IOC Report
qNdO4D18CF.exe

loading gif

Files

File Path
Type
Category
Malicious
qNdO4D18CF.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
initial sample
malicious
C:\Program Files (x86)\Steam\steamclient.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Program Files (x86)\Steam\steamclient.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\qNdO4D18CF.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\XyagYCCOZX.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rmvercvh\rmvercvh.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
malicious
C:\Users\user\Desktop\AFZZLiTQ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\BCBhhiiL.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\BdpSDMGd.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\BuRPCyHG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\BwVbAMfc.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\BzfkqkWQ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CYASrcKR.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CpOixJXm.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CqvSLBwK.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CufHpEgE.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\DfbAZvLY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\DmprTJmg.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\EFxianyZ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\EhArHZqU.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\FsrYoeiE.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\GbyyMOOB.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\GeNRoyLy.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\GpTgJexz.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\Gumzpbgc.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\HLSRUZZF.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\HSbycbvE.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\HWSrgsLR.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\HiqIapca.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\IRjpMTiY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ITtzBsaM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\IYriOWqO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\IaBrEuiC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\IsFPfNCu.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\JxaHDTDN.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KJWyVjBG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KMIinpLK.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KRGQASbM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KgJXRbxs.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KkdqwYhV.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\LYhyhmcT.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\LforkokJ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\MHUibFPy.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\MeZIvNrs.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\MlipEPMs.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\NWAOYYym.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\NnHgmtso.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\NoRyKQDH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\NtxFrmGq.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OQPyFqpt.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PEYPdPrA.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PGiZSoip.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PPFZCaBl.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PWNGLdXl.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PXvpYVwJ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\QLzxKisH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\QvOHgixC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\RKwhQDGz.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\RjAOsfOs.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\SzxHEkUn.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\THYplDVu.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\TbmXCvgb.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\TxYPZkji.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\UAZgkvhu.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\UUoNBnsb.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VHHMJZBT.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VrbgQkMX.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VsDGsRfn.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VwwfTkqf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VxBoFvwp.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VxjNZniX.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\WucwbvLj.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\XXkOusIo.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\XsgfYcsu.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YGOFIxBr.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YKeEIjtU.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YwOfwePf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ZHGMdjIP.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\aEhUzjWJ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\aSHMiLLR.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\aUovvDkq.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\asCFMbmi.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\bhuvEsaX.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\bzdouunp.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\cRJFZrfS.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\cpPftzHM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\dCQWQdrl.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\dpMkGxhC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\epactCHB.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\eqUeBrnj.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\fIcWIVzb.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\fQXwQazI.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ffUEpXBW.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\fhkMXHMd.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\gFDeeVNW.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ggiwcdaV.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\hcheWwWA.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\htowkSQD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\iPDDuStZ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ifdmuvPD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\iiUfyMfQ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ipiVsaGZ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jEEdizHN.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jUVbmMDs.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\kWYnjZbO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\kWtSUqip.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\kixEeWsX.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\kqnUARmv.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\lHqLDiMI.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\lQNLnUfF.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\lsLKjvRr.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\mHEDqnlH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\mXotVngM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\mYLVFIfJ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\nDreGkIL.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\nYgAqZmk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\oOnUZAGE.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\paSjLIrf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ppsaukgn.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\qEBmAmuq.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\qOBMMFgD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\qcHMUuVk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rLAuGYci.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rRaDvjLz.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rThRxFce.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rreJQTki.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rzTkgNRx.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\sFNjAptf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\sIbCbYqd.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\sOBLQjau.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\sYBlcCMG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\sphCHAEj.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\tEVbjhhz.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\tyOaygFf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\uENiETnW.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\vhVAXQlb.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\vpESBzMh.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\vvDaHluY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\yvDYLPoQ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\yxHkJcLm.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\yzXsqMXs.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zJmzvlwN.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zdbaQHhe.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zplKRyKf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\System32\SecurityHealthSystray.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Steam\fcafd258929766
ASCII text, with very long lines (989), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\steamclient.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Hs46Jw7tmA
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\RESA90.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6e4, 10 symbols, created Sat Nov 30 04:28:38 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0xaq1mla.wr2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1utmv0mk.our.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_23h3weqb.iup.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2bb1a3zh.m5m.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ezy1e2m.yxf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2u3lcngq.2im.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_35qxwjfi.tuf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3td4kktq.u0b.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a0tixeyp.5jk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_arxb4pwb.eqy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b1esbh2i.yzh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bcunrahu.d0i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bgd4zguh.3ce.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bt4npn0r.gxw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_btwhhbdr.dvy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bwjfm1bf.liw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_codm3pr5.x0e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ejo2sobw.ixt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_enlojwpn.bvc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_evv3hrkq.l3j.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f1to0rtc.ogw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g4czampg.ftd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gbbnlm4s.ic2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_go55jtae.3he.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ha254hqb.iij.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iqjcet4n.tcg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iwdnnk32.gy0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j2pblsrt.3zy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jzrw0dnp.sth.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3rowymv.cht.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kt0l3oxy.3lt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l4afasvj.yra.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l5itgopo.pji.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m0x0gnr2.mk0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_muraqn2f.mzw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mxptamyo.2ls.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nrb3rwp3.0tt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oapagubr.4nn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p3jqyyy2.kf4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pe0defhf.1hc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pxaykmbt.1g4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rmhrbdbe.2bi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ruvaqlcq.5vt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t1x1byoi.1lb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u02g41wo.uks.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_upocqxa2.0gb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vperpacl.yez.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vspn2cjg.4hu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vwb0tk2v.xxq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wxdsl3u0.52d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x5mlhfkz.4nn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y24g0xft.3dt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yl54dnja.hf5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zech0324.s1c.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zmf03omb.x02.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zu3y5qmq.523.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\rmvercvh\rmvercvh.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\rmvercvh\rmvercvh.out
Unicode text, UTF-8 (with BOM) text, with very long lines (329), with CRLF, CR line terminators
modified
C:\Users\user\Desktop\84f3811bb1c48b
ASCII text, with very long lines (347), with no line terminators
dropped
C:\Windows\System32\CSCA9DA535D810450AA35B2C9F27DA16D.TMP
MSVC .res
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 202 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\qNdO4D18CF.exe
"C:\Users\user\Desktop\qNdO4D18CF.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\rmvercvh\rmvercvh.cmdline"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$WinREAgent/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Steam\steamclient.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\qNdO4D18CF.exe'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\XyagYCCOZX.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Program Files (x86)\Steam\steamclient.exe
"C:\Program Files (x86)\Steam\steamclient.exe"
malicious
C:\Users\user\Desktop\qNdO4D18CF.exe
"C:\Users\user\Desktop\qNdO4D18CF.exe"
malicious
C:\Program Files (x86)\Steam\steamclient.exe
"C:\Program Files (x86)\Steam\steamclient.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c "C:\Program Files (x86)\Steam\steamclient.exe"
malicious
C:\Program Files (x86)\Steam\steamclient.exe
"C:\Program Files (x86)\Steam\steamclient.exe"
malicious
C:\Program Files (x86)\Steam\steamclient.exe
"C:\Program Files (x86)\Steam\steamclient.exe"
malicious
C:\Users\user\Desktop\qNdO4D18CF.exe
"C:\Users\user\Desktop\qNdO4D18CF.exe"
malicious
C:\Program Files (x86)\Steam\steamclient.exe
"C:\Program Files (x86)\Steam\steamclient.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c "C:\Program Files (x86)\Steam\steamclient.exe"
malicious
C:\Program Files (x86)\Steam\steamclient.exe
"C:\Program Files (x86)\Steam\steamclient.exe"
malicious
C:\Users\user\Desktop\qNdO4D18CF.exe
"C:\Users\user\Desktop\qNdO4D18CF.exe"
malicious
C:\Program Files (x86)\Steam\steamclient.exe
"C:\Program Files (x86)\Steam\steamclient.exe"
malicious
C:\Users\user\Desktop\qNdO4D18CF.exe
"C:\Users\user\Desktop\qNdO4D18CF.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c "C:\Users\user\Desktop\qNdO4D18CF.exe"
malicious
C:\Users\user\Desktop\qNdO4D18CF.exe
C:\Users\user\Desktop\qNdO4D18CF.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA90.tmp" "c:\Windows\System32\CSCA9DA535D810450AA35B2C9F27DA16D.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 45 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://390412cm.n9shteam.in/ProviderImagepipeTopacketbaseuniversaldle.php
172.66.0.102
malicious
https://ipinfo.io/country
unknown
https://aka.ms/pscore68
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://github.com/Pester/Pester
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://ipinfo.io/ip
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
390412cm.n9shteam.in
172.66.0.102
malicious

IPs

IP
Domain
Country
Malicious
172.66.0.102
390412cm.n9shteam.in
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
steamclient
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
qNdO4D18CF
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\e099c071fcfe07d52cac9bc9c9838e42068e6df8
0102d8a38281c65a273b2d31fbd65d2be8f06831
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\steamclient_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\qNdO4D18CF_RASMANCS
FileDirectory
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1AE80000
trusted library section
page read and write
malicious
12703000
trusted library allocation
page read and write
malicious
29B266C0000
heap
page read and write
31B3000
trusted library allocation
page read and write
1B770000
unkown
page readonly
7FFD9BD80000
trusted library allocation
page read and write
660000
heap
page read and write
597F479000
stack
page read and write
232DF047000
heap
page execute and read and write
2230000
unkown
page readonly
13116000
trusted library allocation
page read and write
1B8A0000
heap
page execute and read and write
E15000
heap
page read and write
18790C7000
stack
page read and write
1481E0BC000
heap
page read and write
1481E06D000
heap
page read and write
26A89A50000
heap
page read and write
19AA670E000
heap
page read and write
21F0000
unkown
page readonly
1B79C000
heap
page read and write
2DB25763000
heap
page read and write
2E5E3070000
heap
page read and write
13A37000
trusted library allocation
page read and write
1D5472F0000
heap
page read and write
1D549C53000
trusted library allocation
page read and write
3287000
trusted library allocation
page read and write
25F0000
heap
page execute and read and write
29B267A0000
heap
page read and write
1230000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
695000
heap
page read and write
32A0000
trusted library allocation
page read and write
20B00086000
trusted library allocation
page read and write
22B2000
unkown
page readonly
1D547373000
heap
page read and write
1481E1F3000
direct allocation
page read and write
13141000
trusted library allocation
page read and write
1325000
heap
page read and write
29B28451000
heap
page read and write
2DB25720000
heap
page read and write
2964000
trusted library allocation
page read and write
13372000
trusted library allocation
page read and write
2B9F000
trusted library allocation
page read and write
1D29EF60000
heap
page execute and read and write
2DB27395000
heap
page read and write
B90000
heap
page read and write
C753BC7000
stack
page read and write
150421ED000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
305A000
heap
page read and write
1877FF9000
stack
page read and write
13129000
trusted library allocation
page read and write
1BEAE000
stack
page read and write
2FAB000
trusted library allocation
page read and write
2B60000
heap
page read and write
93649F7000
stack
page read and write
12448000
trusted library allocation
page read and write
1244D000
trusted library allocation
page read and write
187817D000
stack
page read and write
1877B93000
stack
page read and write
F1725F9000
stack
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
2441000
trusted library allocation
page read and write
29EA000
trusted library allocation
page read and write
1AF8C000
stack
page read and write
1BA8A000
stack
page read and write
131B7000
trusted library allocation
page read and write
15044365000
trusted library allocation
page read and write
2B81000
trusted library allocation
page read and write
132FD000
trusted library allocation
page read and write
F17283E000
stack
page read and write
26A89940000
trusted library allocation
page read and write
16F0000
heap
page read and write
29B26840000
trusted library allocation
page read and write
22FA87000
stack
page read and write
7FFD9B918000
trusted library allocation
page read and write
232DF102000
heap
page read and write
314F000
trusted library allocation
page read and write
7F0000
heap
page read and write
133D6000
trusted library allocation
page read and write
232DF1B1000
trusted library allocation
page read and write
13210000
trusted library allocation
page read and write
22D0000
unkown
page readonly
2DB25815000
heap
page read and write
F5FF0F9000
stack
page read and write
AC3787C000
stack
page read and write
CC7EFF9000
stack
page read and write
1005000
heap
page read and write
2E5E2FC0000
trusted library allocation
page read and write
131EF000
trusted library allocation
page read and write
1D29D49B000
heap
page read and write
1865000
heap
page read and write
2E5E3037000
heap
page execute and read and write
1D29F591000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
2CA9000
trusted library allocation
page read and write
1B916000
heap
page read and write
26A899AB000
heap
page read and write
F00000
heap
page read and write
12A01000
trusted library allocation
page read and write
266D000
trusted library allocation
page read and write
1D29D710000
heap
page readonly
10D5000
heap
page read and write
17034E000
stack
page read and write
1C008000
heap
page read and write
840000
trusted library allocation
page read and write
1C000000
heap
page read and write
2E5DD8E1000
heap
page read and write
226A000
heap
page read and write
66E1D79000
stack
page read and write
150442D0000
heap
page read and write
D95000
heap
page read and write
132D0000
trusted library allocation
page read and write
1481E210000
direct allocation
page read and write
2B70000
heap
page execute and read and write
19AA666B000
heap
page read and write
2379569D000
trusted library allocation
page read and write
1BFCF000
stack
page read and write
27F0000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
3188000
trusted library allocation
page read and write
19AA82C0000
trusted library allocation
page read and write
2B6000E0000
heap
page execute and read and write
1630000
heap
page read and write
3396000
trusted library allocation
page read and write
2242000
unkown
page readonly
22E5DE000
stack
page read and write
2B2D000
trusted library allocation
page read and write
1555000
heap
page read and write
1288000
heap
page read and write
3177000
trusted library allocation
page read and write
1BB523C0000
heap
page read and write
2B68000
trusted library allocation
page read and write
2DB27908000
trusted library allocation
page read and write
F5FF3B8000
stack
page read and write
232DF1A0000
heap
page execute and read and write
22EF7C000
stack
page read and write
23794C91000
trusted library allocation
page read and write
2E26000
trusted library allocation
page read and write
23794AC0000
heap
page read and write
269A000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page execute and read and write
7FFD9B772000
trusted library allocation
page read and write
137AD000
trusted library allocation
page read and write
22E2000
unkown
page readonly
FD0000
heap
page read and write
F5FF339000
stack
page read and write
EF100BC000
stack
page read and write
12F01000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
26A899F9000
heap
page read and write
2E5E3030000
heap
page execute and read and write
7FFD9B960000
trusted library allocation
page read and write
118A000
heap
page read and write
10D0000
heap
page read and write
32E000
stack
page read and write
7FFD9B984000
trusted library allocation
page read and write
10E1000
stack
page read and write
13317000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
2302000
unkown
page readonly
309D000
trusted library allocation
page read and write
308A000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
221F3F9A000
heap
page read and write
2B6001A5000
trusted library allocation
page read and write
232DF235000
trusted library allocation
page read and write
DD6000
heap
page read and write
23794685000
heap
page read and write
26A89960000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
137EA000
trusted library allocation
page read and write
133CA000
trusted library allocation
page read and write
7FFD9B985000
trusted library allocation
page read and write
7FFD9BD90000
trusted library allocation
page read and write
130A0000
trusted library allocation
page read and write
7A2000
heap
page read and write
FA4857A000
stack
page read and write
66E1703000
stack
page read and write
3E0000
heap
page read and write
1481E047000
heap
page read and write
1460000
heap
page read and write
241E000
stack
page read and write
EF0F7EF000
unkown
page read and write
7FFD9BEE0000
trusted library allocation
page read and write
150421B0000
heap
page read and write
1475000
heap
page read and write
2B600040000
trusted library allocation
page read and write
2A01000
trusted library allocation
page read and write
1D29D750000
heap
page read and write
F85000
heap
page read and write
1A470000
trusted library allocation
page read and write
66E1A7E000
stack
page read and write
1481E05C000
heap
page read and write
1B1E0000
heap
page read and write
2A93000
trusted library allocation
page read and write
EF0F763000
stack
page read and write
1B3A3000
heap
page execute and read and write
139DF000
trusted library allocation
page read and write
1481E0AE000
heap
page read and write
11B3000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
AC36F8F000
unkown
page read and write
7FFD9B772000
trusted library allocation
page read and write
1481E0B5000
heap
page read and write
FA4954E000
stack
page read and write
16F3FF000
stack
page read and write
1B712000
unkown
page readonly
2B28000
trusted library allocation
page read and write
137D4000
trusted library allocation
page read and write
232DF67E000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
133D4000
trusted library allocation
page read and write
2A6F000
trusted library allocation
page read and write
13025000
trusted library allocation
page read and write
19AA84A0000
heap
page read and write
597F3FF000
stack
page read and write
2D09000
trusted library allocation
page read and write
1D29D755000
heap
page read and write
2E6F000
stack
page read and write
26A89900000
trusted library section
page read and write
23792FA0000
heap
page read and write
CC7E9A3000
stack
page read and write
13745000
trusted library allocation
page read and write
1D5472F8000
heap
page read and write
2E5E2EB4000
heap
page read and write
3073000
trusted library allocation
page read and write
2AFD000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
2B6005EE000
trusted library allocation
page read and write
147F000
stack
page read and write
29B285B7000
heap
page execute and read and write
12B81000
trusted library allocation
page read and write
7FFD9BE75000
trusted library allocation
page read and write
E65000
heap
page read and write
14D0000
heap
page read and write
1481FA8D000
direct allocation
page read and write
2959000
trusted library allocation
page read and write
150421A0000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
1470000
trusted library allocation
page read and write
925000
heap
page read and write
139BA000
trusted library allocation
page read and write
31FC000
trusted library allocation
page read and write
F1727BE000
stack
page read and write
AC376F8000
stack
page read and write
93645BF000
stack
page read and write
12A21000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
136B2000
trusted library allocation
page read and write
232DF130000
heap
page read and write
1BA2F000
stack
page read and write
19AA84B1000
trusted library allocation
page read and write
2E5E2D00000
heap
page read and write
2E5DD8E1000
heap
page read and write
2DB27370000
heap
page execute and read and write
AC375F7000
stack
page read and write
820000
heap
page read and write
23794EB6000
trusted library allocation
page read and write
597F4FD000
stack
page read and write
CC7F2FC000
stack
page read and write
22FB8C000
stack
page read and write
1D547690000
heap
page read and write
15043DB0000
heap
page read and write
7FFD9B8A1000
trusted library allocation
page execute and read and write
7A0000
heap
page read and write
2DB2577D000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
CC7FEC9000
stack
page read and write
677000
heap
page read and write
7FFD9B93C000
trusted library allocation
page read and write
1528000
heap
page read and write
2B9A000
trusted library allocation
page read and write
1430000
heap
page read and write
19AA65E0000
heap
page read and write
15042420000
trusted library allocation
page read and write
22F2000
unkown
page readonly
D70000
heap
page read and write
AC3797B000
stack
page read and write
2929000
trusted library allocation
page read and write
130F7000
trusted library allocation
page read and write
1481E0AC000
heap
page read and write
35E000
stack
page read and write
FA4974E000
stack
page read and write
30F3000
trusted library allocation
page read and write
7BF63FF000
stack
page read and write
138C4000
trusted library allocation
page read and write
26A898A0000
heap
page read and write
2A60000
trusted library allocation
page read and write
F17273C000
stack
page read and write
AC3777E000
stack
page read and write
1BBAF000
stack
page read and write
2E80000
heap
page read and write
13E5000
heap
page read and write
26A89A6E000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B7A0000
trusted library allocation
page read and write
2E5DD8E5000
heap
page read and write
7FFD9BE90000
trusted library allocation
page read and write
936497E000
stack
page read and write
1481E08A000
heap
page read and write
1481FAE0000
direct allocation
page read and write
266A000
trusted library allocation
page read and write
597F9BE000
stack
page read and write
2E5DD8D0000
heap
page read and write
13719000
trusted library allocation
page read and write
12421000
trusted library allocation
page read and write
2CF7000
trusted library allocation
page read and write
DC0000
heap
page read and write
12E6F000
trusted library allocation
page read and write
1309E000
trusted library allocation
page read and write
1D5473E2000
heap
page read and write
F83000
heap
page read and write
12B8F000
trusted library allocation
page read and write
2E5E2FA0000
heap
page readonly
138C7000
trusted library allocation
page read and write
2312000
unkown
page readonly
12DD5000
trusted library allocation
page read and write
2A1F000
trusted library allocation
page read and write
1080000
heap
page read and write
380000
heap
page read and write
19AA6653000
heap
page read and write
23792C89000
heap
page read and write
2DB2575D000
heap
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
AC3737A000
stack
page read and write
2302000
unkown
page readonly
1BFF0000
heap
page execute and read and write
12A5000
heap
page read and write
C15000
heap
page read and write
2C43000
trusted library allocation
page read and write
2667000
trusted library allocation
page read and write
13334000
trusted library allocation
page read and write
10F5000
heap
page read and write
1481E053000
heap
page read and write
15F0000
heap
page execute and read and write
12F20000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
7FFD9B788000
trusted library allocation
page read and write
22F0000
unkown
page readonly
150423A0000
heap
page readonly
9364CFF000
stack
page read and write
232DF0FE000
heap
page read and write
597F97B000
stack
page read and write
2D6F000
stack
page read and write
16F7FE000
stack
page read and write
23792C4C000
heap
page read and write
EF10038000
stack
page read and write
1410000
heap
page read and write
1212000
heap
page read and write
6AA000
heap
page read and write
23792C12000
heap
page read and write
1D547680000
heap
page readonly
AC383CD000
stack
page read and write
1361F000
trusted library allocation
page read and write
150420F0000
heap
page read and write
2EF0000
heap
page read and write
C752B7E000
stack
page read and write
2A5E000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
13868000
trusted library allocation
page read and write
9C8F16F000
stack
page read and write
16F37A000
stack
page read and write
2B600090000
trusted library allocation
page read and write
22E513000
stack
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
13123000
trusted library allocation
page read and write
1877E7F000
unkown
page read and write
29B26608000
heap
page read and write
7FFD9B975000
trusted library allocation
page read and write
295E000
stack
page read and write
150442C0000
trusted library allocation
page read and write
2EF4000
trusted library allocation
page read and write
22EC78000
stack
page read and write
12E2D000
trusted library allocation
page read and write
2AA9000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
14820AA0000
direct allocation
page read and write
1481E0B0000
heap
page read and write
19AA8330000
trusted library allocation
page read and write
13341000
trusted library allocation
page read and write
4ABB3FE000
stack
page read and write
26A8BE1F000
trusted library allocation
page read and write
FA481CE000
stack
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
FE0013C000
stack
page read and write
2CB1000
trusted library allocation
page read and write
FA49647000
stack
page read and write
F1724FB000
stack
page read and write
1481FA60000
direct allocation
page read and write
F50000
heap
page read and write
232DEDD0000
trusted library allocation
page read and write
F17360E000
stack
page read and write
12E0000
heap
page read and write
2B6000D0000
trusted library allocation
page read and write
2B600B74000
trusted library allocation
page read and write
339A000
trusted library allocation
page read and write
C752A7E000
stack
page read and write
29A3000
trusted library allocation
page read and write
232DF106000
heap
page read and write
F5FF1F9000
stack
page read and write
221F3EB0000
heap
page read and write
13941000
trusted library allocation
page read and write
150441CE000
heap
page read and write
19AA6655000
heap
page read and write
234000
unkown
page readonly
2DB27390000
heap
page read and write
7FFD9BD60000
trusted library allocation
page read and write
1D29D640000
heap
page read and write
1D29D458000
heap
page read and write
FC3000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
232DD126000
heap
page read and write
1BDAF000
stack
page read and write
4ABB4F7000
stack
page read and write
22ECFE000
stack
page read and write
F5802FD000
stack
page read and write
2DE3000
trusted library allocation
page read and write
7FFD9B96E000
trusted library allocation
page read and write
2A0F000
trusted library allocation
page read and write
13CF000
stack
page read and write
23794D15000
trusted library allocation
page read and write
2EAE000
trusted library allocation
page read and write
CC7FFCD000
stack
page read and write
2DB25970000
trusted library allocation
page read and write
131D9000
trusted library allocation
page read and write
1D29D6C0000
trusted library section
page read and write
232DD090000
heap
page read and write
2597000
trusted library allocation
page read and write
910DFE000
stack
page read and write
232DF0E3000
heap
page read and write
1B9EF000
stack
page read and write
16EF000
stack
page read and write
232DD12C000
heap
page read and write
EF0FC79000
stack
page read and write
13153000
trusted library allocation
page read and write
2A43000
trusted library allocation
page read and write
12D78000
trusted library allocation
page read and write
7FFD9B928000
trusted library allocation
page read and write
2DB2576F000
heap
page read and write
7FFD9B993000
trusted library allocation
page read and write
93645FE000
stack
page read and write
7FFD9BE0D000
trusted library allocation
page read and write
2974000
trusted library allocation
page read and write
1B790000
heap
page read and write
30A3000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
1481E09A000
heap
page read and write
28AB3EC3000
heap
page read and write
1435000
heap
page read and write
1C1DF000
stack
page read and write
964000
heap
page read and write
597F578000
stack
page read and write
2B600110000
heap
page read and write
2B8A000
trusted library allocation
page read and write
720000
trusted library allocation
page read and write
170447000
stack
page read and write
30AD000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7FFD9BEB0000
trusted library allocation
page read and write
1481E070000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
18782F8000
stack
page read and write
1BC88000
heap
page read and write
2EAB000
trusted library allocation
page read and write
1481E0B7000
heap
page read and write
2690000
heap
page read and write
3077000
trusted library allocation
page read and write
2FC0000
heap
page read and write
19AA7F35000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
2B75000
trusted library allocation
page read and write
13C0000
heap
page read and write
1D5491B0000
heap
page execute and read and write
14F0000
heap
page read and write
C752DF8000
stack
page read and write
23792F70000
trusted library allocation
page read and write
C7527FE000
stack
page read and write
7FFD9B794000
trusted library allocation
page read and write
3097000
trusted library allocation
page read and write
1805000
heap
page read and write
1085000
heap
page read and write
11B5000
heap
page read and write
1B207000
heap
page read and write
22E2000
unkown
page readonly
29D4000
trusted library allocation
page read and write
FA488F8000
stack
page read and write
1332B000
trusted library allocation
page read and write
1481E0A6000
heap
page read and write
1800000
heap
page read and write
D30000
trusted library allocation
page read and write
2E5E3040000
trusted library allocation
page read and write
1481E0C5000
heap
page read and write
E60000
heap
page read and write
2868000
trusted library allocation
page read and write
FA484FF000
stack
page read and write
EF101BC000
stack
page read and write
2DB27767000
trusted library allocation
page read and write
2E28000
trusted library allocation
page read and write
960000
trusted library allocation
page read and write
910FFF000
stack
page read and write
2431000
trusted library allocation
page read and write
150421EF000
heap
page read and write
2D02000
trusted library allocation
page read and write
24C9000
trusted library allocation
page read and write
1481E20B000
direct allocation
page read and write
1C2DF000
stack
page read and write
150E000
heap
page read and write
13685000
trusted library allocation
page read and write
232DF0B6000
heap
page read and write
132DF000
trusted library allocation
page read and write
66E217C000
stack
page read and write
1310000
heap
page read and write
7FFD9BD40000
trusted library allocation
page read and write
2B98000
trusted library allocation
page read and write
15042238000
heap
page read and write
AC372FF000
stack
page read and write
157F000
stack
page read and write
1D548CB0000
trusted library allocation
page read and write
13A32000
trusted library allocation
page read and write
230000
unkown
page readonly
25BA000
trusted library allocation
page read and write
242F000
trusted library allocation
page read and write
28F0000
heap
page execute and read and write
2DB25690000
heap
page read and write
CC7FF4C000
stack
page read and write
66E1C79000
stack
page read and write
597F77E000
stack
page read and write
1D29D720000
trusted library allocation
page read and write
1D548D30000
heap
page read and write
2933000
trusted library allocation
page read and write
13146000
trusted library allocation
page read and write
1B7AD000
heap
page read and write
C7530FB000
stack
page read and write
12E3000
heap
page read and write
597FA3E000
stack
page read and write
1481E0AD000
heap
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
28AB3EC3000
heap
page read and write
13288000
trusted library allocation
page read and write
1ABB0000
trusted library allocation
page read and write
F7E000
stack
page read and write
2A53000
trusted library allocation
page read and write
29E3000
trusted library allocation
page read and write
FA4897E000
stack
page read and write
9364A7E000
stack
page read and write
1B5AE000
stack
page read and write
236000
unkown
page readonly
640000
heap
page read and write
26A899CE000
heap
page read and write
908000
heap
page read and write
2B77000
trusted library allocation
page read and write
1D29D6E0000
trusted library allocation
page read and write
29B26860000
trusted library allocation
page read and write
23792B70000
heap
page read and write
29B265C8000
heap
page read and write
25A4000
trusted library allocation
page read and write
3109000
trusted library allocation
page read and write
1D547270000
heap
page read and write
180A000
heap
page read and write
132E2000
trusted library allocation
page read and write
1481E250000
direct allocation
page read and write
3249000
trusted library allocation
page read and write
2238000
unkown
page readonly
22EE7C000
stack
page read and write
187847F000
stack
page read and write
15043DB5000
heap
page read and write
1481E130000
heap
page read and write
16F77E000
stack
page read and write
26A8B845000
heap
page read and write
109A000
heap
page read and write
23792C5E000
heap
page read and write
7FFD9B919000
trusted library allocation
page read and write
2E5E3075000
heap
page read and write
26A8B830000
heap
page read and write
2AE8000
trusted library allocation
page read and write
26A899F4000
heap
page read and write
1B9B6000
heap
page read and write
232DEA50000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
2D04000
trusted library allocation
page read and write
13938000
trusted library allocation
page read and write
EA4000
heap
page read and write
1B6E0000
unkown
page readonly
13F3000
heap
page read and write
2593000
trusted library allocation
page read and write
F5FEEFF000
stack
page read and write
1B9D0000
heap
page read and write
BD3000
heap
page read and write
232DF46C000
trusted library allocation
page read and write
2E5E4DF6000
trusted library allocation
page read and write
11F5000
heap
page read and write
2E40000
trusted library allocation
page read and write
150421FB000
heap
page read and write
1280000
heap
page read and write
29DF000
trusted library allocation
page read and write
243F000
trusted library allocation
page read and write
15044190000
heap
page read and write
1D5496CE000
trusted library allocation
page read and write
14AC000
heap
page read and write
26A898E0000
heap
page read and write
14C9000
heap
page read and write
2300000
unkown
page readonly
66E1B79000
stack
page read and write
26A8B430000
heap
page read and write
3E0000
heap
page read and write
232DF0F2000
heap
page read and write
1481E078000
heap
page read and write
16F97B000
stack
page read and write
1A7C9000
heap
page read and write
CC7E9EE000
stack
page read and write
FA489FF000
stack
page read and write
13D8000
heap
page read and write
16EF23000
stack
page read and write
13390000
trusted library allocation
page read and write
29B268C5000
heap
page read and write
29B28440000
heap
page read and write
221F3F97000
heap
page read and write
820000
trusted library allocation
page read and write
232DEF90000
trusted library allocation
page read and write
29B266B7000
heap
page read and write
1D5491F0000
heap
page read and write
1341C000
trusted library allocation
page read and write
314A000
trusted library allocation
page read and write
1D54734B000
heap
page read and write
1465000
heap
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
133DC000
trusted library allocation
page read and write
18780225000
trusted library allocation
page read and write
243F000
stack
page read and write
7FFD9B950000
trusted library allocation
page read and write
33E9000
trusted library allocation
page read and write
7FFD9BEA0000
trusted library allocation
page read and write
20B00A54000
trusted library allocation
page read and write
23794C40000
trusted library allocation
page read and write
FA48A7D000
stack
page read and write
232DD13E000
heap
page read and write
66E178E000
unkown
page read and write
1580000
heap
page execute and read and write
26A8B888000
heap
page read and write
21F2000
unkown
page readonly
4ABB0FF000
unkown
page read and write
2DB25900000
trusted library allocation
page read and write
152A000
heap
page read and write
169F000
stack
page read and write
26A89A60000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
2C91000
trusted library allocation
page read and write
2B95000
trusted library allocation
page read and write
26A89970000
heap
page read and write
1B6AE000
stack
page read and write
2DBE000
trusted library allocation
page read and write
22E59F000
unkown
page read and write
1B7C2000
heap
page read and write
7FFD9BEF0000
trusted library allocation
page read and write
F98000
heap
page read and write
13F0000
heap
page read and write
10F0000
heap
page read and write
761000
heap
page read and write
1481E1F7000
direct allocation
page read and write
232DF44B000
trusted library allocation
page read and write
2EA8000
trusted library allocation
page read and write
1BB523A0000
heap
page read and write
AC37679000
stack
page read and write
150424C5000
heap
page read and write
20399F9F000
heap
page read and write
22FC0E000
stack
page read and write
1335D000
trusted library allocation
page read and write
1B370000
unkown
page readonly
23792C44000
heap
page read and write
28AB3EC3000
heap
page read and write
19AA8535000
trusted library allocation
page read and write
9364DFC000
stack
page read and write
15043C70000
heap
page read and write
15042430000
heap
page execute and read and write
1330000
heap
page execute and read and write
310D000
trusted library allocation
page read and write
AC385CE000
stack
page read and write
597F5F6000
stack
page read and write
1215000
heap
page read and write
24B3000
trusted library allocation
page read and write
30A8000
trusted library allocation
page read and write
665000
heap
page read and write
3393000
trusted library allocation
page read and write
1704CC000
stack
page read and write
640000
heap
page read and write
1481E1F0000
direct allocation
page read and write
1D29D4D4000
heap
page read and write
597F27E000
stack
page read and write
16F0000
heap
page read and write
2290000
heap
page execute and read and write
1369B000
trusted library allocation
page read and write
C753D4E000
stack
page read and write
15A0000
heap
page read and write
FA4887A000
stack
page read and write
1481E1B0000
direct allocation
page read and write
2A11000
trusted library allocation
page read and write
2ADE000
stack
page read and write
F10000
heap
page read and write
33EC000
trusted library allocation
page read and write
2850000
heap
page execute and read and write
26A89AA0000
trusted library allocation
page read and write
12BF000
heap
page read and write
22EEFE000
stack
page read and write
936453F000
unkown
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B947000
trusted library allocation
page read and write
4ABB1FE000
stack
page read and write
23792C3E000
heap
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
15042120000
heap
page read and write
F17227F000
unkown
page read and write
7FFD9B790000
trusted library allocation
page read and write
1481E08A000
heap
page read and write
678000
heap
page read and write
2F91000
trusted library allocation
page read and write
33F3000
trusted library allocation
page read and write
232DF402000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
6D5000
heap
page read and write
2970000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
1B9B4000
heap
page read and write
232DF3D8000
trusted library allocation
page read and write
1210000
heap
page read and write
1349C000
trusted library allocation
page read and write
9364E7E000
stack
page read and write
12A08000
trusted library allocation
page read and write
CC7F077000
stack
page read and write
22EDF9000
stack
page read and write
1481E038000
heap
page read and write
780000
heap
page read and write
1481E05C000
heap
page read and write
13101000
trusted library allocation
page read and write
F5FF63C000
stack
page read and write
4ABC24E000
stack
page read and write
30AD000
trusted library allocation
page read and write
302A000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
8A0000
heap
page execute and read and write
232DD169000
heap
page read and write
FA4847F000
stack
page read and write
1B550000
heap
page execute and read and write
13855000
trusted library allocation
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
F17293C000
stack
page read and write
23792C42000
heap
page read and write
93658CE000
stack
page read and write
13881000
trusted library allocation
page read and write
150423B0000
trusted library allocation
page read and write
1D5472D0000
trusted library section
page read and write
2DB2576B000
heap
page read and write
CC7F17A000
stack
page read and write
29C8000
trusted library allocation
page read and write
14820A83000
direct allocation
page read and write
1481E0B4000
heap
page read and write
1BAD0000
heap
page read and write
7F3000
heap
page read and write
1BB10000
heap
page read and write
26A8B2FF000
heap
page read and write
22ED7E000
stack
page read and write
2A5E000
trusted library allocation
page read and write
1B9B0000
heap
page read and write
13D0000
heap
page read and write
1395D000
trusted library allocation
page read and write
597FBBE000
stack
page read and write
760000
heap
page read and write
91B000
heap
page read and write
F9C000
heap
page read and write
20B004CE000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
326B000
trusted library allocation
page read and write
2EE7000
trusted library allocation
page read and write
29B26800000
heap
page read and write
18784FD000
stack
page read and write
132BF000
trusted library allocation
page read and write
DE0000
heap
page read and write
AC37579000
stack
page read and write
2DB258F0000
trusted library section
page read and write
18783FE000
stack
page read and write
C75273F000
unkown
page read and write
2D2D000
trusted library allocation
page read and write
12BC000
heap
page read and write
140A000
heap
page read and write
2A68000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9BD20000
trusted library allocation
page read and write
2C55000
trusted library allocation
page read and write
20399F9F000
heap
page read and write
2CA7000
trusted library allocation
page read and write
232DEFC0000
heap
page read and write
C753B4E000
stack
page read and write
133A2000
trusted library allocation
page read and write
1B4AE000
stack
page read and write
2E5E2D60000
heap
page read and write
597F2FF000
stack
page read and write
78A000
heap
page read and write
1D29F3A9000
heap
page read and write
7FFD9B782000
trusted library allocation
page read and write
2E5DD8A0000
heap
page read and write
FA486FE000
stack
page read and write
7FFD9BE68000
trusted library allocation
page read and write
2310000
unkown
page readonly
1481E07F000
heap
page read and write
19AA662D000
heap
page read and write
23792F60000
trusted library section
page read and write
F1723FA000
stack
page read and write
2E5E2DFF000
heap
page read and write
2C8F000
stack
page read and write
9364D7E000
stack
page read and write
7FFD9BED0000
trusted library allocation
page read and write
1B08F000
stack
page read and write
1481E030000
heap
page read and write
2E98000
trusted library allocation
page read and write
7FFD9BE70000
trusted library allocation
page read and write
232DD120000
heap
page read and write
CC7EDFA000
stack
page read and write
1481FA40000
direct allocation
page read and write
12BA000
heap
page read and write
1860000
heap
page read and write
BF5000
heap
page read and write
1300000
heap
page read and write
BB0000
heap
page read and write
118C000
heap
page read and write
2C70000
trusted library allocation
page read and write
597FAB7000
stack
page read and write
12F21000
trusted library allocation
page read and write
1175000
heap
page read and write
18780001000
trusted library allocation
page read and write
4ABB2FF000
stack
page read and write
1D29F615000
trusted library allocation
page read and write
2421000
trusted library allocation
page read and write
22FA0E000
stack
page read and write
1450000
trusted library allocation
page read and write
60C000
heap
page read and write
1481E085000
heap
page read and write
7FFD9BDE0000
trusted library allocation
page read and write
26A8B916000
heap
page read and write
1311B000
trusted library allocation
page read and write
26A899B2000
heap
page read and write
EE6000
heap
page read and write
7FFD9B792000
trusted library allocation
page read and write
12E35000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
1481FB20000
heap
page read and write
9A0000
heap
page read and write
2E5E2E44000
heap
page read and write
19AA6691000
heap
page read and write
F58017E000
stack
page read and write
1C0CE000
stack
page read and write
13939000
trusted library allocation
page read and write
232DF4AA000
trusted library allocation
page read and write
14D2000
heap
page read and write
2D33000
trusted library allocation
page read and write
EF0FD79000
stack
page read and write
1D5473D6000
heap
page read and write
22E0000
unkown
page readonly
29F2000
trusted library allocation
page read and write
4ABADFE000
stack
page read and write
766000
heap
page read and write
2610000
heap
page execute and read and write
FE0000
heap
page read and write
13980000
trusted library allocation
page read and write
26A897A0000
heap
page read and write
1D29F540000
trusted library allocation
page read and write
1481E0C5000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
A00000
heap
page read and write
106F000
stack
page read and write
F17257E000
stack
page read and write
20B00001000
trusted library allocation
page read and write
EDE000
stack
page read and write
19AA6755000
heap
page read and write
2252000
unkown
page readonly
15042160000
heap
page read and write
7FFD9B798000
trusted library allocation
page read and write
3050000
heap
page read and write
232DD12A000
heap
page read and write
132CA000
trusted library allocation
page read and write
1378F000
trusted library allocation
page read and write
29B265C0000
heap
page read and write
FA48103000
stack
page read and write
1C0DF000
stack
page read and write
2EFA000
trusted library allocation
page read and write
1BECF000
stack
page read and write
13C5000
heap
page read and write
2C76000
trusted library allocation
page read and write
782000
heap
page read and write
136D6000
trusted library allocation
page read and write
2A2A000
trusted library allocation
page read and write
F1726B6000
stack
page read and write
2FD8000
trusted library allocation
page read and write
29B265FE000
heap
page read and write
29B265FC000
heap
page read and write
13978000
trusted library allocation
page read and write
F5FF17D000
stack
page read and write
29BD000
trusted library allocation
page read and write
26A8B9D5000
trusted library allocation
page read and write
700000
trusted library allocation
page read and write
16F2FE000
stack
page read and write
2310000
heap
page execute and read and write
2DB25769000
heap
page read and write
19AA6610000
heap
page read and write
18780A0D000
trusted library allocation
page read and write
15044290000
heap
page execute and read and write
1242F000
trusted library allocation
page read and write
AC36FCE000
stack
page read and write
643000
heap
page read and write
232DF07D000
heap
page read and write
15042234000
heap
page read and write
29E2000
trusted library allocation
page read and write
232DF46F000
trusted library allocation
page read and write
D8B000
heap
page read and write
1635000
heap
page read and write
221F41D0000
heap
page read and write
13AA8000
trusted library allocation
page read and write
1481E07B000
heap
page read and write
A20000
heap
page read and write
133D6000
trusted library allocation
page read and write
1D29D495000
heap
page read and write
30A0000
trusted library allocation
page read and write
1360000
heap
page read and write
7FFD9B98A000
trusted library allocation
page read and write
CC7F3FB000
stack
page read and write
29B26870000
heap
page readonly
2E5E2DC0000
heap
page read and write
12AE1000
trusted library allocation
page read and write
66E1EF8000
stack
page read and write
1BCAE000
stack
page read and write
F6F000
stack
page read and write
2E5DD830000
heap
page read and write
9364BFA000
stack
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
232DF050000
heap
page read and write
11D0000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
EF0FE37000
stack
page read and write
2E5E577C000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
297B000
trusted library allocation
page read and write
1D548CE0000
trusted library allocation
page read and write
2F15000
trusted library allocation
page read and write
2DB25A05000
heap
page read and write
1705CC000
stack
page read and write
1481FAC0000
direct allocation
page read and write
2F80000
heap
page execute and read and write
2E5DD750000
heap
page read and write
2D27000
trusted library allocation
page read and write
600000
heap
page read and write
2B84000
trusted library allocation
page read and write
31E2000
trusted library allocation
page read and write
13D0000
heap
page execute and read and write
23792BD0000
heap
page read and write
13E0000
heap
page read and write
1070000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
12BB0000
trusted library allocation
page read and write
338D000
trusted library allocation
page read and write
2272000
unkown
page readonly
150441A7000
heap
page read and write
2EA1000
trusted library allocation
page read and write
CC7EF7D000
stack
page read and write
23794C80000
heap
page execute and read and write
9FF000
stack
page read and write
187924E000
stack
page read and write
1481FA8B000
direct allocation
page read and write
2AED000
trusted library allocation
page read and write
F17237E000
stack
page read and write
12D80000
trusted library allocation
page read and write
7FFD9B993000
trusted library allocation
page read and write
CC7F27E000
stack
page read and write
20399F9F000
heap
page read and write
13B33000
trusted library allocation
page read and write
2E19000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
2DB25930000
heap
page readonly
597F379000
stack
page read and write
93648F9000
stack
page read and write
135C6000
trusted library allocation
page read and write
66E2DCE000
stack
page read and write
31CD000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
13A79000
trusted library allocation
page read and write
2E5E2E1D000
heap
page read and write
2EF0000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
1BC60000
heap
page read and write
2C76000
trusted library allocation
page read and write
16F5000
heap
page read and write
1350000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
2A6D000
trusted library allocation
page read and write
2DB25728000
heap
page read and write
14820A85000
direct allocation
page read and write
1481E0B7000
heap
page read and write
C13000
heap
page read and write
12428000
trusted library allocation
page read and write
12E27000
trusted library allocation
page read and write
1B10D000
stack
page read and write
29B28865000
trusted library allocation
page read and write
2AAD000
trusted library allocation
page read and write
DB0000
heap
page read and write
1B090000
trusted library allocation
page read and write
F173507000
stack
page read and write
12D30000
trusted library allocation
page read and write
152C000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
132C0000
trusted library allocation
page read and write
2E5E30E5000
heap
page read and write
2987000
trusted library allocation
page read and write
22E979000
stack
page read and write
1B6C2000
unkown
page readonly
66E1AFE000
stack
page read and write
9A5000
heap
page read and write
9364EFB000
stack
page read and write
1B772000
unkown
page readonly
1481E0C5000
heap
page read and write
2DB276E1000
trusted library allocation
page read and write
1481E07F000
heap
page read and write
3161000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
15C0000
heap
page read and write
1878FCE000
stack
page read and write
C752C7D000
stack
page read and write
CC7EE7F000
stack
page read and write
7FFD9BE72000
trusted library allocation
page read and write
12D93000
trusted library allocation
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
1312D000
trusted library allocation
page read and write
15C0000
heap
page read and write
F17358C000
stack
page read and write
15044289000
heap
page read and write
26A899BC000
heap
page read and write
F1728B8000
stack
page read and write
29D1000
trusted library allocation
page read and write
12D71000
trusted library allocation
page read and write
26A899B4000
heap
page read and write
26A899B6000
heap
page read and write
22E0000
unkown
page readonly
2DB25710000
trusted library section
page read and write
139AC000
trusted library allocation
page read and write
CC7EC7E000
unkown
page read and write
18785FB000
stack
page read and write
FA48B7B000
stack
page read and write
150442E1000
trusted library allocation
page read and write
2C8A000
trusted library allocation
page read and write
18780BAE000
trusted library allocation
page read and write
66B000
heap
page read and write
16F4FD000
stack
page read and write
10D0000
heap
page read and write
620000
heap
page read and write
66E207C000
stack
page read and write
2E5DD8D0000
heap
page read and write
13D0000
heap
page read and write
2E5E4D7E000
trusted library allocation
page read and write
2DBA000
trusted library allocation
page read and write
7FFD9B936000
trusted library allocation
page read and write
2D81000
trusted library allocation
page read and write
2AB7000
trusted library allocation
page read and write
2B7E000
trusted library allocation
page read and write
EF10B8E000
stack
page read and write
134DF000
trusted library allocation
page read and write
2EF8000
trusted library allocation
page read and write
312F000
trusted library allocation
page read and write
1D29D560000
heap
page read and write
66E2CCD000
stack
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
17D00225000
trusted library allocation
page read and write
2E5DD8D0000
heap
page read and write
F68000
heap
page read and write
232DD095000
heap
page read and write
D05000
heap
page read and write
2E5E2E48000
heap
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
29B2904B000
trusted library allocation
page read and write
1312F000
trusted library allocation
page read and write
7FFD9BEC0000
trusted library allocation
page read and write
12E2000
stack
page read and write
850000
heap
page read and write
29B283B0000
trusted library allocation
page read and write
390000
heap
page read and write
26A89880000
heap
page read and write
2260000
heap
page read and write
EF10D8C000
stack
page read and write
1B6F0000
unkown
page readonly
9D0000
heap
page read and write
7FFD9B97A000
trusted library allocation
page read and write
232DD0E0000
heap
page read and write
132BD000
trusted library allocation
page read and write
CC7EEF7000
stack
page read and write
13060000
trusted library allocation
page read and write
2320000
heap
page read and write
138D5000
trusted library allocation
page read and write
2BB0000
heap
page read and write
1D29F580000
heap
page read and write
E48000
heap
page read and write
13657000
trusted library allocation
page read and write
2E5DD850000
heap
page read and write
CC7FE4E000
stack
page read and write
26A899F6000
heap
page read and write
7FFD9B94D000
trusted library allocation
page read and write
2DB257A4000
heap
page read and write
F58027C000
stack
page read and write
1B4CD000
stack
page read and write
23794600000
trusted library allocation
page read and write
1B1CA000
heap
page read and write
1363F000
trusted library allocation
page read and write
66E20FE000
stack
page read and write
15C5000
heap
page read and write
232DD0F2000
heap
page read and write
2E5E4BDD000
heap
page read and write
597EFCE000
stack
page read and write
7FFD9BDD0000
trusted library allocation
page read and write
2E9D000
trusted library allocation
page read and write
A5E000
stack
page read and write
7FFD9B784000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
22C2000
unkown
page readonly
18781F9000
stack
page read and write
13663000
trusted library allocation
page read and write
2E5E2E03000
heap
page read and write
4ABC3CD000
stack
page read and write
237945C0000
heap
page readonly
BEA000
heap
page read and write
1BE64000
heap
page read and write
15AA000
heap
page read and write
2A2A000
trusted library allocation
page read and write
22EBF7000
stack
page read and write
CC7F37E000
stack
page read and write
232DD128000
heap
page read and write
13507000
trusted library allocation
page read and write
29B2661C000
heap
page read and write
3254000
trusted library allocation
page read and write
1504220D000
heap
page read and write
EF0FF3E000
stack
page read and write
2328000
unkown
page readonly
9364C7A000
stack
page read and write
1D29D48D000
heap
page read and write
1B6B2000
unkown
page readonly
2E5E2FF0000
trusted library allocation
page read and write
306F000
trusted library allocation
page read and write
C752BF9000
stack
page read and write
1877EFF000
stack
page read and write
1481FA80000
direct allocation
page read and write
20399F96000
heap
page read and write
29EB000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
1334F000
trusted library allocation
page read and write
2C3C000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
16F8FE000
stack
page read and write
3075000
trusted library allocation
page read and write
95E000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
4ABC44C000
stack
page read and write
1D547339000
heap
page read and write
19AA8340000
heap
page execute and read and write
B41000
stack
page read and write
93A000
heap
page read and write
CC7ED7E000
stack
page read and write
232DF498000
trusted library allocation
page read and write
AC37477000
stack
page read and write
1D29D700000
trusted library allocation
page read and write
1BAED000
stack
page read and write
23792BF0000
trusted library section
page read and write
2C59000
trusted library allocation
page read and write
2E5DD8D1000
heap
page read and write
66E2D4C000
stack
page read and write
1AE70000
heap
page read and write
2E1D000
trusted library allocation
page read and write
1D547377000
heap
page read and write
3155000
trusted library allocation
page read and write
33EF000
trusted library allocation
page read and write
12DA4000
trusted library allocation
page read and write
25C0000
heap
page read and write
26A89910000
trusted library section
page read and write
13F0000
heap
page read and write
2B7A000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
20399FAF000
heap
page read and write
232DD0A0000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
990000
heap
page read and write
2E5E2FB0000
heap
page execute and read and write
2F1E000
stack
page read and write
2212000
unkown
page readonly
CC0007C000
stack
page read and write
232DF0FA000
heap
page read and write
11DF000
stack
page read and write
1509000
heap
page read and write
2D85000
trusted library allocation
page read and write
1507000
heap
page read and write
1598000
heap
page read and write
2B8A000
trusted library allocation
page read and write
1D29D4D8000
heap
page read and write
13346000
trusted library allocation
page read and write
3208000
trusted library allocation
page read and write
232DD0FE000
heap
page read and write
28FB000
trusted library allocation
page read and write
2964000
trusted library allocation
page read and write
1481E05C000
heap
page read and write
1BE60000
heap
page read and write
23792B90000
heap
page read and write
23794680000
heap
page read and write
1540000
trusted library allocation
page read and write
15042390000
trusted library allocation
page read and write
2DB25940000
trusted library allocation
page read and write
302F000
trusted library allocation
page read and write
232DEDF0000
trusted library allocation
page read and write
9365A4D000
stack
page read and write
22E87F000
stack
page read and write
1410000
heap
page read and write
23792B60000
heap
page read and write
E65000
heap
page read and write
1336F000
trusted library allocation
page read and write
2E03000
trusted library allocation
page read and write
137D9000
trusted library allocation
page read and write
23794BF0000
heap
page execute and read and write
8F0000
heap
page read and write
A90000
trusted library allocation
page read and write
9365ACC000
stack
page read and write
EF10E0E000
stack
page read and write
1D54732B000
heap
page read and write
1B6D0000
unkown
page readonly
26A89B45000
heap
page read and write
EF0FDBE000
stack
page read and write
BEC000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
232DF4AC000
trusted library allocation
page read and write
134F000
stack
page read and write
187857E000
stack
page read and write
1D549287000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
2DB27310000
heap
page read and write
9364AF9000
stack
page read and write
12A0F000
trusted library allocation
page read and write
855000
heap
page read and write
F58037E000
stack
page read and write
232DF09A000
heap
page read and write
22B0000
unkown
page readonly
AC3834E000
stack
page read and write
2BA4000
trusted library allocation
page read and write
323D000
trusted library allocation
page read and write
7FFD9B99E000
trusted library allocation
page read and write
12441000
trusted library allocation
page read and write
12D91000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
29B26890000
heap
page read and write
26A1000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
EF0FA7F000
stack
page read and write
17FF000
stack
page read and write
4ABB578000
stack
page read and write
1D548D35000
heap
page read and write
CC7F1FE000
stack
page read and write
66E17CE000
stack
page read and write
17054C000
stack
page read and write
7FFD9BD50000
trusted library allocation
page read and write
2D2A000
trusted library allocation
page read and write
66D000
heap
page read and write
1D5472E0000
trusted library section
page read and write
16F479000
stack
page read and write
AC38449000
stack
page read and write
597FB3C000
stack
page read and write
1BB521D0000
heap
page read and write
597F6FB000
stack
page read and write
12501000
trusted library allocation
page read and write
23792C86000
heap
page read and write
2EF2000
trusted library allocation
page read and write
3013000
trusted library allocation
page read and write
1327D000
trusted library allocation
page read and write
2E5E2CF0000
heap
page read and write
BE8000
heap
page read and write
232DEE00000
heap
page readonly
22EA79000
stack
page read and write
1481E09D000
heap
page read and write
13742000
trusted library allocation
page read and write
1C020000
heap
page read and write
2D3D000
trusted library allocation
page read and write
BF0000
heap
page read and write
22FB0D000
stack
page read and write
1D29EFA0000
trusted library allocation
page read and write
D55000
heap
page read and write
2CA1000
trusted library allocation
page read and write
26B1000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1C6FE000
stack
page read and write
C753ACE000
stack
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
14B0000
trusted library allocation
page read and write
2B48000
trusted library allocation
page read and write
BD5000
heap
page read and write
1381B000
trusted library allocation
page read and write
1334B000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7FFD9B846000
trusted library allocation
page execute and read and write
29E1000
trusted library allocation
page read and write
26A8B940000
heap
page execute and read and write
7FFD9BCC0000
trusted library allocation
page execute and read and write
F172A3B000
stack
page read and write
29B265DD000
heap
page read and write
2D7F000
trusted library allocation
page read and write
13359000
trusted library allocation
page read and write
1D549428000
trusted library allocation
page read and write
7FFD9B975000
trusted library allocation
page read and write
2B600050000
heap
page readonly
EA6000
heap
page read and write
1D29F055000
heap
page read and write
1BB521C0000
heap
page read and write
3121000
trusted library allocation
page read and write
15044507000
trusted library allocation
page read and write
2DB259B0000
trusted library allocation
page read and write
1306B000
trusted library allocation
page read and write
22F94E000
stack
page read and write
11F0000
heap
page read and write
2224000
unkown
page readonly
F171FE3000
stack
page read and write
78D000
heap
page read and write
1481E290000
heap
page read and write
2A18000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
29B268C0000
heap
page read and write
1877BDE000
stack
page read and write
26A8B865000
heap
page read and write
AC378FF000
stack
page read and write
AC374FD000
stack
page read and write
AA0000
heap
page read and write
29B26880000
trusted library allocation
page read and write
14A6000
heap
page read and write
66E1FFE000
stack
page read and write
12EA000
heap
page read and write
1BE80000
heap
page read and write
E30000
trusted library allocation
page read and write
1B6B0000
unkown
page readonly
7FFD9B78D000
trusted library allocation
page execute and read and write
232DF160000
heap
page execute and read and write
1504422B000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
C752CF9000
stack
page read and write
2EFA000
heap
page read and write
1BC40000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
AC3727F000
stack
page read and write
C752F7A000
stack
page read and write
2202000
unkown
page readonly
1306F000
trusted library allocation
page read and write
16EFAD000
unkown
page read and write
7FFD9B940000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
26A89A70000
trusted library allocation
page read and write
232DD124000
heap
page read and write
2DB256F0000
heap
page read and write
1090000
heap
page read and write
31E0000
trusted library allocation
page read and write
13815000
trusted library allocation
page read and write
F5FEF7E000
stack
page read and write
1481FAA0000
direct allocation
page read and write
16F27F000
stack
page read and write
2C93000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FF43F540000
trusted library allocation
page execute and read and write
26A8B475000
heap
page read and write
2548000
trusted library allocation
page read and write
26A89B40000
heap
page read and write
CC7F0F8000
stack
page read and write
3264000
trusted library allocation
page read and write
1D549201000
trusted library allocation
page read and write
CD0000
heap
page read and write
1B6F2000
unkown
page readonly
4ABC2CE000
stack
page read and write
1B6D2000
unkown
page readonly
1C5EB000
stack
page read and write
7FFD9BC20000
trusted library allocation
page read and write
19AA82F0000
trusted library allocation
page read and write
29F7000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
12E51000
trusted library allocation
page read and write
22C0000
unkown
page readonly
D61000
stack
page read and write
221F3F90000
heap
page read and write
12DC9000
trusted library allocation
page read and write
22EAFD000
stack
page read and write
232DD105000
heap
page read and write
C7526B3000
stack
page read and write
1D29F020000
heap
page execute and read and write
2CDF000
trusted library allocation
page read and write
13236000
trusted library allocation
page read and write
2E5E2DC8000
heap
page read and write
17D00001000
trusted library allocation
page read and write
13A80000
trusted library allocation
page read and write
15044180000
heap
page execute and read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1D29EF70000
trusted library allocation
page read and write
3C0000
heap
page read and write
2CE3000
trusted library allocation
page read and write
130AC000
trusted library allocation
page read and write
4ABC4CE000
stack
page read and write
1D547695000
heap
page read and write
AAF000
stack
page read and write
26A89978000
heap
page read and write
19AA664F000
heap
page read and write
232DEE10000
trusted library allocation
page read and write
E7D000
heap
page read and write
2BBA000
heap
page read and write
66E2BCD000
stack
page read and write
2595000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
AC384CC000
stack
page read and write
597F7FE000
stack
page read and write
3071000
trusted library allocation
page read and write
24CD000
trusted library allocation
page read and write
F55000
heap
page read and write
7FFD9B98F000
trusted library allocation
page read and write
26A8B90E000
heap
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
237945D0000
trusted library allocation
page read and write
1481E059000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
13905000
trusted library allocation
page read and write
3061000
trusted library allocation
page read and write
AE2000
stack
page read and write
19AA7F30000
heap
page read and write
870000
heap
page read and write
2B50000
heap
page read and write
7FFD9B971000
trusted library allocation
page read and write
20399F9F000
heap
page read and write
4ABB67F000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
1481E07A000
heap
page read and write
16F67E000
stack
page read and write
29C0000
heap
page read and write
2DB256B0000
heap
page read and write
3131000
trusted library allocation
page read and write
1B3A0000
heap
page execute and read and write
31FA000
trusted library allocation
page read and write
1B372000
unkown
page readonly
C753C4E000
stack
page read and write
150421B8000
heap
page read and write
14820A80000
direct allocation
page read and write
122F000
stack
page read and write
FC5000
heap
page read and write
310D000
stack
page read and write
2D8C000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
CAF000
stack
page read and write
2A57000
trusted library allocation
page read and write
19AA6659000
heap
page read and write
4ABB6FF000
stack
page read and write
1331C000
trusted library allocation
page read and write
29B283E0000
trusted library allocation
page read and write
1878276000
stack
page read and write
FA495CE000
stack
page read and write
1398F000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
1B29C000
heap
page read and write
4ABC347000
stack
page read and write
F30000
heap
page read and write
1AF30000
trusted library allocation
page read and write
13061000
trusted library allocation
page read and write
1B5ED000
stack
page read and write
232DD0E8000
heap
page read and write
13128000
trusted library allocation
page read and write
29B286C5000
trusted library allocation
page read and write
1BBBB000
stack
page read and write
232DD1D0000
heap
page read and write
62E000
heap
page read and write
D00000
heap
page read and write
F5801F7000
stack
page read and write
232DD165000
heap
page read and write
2E5E4F96000
trusted library allocation
page read and write
232DF07F000
heap
page read and write
29CA000
heap
page read and write
BB8000
heap
page read and write
2EB1000
trusted library allocation
page read and write
2477000
trusted library allocation
page read and write
2270000
unkown
page readonly
232DD050000
heap
page read and write
23794640000
trusted library allocation
page read and write
138AE000
trusted library allocation
page read and write
790000
heap
page read and write
2240000
unkown
page readonly
1B910000
heap
page read and write
3152000
trusted library allocation
page read and write
2DC7000
trusted library allocation
page read and write
1481E08A000
heap
page read and write
1481E150000
heap
page read and write
2250000
unkown
page readonly
1481E1D9000
direct allocation
page read and write
2312000
unkown
page readonly
7FFD9B77D000
trusted library allocation
page execute and read and write
9C0000
heap
page read and write
1515000
heap
page read and write
29B0000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
232DF040000
heap
page execute and read and write
19AA8280000
trusted library allocation
page read and write
F5FF07E000
stack
page read and write
19AA664B000
heap
page read and write
2DB25680000
heap
page read and write
26A8BB78000
trusted library allocation
page read and write
66E1DF7000
stack
page read and write
29DC000
trusted library allocation
page read and write
9C8F0EC000
stack
page read and write
1B9AD000
stack
page read and write
2280000
heap
page execute and read and write
1D548D20000
trusted library allocation
page read and write
13438000
trusted library allocation
page read and write
2857000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B810000
trusted library allocation
page read and write
66E1E79000
stack
page read and write
2E5E2E09000
heap
page read and write
19AA6618000
heap
page read and write
FA496CD000
stack
page read and write
30B7000
trusted library allocation
page read and write
13525000
trusted library allocation
page read and write
14F0000
heap
page read and write
1481E06B000
heap
page read and write
150447AE000
trusted library allocation
page read and write
1B710000
unkown
page readonly
15044267000
heap
page read and write
2F01000
trusted library allocation
page read and write
1BFD0000
heap
page execute and read and write
150423E0000
trusted library allocation
page read and write
29B28630000
heap
page execute and read and write
2D4D000
trusted library allocation
page read and write
66E1CFE000
stack
page read and write
1D29F050000
heap
page read and write
96E000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
29B28641000
trusted library allocation
page read and write
3110000
heap
page execute and read and write
F17263E000
stack
page read and write
7FFD9BA90000
trusted library allocation
page read and write
150421F5000
heap
page read and write
294D000
trusted library allocation
page read and write
DD4000
heap
page read and write
D90000
heap
page read and write
23792C00000
heap
page read and write
E40000
heap
page read and write
F5FEBE3000
stack
page read and write
DD0000
heap
page read and write
13735000
trusted library allocation
page read and write
339D000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
F58003E000
stack
page read and write
1481E0B0000
heap
page read and write
232DF445000
trusted library allocation
page read and write
2E5DD8AA000
heap
page read and write
C752D77000
stack
page read and write
900000
heap
page read and write
606000
heap
page read and write
126F9000
trusted library allocation
page read and write
F6F000
stack
page read and write
1D549120000
heap
page execute and read and write
FA48AFE000
stack
page read and write
1595000
heap
page read and write
25A0000
trusted library allocation
page read and write
597F67A000
stack
page read and write
66E2C47000
stack
page read and write
2435000
trusted library allocation
page read and write
1BB521D9000
heap
page read and write
1481E07F000
heap
page read and write
1481E067000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
7BF5F0C000
stack
page read and write
E7B000
heap
page read and write
7FFD9B772000
trusted library allocation
page read and write
19AA835D000
heap
page read and write
AA5000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
FE004FF000
unkown
page read and write
1A9CA000
stack
page read and write
1481FA9F000
direct allocation
page read and write
31D5000
trusted library allocation
page read and write
2210000
unkown
page readonly
130FF000
trusted library allocation
page read and write
14CC000
heap
page read and write
79D000
heap
page read and write
1AE0D000
stack
page read and write
313F000
trusted library allocation
page read and write
1D29D6D0000
trusted library section
page read and write
26A89920000
trusted library allocation
page read and write
1D29D4AD000
heap
page read and write
7FFD9BA82000
trusted library allocation
page read and write
597F8FE000
stack
page read and write
12D7F000
trusted library allocation
page read and write
2E5E2D20000
heap
page read and write
232DEE40000
trusted library allocation
page read and write
2E5E4D71000
trusted library allocation
page read and write
1481E0B0000
heap
page read and write
1D5472B0000
heap
page read and write
1481E06A000
heap
page read and write
2B600121000
trusted library allocation
page read and write
F17348E000
stack
page read and write
F5800FE000
stack
page read and write
12C61000
trusted library allocation
page read and write
2290000
heap
page read and write
268B000
trusted library allocation
page read and write
7FFD9B778000
trusted library allocation
page read and write
18780FB000
stack
page read and write
31E9000
trusted library allocation
page read and write
EF1013E000
stack
page read and write
7CB000
heap
page read and write
2674000
trusted library allocation
page read and write
7FFD9B91C000
trusted library allocation
page read and write
232DF4EC000
trusted library allocation
page read and write
F5FF2B6000
stack
page read and write
2CFB000
trusted library allocation
page read and write
2B17000
trusted library allocation
page read and write
2997000
trusted library allocation
page read and write
936487E000
stack
page read and write
22EB79000
stack
page read and write
7FFD9BD10000
trusted library allocation
page read and write
138F9000
trusted library allocation
page read and write
131A5000
trusted library allocation
page read and write
23792C4A000
heap
page read and write
597EF03000
stack
page read and write
93659C9000
stack
page read and write
1B8F0000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
187904E000
stack
page read and write
76C000
heap
page read and write
3135000
trusted library allocation
page read and write
1B930000
heap
page read and write
966000
heap
page read and write
3B0000
heap
page read and write
1173000
heap
page read and write
2DB271B7000
heap
page read and write
16F5F6000
stack
page read and write
29B26647000
heap
page read and write
150441CC000
heap
page read and write
2DB25A00000
heap
page read and write
13839000
trusted library allocation
page read and write
136A6000
trusted library allocation
page read and write
2CE5000
trusted library allocation
page read and write
232A000
heap
page read and write
135B7000
trusted library allocation
page read and write
16EFEE000
stack
page read and write
18780BC0000
trusted library allocation
page read and write
139E2000
trusted library allocation
page read and write
29B266A4000
heap
page read and write
EF10C0E000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
910BF5000
stack
page read and write
15042100000
heap
page read and write
7FFD9B778000
trusted library allocation
page read and write
26A8B900000
heap
page read and write
13171000
trusted library allocation
page read and write
7D0000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
C753CCC000
stack
page read and write
F5FEFF9000
stack
page read and write
7FFD9BD70000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
2E5E2DA0000
trusted library allocation
page read and write
16F6FA000
stack
page read and write
EF0FB79000
stack
page read and write
F5FF4BF000
stack
page read and write
2EB4000
trusted library allocation
page read and write
1B914000
heap
page read and write
2E5DD9A0000
heap
page read and write
29B26643000
heap
page read and write
26A8B470000
heap
page read and write
AC377FE000
stack
page read and write
232DEA80000
heap
page read and write
1481E230000
heap
page read and write
2C60000
heap
page execute and read and write
1C4EE000
stack
page read and write
725000
heap
page read and write
12511000
trusted library allocation
page read and write
338A000
trusted library allocation
page read and write
1250000
trusted library allocation
page read and write
7D0000
heap
page read and write
26A8B8D3000
heap
page read and write
2D71000
trusted library allocation
page read and write
2E5E30E0000
heap
page read and write
1D547335000
heap
page read and write
13121000
trusted library allocation
page read and write
BE0000
heap
page read and write
26A8B962000
trusted library allocation
page read and write
7B0000
heap
page read and write
19AA6710000
heap
page read and write
132A6000
trusted library allocation
page read and write
29A0000
heap
page execute and read and write
7D0000
heap
page read and write
2CF3000
trusted library allocation
page read and write
2B76000
trusted library allocation
page read and write
F17340E000
stack
page read and write
69E000
heap
page read and write
FA4867B000
stack
page read and write
13F5000
heap
page read and write
12D82000
trusted library allocation
page read and write
301A000
trusted library allocation
page read and write
2B82000
trusted library allocation
page read and write
242E000
stack
page read and write
7C9000
heap
page read and write
13103000
trusted library allocation
page read and write
1D29D6A0000
heap
page read and write
22E9FF000
stack
page read and write
4ABB279000
stack
page read and write
12D7B000
trusted library allocation
page read and write
1433000
heap
page read and write
BC0000
heap
page read and write
1B6C0000
unkown
page readonly
7FFD9B937000
trusted library allocation
page read and write
15044187000
heap
page execute and read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7FFD9B820000
trusted library allocation
page execute and read and write
12431000
trusted library allocation
page read and write
20399F9F000
heap
page read and write
19AA7F00000
heap
page read and write
187837A000
stack
page read and write
4ABB479000
stack
page read and write
309A000
trusted library allocation
page read and write
2664000
trusted library allocation
page read and write
19AA66F2000
heap
page read and write
18780085000
trusted library allocation
page read and write
12BA1000
trusted library allocation
page read and write
1188000
heap
page read and write
31C9000
trusted library allocation
page read and write
EF10D0E000
stack
page read and write
221F3DB0000
heap
page read and write
3248000
trusted library allocation
page read and write
F17247E000
stack
page read and write
12F08000
trusted library allocation
page read and write
1B6E2000
unkown
page readonly
EF0FBFE000
stack
page read and write
14DE000
heap
page read and write
22D2000
unkown
page readonly
19AA86FF000
trusted library allocation
page read and write
19AA6500000
heap
page read and write
2FB0000
heap
page execute and read and write
F5FEE7F000
unkown
page read and write
16F87C000
stack
page read and write
7F5000
heap
page read and write
25A2000
trusted library allocation
page read and write
230000
unkown
page readonly
1BF1D000
stack
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
12B88000
trusted library allocation
page read and write
1D29D450000
heap
page read and write
2270000
heap
page read and write
2E5E2F90000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
232DF469000
trusted library allocation
page read and write
1408000
heap
page read and write
232000
unkown
page readonly
4ABB87C000
stack
page read and write
1BB52420000
heap
page read and write
2DB25920000
trusted library allocation
page read and write
1396F000
trusted library allocation
page read and write
12D17000
trusted library allocation
page read and write
17D00084000
trusted library allocation
page read and write
1481E270000
direct allocation
page read and write
1D547240000
heap
page read and write
2A15000
trusted library allocation
page read and write
C752FFC000
stack
page read and write
2C2B000
trusted library allocation
page read and write
8F5000
heap
page read and write
1020000
trusted library allocation
page read and write
29F9000
trusted library allocation
page read and write
13201000
trusted library allocation
page read and write
1D29F7B6000
trusted library allocation
page read and write
133E4000
trusted library allocation
page read and write
2E5DD890000
heap
page read and write
7FFD9B96B000
trusted library allocation
page read and write
FA485FE000
stack
page read and write
C752AFA000
stack
page read and write
1364D000
trusted library allocation
page read and write
D80000
heap
page read and write
1150000
heap
page read and write
1BDC0000
heap
page execute and read and write
391000
stack
page read and write
2200000
unkown
page readonly
9C8F1EF000
stack
page read and write
597EF8E000
unkown
page read and write
33EC000
trusted library allocation
page read and write
31D7000
trusted library allocation
page read and write
27FA000
heap
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
23792C48000
heap
page read and write
2F9E000
stack
page read and write
2B600020000
trusted library allocation
page read and write
2F0A000
trusted library allocation
page read and write
BA0000
heap
page read and write
4ABB073000
stack
page read and write
AC3854C000
stack
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
14A0000
heap
page read and write
19AA86D5000
trusted library allocation
page read and write
2E5DD8E1000
heap
page read and write
13081000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
2E5DD8E1000
heap
page read and write
6D3000
heap
page read and write
22E8FE000
stack
page read and write
31E4000
trusted library allocation
page read and write
2EE5000
trusted library allocation
page read and write
2D9A000
trusted library allocation
page read and write
4ABB379000
stack
page read and write
23794ADB000
heap
page read and write
FA4818F000
unkown
page read and write
232DEE86000
heap
page read and write
232DF4A6000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
1553000
heap
page read and write
29FE000
stack
page read and write
29B285B0000
heap
page execute and read and write
1270F000
trusted library allocation
page read and write
2DCD000
trusted library allocation
page read and write
30FC000
trusted library allocation
page read and write
2E24000
trusted library allocation
page read and write
1481E0C6000
heap
page read and write
12F0F000
trusted library allocation
page read and write
2B82000
trusted library allocation
page read and write
1D547650000
trusted library allocation
page read and write
93C000
heap
page read and write
26AC000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
1481E0C7000
heap
page read and write
12E5000
heap
page read and write
C752E7E000
stack
page read and write
7FFD9BD07000
trusted library allocation
page read and write
3277000
trusted library allocation
page read and write
9364B77000
stack
page read and write
7FFD9B762000
trusted library allocation
page read and write
23792F90000
trusted library allocation
page read and write
1B150000
trusted library allocation
page read and write
1877F7E000
stack
page read and write
A40000
heap
page read and write
307F000
trusted library allocation
page read and write
232DF422000
trusted library allocation
page read and write
25AE000
stack
page read and write
18791CC000
stack
page read and write
D50000
heap
page read and write
1243D000
trusted library allocation
page read and write
CC0007E000
stack
page read and write
D78000
heap
page read and write
66E1F7E000
stack
page read and write
3E0000
heap
page read and write
23792C08000
heap
page read and write
7FFD9BC40000
trusted library allocation
page execute and read and write
124DF000
trusted library allocation
page read and write
DE0000
heap
page read and write
2E5DD8E0000
heap
page read and write
1158000
heap
page read and write
936594E000
stack
page read and write
1481E076000
heap
page read and write
1481E0C3000
heap
page read and write
1481DF40000
heap
page read and write
302D000
trusted library allocation
page read and write
12B8000
heap
page read and write
1481E069000
heap
page read and write
1703CE000
stack
page read and write
1800000
heap
page read and write
2DB272D0000
heap
page execute and read and write
6AC000
heap
page read and write
20B00228000
trusted library allocation
page read and write
CC7ECFE000
stack
page read and write
221F3E90000
heap
page read and write
F5FF5BE000
stack
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
27BA000
trusted library allocation
page read and write
5CE000
stack
page read and write
324D000
trusted library allocation
page read and write
12DD1000
trusted library allocation
page read and write
13141000
trusted library allocation
page read and write
2CE7000
trusted library allocation
page read and write
125D0000
trusted library allocation
page read and write
232DF496000
trusted library allocation
page read and write
12D95000
trusted library allocation
page read and write
140C000
heap
page read and write
B50000
trusted library allocation
page read and write
26A8B926000
heap
page read and write
CF0000
heap
page read and write
670000
heap
page read and write
1350000
heap
page read and write
BAF000
stack
page read and write
7FFD9BDF0000
trusted library allocation
page read and write
F1722FF000
stack
page read and write
29B26895000
heap
page read and write
1B54F000
stack
page read and write
7FFD9B922000
trusted library allocation
page read and write
FE005FF000
stack
page read and write
C752EFF000
stack
page read and write
4ABB17F000
stack
page read and write
1365000
heap
page read and write
1380E000
trusted library allocation
page read and write
12DB2000
trusted library allocation
page read and write
2E5DD8E0000
heap
page read and write
150424C0000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
DAC000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
2E5E4D60000
heap
page read and write
9365B4E000
stack
page read and write
7BF62FF000
stack
page read and write
2DB257A8000
heap
page read and write
4ABB5FA000
stack
page read and write
232DF427000
trusted library allocation
page read and write
1D547670000
trusted library allocation
page read and write
1B8CD000
stack
page read and write
1333A000
trusted library allocation
page read and write
19AA82A0000
trusted library allocation
page read and write
33F6000
trusted library allocation
page read and write
19AA6750000
heap
page read and write
187807E000
stack
page read and write
19AA82B0000
heap
page readonly
15042288000
heap
page read and write
2661000
trusted library allocation
page read and write
F5FF43F000
stack
page read and write
1481E06C000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
13068000
trusted library allocation
page read and write
27DA000
trusted library allocation
page read and write
AC373FE000
stack
page read and write
93644B3000
stack
page read and write
14F8000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
133BE000
trusted library allocation
page read and write
EF0FFBE000
stack
page read and write
14E1000
heap
page read and write
F5800BC000
stack
page read and write
1D547250000
heap
page read and write
26A89950000
heap
page readonly
7FFD9BE80000
trusted library allocation
page read and write
318D000
trusted library allocation
page read and write
2CF5000
trusted library allocation
page read and write
232DD11E000
heap
page read and write
EF0FEBC000
stack
page read and write
1481E07F000
heap
page read and write
17D00A0C000
trusted library allocation
page read and write
1340F000
trusted library allocation
page read and write
7FFD9B933000
trusted library allocation
page read and write
12E1000
stack
page read and write
2D36000
trusted library allocation
page read and write
254D000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
221F41D5000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
D98000
heap
page read and write
93E000
stack
page read and write
2B86000
trusted library allocation
page read and write
66E1BFE000
stack
page read and write
7FFD9B830000
trusted library allocation
page read and write
6B8000
heap
page read and write
3003000
trusted library allocation
page read and write
26A8B951000
trusted library allocation
page read and write
DAA000
heap
page read and write
12438000
trusted library allocation
page read and write
29B267C0000
heap
page read and write
C75307E000
stack
page read and write
2B01000
trusted library allocation
page read and write
EF0FCFD000
stack
page read and write
1B48D000
stack
page read and write
2C63000
trusted library allocation
page read and write
133F7000
trusted library allocation
page read and write
FA48779000
stack
page read and write
2B88000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
1B5C0000
heap
page read and write
CC7FDCE000
stack
page read and write
187914E000
stack
page read and write
232DF4A8000
trusted library allocation
page read and write
66E2B4E000
stack
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
2B80000
trusted library allocation
page read and write
232DEA85000
heap
page read and write
C7527BE000
stack
page read and write
232DD060000
heap
page read and write
99A000
heap
page read and write
1705CE000
stack
page read and write
23792FA5000
heap
page read and write
136F7000
trusted library allocation
page read and write
244A000
trusted library allocation
page read and write
EF10C87000
stack
page read and write
2E5E2DFD000
heap
page read and write
12441000
trusted library allocation
page read and write
150421F3000
heap
page read and write
EF0FAFF000
stack
page read and write
AC36F03000
stack
page read and write
1D29D660000
heap
page read and write
3E5000
heap
page read and write
597F87C000
stack
page read and write
1560000
trusted library allocation
page read and write
12CEF000
trusted library allocation
page read and write
7FFD9B924000
trusted library allocation
page read and write
F60000
heap
page read and write
2431000
trusted library allocation
page read and write
2330000
heap
page execute and read and write
26A899BE000
heap
page read and write
3B0000
heap
page read and write
2DB27BAE000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
2E8C000
trusted library allocation
page read and write
25A9000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
4ABB7FE000
stack
page read and write
2B600347000
trusted library allocation
page read and write
2A6A000
trusted library allocation
page read and write
F1729BE000
stack
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
16C0000
heap
page read and write
600000
heap
page read and write
26A899AE000
heap
page read and write
1AA30000
trusted library allocation
page read and write
16F5000
heap
page read and write
FE0000
heap
page read and write
FA487F7000
stack
page read and write
2DB8000
trusted library allocation
page read and write
6D0000
heap
page read and write
2960000
trusted library allocation
page read and write
F9A000
heap
page read and write
16F578000
stack
page read and write
2232000
unkown
page readonly
2D8F000
trusted library allocation
page read and write
4ABB77C000
stack
page read and write
There are 2016 hidden memdumps, click here to show them.