD394FE000
stack
page read and write
1300000
direct allocation
page read and write
514E000
heap
page read and write
5C4F000
stack
page read and write
2373970D000
heap
page read and write
630000
unkown
page readonly
69B70000
unkown
page readonly
6250000
heap
page read and write
6080000
trusted library allocation
page read and write
2210000
trusted library allocation
page execute and read and write
1550000
heap
page execute and read and write
FD38C7E000
stack
page read and write
4874000
trusted library allocation
page read and write
24222702000
heap
page read and write
14D0000
heap
page read and write
5EB4000
trusted library allocation
page read and write
C2B000
heap
page read and write
383F000
trusted library allocation
page read and write
5EC4000
trusted library allocation
page read and write
42434FF000
stack
page read and write
FD37C7B000
stack
page read and write
5146000
heap
page read and write
3314000
trusted library allocation
page read and write
1156000
heap
page read and write
39D4000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
193C000
direct allocation
page read and write
1AB4000
direct allocation
page read and write
1AF9F000
stack
page read and write
3408000
trusted library allocation
page read and write
36F0000
trusted library allocation
page read and write
133B000
trusted library allocation
page execute and read and write
22A2000
direct allocation
page read and write
319C000
heap
page read and write
1125000
unkown
page execute and read and write
BE4447F000
stack
page read and write
2314000
direct allocation
page read and write
209E000
direct allocation
page read and write
20B2000
direct allocation
page read and write
3A30000
trusted library allocation
page read and write
306C000
stack
page read and write
4EA1000
heap
page read and write
58F0000
heap
page execute and read and write
298E000
trusted library allocation
page read and write
1B20000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
26090C78000
heap
page read and write
5D04000
trusted library allocation
page read and write
9253000
heap
page read and write
15E2000
trusted library allocation
page read and write
705F000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
13FC000
unkown
page write copy
F89000
unkown
page readonly
4CAD000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
315F000
stack
page read and write
1B00000
heap
page read and write
27442000
heap
page read and write
20FA000
direct allocation
page read and write
2D0F000
unkown
page read and write
290E000
stack
page read and write
1845000
direct allocation
page read and write
171FB000
stack
page read and write
1BF0000
direct allocation
page read and write
3792000
trusted library allocation
page read and write
23733EFF000
heap
page read and write
2771000
trusted library allocation
page read and write
23734F60000
trusted library section
page readonly
30D0000
heap
page read and write
C3D000
heap
page read and write
1908000
direct allocation
page read and write
1260000
heap
page read and write
31E0000
trusted library allocation
page read and write
3367000
trusted library allocation
page read and write
57B000
heap
page read and write
C8C000
stack
page read and write
1AD1E000
stack
page read and write
1A6E000
stack
page read and write
608E000
trusted library allocation
page read and write
230A000
direct allocation
page read and write
56B0000
trusted library allocation
page execute and read and write
18A2000
direct allocation
page read and write
3BDF000
stack
page read and write
55A000
heap
page read and write
1747E000
stack
page read and write
2CA9000
trusted library allocation
page read and write
71C000
stack
page read and write
1270000
direct allocation
page read and write
C61000
unkown
page execute and read and write
20E8000
direct allocation
page read and write
2217D000
stack
page read and write
15BD000
heap
page read and write
4D5D000
stack
page read and write
32D3000
trusted library allocation
page read and write
15D3000
trusted library allocation
page read and write
2CC2000
trusted library allocation
page read and write
10FF000
unkown
page execute and read and write
FCD000
unkown
page readonly
5A8E000
trusted library allocation
page read and write
2102000
direct allocation
page read and write
605E000
stack
page read and write
5867000
trusted library allocation
page read and write
3DD5000
heap
page read and write
4DD3000
heap
page read and write
23733E7B000
heap
page read and write
2D4E000
stack
page read and write
2143D000
heap
page read and write
78AF000
stack
page read and write
1AB0000
heap
page read and write
2291000
trusted library allocation
page read and write
5C3F000
heap
page read and write
7420000
heap
page read and write
F9A000
unkown
page readonly
26DE000
trusted library allocation
page read and write
14FB000
trusted library allocation
page execute and read and write
663E000
stack
page read and write
1495000
heap
page read and write
616A000
trusted library allocation
page read and write
33B2000
trusted library allocation
page read and write
1313000
trusted library allocation
page read and write
187C000
direct allocation
page read and write
24222700000
heap
page read and write
14E8000
heap
page read and write
1706000
heap
page read and write
61B6000
trusted library allocation
page read and write
1D69D000
stack
page read and write
33E6000
trusted library allocation
page read and write
B70000
heap
page read and write
1AE9E000
stack
page read and write
4F1000
remote allocation
page execute and read and write
7750000
trusted library allocation
page execute and read and write
61CE000
trusted library allocation
page read and write
7FC00000
trusted library allocation
page execute and read and write
5762000
trusted library allocation
page read and write
4EA1000
heap
page read and write
1D40000
direct allocation
page read and write
E0D000
heap
page read and write
5155000
heap
page read and write
6470000
trusted library allocation
page read and write
1814000
direct allocation
page read and write
20B8000
direct allocation
page read and write
20E0000
direct allocation
page read and write
DF3000
heap
page read and write
100A000
unkown
page read and write
5840000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
52FD000
stack
page read and write
2BA0000
trusted library allocation
page read and write
3357000
trusted library allocation
page read and write
31B1000
heap
page read and write
13D0000
trusted library allocation
page read and write
1B0000
heap
page read and write
23739371000
trusted library allocation
page read and write
18F8000
trusted library allocation
page read and write
150A000
heap
page read and write
11FB000
heap
page read and write
425E000
stack
page read and write
4EA1000
heap
page read and write
5890000
trusted library allocation
page read and write
15FA000
trusted library allocation
page execute and read and write
6ECD000
heap
page read and write
726E000
stack
page read and write
40E2000
trusted library allocation
page read and write
1B3CA000
heap
page read and write
2002000
direct allocation
page read and write
200A000
direct allocation
page read and write
4274000
trusted library allocation
page read and write
1FFDD4C5000
heap
page read and write
4EA1000
heap
page read and write
CB26679000
stack
page read and write
1070000
heap
page read and write
1BA0000
direct allocation
page read and write
4EA1000
heap
page read and write
54DF000
stack
page read and write
3880000
trusted library allocation
page read and write
4FD3000
trusted library allocation
page read and write
143E000
stack
page read and write
159D000
heap
page read and write
515B000
heap
page read and write
E24000
heap
page read and write
146D000
unkown
page readonly
333D000
trusted library allocation
page read and write
526D000
stack
page read and write
2056000
direct allocation
page read and write
2954000
trusted library allocation
page read and write
74B000
trusted library allocation
page execute and read and write
2F2A000
stack
page read and write
212E000
stack
page read and write
5EA0000
trusted library allocation
page read and write
6EE4000
heap
page read and write
24E8000
direct allocation
page read and write
4EA1000
heap
page read and write
A8A000
trusted library allocation
page execute and read and write
61A0000
trusted library allocation
page read and write
2974000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
5920000
heap
page read and write
5753000
trusted library allocation
page read and write
2252B000
direct allocation
page read and write
1460000
heap
page read and write
3F9F000
stack
page read and write
4EA1000
heap
page read and write
54C0000
direct allocation
page execute and read and write
58FB000
stack
page read and write
2006000
direct allocation
page read and write
1550000
heap
page read and write
1952000
direct allocation
page read and write
5AD000
remote allocation
page execute and read and write
51AD000
trusted library allocation
page read and write
6063000
trusted library allocation
page read and write
BB4000
heap
page read and write
56F0000
trusted library allocation
page read and write
22A6000
direct allocation
page read and write
3295000
trusted library allocation
page read and write
EA4000
heap
page read and write
14AE000
stack
page read and write
23733E13000
heap
page read and write
190A000
heap
page read and write
1D7DE000
stack
page read and write
140F33000
unkown
page execute read
BA7000
heap
page read and write
60A4000
trusted library allocation
page read and write
1680000
heap
page read and write
2C6C000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
17300000
heap
page read and write
175FD000
heap
page read and write
138C000
heap
page read and write
24222702000
heap
page read and write
8D0000
heap
page read and write
140CAE000
unkown
page execute read
1040000
unkown
page readonly
1AF0000
heap
page read and write
59BE000
stack
page read and write
411E000
stack
page read and write
1900000
heap
page read and write
1850000
heap
page read and write
593E000
stack
page read and write
3230000
direct allocation
page read and write
1B23000
trusted library allocation
page execute and read and write
2C8D000
trusted library allocation
page read and write
3289000
trusted library allocation
page read and write
15D0000
trusted library allocation
page read and write
2324000
direct allocation
page read and write
1918000
direct allocation
page read and write
5950000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
14DE000
stack
page read and write
5C2D000
heap
page read and write
1300000
heap
page read and write
4235000
trusted library allocation
page read and write
1B24F000
stack
page read and write
58E0000
trusted library allocation
page execute and read and write
189C000
direct allocation
page read and write
1370000
heap
page read and write
22FB000
direct allocation
page read and write
13DE000
heap
page read and write
14E0000
trusted library allocation
page read and write
7640000
heap
page read and write
5D25000
trusted library allocation
page read and write
612000
unkown
page readonly
3771000
trusted library allocation
page read and write
185A000
direct allocation
page read and write
160B000
trusted library allocation
page execute and read and write
77AE000
stack
page read and write
1BD5000
heap
page read and write
1EC0000
heap
page read and write
DA0000
heap
page read and write
32AB000
heap
page read and write
CF7000
unkown
page readonly
11DA000
heap
page read and write
519E000
stack
page read and write
1530000
trusted library allocation
page read and write
5060000
heap
page read and write
58A0000
trusted library allocation
page execute and read and write
3399000
trusted library allocation
page read and write
452000
remote allocation
page execute and read and write
4EA1000
heap
page read and write
AF2000
stack
page read and write
CF7000
unkown
page readonly
5B21000
heap
page read and write
5980000
trusted library allocation
page read and write
24222120000
heap
page read and write
2193D000
stack
page read and write
337A000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
20A4000
trusted library allocation
page read and write
4EA0000
heap
page read and write
774E000
stack
page read and write
D9D000
heap
page read and write
60C5000
trusted library allocation
page read and write
24222324000
heap
page read and write
5C9E000
stack
page read and write
103F000
unkown
page write copy
31E1000
trusted library allocation
page read and write
30B5000
trusted library allocation
page read and write
3320000
heap
page read and write
17310000
heap
page read and write
38CE000
stack
page read and write
2950000
trusted library allocation
page read and write
7055000
trusted library allocation
page read and write
237393CE000
trusted library allocation
page read and write
14ED000
trusted library allocation
page execute and read and write
540000
heap
page read and write
ED6000
unkown
page readonly
534000
heap
page read and write
2D57000
trusted library allocation
page read and write
16FF000
stack
page read and write
4EA1000
heap
page read and write
205C000
direct allocation
page read and write
46A000
remote allocation
page execute and read and write
21DFE000
stack
page read and write
1624000
heap
page read and write
2BDC000
trusted library allocation
page read and write
2D3B000
trusted library allocation
page read and write
F48000
unkown
page readonly
3342000
heap
page read and write
21A7E000
stack
page read and write
FD383F9000
stack
page read and write
13CF000
stack
page read and write
165A000
heap
page read and write
32FB000
trusted library allocation
page read and write
70EE000
stack
page read and write
248C000
direct allocation
page read and write
1ACDD000
stack
page read and write
587000
remote allocation
page execute and read and write
5DA0000
heap
page read and write
1DA50000
heap
page read and write
114E000
stack
page read and write
30C0000
heap
page read and write
4EA1000
heap
page read and write
2330000
trusted library allocation
page read and write
1E9F000
stack
page read and write
3170000
heap
page read and write
445000
remote allocation
page execute and read and write
330E000
stack
page read and write
575B000
trusted library allocation
page read and write
2373475A000
heap
page read and write
16A0000
heap
page read and write
634E000
stack
page read and write
23734702000
heap
page read and write
2F2F000
stack
page read and write
2C98000
trusted library allocation
page read and write
4D2D000
stack
page read and write
C7E000
stack
page read and write
4322000
trusted library allocation
page read and write
131F000
heap
page read and write
586E000
trusted library allocation
page read and write
57AE000
stack
page read and write
20FE000
direct allocation
page read and write
14F4000
trusted library allocation
page read and write
1AA9E000
stack
page read and write
15E6000
trusted library allocation
page execute and read and write
90E000
stack
page read and write
182B000
direct allocation
page read and write
3D80000
heap
page read and write
146C000
heap
page read and write
17809000
heap
page read and write
5AAE000
stack
page read and write
399E000
stack
page read and write
2CF7000
trusted library allocation
page read and write
181A000
direct allocation
page read and write
141933000
unkown
page execute read
203E000
direct allocation
page read and write
3280000
heap
page read and write
23733F02000
heap
page read and write
3D49000
heap
page read and write
A10000
unkown
page readonly
5AC4000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
173B000
trusted library allocation
page execute and read and write
1455000
unkown
page readonly
132A000
trusted library allocation
page execute and read and write
67A9000
trusted library allocation
page read and write
4EA1000
heap
page read and write
ED0000
heap
page read and write
1E2E000
stack
page read and write
AFC000
stack
page read and write
1D50000
direct allocation
page read and write
2F90000
heap
page read and write
3339000
trusted library allocation
page read and write
15F2000
trusted library allocation
page read and write
1664000
heap
page read and write
3E9E000
stack
page read and write
4EA1000
heap
page read and write
1850000
direct allocation
page read and write
377F000
trusted library allocation
page read and write
1AD0000
direct allocation
page read and write
100C000
unkown
page read and write
2018000
direct allocation
page read and write
4EA1000
heap
page read and write
5320000
direct allocation
page read and write
3230000
direct allocation
page read and write
631000
unkown
page execute read
1DB9E000
stack
page read and write
6220000
trusted library allocation
page read and write
1065000
unkown
page readonly
5760000
trusted library allocation
page read and write
58F0000
trusted library allocation
page execute and read and write
184C000
direct allocation
page read and write
4EA1000
heap
page read and write
4CB0000
heap
page read and write
7050000
trusted library allocation
page read and write
13BA000
heap
page read and write
166F000
stack
page read and write
4F80000
remote allocation
page read and write
44BE000
stack
page read and write
22FD000
direct allocation
page read and write
1200000
heap
page read and write
566F000
stack
page read and write
23733E73000
heap
page read and write
5470000
direct allocation
page execute and read and write
5735000
trusted library allocation
page read and write
1CC000
stack
page read and write
33FF000
trusted library allocation
page read and write
309D000
stack
page read and write
12D0000
heap
page read and write
3A97000
trusted library allocation
page read and write
237394C0000
trusted library allocation
page read and write
5F6E000
stack
page read and write
559000
stack
page read and write
224FF000
stack
page read and write
614E000
stack
page read and write
64FF000
stack
page read and write
5F9E000
stack
page read and write
4D4F000
stack
page read and write
1580000
heap
page read and write
2C16000
trusted library allocation
page read and write
FD393FE000
unkown
page readonly
2BD0000
trusted library allocation
page read and write
31EE000
stack
page read and write
3090000
heap
page read and write
1D7A2000
direct allocation
page read and write
12B0000
heap
page read and write
489E000
stack
page read and write
24222200000
unkown
page read and write
1316000
trusted library allocation
page read and write
4984000
trusted library allocation
page read and write
7AF000
unkown
page read and write
3859000
trusted library allocation
page read and write
178F000
stack
page read and write
5C10000
trusted library allocation
page execute and read and write
4EA1000
heap
page read and write
65EC000
stack
page read and write
D39000
stack
page read and write
3A4F000
trusted library allocation
page read and write
456000
remote allocation
page execute and read and write
2093000
trusted library allocation
page execute and read and write
57A0000
heap
page read and write
252E000
stack
page read and write
180A000
direct allocation
page read and write
14E4000
trusted library allocation
page read and write
30B3000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
15C0000
trusted library allocation
page read and write
F9A000
unkown
page readonly
5910000
trusted library allocation
page execute and read and write
3A10000
trusted library allocation
page read and write
471000
remote allocation
page execute and read and write
586A000
trusted library allocation
page read and write
5990000
heap
page execute and read and write
2980000
heap
page read and write
5747000
trusted library allocation
page read and write
23739370000
trusted library allocation
page read and write
323C000
trusted library allocation
page read and write
4EA1000
heap
page read and write
31D8000
heap
page read and write
2FDE000
unkown
page read and write
26090C40000
heap
page read and write
1B24000
trusted library allocation
page read and write
33B0000
heap
page read and write
4171000
trusted library allocation
page read and write
23734F20000
trusted library section
page readonly
E8C000
unkown
page execute and read and write
243E000
stack
page read and write
A7D000
trusted library allocation
page execute and read and write
5EFE000
stack
page read and write
4F80000
remote allocation
page read and write
123B000
stack
page read and write
232A000
direct allocation
page read and write
37E0000
heap
page execute and read and write
74CE000
stack
page read and write
6E63000
heap
page read and write
16CD0320000
heap
page read and write
5628000
trusted library allocation
page read and write
4B4000
remote allocation
page execute and read and write
333B000
heap
page read and write
27453000
heap
page read and write
5730000
trusted library allocation
page read and write
1304000
trusted library allocation
page read and write
10FE000
stack
page read and write
55E000
heap
page read and write
6E92000
heap
page read and write
3397000
trusted library allocation
page read and write
2BCC000
trusted library allocation
page read and write
12D5000
heap
page read and write
2EC8000
trusted library allocation
page read and write
4DC0000
heap
page execute and read and write
2A18000
trusted library allocation
page read and write
14F0000
trusted library allocation
page execute and read and write
FD392FB000
stack
page read and write
1D2DE000
stack
page read and write
5BF0000
heap
page read and write
76E000
stack
page read and write
5890000
trusted library allocation
page read and write
FD38AFE000
unkown
page readonly
FDE000
unkown
page read and write
5990000
trusted library allocation
page read and write
1912000
direct allocation
page read and write
F96000
stack
page read and write
50E000
heap
page read and write
E16000
unkown
page readonly
140000000
unkown
page readonly
1AA4000
direct allocation
page read and write
21340000
heap
page read and write
4EA1000
heap
page read and write
44D000
remote allocation
page execute and read and write
59E4000
trusted library allocation
page read and write
2D03000
trusted library allocation
page read and write
770000
trusted library allocation
page execute and read and write
89F000
stack
page read and write
185C000
direct allocation
page read and write
532E000
stack
page read and write
4C21000
trusted library allocation
page read and write
23739440000
trusted library allocation
page read and write
2A4D000
stack
page read and write
5ED0000
trusted library allocation
page execute and read and write
349E000
stack
page read and write
570E000
trusted library allocation
page read and write
1570000
heap
page read and write
5670000
heap
page read and write
5E80000
heap
page read and write
237392F0000
trusted library allocation
page read and write
1D51F000
stack
page read and write
A95000
heap
page read and write
1B56000
trusted library allocation
page execute and read and write
1360000
heap
page read and write
4EA1000
heap
page read and write
FD38DFE000
unkown
page readonly
237396EF000
heap
page read and write
9237000
heap
page read and write
F1E000
stack
page read and write
18D0000
heap
page read and write
15B0000
heap
page read and write
1065000
unkown
page readonly
1BA5FEF0000
heap
page read and write
780000
heap
page read and write
2FE0000
heap
page read and write
15CA000
trusted library allocation
page execute and read and write
9220000
heap
page read and write
25D0000
heap
page read and write
712E000
stack
page read and write
12AE000
stack
page read and write
672C000
stack
page read and write
5700000
heap
page read and write
5C60000
heap
page read and write
2322000
direct allocation
page read and write
57B0000
trusted library allocation
page execute and read and write
11C4000
trusted library allocation
page read and write
2301000
direct allocation
page read and write
2B74000
trusted library allocation
page read and write
141968000
unkown
page readonly
5B3D000
stack
page read and write
5BE3000
trusted library allocation
page read and write
4C5E000
stack
page read and write
14C1E000
stack
page read and write
385E000
stack
page read and write
3A20000
trusted library allocation
page read and write
1804000
direct allocation
page read and write
4A64000
trusted library allocation
page read and write
1B60000
heap
page read and write
31BF000
heap
page read and write
23B0000
heap
page execute and read and write
FD386FE000
unkown
page readonly
381F000
stack
page read and write
61FE000
trusted library allocation
page read and write
18AC000
direct allocation
page read and write
FD390FE000
unkown
page readonly
3285000
trusted library allocation
page read and write
5C65000
heap
page read and write
1ACC000
direct allocation
page read and write
735E000
heap
page read and write
486F000
stack
page read and write
F99000
stack
page read and write
43C000
remote allocation
page execute and read and write
4EA1000
heap
page read and write
13EC000
unkown
page read and write
13E0000
trusted library allocation
page read and write
576F000
stack
page read and write
34BE000
stack
page read and write
1254D000
stack
page read and write
327E000
stack
page read and write
176E000
stack
page read and write
1100000
heap
page read and write
31A5000
trusted library allocation
page read and write
388F000
stack
page read and write
3070000
heap
page read and write
1540000
heap
page read and write
44CD000
trusted library allocation
page read and write
2D70000
heap
page read and write
2BAD000
trusted library allocation
page read and write
113B000
unkown
page execute and read and write
3230000
direct allocation
page read and write
1800000
direct allocation
page read and write
64EC000
stack
page read and write
23733EB7000
heap
page read and write
2012000
direct allocation
page read and write
30AE000
stack
page read and write
4EA1000
heap
page read and write
13DF000
stack
page read and write
14D3000
trusted library allocation
page read and write
3200000
heap
page read and write
FDD000
unkown
page write copy
1AB9F000
stack
page read and write
61C2000
trusted library allocation
page read and write
57C0000
heap
page read and write
1704000
trusted library allocation
page read and write
215E000
direct allocation
page read and write
23733E8E000
heap
page read and write
589000
heap
page read and write
144B000
trusted library allocation
page execute and read and write
713000
trusted library allocation
page execute and read and write
16CA000
heap
page read and write
1816000
direct allocation
page read and write
15A0000
direct allocation
page read and write
576E000
trusted library allocation
page read and write
23734615000
heap
page read and write
17B0000
trusted library allocation
page read and write
5C1E000
stack
page read and write
12F9000
stack
page read and write
3AC6000
trusted library allocation
page read and write
4EA1000
heap
page read and write
13B0000
unkown
page write copy
6420000
trusted library allocation
page read and write
9222000
heap
page read and write
D01000
heap
page read and write
2286000
direct allocation
page read and write
500000
heap
page read and write
24222713000
heap
page read and write
5CBD000
heap
page read and write
1DABD000
stack
page read and write
6450000
heap
page execute and read and write
1344000
unkown
page write copy
1878000
direct allocation
page read and write
23739643000
heap
page read and write
C37000
heap
page read and write
E58000
heap
page read and write
1FFDD1C0000
heap
page read and write
15F0000
trusted library allocation
page read and write
6041000
trusted library allocation
page read and write
3291000
trusted library allocation
page read and write
461E000
stack
page read and write
610000
unkown
page readonly
29D0000
heap
page read and write
DBE000
heap
page read and write
23734C40000
trusted library allocation
page read and write
1737C000
heap
page read and write
15C3000
trusted library allocation
page execute and read and write
4EA1000
heap
page read and write
18F4000
direct allocation
page read and write
FD3917E000
stack
page read and write
23733EA2000
heap
page read and write
15C4000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
564C000
trusted library allocation
page read and write
49CD000
stack
page read and write
4E50000
heap
page read and write
5710000
trusted library allocation
page read and write
758E000
stack
page read and write
1560000
heap
page read and write
23739510000
remote allocation
page read and write
335D000
trusted library allocation
page read and write
2004000
direct allocation
page read and write
2203D000
stack
page read and write
1360000
trusted library allocation
page execute and read and write
13A0000
heap
page read and write
1812000
direct allocation
page read and write
201E000
direct allocation
page read and write
1790000
heap
page read and write
26DF000
stack
page read and write
51E8000
trusted library allocation
page read and write
1617000
heap
page read and write
487000
remote allocation
page execute and read and write
23734F30000
trusted library section
page readonly
D6F000
stack
page read and write
1FFDD1C8000
heap
page read and write
32A2000
trusted library allocation
page read and write
140CE8000
unkown
page execute read
2D24000
trusted library allocation
page read and write
5B00000
trusted library allocation
page execute and read and write
3A2A000
trusted library allocation
page read and write
16CD0340000
heap
page read and write
1AA6000
direct allocation
page read and write
1517000
trusted library allocation
page execute and read and write
58DF000
stack
page read and write
2294000
direct allocation
page read and write
2CED000
trusted library allocation
page read and write
273C0000
heap
page read and write
4F80000
remote allocation
page read and write
4677000
trusted library allocation
page read and write
3A41000
trusted library allocation
page read and write
40E9000
trusted library allocation
page read and write
1310000
direct allocation
page read and write
18A8000
direct allocation
page read and write
630000
unkown
page readonly
24222700000
heap
page read and write
24222302000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
A10000
heap
page read and write
291A000
stack
page read and write
22F5000
direct allocation
page read and write
5B7E000
stack
page read and write
2A0E000
stack
page read and write
FA4000
unkown
page readonly
1460000
heap
page read and write
14FE000
heap
page read and write
24222238000
unkown
page read and write
9E0000
heap
page read and write
FDF000
unkown
page write copy
6060000
trusted library allocation
page read and write
3230000
direct allocation
page read and write
23734713000
heap
page read and write
168E000
stack
page read and write
1344000
unkown
page write copy
49DE000
stack
page read and write
2D4F0000
heap
page read and write
930000
heap
page execute and read and write
33E8000
trusted library allocation
page read and write
4D70000
trusted library allocation
page execute and read and write
2080000
direct allocation
page read and write
13CF000
unkown
page read and write
4A0F000
trusted library allocation
page read and write
21D6000
direct allocation
page read and write
3230000
direct allocation
page read and write
CB2637A000
stack
page read and write
4712000
trusted library allocation
page read and write
FD38BFE000
unkown
page readonly
1B2C0000
heap
page read and write
8D0000
trusted library allocation
page read and write
3ADE000
stack
page read and write
9225000
heap
page read and write
1BF5000
heap
page read and write
6090000
trusted library allocation
page execute and read and write
3301000
trusted library allocation
page read and write
475E000
stack
page read and write
FF8F000
stack
page read and write
21E06000
direct allocation
page read and write
4D9D000
stack
page read and write
6E9B000
heap
page read and write
75EF000
stack
page read and write
23739704000
heap
page read and write
134C000
unkown
page read and write
335F000
stack
page read and write
14E5000
heap
page read and write
67A0000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
3220000
heap
page read and write
23733E5B000
heap
page read and write
63FE000
stack
page read and write
3292000
trusted library allocation
page read and write
1580000
heap
page read and write
5E90000
trusted library allocation
page read and write
4EA1000
heap
page read and write
24222713000
heap
page read and write
1120000
heap
page read and write
5BE0000
trusted library allocation
page read and write
1818000
direct allocation
page read and write
36DF000
stack
page read and write
208A000
direct allocation
page read and write
222E000
direct allocation
page read and write
E2000
unkown
page readonly
1944000
direct allocation
page read and write
2CB5000
trusted library allocation
page read and write
585B000
trusted library allocation
page read and write
510A000
heap
page read and write
4CAF000
stack
page read and write
1D76F000
direct allocation
page readonly
50A000
heap
page read and write
5680000
trusted library allocation
page execute and read and write
15C3000
trusted library allocation
page execute and read and write
1366000
heap
page read and write
20C0000
trusted library allocation
page read and write
53FD000
stack
page read and write
20E6000
direct allocation
page read and write
3230000
direct allocation
page read and write
61FB000
trusted library allocation
page read and write
36D7000
trusted library allocation
page execute and read and write
1ABDE000
stack
page read and write
4031AF000
stack
page read and write
446000
remote allocation
page execute and read and write
61ECC000
direct allocation
page read and write
7404000
heap
page read and write
329D000
stack
page read and write
5860000
trusted library allocation
page read and write
1D778000
direct allocation
page readonly
27422000
heap
page read and write
113C000
unkown
page execute and write copy
1DA54000
heap
page read and write
3365000
trusted library allocation
page read and write
4F6D000
stack
page read and write
BE441CD000
stack
page read and write
3AB6000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
134A000
unkown
page write copy
C3A000
unkown
page readonly
498A000
trusted library allocation
page read and write
17B0000
heap
page read and write
13C8000
heap
page read and write
15F7000
trusted library allocation
page execute and read and write
1710000
trusted library allocation
page read and write
3250000
heap
page read and write
29C1000
trusted library allocation
page read and write
2E2E000
stack
page read and write
15F8000
heap
page read and write
15EA000
trusted library allocation
page execute and read and write
74EE000
stack
page read and write
1854000
direct allocation
page read and write
5893000
trusted library allocation
page read and write
4EA1000
heap
page read and write
3322000
trusted library allocation
page read and write
23733EB3000
heap
page read and write
61E00000
direct allocation
page execute and read and write
1510000
trusted library allocation
page read and write
1672000
heap
page read and write
4EA1000
heap
page read and write
14D5000
heap
page read and write
140001000
unkown
page execute read
4EA1000
heap
page read and write
21A3F000
stack
page read and write
CB2627F000
stack
page read and write
180000
heap
page read and write
1437000
heap
page read and write
188A000
direct allocation
page read and write
33E2000
trusted library allocation
page read and write
4EA1000
heap
page read and write
2720000
heap
page execute and read and write
1028000
unkown
page execute and read and write
1B2D000
trusted library allocation
page execute and read and write
14F7000
trusted library allocation
page execute and read and write
13AB000
heap
page read and write
1703000
trusted library allocation
page read and write
2094000
direct allocation
page read and write
30A0000
trusted library allocation
page execute and read and write
1456000
heap
page read and write
A90000
heap
page read and write
56FE000
stack
page read and write
15A8000
direct allocation
page read and write
60FE000
stack
page read and write
191C000
trusted library allocation
page read and write
23733E41000
heap
page read and write
5AE0000
heap
page read and write
204B000
direct allocation
page read and write
D83000
stack
page read and write
9249000
heap
page read and write
4EA1000
heap
page read and write
3230000
direct allocation
page read and write
591000
heap
page read and write
5E6E000
stack
page read and write
11C3000
trusted library allocation
page execute and read and write
2108000
direct allocation
page read and write
2280000
heap
page read and write
1360000
heap
page read and write
2068000
direct allocation
page read and write
4E20000
heap
page read and write
583E000
stack
page read and write
6284000
heap
page read and write
181E000
direct allocation
page read and write
C3C000
stack
page read and write
2C60000
trusted library allocation
page read and write
4284000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
4D9E000
stack
page read and write
500000
remote allocation
page execute and read and write
17AD000
stack
page read and write
23733E00000
heap
page read and write
4EA1000
heap
page read and write
7030000
trusted library allocation
page read and write
23733D90000
heap
page read and write
61B1000
trusted library allocation
page read and write
7DF000
unkown
page read and write
4EA1000
heap
page read and write
401000
unkown
page execute read
AC0000
trusted library allocation
page read and write
359F000
stack
page read and write
6030000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
5220000
trusted library allocation
page execute and read and write
31D0000
heap
page execute and read and write
1A5EE000
stack
page read and write
1AD0000
direct allocation
page read and write
3230000
direct allocation
page read and write
15FB000
trusted library allocation
page execute and read and write
28A4000
trusted library allocation
page read and write
1250D000
stack
page read and write
FD39BFE000
unkown
page readonly
3320000
trusted library allocation
page read and write
2373970A000
heap
page read and write
3A47000
trusted library allocation
page read and write
237394C0000
trusted library allocation
page read and write
6440000
trusted library allocation
page read and write
14FA000
heap
page read and write
7350000
heap
page read and write
4164000
trusted library allocation
page read and write
421F000
stack
page read and write
485B000
trusted library allocation
page read and write
3210000
heap
page read and write
8CE000
stack
page read and write
5BAF000
stack
page read and write
12F0000
trusted library allocation
page read and write
DCA000
heap
page read and write
7410000
heap
page read and write
165E000
stack
page read and write
5AAA000
trusted library allocation
page read and write
4EA1000
heap
page read and write
2E5B000
heap
page read and write
2090000
direct allocation
page read and write
2100000
direct allocation
page read and write
4EA1000
heap
page read and write
3205000
heap
page read and write
FD387FA000
stack
page read and write
3337000
trusted library allocation
page read and write
15DD000
trusted library allocation
page execute and read and write
DAE000
stack
page read and write
597E000
stack
page read and write
526C000
stack
page read and write
2960000
trusted library allocation
page read and write
FE8E000
stack
page read and write
49D0000
heap
page read and write
15F6000
trusted library allocation
page execute and read and write
6E30000
heap
page read and write
5720000
trusted library allocation
page read and write
23739450000
trusted library allocation
page read and write
14000C000
unkown
page read and write
3DDB000
heap
page read and write
892E000
stack
page read and write
2946000
trusted library allocation
page read and write
2036000
direct allocation
page read and write
1460000
heap
page read and write
4EA1000
heap
page read and write
331E000
trusted library allocation
page read and write
39BE000
stack
page read and write
3198000
heap
page read and write
320F000
heap
page read and write
322E000
stack
page read and write
2890000
heap
page read and write
130D000
trusted library allocation
page execute and read and write
4EA1000
heap
page read and write
20FC000
direct allocation
page read and write
23733DB0000
heap
page read and write
1AFE000
stack
page read and write
31BF000
heap
page read and write
D94000
heap
page read and write
4BAE000
stack
page read and write
1B33000
trusted library allocation
page read and write
3355000
trusted library allocation
page read and write
237396EC000
heap
page read and write
B6E000
heap
page read and write
FFCE000
stack
page read and write
1660000
heap
page read and write
2253B000
direct allocation
page read and write
873000
unkown
page readonly
549E000
stack
page read and write
33B0000
heap
page read and write
60B6000
trusted library allocation
page read and write
39C9000
trusted library allocation
page read and write
150C000
stack
page read and write
5ECB000
trusted library allocation
page read and write
F4E000
stack
page read and write
1265000
heap
page read and write
14B0000
heap
page read and write
400000
remote allocation
page execute and read and write
166F000
stack
page read and write
1928000
direct allocation
page read and write
56FE000
trusted library allocation
page read and write
174BE000
stack
page read and write
5AD6000
trusted library allocation
page read and write
2DDC000
stack
page read and write
9B0000
heap
page read and write
5810000
trusted library allocation
page execute and read and write
4EA1000
heap
page read and write
22FF000
direct allocation
page read and write
499F000
stack
page read and write
42431FD000
stack
page read and write
910000
heap
page read and write
16BB000
stack
page read and write
6430000
trusted library allocation
page read and write
33CD000
trusted library allocation
page read and write
7D0000
heap
page read and write
5D16000
trusted library allocation
page read and write
339D000
trusted library allocation
page read and write
5E93000
trusted library allocation
page read and write
32FF000
trusted library allocation
page read and write
FD385FB000
stack
page read and write
339B000
trusted library allocation
page read and write
526E000
stack
page read and write
1250000
heap
page read and write
54B0000
direct allocation
page execute and read and write
55F0000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
1204000
heap
page read and write
15E0000
heap
page read and write
204E000
direct allocation
page read and write
1710000
heap
page read and write
64A0000
trusted library allocation
page execute and read and write
4E57000
trusted library allocation
page read and write
10D0000
heap
page read and write
DF0000
heap
page read and write
471F000
stack
page read and write
1D6B000
direct allocation
page read and write
32DB000
trusted library allocation
page read and write
1838000
direct allocation
page read and write
2016000
direct allocation
page read and write
2422224D000
heap
page read and write
1170000
heap
page read and write
542F000
stack
page read and write
140A0C000
unkown
page read and write
36D0000
trusted library allocation
page read and write
14EA000
trusted library allocation
page execute and read and write
1870000
trusted library allocation
page execute and read and write
485F000
stack
page read and write
190000
heap
page read and write
B0E000
stack
page read and write
5A80000
trusted library allocation
page read and write
166E000
heap
page read and write
20C6000
direct allocation
page read and write
6240000
trusted library allocation
page read and write
1126000
heap
page read and write
35F0000
heap
page read and write
1BA60240000
heap
page read and write
14F0000
trusted library allocation
page read and write
225CE000
stack
page read and write
67B0000
trusted library allocation
page read and write
1DA52000
heap
page read and write
5994000
trusted library allocation
page read and write
140F33000
unkown
page execute read
17604000
heap
page read and write
58C0000
trusted library section
page read and write
400000
unkown
page readonly
14D0000
trusted library allocation
page read and write
408000
unkown
page readonly
3DC0000
heap
page read and write
23734600000
heap
page read and write
B7B000
heap
page read and write
5716000
trusted library allocation
page read and write
3876000
trusted library allocation
page read and write
780F000
stack
page read and write
26C0000
trusted library allocation
page read and write
213C000
direct allocation
page read and write
7400000
heap
page read and write
33AF000
stack
page read and write
18F2000
trusted library allocation
page read and write
F61000
unkown
page readonly
1D560000
direct allocation
page execute and read and write
153E000
stack
page read and write
FCD000
unkown
page readonly
3850000
trusted library allocation
page read and write
2326000
direct allocation
page read and write
15AE000
stack
page read and write
3BCF000
trusted library allocation
page read and write
F9C000
unkown
page readonly
134D000
unkown
page write copy
1D8DE000
stack
page read and write
1AA40000
heap
page read and write
3230000
direct allocation
page read and write
There are 2517 hidden memdumps, click here to show them.