IOC Report
Us051y7j25.exe

loading gif

Files

File Path
Type
Category
Malicious
Us051y7j25.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\nxmr[1].exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\tdrpl[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1082429028.exe
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\1091722296.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1239611256.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\146916724.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1881231804.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\21324.scr
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\2314627202.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\3336719498.exe
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\jacrzswcvuml.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Google\Libs\WR64.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\sysppvrdnvs.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\1881231804.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\1[1]
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\3[1]
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\5[1]
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\2[1]
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\4[1]
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_14qh4nm0.p5f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1sz3rpw4.dzv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2c3hm42o.ld0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2hl3jjxm.oha.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4uadpr33.h0x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ugba5jg.bxw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4xipuaab.g34.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5cehqxf4.krl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bxt42d4i.nfe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fjk0g44u.olh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gjfslgz4.1gf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_grqjuq4n.irv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kxt4kdf2.1of.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lbufvkp0.djc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lgkljmwu.uco.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s3iti3fc.eur.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_soq3332j.kzj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_unya5ro4.1rs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vh0o1iq4.kfw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yk2gyel2.4uu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\tbtnds.dat
OpenPGP Public Key
dropped
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Us051y7j25.exe
"C:\Users\user\Desktop\Us051y7j25.exe"
malicious
C:\Users\user\AppData\Local\Temp\21324.scr
"C:\Users\user\AppData\Local\Temp\21324.scr" /S
malicious
C:\Windows\sysppvrdnvs.exe
C:\Windows\sysppvrdnvs.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\sc.exe
sc stop UsoSvc
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
malicious
C:\Windows\SysWOW64\sc.exe
sc stop WaaSMedicSvc
malicious
C:\Windows\SysWOW64\sc.exe
sc stop wuauserv
malicious
C:\Windows\SysWOW64\sc.exe
sc stop DoSvc
malicious
C:\Windows\SysWOW64\sc.exe
sc stop BITS /wait
malicious
C:\Windows\sysppvrdnvs.exe
"C:\Windows\sysppvrdnvs.exe"
malicious
C:\Users\user\AppData\Local\Temp\1881231804.exe
C:\Users\user\AppData\Local\Temp\1881231804.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\schtasks.exe
schtasks /delete /f /tn "Windows Upgrade Manager"
malicious
C:\Users\user\AppData\Local\Temp\2314627202.exe
C:\Users\user\AppData\Local\Temp\2314627202.exe
malicious
C:\Users\user\AppData\Local\Temp\1091722296.exe
C:\Users\user\AppData\Local\Temp\1091722296.exe
malicious
C:\Users\user\AppData\Local\Temp\1239611256.exe
C:\Users\user\AppData\Local\Temp\1239611256.exe
malicious
C:\Users\user\AppData\Local\Temp\146916724.exe
C:\Users\user\AppData\Local\Temp\146916724.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe
"C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\System32\conhost.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydcfdz#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\dwm.exe
C:\Windows\System32\dwm.exe
malicious
C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe
"C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\reg.exe
reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
There are 27 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://91.202.233.141/
unknown
malicious
http://185.215.113.66/
unknown
malicious
http://185.215.113.66/tdrpl.exe
185.215.113.66
malicious
http://185.215.113.66/reg.php?s=%s
unknown
http://www.t.com/pk
unknown
http://185.215.113.84/nxmr.exe
unknown
http://185.215.113.84/nxmr.exep
unknown
http://91.202.233.141/ALLBSTATAASASDMozilla/5.0
unknown
http://185.215.113.66/tdrpl.exeystem32
unknown
http://crl.microsoft
unknown
http://185.215.113.66/1E
unknown
http://185.215.113.66/tdrpl.exeUUC:
unknown
http://91.202.233.141/der
unknown
https://contoso.com/License
unknown
http://185.215.113.84/nxmr.exeP0
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://91.202.233.141/1
unknown
http://185.215.113.66/5hR&
unknown
http://91.202.233.141/2
unknown
http://185.215.113.66/1zR
unknown
http://91.202.233.141/5
unknown
http://91.202.233.141/3
unknown
http://91.202.233.141/ALLBSTATAASASDO
unknown
http://91.202.233.141/ALLBSTATAASASDH
unknown
http://185.215.113.66/4C:
unknown
http://185.215.113.66/1MR
unknown
http://crl.m5
unknown
http://185.215.113.66/17.36C:
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://91.202.233.141/ALLBSTATAASASD?
unknown
http://91.202.233.141/ALLBSTATAASASD
unknown
http://91.202.233.141/4#
unknown
http://www.microsoft.c
unknown
http://91.202.233.141/TLOADEDBROMozilla/5.0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://185.215.113.66/tdrpl.exe2
unknown
http://185.215.113.84/U
unknown
http://91.202.233.141/ALLBSTATAASASD1
unknown
http://185.215.113.66/tdrpl.exeLMEM
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://185.215.113.66/1x
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://185.215.113.66/http://91.202.233.141/12345%s%s%s:Zone.Identifier%userprofile%%windir%%s
unknown
http://91.202.233.141/2MR
unknown
https://contoso.com/Icon
unknown
http://185.215.113.66/5
unknown
http://185.215.113.66/4
unknown
http://185.215.113.66/5aR-
unknown
http://185.215.113.66/3
unknown
http://185.215.113.66/2
unknown
http://185.215.113.66/ws
unknown
http://185.215.113.66/1FR
unknown
http://185.215.113.66/1C:
unknown
http://185.215.113.66/3_R
unknown
https://github.com/Pester/Pester
unknown
http://185.215.113.66/1
unknown
http://185.215.113.66/1_R
unknown
http://185.215.113.66/reg.php?s=%sMozilla/5.0
unknown
http://91.202.233.141//Rg
unknown
http://185.215.113.66/1t
unknown
http://91.202.233.141/4r
unknown
http://185.215.113.66/tdrp.exe%s:Zone.Identifier/c
unknown
http://185.215.113.66/1tR
unknown
http://185.215.113.66/5C:
unknown
http://185.215.113.84/nxmr.exeM
unknown
http://185.215.113.66/2zR
unknown
http://185.215.113.84/
unknown
http://185.215.113.84/nxmr.exeF
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://185.215.113.84/nxmr.exeH
unknown
http://185.215.113.66/1$
unknown
https://xmrig.com/docs/algorithms
unknown
http://91.202.233.141/tography
unknown
http://185.215.113.66/tdrpl.exel
unknown
https://aka.ms/pscore68
unknown
http://185.215.113.66/tdrpl.exeC:
unknown
http://185.215.113.66/tdrpl.exen
unknown
http://185.215.113.66/tdrp.exe
unknown
http://185.215.113.66/4MMC:
unknown
http://185.215.113.66/3405117-2476756634-1003$
unknown
http://185.215.113.66/2t
unknown
There are 75 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
twizthash.net
185.215.113.66
malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45

IPs

IP
Domain
Country
Malicious
185.215.113.66
twizthash.net
Portugal
malicious
91.202.233.141
unknown
Russian Federation
malicious
91.246.92.22
unknown
Russian Federation
malicious
85.233.153.109
unknown
Russian Federation
malicious
93.188.83.238
unknown
Russian Federation
malicious
151.243.242.97
unknown
Iran (ISLAMIC Republic Of)
malicious
85.173.115.180
unknown
Russian Federation
malicious
178.91.91.225
unknown
Kazakhstan
malicious
90.156.163.121
unknown
Russian Federation
malicious
94.158.52.97
unknown
Uzbekistan
malicious
90.156.163.55
unknown
Russian Federation
malicious
213.230.97.241
unknown
Uzbekistan
malicious
46.100.164.239
unknown
Iran (ISLAMIC Republic Of)
malicious
77.240.41.3
unknown
Kazakhstan
malicious
90.156.160.66
unknown
Russian Federation
malicious
213.206.45.227
unknown
Uzbekistan
malicious
78.39.234.9
unknown
Iran (ISLAMIC Republic Of)
malicious
62.209.135.143
unknown
Uzbekistan
malicious
2.181.31.167
unknown
Iran (ISLAMIC Republic Of)
malicious
80.191.218.209
unknown
Iran (ISLAMIC Republic Of)
malicious
188.212.80.105
unknown
Iran (ISLAMIC Republic Of)
malicious
198.163.192.16
unknown
United States
90.156.162.125
unknown
Russian Federation
78.37.229.249
unknown
Russian Federation
89.218.239.82
unknown
Kazakhstan
95.58.216.162
unknown
Kazakhstan
37.151.113.156
unknown
Kazakhstan
5.237.148.223
unknown
Iran (ISLAMIC Republic Of)
92.47.47.166
unknown
Kazakhstan
59.91.192.122
unknown
India
185.215.113.84
unknown
Portugal
2.178.164.63
unknown
Iran (ISLAMIC Republic Of)
197.165.192.61
unknown
Egypt
94.183.35.46
unknown
Iran (ISLAMIC Republic Of)
5.239.153.192
unknown
Iran (ISLAMIC Republic Of)
178.22.171.158
unknown
Kazakhstan
239.255.255.250
unknown
Reserved
94.230.230.211
unknown
Uzbekistan
88.151.180.214
unknown
Kazakhstan
88.204.242.226
unknown
Kazakhstan
There are 30 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
FirewallOverride
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
FirewallDisableNotify
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
AntiSpywareOverride
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
AntiVirusOverride
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
AntiVirusDisableNotify
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
UpdatesOverride
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
UpdatesDisableNotify
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Windows Settings
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DisableWindowsUpdate
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AlwaysAutoUpdate
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
OverrideNotice
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\BITS
Start
There are 2 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
410000
unkown
page readonly
malicious
410000
unkown
page readonly
malicious
410000
unkown
page readonly
malicious
410000
unkown
page readonly
malicious
7FF7AD1CB000
unkown
page read and write
malicious
410000
unkown
page readonly
malicious
7C7000
heap
page read and write
malicious
2640F711000
heap
page read and write
malicious
410000
unkown
page readonly
malicious
F6F000
stack
page read and write
7DF4E0D20000
trusted library allocation
page execute and read and write
7AE000
heap
page read and write
7FFD3467D000
trusted library allocation
page execute and read and write
15DF0CE0000
heap
page read and write
D1C3D46000
stack
page read and write
FAE000
stack
page read and write
25207885000
heap
page read and write
EE7137F000
stack
page read and write
7FFD34780000
trusted library allocation
page execute and read and write
25E265EF000
heap
page read and write
65C000
stack
page read and write
7FF7AD1B0000
unkown
page readonly
7FFD34847000
trusted library allocation
page read and write
913000
heap
page read and write
25207790000
heap
page read and write
7FFD34880000
trusted library allocation
page read and write
872000
unkown
page readonly
7FFD34694000
trusted library allocation
page read and write
15D90021000
trusted library allocation
page read and write
400000
unkown
page readonly
25E0DBD5000
heap
page read and write
25E0EC79000
trusted library allocation
page read and write
EE711F7000
stack
page read and write
93C000
heap
page read and write
25E2658E000
heap
page read and write
3640000
heap
page read and write
163E000
stack
page read and write
26411110000
heap
page read and write
2FB0000
heap
page read and write
25221815000
heap
page read and write
15DF0F90000
heap
page readonly
43BF000
stack
page read and write
7FFD34ACD000
trusted library allocation
page read and write
78E000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page read and write
7FFD3467B000
trusted library allocation
page read and write
2F44A77000
stack
page read and write
7FFD34A00000
trusted library allocation
page read and write
252217CE000
heap
page read and write
25207809000
heap
page read and write
15DF3504000
heap
page read and write
25E26582000
heap
page read and write
7FFD349DC000
trusted library allocation
page read and write
84EBDFF000
stack
page read and write
414000
unkown
page write copy
7FF7AD1CB000
unkown
page write copy
57E000
stack
page read and write
2641205C000
heap
page read and write
7FFD34A6A000
trusted library allocation
page read and write
25E0C153000
heap
page read and write
890000
heap
page read and write
7FFD348C0000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page execute and read and write
604000
unkown
page readonly
199000
stack
page read and write
25219441000
trusted library allocation
page read and write
650000
heap
page read and write
7FFD34AA0000
trusted library allocation
page read and write
C90000
unkown
page readonly
7FF690A79000
unkown
page readonly
414000
unkown
page write copy
25E0DB70000
heap
page execute and read and write
7FFD34A60000
trusted library allocation
page read and write
1F0000
heap
page read and write
120A000
heap
page read and write
7FF7AD745000
unkown
page write copy
26410F70000
heap
page read and write
25E0DBEA000
heap
page read and write
75B000
stack
page read and write
787000
heap
page read and write
7FFD34A70000
trusted library allocation
page read and write
2D9F000
stack
page read and write
90E000
heap
page read and write
871000
unkown
page execute read
7FFD34756000
trusted library allocation
page execute and read and write
2F448FB000
stack
page read and write
7FF4877D0000
trusted library allocation
page execute and read and write
7FFD34940000
trusted library allocation
page read and write
37B000
stack
page read and write
7FFD34A50000
trusted library allocation
page read and write
15DF2AA1000
heap
page read and write
2520AF90000
trusted library allocation
page read and write
8B7000
heap
page read and write
39AE000
stack
page read and write
BF5000
stack
page read and write
7FF690A85000
unkown
page write copy
15D81A68000
trusted library allocation
page read and write
25E0FAFE000
trusted library allocation
page read and write
4B40000
heap
page read and write
34AE000
stack
page read and write
26411020000
direct allocation
page execute and read and write
1F0000
heap
page read and write
84EBE7F000
stack
page read and write
7FFD34664000
trusted library allocation
page read and write
D1C3DCA000
stack
page read and write
31A8000
heap
page read and write
25219451000
trusted library allocation
page read and write
780000
heap
page read and write
570000
heap
page read and write
2E3F000
stack
page read and write
26411300000
heap
page read and write
793000
heap
page read and write
49FF000
stack
page read and write
389E000
stack
page read and write
1060000
heap
page read and write
9C000
stack
page read and write
84EC2FF000
stack
page read and write
7FFD34670000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
2BEE000
stack
page read and write
25E0DD50000
heap
page read and write
15DF0CF0000
heap
page read and write
795000
heap
page read and write
1E7E0C50000
heap
page read and write
141000
unkown
page execute read
2F9C000
stack
page read and write
25209421000
trusted library allocation
page read and write
143D000
stack
page read and write
22AD000
stack
page read and write
15DF3182000
heap
page read and write
89E000
heap
page read and write
25221B6E000
heap
page read and write
403E000
stack
page read and write
7FFD34AC0000
trusted library allocation
page read and write
7FFD34AD0000
trusted library allocation
page read and write
7FFD3468D000
trusted library allocation
page execute and read and write
7FF7AD742000
unkown
page read and write
15DF2A67000
heap
page execute and read and write
90E000
heap
page read and write
910000
heap
page read and write
8EC000
heap
page read and write
25E268C9000
heap
page read and write
25E0EEAA000
trusted library allocation
page read and write
3650000
heap
page read and write
7FFD347F0000
trusted library allocation
page read and write
147E000
stack
page read and write
1851D1D0000
unkown
page read and write
25E0C180000
heap
page read and write
15DF0DA8000
heap
page read and write
2F4584A000
stack
page read and write
401000
unkown
page execute read
7FFD3466B000
trusted library allocation
page read and write
786000
heap
page read and write
42BE000
stack
page read and write
7AA000
heap
page read and write
30CF000
stack
page read and write
7FFD34716000
trusted library allocation
page read and write
139B7000
trusted library allocation
page read and write
7FF69050B000
unkown
page read and write
3549000
heap
page read and write
7FFD3481A000
trusted library allocation
page read and write
2BA0000
heap
page read and write
18AE000
stack
page read and write
299D000
stack
page read and write
25E0C149000
heap
page read and write
7FFD3465D000
trusted library allocation
page execute and read and write
15DF0D6B000
heap
page read and write
B90000
heap
page read and write
7FF6904F1000
unkown
page execute read
1DE7A350000
heap
page read and write
436F9FE000
stack
page read and write
CA3000
heap
page read and write
15D80229000
trusted library allocation
page read and write
78C000
heap
page read and write
3547000
heap
page read and write
875000
unkown
page readonly
697000
heap
page read and write
7FF7AD1CC000
unkown
page write copy
7FFD34674000
trusted library allocation
page read and write
25E0DF40000
heap
page execute and read and write
252219A0000
heap
page read and write
C92000
unkown
page readonly
2DFE000
stack
page read and write
7FFD3482A000
trusted library allocation
page read and write
7FF7B89C8000
unkown
page readonly
2520A5C7000
trusted library allocation
page read and write
1D4BF190000
heap
page read and write
25E265C8000
heap
page read and write
726000
heap
page read and write
601000
unkown
page execute read
7FFD349D8000
trusted library allocation
page read and write
32A0000
heap
page read and write
7FFD348E0000
trusted library allocation
page read and write
2B8F000
stack
page read and write
1C9E0000
heap
page read and write
7FF7AD740000
unkown
page read and write
15DF2A9C000
heap
page read and write
7FFD34654000
trusted library allocation
page read and write
15D8119D000
trusted library allocation
page read and write
4F0000
heap
page read and write
D1C3C4E000
stack
page read and write
25E1E238000
trusted library allocation
page read and write
2FDB000
stack
page read and write
7FFD3467D000
trusted library allocation
page execute and read and write
6A0000
heap
page read and write
734000
heap
page read and write
354A000
heap
page read and write
D4B000
heap
page read and write
2C3E000
stack
page read and write
84EB969000
stack
page read and write
15DF3192000
heap
page read and write
7FFD34746000
trusted library allocation
page execute and read and write
8F1000
heap
page read and write
2F4467F000
stack
page read and write
7FFD349CC000
trusted library allocation
page read and write
7FF690A85000
unkown
page write copy
3110000
heap
page read and write
CAC000
heap
page read and write
25E2675F000
heap
page read and write
7FFD3470C000
trusted library allocation
page execute and read and write
1DE79FE0000
heap
page read and write
2FEE000
stack
page read and write
70C000
stack
page read and write
4A3E000
stack
page read and write
34D0000
heap
page read and write
15D902F1000
trusted library allocation
page read and write
25E0F23C000
trusted library allocation
page read and write
C92000
unkown
page readonly
7FFD34AB0000
trusted library allocation
page execute and read and write
79B000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
400000
unkown
page readonly
C0E000
stack
page read and write
2521970A000
trusted library allocation
page read and write
1DE7A060000
heap
page read and write
78E000
stack
page read and write
7FFD34990000
trusted library allocation
page read and write
15DF2AF7000
heap
page read and write
2641525C000
heap
page read and write
1200000
heap
page read and write
387F000
stack
page read and write
5B0000
heap
page read and write
7FFD348B0000
trusted library allocation
page read and write
3470000
heap
page read and write
2FEE000
stack
page read and write
15DF319A000
heap
page read and write
7FFD34670000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page read and write
91A000
heap
page read and write
2AFD000
stack
page read and write
2FBE000
stack
page read and write
7FFD34B00000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
25E1DFBA000
trusted library allocation
page read and write
25219703000
trusted library allocation
page read and write
D7E000
stack
page read and write
F0AF28E000
stack
page read and write
321E000
stack
page read and write
D1C2DFD000
stack
page read and write
25221A00000
heap
page read and write
2520A13D000
trusted library allocation
page read and write
767000
heap
page read and write
1851D280000
heap
page read and write
7FFD34674000
trusted library allocation
page read and write
2520922B000
heap
page read and write
84EBFFE000
stack
page read and write
7FFD34AC0000
trusted library allocation
page read and write
7FFD34910000
trusted library allocation
page read and write
2F447F9000
stack
page read and write
31E0000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
25221B60000
heap
page read and write
2520AF0C000
trusted library allocation
page read and write
875000
unkown
page readonly
15DF0D3F000
heap
page read and write
7FFD34AE0000
trusted library allocation
page read and write
4B0000
unkown
page readonly
7FFD348D0000
trusted library allocation
page read and write
15D80F53000
trusted library allocation
page read and write
780000
heap
page read and write
7FF7AD745000
unkown
page write copy
D1C2FF8000
stack
page read and write
5F5000
heap
page read and write
C91000
unkown
page execute read
2BE4FF50000
unkown
page read and write
8DA000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
25E266B7000
heap
page read and write
270D000
stack
page read and write
7FFD34663000
trusted library allocation
page execute and read and write
734000
heap
page read and write
2520785E000
heap
page read and write
25E0FAC3000
trusted library allocation
page read and write
7FFD3480A000
trusted library allocation
page read and write
7FFD348F0000
trusted library allocation
page read and write
25E0DA50000
trusted library allocation
page read and write
26411179000
heap
page read and write
74B000
heap
page read and write
7FF7AD745000
unkown
page write copy
7FFD34672000
trusted library allocation
page read and write
29DE000
stack
page read and write
252077F0000
trusted library section
page read and write
2F446FE000
stack
page read and write
25221992000
heap
page read and write
311E000
stack
page read and write
2BE4FBC0000
heap
page read and write
7FFD34920000
trusted library allocation
page read and write
7FFD34690000
trusted library allocation
page read and write
78A000
heap
page read and write
139B9000
trusted library allocation
page read and write
2F44C7E000
stack
page read and write
2E50000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
7FF7AD746000
unkown
page readonly
7FFD34910000
trusted library allocation
page read and write
26412A5C000
heap
page read and write
43FE000
stack
page read and write
BDE000
heap
page read and write
2BDF000
stack
page read and write
2B3D000
stack
page read and write
6AA000
heap
page read and write
15DF31C8000
heap
page read and write
9B000
stack
page read and write
1F0000
heap
page read and write
D1C2D7A000
stack
page read and write
38BE000
stack
page read and write
7C5000
heap
page read and write
2640F6F6000
heap
page read and write
3549000
heap
page read and write
3544000
heap
page read and write
25E268B0000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
C94000
unkown
page read and write
25209E21000
trusted library allocation
page read and write
15DF3000000
heap
page read and write
25E2675A000
heap
page read and write
A6EAC7F000
stack
page read and write
7FFD349EC000
trusted library allocation
page read and write
477F000
stack
page read and write
2640F712000
heap
page read and write
33C0000
heap
page read and write
25221AF0000
heap
page read and write
25221E10000
heap
page read and write
7FF7AD1CB000
unkown
page read and write
7FFD349B0000
trusted library allocation
page read and write
74D000
heap
page read and write
263F000
stack
page read and write
DF0000
heap
page read and write
7FFD34842000
trusted library allocation
page read and write
2500000
heap
page read and write
25E0DDD9000
heap
page read and write
15DF0FA0000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
123E000
stack
page read and write
3545000
heap
page read and write
252219CE000
heap
page read and write
7FFD3472C000
trusted library allocation
page execute and read and write
7FFD34837000
trusted library allocation
page read and write
3540000
heap
page read and write
23E0000
heap
page read and write
7FFD349E0000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
25207950000
trusted library allocation
page read and write
BCE000
stack
page read and write
25E1DF81000
trusted library allocation
page read and write
3AFF000
stack
page read and write
7FFD349C0000
trusted library allocation
page read and write
25207900000
trusted library section
page read and write
7FFD347F2000
trusted library allocation
page read and write
7FFD34A90000
trusted library allocation
page execute and read and write
25207940000
heap
page readonly
3DBE000
stack
page read and write
25207770000
heap
page read and write
377E000
stack
page read and write
EE71279000
stack
page read and write
719000
heap
page read and write
15D90301000
trusted library allocation
page read and write
DC0000
heap
page read and write
74E000
heap
page read and write
2FC0000
heap
page read and write
873000
unkown
page write copy
33BE000
stack
page read and write
A30000
heap
page read and write
BC6000
heap
page read and write
7FF690A82000
unkown
page read and write
126A000
heap
page read and write
D3E000
stack
page read and write
7FFD34890000
trusted library allocation
page read and write
30DF000
stack
page read and write
15DF317E000
heap
page read and write
15DF0D20000
heap
page read and write
414000
unkown
page write copy
2521948A000
trusted library allocation
page read and write
7FFD34AA0000
trusted library allocation
page read and write
C79000
heap
page read and write
400000
unkown
page readonly
2641115B000
heap
page read and write
1D4BF0F0000
heap
page read and write
7FFD34AD0000
trusted library allocation
page read and write
79B000
heap
page read and write
7DF4E0D30000
trusted library allocation
page execute and read and write
26411070000
direct allocation
page execute and read and write
2F44D7B000
stack
page read and write
436F7ED000
stack
page read and write
15DF0D65000
heap
page read and write
2640F7A2000
heap
page read and write
3543000
heap
page read and write
26411105000
heap
page read and write
2D6E000
stack
page read and write
360E000
stack
page read and write
C97000
heap
page read and write
7FFD34870000
trusted library allocation
page read and write
EE7147E000
stack
page read and write
7FFD34662000
trusted library allocation
page read and write
25E0DF51000
trusted library allocation
page read and write
2520AFCB000
trusted library allocation
page read and write
7FF7AD746000
unkown
page readonly
EE713FE000
stack
page read and write
15DF3136000
heap
page read and write
3549000
heap
page read and write
B8F000
stack
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
870000
unkown
page readonly
7FF69050B000
unkown
page write copy
26411160000
heap
page read and write
25E265D7000
heap
page read and write
15D81AF4000
trusted library allocation
page read and write
7FFD34900000
trusted library allocation
page read and write
2F44BFE000
stack
page read and write
326E000
stack
page read and write
7FF7AD739000
unkown
page readonly
78E000
heap
page read and write
D1C2F79000
stack
page read and write
2E5D000
stack
page read and write
31DF000
stack
page read and write
8B0000
heap
page read and write
2520AE22000
trusted library allocation
page read and write
25E0EADF000
trusted library allocation
page read and write
25E266DD000
heap
page read and write
7FF7B89BA000
unkown
page read and write
25221B24000
heap
page read and write
2520B258000
trusted library allocation
page read and write
15D90031000
trusted library allocation
page read and write
1238000
heap
page read and write
252093F0000
heap
page execute and read and write
2640F5C0000
heap
page read and write
7FFD34780000
trusted library allocation
page execute and read and write
25E0FA40000
trusted library allocation
page read and write
3F0000
heap
page read and write
734000
heap
page read and write
15D81B39000
trusted library allocation
page read and write
7FFD346BC000
trusted library allocation
page execute and read and write
7FFD34870000
trusted library allocation
page read and write
31DB000
stack
page read and write
7FFD34AD0000
trusted library allocation
page read and write
25E0C18E000
heap
page read and write
25207690000
heap
page read and write
374E000
stack
page read and write
142000
unkown
page readonly
795000
heap
page read and write
53E000
stack
page read and write
25E2673F000
heap
page read and write
18EE000
stack
page read and write
84EBCFF000
stack
page read and write
7FFD34860000
trusted library allocation
page read and write
920000
heap
page read and write
47BE000
stack
page read and write
39FE000
stack
page read and write
7FFD34720000
trusted library allocation
page read and write
7FF7B89C3000
unkown
page read and write
15D81DD7000
trusted library allocation
page read and write
7FFD34672000
trusted library allocation
page read and write
7FFD34AF2000
trusted library allocation
page read and write
453E000
stack
page read and write
741000
heap
page read and write
871000
unkown
page execute read
2E53000
heap
page read and write
870000
heap
page read and write
260D000
stack
page read and write
15D80DBE000
trusted library allocation
page read and write
413F000
stack
page read and write
BFD000
heap
page read and write
15DF0DA6000
heap
page read and write
7FFD34832000
trusted library allocation
page read and write
3180000
heap
page read and write
1710000
heap
page read and write
2641665C000
heap
page read and write
7FFD34860000
trusted library allocation
page read and write
25207990000
heap
page read and write
2C40000
heap
page read and write
414000
unkown
page read and write
2520784C000
heap
page read and write
C91000
unkown
page execute read
7FFD34680000
trusted library allocation
page read and write
916000
heap
page read and write
78C000
heap
page read and write
7FFD34920000
trusted library allocation
page read and write
2BE4FB90000
heap
page read and write
280E000
stack
page read and write
D1C3CCA000
stack
page read and write
1D4BF110000
unkown
page read and write
25219722000
trusted library allocation
page read and write
414000
unkown
page write copy
7FFD34746000
trusted library allocation
page execute and read and write
25219712000
trusted library allocation
page read and write
7FFD34684000
trusted library allocation
page read and write
26411160000
heap
page read and write
7FF7B89A1000
unkown
page execute read
7FFD34920000
trusted library allocation
page read and write
25E0DBD0000
heap
page read and write
144000
unkown
page readonly
25E0C161000
heap
page read and write
2710000
heap
page read and write
D1C2B7E000
stack
page read and write
601000
unkown
page execute read
460000
heap
page read and write
7FFD34930000
trusted library allocation
page read and write
7FFD34674000
trusted library allocation
page read and write
2E7C000
stack
page read and write
670000
heap
page read and write
1D4BF490000
heap
page read and write
7B0000
heap
page read and write
7FF6904F0000
unkown
page readonly
78E000
heap
page read and write
7FFD34820000
trusted library allocation
page execute and read and write
690000
heap
page read and write
7FFD349C9000
trusted library allocation
page read and write
400000
unkown
page readonly
7FFD34653000
trusted library allocation
page execute and read and write
7FFD34AB0000
trusted library allocation
page read and write
25E266F1000
heap
page read and write
7FFD34A10000
trusted library allocation
page read and write
784000
heap
page read and write
1E7E0BB0000
heap
page read and write
25E0DA60000
heap
page readonly
7FFD34720000
trusted library allocation
page execute and read and write
2BE4FB70000
heap
page read and write
15DF2F20000
heap
page read and write
7FFD34652000
trusted library allocation
page read and write
C9C000
heap
page read and write
3541000
heap
page read and write
C93000
unkown
page write copy
2520A38B000
trusted library allocation
page read and write
3E0000
heap
page read and write
25E2668D000
heap
page read and write
25221A92000
heap
page read and write
5F0000
heap
page read and write
7C0000
heap
page read and write
25E0ED18000
trusted library allocation
page read and write
2641118B000
heap
page read and write
7FF7AD739000
unkown
page readonly
4C21DFF000
stack
page read and write
252093E0000
heap
page execute and read and write
25E0EEBE000
trusted library allocation
page read and write
252219D6000
heap
page read and write
D1C27CE000
stack
page read and write
7FFD348F0000
trusted library allocation
page read and write
176E000
stack
page read and write
7FF69050C000
unkown
page write copy
7FFD349C8000
trusted library allocation
page read and write
30A8000
heap
page read and write
25E0C1C7000
heap
page read and write
4B3F000
stack
page read and write
602000
unkown
page readonly
767000
heap
page read and write
15D81AAF000
trusted library allocation
page read and write
2520AEC8000
trusted library allocation
page read and write
D1C2A73000
stack
page read and write
252093C7000
heap
page execute and read and write
7FFD349D9000
trusted library allocation
page read and write
CAE000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
25219710000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD34AF0000
trusted library allocation
page read and write
EE710FD000
stack
page read and write
7FFD34A70000
trusted library allocation
page read and write
2F7F000
stack
page read and write
7FFD34B20000
trusted library allocation
page read and write
7FFD34821000
trusted library allocation
page read and write
7FFD34650000
trusted library allocation
page read and write
25221ACA000
heap
page read and write
7DF47B830000
trusted library allocation
page execute and read and write
7FFD34800000
trusted library allocation
page read and write
7FFD348F0000
trusted library allocation
page read and write
2F44B79000
stack
page read and write
15D80DBC000
trusted library allocation
page read and write
19D000
stack
page read and write
7FFD34810000
trusted library allocation
page read and write
28B8000
heap
page read and write
7FFD34810000
trusted library allocation
page execute and read and write
7FFD34660000
trusted library allocation
page read and write
782000
heap
page read and write
B9A000
heap
page read and write
7FFD34A80000
trusted library allocation
page read and write
15DF0D5F000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
401000
unkown
page execute read
2D7B000
stack
page read and write
6FA000
stack
page read and write
7FFD349C4000
trusted library allocation
page read and write
4C21BFE000
stack
page read and write
186E000
stack
page read and write
7FFD348C0000
trusted library allocation
page read and write
7FF7AD739000
unkown
page readonly
D1C2E79000
stack
page read and write
2E40000
heap
page read and write
15DF29D0000
heap
page read and write
15D81BB2000
trusted library allocation
page read and write
15D81B77000
trusted library allocation
page read and write
7FFD34AC6000
trusted library allocation
page read and write
15DF0FD0000
trusted library allocation
page read and write
7FFD349B4000
trusted library allocation
page read and write
2520AE81000
trusted library allocation
page read and write
15DF0D67000
heap
page read and write
D1C317C000
stack
page read and write
7FF6904F0000
unkown
page readonly
7FFD349B3000
trusted library allocation
page read and write
15D902E8000
trusted library allocation
page read and write
770000
heap
page read and write
A8E000
stack
page read and write
EE714FC000
stack
page read and write
15DF1090000
heap
page read and write
7FFD34900000
trusted library allocation
page read and write
7FF7AD1B0000
unkown
page readonly
26411179000
heap
page read and write
15DF2B90000
trusted library allocation
page read and write
26411179000
heap
page read and write
102E000
stack
page read and write
7FFD348B0000
trusted library allocation
page read and write
25E0FAB0000
trusted library allocation
page read and write
25E262B0000
heap
page read and write
2E7D000
stack
page read and write
7FF7AD737000
unkown
page read and write
3C3F000
stack
page read and write
7E0000
heap
page read and write
7FFD34680000
trusted library allocation
page read and write
39BA000
trusted library allocation
page read and write
2EF0000
heap
page read and write
7FFD34AB6000
trusted library allocation
page read and write
7FF7AD1CB000
unkown
page write copy
25219421000
trusted library allocation
page read and write
34BD000
stack
page read and write
270E000
stack
page read and write
1180000
heap
page read and write
7FFD34710000
trusted library allocation
page read and write
123E000
heap
page read and write
7FF7AD1B1000
unkown
page execute read
1E7E0BE0000
unkown
page read and write
2641165C000
heap
page read and write
AF6000
stack
page read and write
797000
heap
page read and write
756000
stack
page read and write
7FFD34970000
trusted library allocation
page read and write
784000
heap
page read and write
84EC07F000
stack
page read and write
7FFD348E0000
trusted library allocation
page read and write
874000
unkown
page read and write
EE70EFF000
stack
page read and write
84EB9ED000
stack
page read and write
25E0DDF6000
heap
page read and write
25221970000
heap
page read and write
2F6F000
stack
page read and write
15DF3003000
heap
page read and write
EE70B13000
stack
page read and write
252079A0000
trusted library allocation
page read and write
157F000
stack
page read and write
241E000
stack
page read and write
15DF0F80000
trusted library allocation
page read and write
25E0DA30000
trusted library allocation
page read and write
797000
heap
page read and write
2EAE000
stack
page read and write
25207846000
heap
page read and write
252219DA000
heap
page read and write
3EFE000
stack
page read and write
D1C327B000
stack
page read and write
25E1E251000
trusted library allocation
page read and write
39BF000
stack
page read and write
25E0C0E0000
heap
page read and write
7FFD349C2000
trusted library allocation
page read and write
18F0000
heap
page read and write
797000
heap
page read and write
761000
heap
page read and write
2F457CC000
stack
page read and write
26413E5C000
heap
page read and write
7FFD34910000
trusted library allocation
page read and write
25E266ED000
heap
page read and write
1D4BF495000
heap
page read and write
2BF0000
heap
page read and write
401000
unkown
page execute read
2EDB000
stack
page read and write
1D4BF4A0000
unkown
page read and write
116F000
stack
page read and write
7FFD34834000
trusted library allocation
page read and write
2F4487F000
stack
page read and write
25E0F0F6000
trusted library allocation
page read and write
2ED8000
heap
page read and write
7FFD34880000
trusted library allocation
page read and write
2F443EF000
stack
page read and write
1851CF70000
heap
page read and write
15DF0F20000
heap
page read and write
3EBF000
stack
page read and write
2F4574E000
stack
page read and write
EE70E7E000
stack
page read and write
1E7E0F90000
heap
page read and write
D1C2BFF000
stack
page read and write
25E0F9FB000
trusted library allocation
page read and write
7FFD3466D000
trusted library allocation
page execute and read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
6D9000
heap
page read and write
25207930000
trusted library allocation
page read and write
89A000
heap
page read and write
2520B1F0000
trusted library allocation
page read and write
7FFD34670000
trusted library allocation
page read and write
2D3E000
stack
page read and write
2FF0000
heap
page read and write
7FF690A82000
unkown
page write copy
334E000
stack
page read and write
7FF7B89C5000
unkown
page read and write
3560000
heap
page execute and read and write
7FFD346BC000
trusted library allocation
page execute and read and write
1B1F000
stack
page read and write
25221E4C000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FF690A79000
unkown
page readonly
7FFD34AA0000
trusted library allocation
page execute and read and write
15D80D19000
trusted library allocation
page read and write
784000
heap
page read and write
2BE4FF40000
heap
page read and write
245E000
stack
page read and write
15DF29D5000
heap
page read and write
99F000
stack
page read and write
2DA0000
heap
page read and write
8CA7DFF000
stack
page read and write
2E38000
heap
page read and write
25E26570000
heap
page read and write
25E0C169000
heap
page read and write
10F6000
stack
page read and write
4F0000
heap
page read and write
590000
heap
page read and write
7FFD34A5A000
trusted library allocation
page read and write
7FFD34B10000
trusted library allocation
page read and write
7FFD34710000
trusted library allocation
page read and write
870000
unkown
page readonly
25221760000
heap
page read and write
84EBEFC000
stack
page read and write
EE70B9E000
stack
page read and write
2F4477E000
stack
page read and write
3546000
heap
page read and write
7FFD34726000
trusted library allocation
page read and write
1720000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
370E000
stack
page read and write
657000
heap
page read and write
7FFD34993000
trusted library allocation
page read and write
7FF690A86000
unkown
page readonly
25E26725000
heap
page read and write
C90000
unkown
page readonly
2FAE000
stack
page read and write
25E268F4000
heap
page read and write
25E0FD89000
trusted library allocation
page read and write
25E0E950000
trusted library allocation
page read and write
7FFD3468B000
trusted library allocation
page read and write
7FFD34B02000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
2520A141000
trusted library allocation
page read and write
1D1ED000
stack
page read and write
84EBF7F000
stack
page read and write
1851CF90000
unkown
page read and write
45E000
stack
page read and write
26411160000
heap
page read and write
7FFD34801000
trusted library allocation
page read and write
25E0C1CC000
heap
page read and write
3547000
heap
page read and write
A6EA98C000
stack
page read and write
7FF7AD742000
unkown
page write copy
2BE4FED0000
unkown
page read and write
CD8000
heap
page read and write
782000
heap
page read and write
7FFD34852000
trusted library allocation
page read and write
15DF0EF0000
heap
page read and write
252219D2000
heap
page read and write
25221BA0000
trusted library allocation
page read and write
EE70FFF000
stack
page read and write
2DB0000
heap
page read and write
2640F73C000
heap
page read and write
25E1DF71000
trusted library allocation
page read and write
15DF1010000
trusted library allocation
page read and write
252077D0000
heap
page read and write
7FFD34A60000
trusted library allocation
page read and write
EE70F79000
stack
page read and write
7FFD349D4000
trusted library allocation
page read and write
15DF1095000
heap
page read and write
15DF2AD1000
heap
page read and write
790000
heap
page read and write
2F20000
heap
page read and write
399C000
stack
page read and write
80E000
stack
page read and write
7DF49D860000
trusted library allocation
page execute and read and write
7FFD34900000
trusted library allocation
page read and write
140000
unkown
page readonly
7FF7AD742000
unkown
page read and write
1DDEB000
stack
page read and write
15DF34D0000
heap
page read and write
25E0E179000
trusted library allocation
page read and write
7FF7B89BC000
unkown
page readonly
15DF3186000
heap
page read and write
7FFD34811000
trusted library allocation
page read and write
436F7FE000
stack
page read and write
7FFD34802000
trusted library allocation
page read and write
7FF7AD745000
unkown
page write copy
2640F7B0000
heap
page read and write
7FFD348C0000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
FEE000
stack
page read and write
335F000
stack
page read and write
EE71F4D000
stack
page read and write
1851CF60000
heap
page read and write
D1C2FFE000
stack
page read and write
1851D000000
heap
page read and write
15DF2BB0000
heap
page read and write
15D80001000
trusted library allocation
page read and write
540000
heap
page read and write
15DF2840000
heap
page read and write
BEB000
heap
page read and write
15DF3520000
heap
page read and write
139B1000
trusted library allocation
page read and write
25E1DF51000
trusted library allocation
page read and write
7FFD3471C000
trusted library allocation
page execute and read and write
25207A70000
heap
page read and write
30ED000
stack
page read and write
78B000
heap
page read and write
DF5000
heap
page read and write
B9E000
heap
page read and write
25207A75000
heap
page read and write
D1C2EF6000
stack
page read and write
88F000
stack
page read and write
1D4BF150000
unkown
page read and write
26417A5C000
heap
page read and write
7FF7AD1B0000
unkown
page readonly
F0AF27E000
stack
page read and write
785000
heap
page read and write
1253000
heap
page read and write
C95000
unkown
page readonly
7DF47B820000
trusted library allocation
page execute and read and write
7FFD348A0000
trusted library allocation
page read and write
761000
heap
page read and write
384F000
stack
page read and write
7FFD3468B000
trusted library allocation
page execute and read and write
25E0C100000
heap
page read and write
7A0000
heap
page read and write
7FFD34700000
trusted library allocation
page read and write
7FF690A77000
unkown
page read and write
2A4F000
stack
page read and write
25E0C233000
heap
page read and write
9C000
stack
page read and write
EE71178000
stack
page read and write
7FFD34930000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
2B70000
heap
page read and write
750000
heap
page read and write
2ADE000
stack
page read and write
2E9E000
stack
page read and write
401000
unkown
page execute read
2F449F9000
stack
page read and write
7FFD34970000
trusted library allocation
page read and write
239E000
stack
page read and write
550000
heap
page read and write
141000
unkown
page execute read
275F000
stack
page read and write
525000
heap
page read and write
93E000
heap
page read and write
EE71079000
stack
page read and write
79A000
heap
page read and write
2640F722000
heap
page read and write
A6EACFF000
stack
page read and write
873000
unkown
page write copy
EE712F8000
stack
page read and write
2BE4FE90000
unkown
page read and write
D29000
heap
page read and write
25219708000
trusted library allocation
page read and write
400000
unkown
page readonly
25221845000
heap
page read and write
DB0000
heap
page read and write
25E0F9B4000
trusted library allocation
page read and write
7FFD346AC000
trusted library allocation
page execute and read and write
7FFD3468D000
trusted library allocation
page execute and read and write
25E0DB77000
heap
page execute and read and write
7FFD349D0000
trusted library allocation
page read and write
417E000
stack
page read and write
7FFD34660000
trusted library allocation
page read and write
7FFD34680000
trusted library allocation
page read and write
133D000
stack
page read and write
6F4000
heap
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
48BF000
stack
page read and write
25207889000
heap
page read and write
1DE79FC0000
heap
page read and write
7FFD34857000
trusted library allocation
page read and write
7FFD3467B000
trusted library allocation
page execute and read and write
15DF0DAD000
heap
page read and write
872000
unkown
page readonly
7FFD349A3000
trusted library allocation
page read and write
B7E000
stack
page read and write
7FFD34980000
trusted library allocation
page read and write
25E266E1000
heap
page read and write
7FFD34A80000
trusted library allocation
page read and write
268E000
stack
page read and write
D1C2AFE000
stack
page read and write
78D000
heap
page read and write
7FFD34854000
trusted library allocation
page read and write
25E0C000000
heap
page read and write
D0F000
stack
page read and write
2A8E000
stack
page read and write
120E000
heap
page read and write
725000
heap
page read and write
7FF7AD746000
unkown
page readonly
25E0C1A0000
heap
page read and write
7C0000
heap
page read and write
7FFD349B9000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page read and write
2F458CA000
stack
page read and write
140000
unkown
page readonly
4C21BED000
stack
page read and write
252094A8000
trusted library allocation
page read and write
2FDE000
stack
page read and write
7FFD34736000
trusted library allocation
page execute and read and write
15D81A09000
trusted library allocation
page read and write
15DF319E000
heap
page read and write
467E000
stack
page read and write
15D80A00000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page read and write
6AE000
heap
page read and write
D1C307E000
stack
page read and write
25E0EAEB000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
520000
heap
page read and write
26411150000
heap
page read and write
600000
unkown
page readonly
15DF2B2A000
heap
page read and write
400000
unkown
page readonly
15DF2A70000
heap
page read and write
7FFD3466D000
trusted library allocation
page execute and read and write
7FFD34B00000
trusted library allocation
page read and write
7FFD348E0000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD34A7C000
trusted library allocation
page read and write
121D000
heap
page read and write
7FF7AD746000
unkown
page readonly
602000
unkown
page readonly
1D4BF0E0000
heap
page read and write
15D80087000
trusted library allocation
page read and write
252217AC000
heap
page read and write
8DA000
heap
page read and write
32DC000
stack
page read and write
35A0000
heap
page execute and read and write
7FF7AD742000
unkown
page write copy
25E0C18A000
heap
page read and write
EE71FCA000
stack
page read and write
2F4497D000
stack
page read and write
25209410000
heap
page read and write
310F000
stack
page read and write
48FE000
stack
page read and write
26415C5C000
heap
page read and write
2350000
heap
page read and write
44FF000
stack
page read and write
1E7E0BC0000
heap
page read and write
427F000
stack
page read and write
2641705C000
heap
page read and write
25209415000
heap
page read and write
15DF2AAC000
heap
page read and write
25E0DFD6000
trusted library allocation
page read and write
312E000
stack
page read and write
325E000
stack
page read and write
719000
heap
page read and write
AFB000
stack
page read and write
7FFD34844000
trusted library allocation
page read and write
1C12D000
stack
page read and write
8CA7BFD000
stack
page read and write
139B3000
trusted library allocation
page read and write
3541000
heap
page read and write
15DF3196000
heap
page read and write
C99000
heap
page read and write
C93000
unkown
page write copy
25E0EC75000
trusted library allocation
page read and write
7FFD34800000
trusted library allocation
page read and write
15DF305A000
heap
page read and write
7FFD34930000
trusted library allocation
page read and write
C70000
heap
page read and write
2F3E000
stack
page read and write
15DF3158000
heap
page read and write
2690000
heap
page read and write
2640F7A2000
heap
page read and write
7FFD34820000
trusted library allocation
page execute and read and write
2640000
heap
page read and write
252093C0000
heap
page execute and read and write
15DF0F60000
trusted library allocation
page read and write
30A0000
heap
page read and write
344F000
stack
page read and write
7FFD34770000
trusted library allocation
page execute and read and write
7FFD34950000
trusted library allocation
page read and write
25221880000
heap
page read and write
7FFD348A0000
trusted library allocation
page read and write
1DE7A068000
heap
page read and write
2641345C000
heap
page read and write
15D81E9C000
trusted library allocation
page read and write
26410F90000
direct allocation
page execute read
25E0C140000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
7FF7AD1B1000
unkown
page execute read
7FFD349B0000
trusted library allocation
page read and write
B3D000
stack
page read and write
25207800000
heap
page read and write
39B1000
trusted library allocation
page read and write
2640F6B0000
heap
page read and write
35AF000
stack
page read and write
414000
unkown
page write copy
1D5EE000
stack
page read and write
26411153000
heap
page read and write
11D0000
heap
page read and write
25E1E240000
trusted library allocation
page read and write
25E26614000
heap
page read and write
7FFD34706000
trusted library allocation
page read and write
1DE79FB0000
heap
page read and write
6BE000
stack
page read and write
7FFD34AE0000
trusted library allocation
page read and write
463F000
stack
page read and write
25E0DAE0000
trusted library allocation
page read and write
1D9EE000
stack
page read and write
19C000
stack
page read and write
7FFD34790000
trusted library allocation
page execute and read and write
CA1000
heap
page read and write
15D902E3000
trusted library allocation
page read and write
15D80B91000
trusted library allocation
page read and write
2ED0000
heap
page read and write
25221AB2000
heap
page read and write
2FAE000
stack
page read and write
7FFD34664000
trusted library allocation
page read and write
26418E5C000
heap
page read and write
600000
unkown
page readonly
7FFD34A6C000
trusted library allocation
page read and write
77E000
stack
page read and write
10FA000
stack
page read and write
3541000
heap
page read and write
73E000
stack
page read and write
1DE7A355000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
7FF7AD1B1000
unkown
page execute read
15D80F67000
trusted library allocation
page read and write
25E0C3D0000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
322E000
stack
page read and write
7FFD346CC000
trusted library allocation
page execute and read and write
7FFD34AF0000
trusted library allocation
page read and write
D90000
heap
page read and write
79A000
heap
page read and write
8CA7BED000
stack
page read and write
7FF7B89A0000
unkown
page readonly
31A0000
heap
page read and write
7FFD34A73000
trusted library allocation
page read and write
7FFD3466D000
trusted library allocation
page execute and read and write
15DF2A60000
heap
page execute and read and write
3520000
heap
page read and write
25E0C410000
heap
page read and write
15DF0D61000
heap
page read and write
84E000
stack
page read and write
25E266CE000
heap
page read and write
7FFD34670000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
15DF29DA000
heap
page read and write
D1C31FE000
stack
page read and write
3FFF000
stack
page read and write
7FFD3469D000
trusted library allocation
page execute and read and write
25E26717000
heap
page read and write
2520783D000
heap
page read and write
640000
heap
page read and write
2640F6B8000
heap
page read and write
25E266D9000
heap
page read and write
7FFD34AB0000
trusted library allocation
page read and write
25E0DAA0000
trusted library allocation
page read and write
EE70BDE000
stack
page read and write
25E0DBB0000
heap
page execute and read and write
7FFD34990000
trusted library allocation
page read and write
25209649000
trusted library allocation
page read and write
15DF3011000
heap
page read and write
790000
heap
page read and write
7FFD34ABD000
trusted library allocation
page read and write
142000
unkown
page readonly
26411100000
heap
page read and write
3B3E000
stack
page read and write
761000
heap
page read and write
15DF3380000
heap
page read and write
7FFD34850000
trusted library allocation
page read and write
25E0C415000
heap
page read and write
D1C30FE000
stack
page read and write
15D9006A000
trusted library allocation
page read and write
2BE4FB80000
heap
page readonly
25E1E21D000
trusted library allocation
page read and write
15D80DD4000
trusted library allocation
page read and write
84EC17E000
stack
page read and write
25E0EAE5000
trusted library allocation
page read and write
EE7204C000
stack
page read and write
2EBD000
stack
page read and write
336E000
stack
page read and write
401000
unkown
page execute read
C95000
unkown
page readonly
D1C2CFF000
stack
page read and write
25221AF4000
heap
page read and write
7FFD348A0000
trusted library allocation
page read and write
25E0DD60000
heap
page read and write
7FFD34890000
trusted library allocation
page read and write
4B2000
unkown
page readonly
15DF29B0000
heap
page execute and read and write
25E26560000
heap
page read and write
25E0F19A000
trusted library allocation
page read and write
15D81E3F000
trusted library allocation
page read and write
7FFD34B10000
trusted library allocation
page read and write
2E9C000
stack
page read and write
EE71ECE000
stack
page read and write
15DF318E000
heap
page read and write
294E000
stack
page read and write
E6D000
stack
page read and write
7FFD34AC0000
trusted library allocation
page read and write
1715000
heap
page read and write
28B0000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
7DF49D870000
trusted library allocation
page execute and read and write
25E0DD20000
trusted library allocation
page read and write
15DF2990000
heap
page execute and read and write
7FFD3467D000
trusted library allocation
page execute and read and write
25E0DA70000
trusted library allocation
page read and write
3C7E000
stack
page read and write
25E1E233000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
7FFD349D2000
trusted library allocation
page read and write
742000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
D1C2C7A000
stack
page read and write
E40000
heap
page read and write
7FFD3469B000
trusted library allocation
page execute and read and write
2641485C000
heap
page read and write
CCE000
stack
page read and write
7FFD3471C000
trusted library allocation
page execute and read and write
25E0F955000
trusted library allocation
page read and write
25207910000
trusted library allocation
page read and write
2F44CFE000
stack
page read and write
25E26652000
heap
page read and write
767000
heap
page read and write
252217FE000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
63F000
stack
page read and write
252079D0000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page execute and read and write
91E000
heap
page read and write
7FF7AD1B0000
unkown
page readonly
2FAF000
stack
page read and write
401000
unkown
page execute read
3D7F000
stack
page read and write
2E6E000
stack
page read and write
2E30000
heap
page read and write
6F6000
stack
page read and write
2641845C000
heap
page read and write
2F44AF9000
stack
page read and write
7FFD34880000
trusted library allocation
page read and write
15D90001000
trusted library allocation
page read and write
26411010000
heap
page readonly
23DF000
stack
page read and write
7FFD349E8000
trusted library allocation
page read and write
290F000
stack
page read and write
7FF7AD739000
unkown
page readonly
15DF3020000
heap
page read and write
8EC000
heap
page read and write
7FF690A86000
unkown
page readonly
144000
unkown
page readonly
7FFD34663000
trusted library allocation
page execute and read and write
15DF0D7F000
heap
page read and write
26411060000
direct allocation
page execute and read and write
2D5E000
stack
page read and write
22EE000
stack
page read and write
2520A414000
trusted library allocation
page read and write
2F6E000
stack
page read and write
7C7000
heap
page read and write
2640F742000
heap
page read and write
1851D390000
unkown
page read and write
7DF4E0D10000
trusted library allocation
page execute and read and write
1C870000
heap
page read and write
604000
unkown
page readonly
25221B90000
heap
page read and write
84EC27F000
stack
page read and write
7FFD34673000
trusted library allocation
page execute and read and write
7FF6904F1000
unkown
page execute read
7FFD3467D000
trusted library allocation
page execute and read and write
2F443A3000
stack
page read and write
D4C000
stack
page read and write
7FF7AD1B1000
unkown
page execute read
There are 1188 hidden memdumps, click here to show them.