IOC Report
wfJfUGeGT3.exe

loading gif

Files

File Path
Type
Category
Malicious
wfJfUGeGT3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
modified
malicious
C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\BowExpert[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\contorax[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\crypteda[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\GOLD[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\build2[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\channel2[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\3546345[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Channel1[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\exbuild[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\kitty[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\meta[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000142101\build2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000194001\meta.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000221001\exbuild.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000223001\36f677264b.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000255001\channel2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000256001\BowExpert.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000260001\Channel1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\591950\E
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\Competent
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Corporate
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Entrepreneurs
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Greatest
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Provides
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Reveal
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Screw
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Still
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Whom
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Wireless
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\TrackGuard Technologies\z
data
dropped
malicious
C:\Users\user\AppData\Roaming\D0nMCdvUeB.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url
MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js" >), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\WIDeqOfZq9.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Windows.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\3HvoFOAmEaJswFCHOzyfyz5b.exe
ASCII text
modified
C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe
ASCII text
dropped
C:\ProgramData\SmLAztxc1o8yfogkJXrRjbDt.exe
ASCII text
dropped
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:54 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GOLD.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\crypteda.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\installutil.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\246122658369
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\Users\user\AppData\Local\Temp\Honda
ASCII text, with very long lines (574), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Honda.bat (copy)
ASCII text, with very long lines (574), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Itsa
data
dropped
C:\Users\user\AppData\Local\Temp\Scottish
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp1486.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp14D5.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Windows\Tasks\Hkbsse.job
data
dropped
There are 57 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\wfJfUGeGT3.exe
"C:\Users\user\Desktop\wfJfUGeGT3.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k move Honda Honda.bat & Honda.bat & exit
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 591950
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Competent + ..\Screw + ..\Whom + ..\Reveal + ..\Provides + ..\Still + ..\Entrepreneurs + ..\Greatest + ..\Corporate + ..\Wireless E
malicious
C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
Shipment.pif E
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & echo URL="C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & exit
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js"
malicious
C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr
"C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\user\AppData\Local\TrackGuard Technologies\z"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js"
malicious
C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr
"C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\user\AppData\Local\TrackGuard Technologies\z"
malicious
C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe
"C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F
malicious
C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
"C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
malicious
C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F
malicious
C:\Users\user\AppData\Local\Temp\1000142101\build2.exe
"C:\Users\user\AppData\Local\Temp\1000142101\build2.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe
"C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe"
malicious
C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe
"C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe"
malicious
C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
"C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F
malicious
C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe
"C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000194001\meta.exe
"C:\Users\user\AppData\Local\Temp\1000194001\meta.exe"
malicious
C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
"C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
malicious
C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe
"C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe
"C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe
"C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
C:\Windows\SysWOW64\findstr.exe
findstr /V "BachelorRayPotentialBeats" Itsa
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 38 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://thizx13vt.top/v
unknown
malicious
http://thizx13vt.top/v1/upload.phpIq
unknown
malicious
http://thizx13vt.top/g
unknown
malicious
thizx13vt.top
malicious
95.179.163.21:29257
malicious
http://thizx13vt.top/v1/upload.phpM?
unknown
malicious
http://thizx13vt.top/v1/upload.php%qN
unknown
malicious
http://thizx13vt.top/v1/upload.phpsrJG
unknown
malicious
analforeverlovyu.top
malicious
+#thizx13vt.top
malicious
t.top
malicious
exonic-hacks.com
malicious
http://crl.microsoft
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/Entity/Id15Responsex
unknown
http://thizx13vt.top/j
unknown
https://www.dropbox.com/he
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://tempuri.org/Entity/Id21Response
unknown
https://www.dropbox.com/
unknown
http://thizx13vt.top/x
unknown
http://tempuri.org/Entity/Id10Responsex
unknown
https://fusionflow-meta.net:443/socket/.)
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13LRjq
unknown
http://tempuri.org/Entity/Id6Responsex
unknown
https://discord.com/api/v9/users/
unknown
http://185.216.214.225/freedom.exe
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id1Responsex
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://tempuri.org/Entity/Id3LRjq
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://api.ip.sb/ip
unknown
http://tempuri.org/Entity/Id23Responsex
unknown
https://fusionflow-meta.net:443/socket/3422
unknown
http://www.entrust.net/rpa03
unknown
http://tempuri.org/Entity/Id6LRjq(
unknown
https://aka.ms/nativeaot-compatibilityy
unknown
http://tempuri.org/Entity/Id20Responsex
unknown
http://thizx13vt.top:80/v1/upload.phpraz
unknown
https://direct-link.net/1218649/browse-and-buy-cs2-skins
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://pastebin.com/raw/fiLr6dSt
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://tempuri.org/Entity/Id8Responsex
unknown
https://fusionflow-meta.net/1G
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Entity/Id17LRjq
unknown
http://tempuri.org/Entity/Id3Responsex
unknown
https://aka.ms/nativeaot-compatibilityY
unknown
http://pastebin.com
unknown
http://tempuri.org/Entity/Id12Responsex
unknown
http://tempuri.org/Entity/Id17Responsex
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
https://aka.ms/nativeaot-compatibilityh
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://tempuri.org/Entity/Id8Response
unknown
https://www.dropbox.com/scl/fi/rqsnrl6msilfirz1qp1pn/weetwegsdg.exe?rlkey=rmj9i20g87wwdvd6wsdaypie2&
unknown
http://tempuri.org/Entity/Id24LRjq
unknown
http://185.216.214.225/freedom.exe-
unknown
https://api.ip.s
unknown
https://www.dropbox.com/S
unknown
https://www.dropbox.com/K
unknown
http://tempuri.org/Entity/Id22Responsex
unknown
http://tempuri.org/Entity/Id19Responsex
unknown
http://tempuri.org/Entity/Id2LRjq
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://thizx13vt.top/:F
unknown
http://tempuri.org/Entity/Id20LRjq
unknown
http://tempuri.org/Entity/Id14LRjq
unknown
http://tempuri.org/Entity/Id13Response
unknown
https://www.dropbox.com/r
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
https://direct-link.net/1218649/windows-latest-updates
unknown
http://thizx13vt.top/2
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://thizx13vt.top/)
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
https://www.dropbox.com/(e
unknown
http://tempuri.org/Entity/Id22Response
unknown
http://thizx13vt.top/E
unknown
http://185.216.214.225/freedom.exej
unknown
http://thizx13vt.top/F
unknown
http://185.216.214.225/freedom.exeryWt.exe
unknown
http://tempuri.org/Entity/Id13Responsex
unknown
http://tempuri.org/Entity/Id16Responsex
unknown
http://tempuri.org/Entity/Id23LRjqp
unknown
http://thizx13vt.top/S
unknown
http://tempuri.org/Entity/Id18Response
unknown
http://185.216.214.225/
unknown
http://thizx13vt.top/N
unknown
http://tempuri.org/Entity/Id3Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
95.179.163.21
unknown
Netherlands
malicious
193.176.158.185
unknown
unknown
malicious
162.125.66.18
unknown
United States
185.215.113.26
unknown
Portugal
185.215.113.19
unknown
Portugal
103.130.147.211
unknown
Turkey
45.200.149.147
unknown
Seychelles
185.215.113.16
unknown
Portugal
208.95.112.1
unknown
United States
82.147.85.52
unknown
Russian Federation
104.20.4.235
unknown
United States
185.216.214.225
unknown
Germany
188.114.96.3
unknown
European Union
There are 3 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Cerker.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Startup
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Microsoft Subsystem Framework
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\winmsbt_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\IIZS2TRqf69aZbLAX3cf3edn_RASMANCS
FileDirectory
There are 25 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2B60000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
12DF1000
trusted library allocation
page read and write
malicious
2AF0000
direct allocation
page execute and read and write
malicious
BF2000
unkown
page readonly
malicious
479000
remote allocation
page execute and read and write
malicious
2DE1000
trusted library allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
3405000
trusted library allocation
page read and write
malicious
220BC200000
direct allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
21CA000
trusted library allocation
page read and write
110E000
heap
page read and write
33F0000
trusted library allocation
page read and write
1BD22000
heap
page read and write
103E000
heap
page read and write
33A6000
trusted library allocation
page read and write
1046000
heap
page read and write
E5F000
stack
page read and write
22AE000
trusted library allocation
page read and write
357C000
heap
page read and write
32D1000
trusted library allocation
page read and write
1352000
heap
page read and write
597E000
stack
page read and write
2614F60C000
heap
page read and write
320C000
heap
page read and write
910000
unkown
page readonly
1BBC0000
heap
page read and write
F90000
trusted library allocation
page read and write
9E0000
heap
page read and write
5C11000
heap
page read and write
32B0000
trusted library allocation
page read and write
730000
unkown
page readonly
335D000
stack
page read and write
286F000
stack
page read and write
5AC000
unkown
page write copy
21C0000
trusted library allocation
page read and write
3552000
heap
page read and write
8CF000
stack
page read and write
321B000
heap
page read and write
4AEB000
stack
page read and write
2D9E000
stack
page read and write
731000
unkown
page execute read
D41000
heap
page read and write
1092000
heap
page read and write
322C000
heap
page read and write
3448000
trusted library allocation
page read and write
6390000
heap
page read and write
124B000
heap
page read and write
320B000
heap
page read and write
F24000
heap
page read and write
16B0000
trusted library allocation
page read and write
1063000
trusted library allocation
page read and write
1110000
heap
page read and write
22B7000
trusted library allocation
page read and write
10B2000
heap
page read and write
4141000
heap
page read and write
12DE8000
trusted library allocation
page read and write
1C1D000
stack
page read and write
640000
unkown
page readonly
D01000
heap
page read and write
31CE000
stack
page read and write
1BD0E000
stack
page read and write
2260000
trusted library allocation
page read and write
924000
heap
page read and write
98F000
stack
page read and write
F90000
trusted library allocation
page read and write
1521000
heap
page read and write
343A000
trusted library allocation
page read and write
1D839880000
heap
page read and write
17F5000
heap
page read and write
11C0000
trusted library allocation
page read and write
2614F521000
heap
page read and write
F20000
heap
page read and write
10BC000
heap
page read and write
B2B000
trusted library allocation
page execute and read and write
1BC4D000
heap
page read and write
4141000
heap
page read and write
1DC1000
trusted library allocation
page read and write
924000
heap
page read and write
2589202F000
heap
page read and write
11CA000
heap
page read and write
1533000
trusted library allocation
page execute and read and write
7B4000
heap
page read and write
1490000
heap
page read and write
A06000
unkown
page readonly
CEF000
heap
page read and write
9E0000
unkown
page readonly
45DE000
stack
page read and write
43F0000
trusted library allocation
page read and write
7FF848C34000
trusted library allocation
page read and write
115F000
heap
page read and write
1762000
heap
page read and write
2614F5A6000
heap
page read and write
4141000
heap
page read and write
17BC000
heap
page read and write
D28000
heap
page read and write
CCC000
stack
page read and write
106A000
heap
page read and write
1023000
heap
page read and write
61D2000
heap
page read and write
30CA000
trusted library allocation
page read and write
BF6000
unkown
page read and write
873000
unkown
page readonly
F90000
trusted library allocation
page read and write
2E22000
heap
page read and write
1141000
heap
page read and write
2E2A000
heap
page read and write
262E000
stack
page read and write
121B000
heap
page read and write
3CF000
stack
page read and write
10EB000
heap
page read and write
330B000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
1082000
trusted library allocation
page read and write
21C4000
trusted library allocation
page read and write
5B1000
unkown
page execute read
DA0000
heap
page read and write
77E000
unkown
page read and write
11C0000
heap
page read and write
21C7000
trusted library allocation
page read and write
46AF000
stack
page read and write
FCA000
heap
page read and write
10C6000
heap
page read and write
1136000
heap
page read and write
FBE000
stack
page read and write
5654000
heap
page read and write
220B76A2000
heap
page read and write
FC7000
heap
page read and write
3401000
trusted library allocation
page read and write
1534000
trusted library allocation
page read and write
2262000
trusted library allocation
page read and write
1D839894000
heap
page read and write
2770000
heap
page read and write
1BC1000
trusted library allocation
page read and write
22BD000
trusted library allocation
page read and write
1F76000
trusted library allocation
page read and write
21C1000
trusted library allocation
page read and write
401000
unkown
page execute read
2B55000
heap
page read and write
13C8000
heap
page read and write
1092000
heap
page read and write
3260000
trusted library allocation
page read and write
220B76B4000
heap
page read and write
CEF000
heap
page read and write
111E000
heap
page read and write
138C000
heap
page read and write
1173000
heap
page read and write
1900000
trusted library allocation
page read and write
2AD2000
heap
page read and write
F90000
trusted library allocation
page read and write
135A000
heap
page read and write
4FA0000
trusted library allocation
page read and write
57F0000
trusted library allocation
page execute and read and write
3D0000
heap
page read and write
5640000
heap
page read and write
7FF848C43000
trusted library allocation
page execute and read and write
21CF000
trusted library allocation
page read and write
1088000
heap
page read and write
4141000
heap
page read and write
5BC0000
heap
page read and write
2C00000
heap
page read and write
7500000
heap
page read and write
B40000
heap
page read and write
32C0000
heap
page execute and read and write
7FF848D10000
trusted library allocation
page read and write
5DFE000
stack
page read and write
30D6000
trusted library allocation
page read and write
C6F000
heap
page read and write
350C000
trusted library allocation
page read and write
924000
heap
page read and write
3479000
trusted library allocation
page read and write
121F000
heap
page read and write
378D000
stack
page read and write
21C3000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
B2E000
stack
page read and write
1058000
heap
page read and write
DD4F000
stack
page read and write
368D000
stack
page read and write
980000
heap
page read and write
1900000
trusted library allocation
page read and write
730000
unkown
page readonly
21C7000
trusted library allocation
page read and write
13BE000
heap
page read and write
1590000
heap
page read and write
11E2000
heap
page read and write
37CD000
stack
page read and write
E44000
stack
page read and write
121B000
heap
page read and write
11ED000
heap
page read and write
DAA000
stack
page read and write
3A70000
remote allocation
page read and write
1BBF0000
heap
page read and write
4141000
heap
page read and write
25891F80000
heap
page read and write
6610000
heap
page read and write
2266000
trusted library allocation
page read and write
1157000
heap
page read and write
21C5000
trusted library allocation
page read and write
220B76B5000
heap
page read and write
1074000
heap
page read and write
39FD000
stack
page read and write
C91000
unkown
page execute read
1D839860000
heap
page read and write
1EBA000
trusted library allocation
page read and write
1D10000
heap
page read and write
11CB000
heap
page read and write
DCC000
stack
page read and write
3468000
trusted library allocation
page read and write
4141000
heap
page read and write
46A4000
trusted library allocation
page read and write
7A2000
unkown
page read and write
31FD000
heap
page read and write
DDB000
stack
page read and write
327E000
trusted library allocation
page read and write
98A000
heap
page read and write
21C9000
trusted library allocation
page read and write
10A5000
heap
page read and write
4141000
heap
page read and write
1CDA000
trusted library allocation
page read and write
3462000
trusted library allocation
page read and write
4C80000
heap
page read and write
30EB000
trusted library allocation
page read and write
7FF617F88000
unkown
page read and write
1C4A000
trusted library allocation
page read and write
1A50000
heap
page read and write
31FF000
heap
page read and write
CF1000
stack
page read and write
CDE000
unkown
page write copy
1356000
heap
page read and write
10E7000
heap
page read and write
33FE000
stack
page read and write
4141000
heap
page read and write
11DA000
heap
page read and write
1070000
trusted library allocation
page read and write
7FF848C80000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
93E000
stack
page read and write
1080000
heap
page read and write
4CE000
stack
page read and write
61D0000
heap
page read and write
BC0000
heap
page read and write
43F0000
trusted library allocation
page read and write
1043000
heap
page read and write
2A0F000
heap
page execute and read and write
2270000
trusted library allocation
page read and write
1202000
heap
page read and write
44F0000
trusted library allocation
page read and write
CC000
stack
page read and write
979000
unkown
page read and write
4560000
heap
page read and write
21CC000
trusted library allocation
page read and write
1250000
heap
page read and write
951000
unkown
page execute read
6930000
trusted library allocation
page read and write
153D000
trusted library allocation
page execute and read and write
16F8000
heap
page read and write
22EF000
trusted library allocation
page read and write
1674000
heap
page read and write
F50000
trusted library allocation
page read and write
21C8000
trusted library allocation
page read and write
308E000
stack
page read and write
3234000
trusted library allocation
page read and write
220B76B8000
heap
page read and write
2D5E000
stack
page read and write
446000
remote allocation
page execute and read and write
2614F613000
heap
page read and write
121E000
heap
page read and write
BB6000
heap
page read and write
2614F5C9000
heap
page read and write
1480000
heap
page read and write
1244000
heap
page read and write
6606000
heap
page read and write
924000
heap
page read and write
400000
unkown
page readonly
27A2000
trusted library allocation
page execute and read and write
11FD000
heap
page read and write
4141000
heap
page read and write
1319000
heap
page read and write
6819000
stack
page read and write
226B000
trusted library allocation
page read and write
1062000
heap
page read and write
5810000
heap
page read and write
1B90D000
stack
page read and write
2614F5BF000
heap
page read and write
12A0000
heap
page read and write
25891FE8000
heap
page read and write
135E000
heap
page read and write
296F000
stack
page read and write
1DC1000
trusted library allocation
page read and write
65AF000
stack
page read and write
34AA000
trusted library allocation
page read and write
3421000
trusted library allocation
page read and write
FEE000
stack
page read and write
10A2000
heap
page read and write
31DF000
trusted library allocation
page read and write
1DC1000
trusted library allocation
page read and write
1044000
heap
page read and write
1670000
trusted library allocation
page read and write
11D9000
heap
page read and write
5440000
heap
page read and write
5360000
trusted library allocation
page execute and read and write
2BDE000
stack
page read and write
23F7000
heap
page read and write
1055000
heap
page read and write
1190000
heap
page read and write
1900000
trusted library allocation
page read and write
25892016000
heap
page read and write
10AE000
stack
page read and write
21CA000
trusted library allocation
page read and write
1147000
heap
page read and write
2CEE000
stack
page read and write
59D0000
trusted library allocation
page read and write
8EE000
stack
page read and write
1040000
trusted library allocation
page read and write
7FF848D16000
trusted library allocation
page read and write
D0F000
heap
page read and write
7FF848C5D000
trusted library allocation
page execute and read and write
1210000
trusted library allocation
page read and write
7FF848C64000
trusted library allocation
page read and write
5830000
heap
page read and write
FC0000
heap
page read and write
730000
unkown
page readonly
960000
trusted library allocation
page read and write
34C3000
trusted library allocation
page read and write
1244000
heap
page read and write
226D000
trusted library allocation
page read and write
BE5000
heap
page read and write
34A4000
trusted library allocation
page read and write
22A5000
trusted library allocation
page read and write
308F000
stack
page read and write
235A000
trusted library allocation
page read and write
10B9000
heap
page read and write
C90000
unkown
page readonly
12A0000
heap
page read and write
58A0000
heap
page read and write
2268000
trusted library allocation
page read and write
1072000
heap
page read and write
5BD9000
heap
page read and write
1072000
heap
page read and write
121D000
heap
page read and write
11C0000
heap
page read and write
A75000
heap
page read and write
5B0000
unkown
page readonly
1261000
heap
page read and write
114F000
heap
page read and write
50C0000
heap
page read and write
3401000
trusted library allocation
page read and write
401000
unkown
page execute read
31B0000
trusted library allocation
page read and write
7FF848C6D000
trusted library allocation
page execute and read and write
DCE000
stack
page read and write
1530000
trusted library allocation
page read and write
10A4000
heap
page read and write
7FF848C5D000
trusted library allocation
page execute and read and write
7FF848D16000
trusted library allocation
page execute and read and write
529B000
trusted library allocation
page read and write
22AA000
trusted library allocation
page read and write
14D0000
heap
page read and write
21C1000
trusted library allocation
page read and write
2274000
trusted library allocation
page read and write
1BC1000
trusted library allocation
page read and write
65C0000
trusted library allocation
page read and write
679000
unkown
page readonly
D2A000
heap
page read and write
31FD000
heap
page read and write
6920000
trusted library allocation
page execute and read and write
1179000
heap
page read and write
F90000
trusted library allocation
page read and write
10DD000
heap
page read and write
22A3000
trusted library allocation
page read and write
50BF000
stack
page read and write
1D8398C6000
heap
page read and write
1B8C000
heap
page read and write
363E000
stack
page read and write
353D000
stack
page read and write
F20000
trusted library allocation
page read and write
32F2000
trusted library allocation
page read and write
76D000
unkown
page readonly
135A000
heap
page read and write
41F000
unkown
page read and write
D15000
heap
page read and write
13EA000
heap
page read and write
21C4000
trusted library allocation
page read and write
1073000
heap
page read and write
674000
unkown
page write copy
2660000
unclassified section
page read and write
176E000
heap
page read and write
8F5000
heap
page read and write
781000
unkown
page readonly
2CDF000
stack
page read and write
12CF000
heap
page read and write
1166000
heap
page read and write
3202000
heap
page read and write
2614F5D2000
heap
page read and write
314C000
stack
page read and write
10AD000
heap
page read and write
6C60000
trusted library allocation
page read and write
2E3E000
trusted library allocation
page read and write
135A000
heap
page read and write
11EE000
heap
page read and write
228D000
trusted library allocation
page read and write
453C000
stack
page read and write
236F000
heap
page read and write
FDB000
stack
page read and write
1268000
heap
page read and write
D04000
heap
page read and write
924000
heap
page read and write
5B0000
unkown
page readonly
D22000
heap
page read and write
30DF000
stack
page read and write
371F000
stack
page read and write
790000
heap
page read and write
77E000
unkown
page read and write
7F6000
unkown
page read and write
111E000
heap
page read and write
31F8000
heap
page read and write
CAC000
stack
page read and write
289D000
stack
page read and write
D1B000
heap
page read and write
976000
unkown
page read and write
21FCEFA000
stack
page read and write
1152000
heap
page read and write
6B28000
trusted library allocation
page read and write
1BBBE000
stack
page read and write
21C2000
trusted library allocation
page read and write
F60000
heap
page read and write
121B000
heap
page read and write
1260000
heap
page read and write
31CF000
trusted library allocation
page read and write
670000
unkown
page write copy
2F7E000
stack
page read and write
9AD000
heap
page read and write
6EC000
stack
page read and write
1192000
heap
page read and write
2589202F000
heap
page read and write
C78000
heap
page read and write
2790000
heap
page read and write
15A1000
heap
page read and write
BB0000
heap
page read and write
1192000
heap
page read and write
10F4000
heap
page read and write
7FF617D10000
unkown
page readonly
17E4000
heap
page read and write
32AF000
trusted library allocation
page read and write
2D20000
heap
page read and write
25CB000
trusted library allocation
page execute and read and write
1000000
heap
page read and write
1054000
trusted library allocation
page read and write
52AE000
trusted library allocation
page read and write
BE0000
heap
page read and write
910000
heap
page read and write
10EE000
stack
page read and write
3364000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
1215000
heap
page read and write
FFF000
heap
page read and write
FD7000
heap
page read and write
2DF8000
heap
page read and write
101F000
heap
page read and write
98E000
heap
page read and write
21FD0FF000
stack
page read and write
6606000
heap
page read and write
7FF848D46000
trusted library allocation
page execute and read and write
33D0000
heap
page read and write
114C000
heap
page read and write
CF5000
heap
page read and write
7FF617EB7000
unkown
page readonly
2B60000
heap
page read and write
950000
unkown
page readonly
10B3000
heap
page read and write
11BD000
heap
page read and write
3476000
trusted library allocation
page read and write
2614F60C000
heap
page read and write
10CC000
heap
page read and write
3031000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
2D90000
heap
page read and write
2377000
heap
page read and write
763E000
stack
page read and write
2640000
heap
page read and write
2589201A000
heap
page read and write
14B0000
heap
page read and write
25891FC8000
heap
page read and write
21C3000
trusted library allocation
page read and write
6AF6000
trusted library allocation
page read and write
38FC000
stack
page read and write
5DBE000
stack
page read and write
924000
heap
page read and write
6E0000
heap
page read and write
16DE000
heap
page read and write
4141000
heap
page read and write
320E000
heap
page read and write
30EF000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
181E000
stack
page read and write
63B4000
heap
page read and write
1674000
heap
page read and write
1B4A0000
heap
page execute and read and write
31E8000
heap
page read and write
10DD000
heap
page read and write
21CB000
trusted library allocation
page read and write
1321000
heap
page read and write
43F0000
trusted library allocation
page read and write
5340000
heap
page read and write
96E000
stack
page read and write
1BCC8000
heap
page read and write
138C000
heap
page read and write
2C80000
trusted library allocation
page read and write
1141000
heap
page read and write
5B4C000
stack
page read and write
201F000
stack
page read and write
11C0000
heap
page read and write
138C000
heap
page read and write
3630000
heap
page read and write
1063000
heap
page read and write
228E000
trusted library allocation
page read and write
FEC6FFF000
stack
page read and write
964000
trusted library allocation
page read and write
59F0000
heap
page read and write
FFF000
heap
page read and write
6CB0000
trusted library allocation
page execute and read and write
337B000
trusted library allocation
page read and write
1900000
trusted library allocation
page read and write
220B768F000
heap
page read and write
1D8398AD000
heap
page read and write
D26000
heap
page read and write
335F000
stack
page read and write
23FE000
stack
page read and write
1040000
heap
page read and write
1674000
heap
page read and write
1229000
heap
page read and write
1096000
heap
page read and write
BF0000
unkown
page readonly
1B670000
heap
page read and write
1D8398BC000
heap
page read and write
730000
unkown
page readonly
6D50000
heap
page execute and read and write
7FF848DE0000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
10A5000
heap
page read and write
21CA000
trusted library allocation
page read and write
1D83989F000
heap
page read and write
21C2000
trusted library allocation
page read and write
7FF848CFC000
trusted library allocation
page execute and read and write
1BE0B000
stack
page read and write
44B0000
heap
page read and write
123F000
heap
page read and write
1BC0E000
stack
page read and write
1540000
trusted library allocation
page read and write
28F5000
heap
page read and write
229D000
trusted library allocation
page read and write
1F9A000
trusted library allocation
page read and write
11EA000
heap
page read and write
104F000
heap
page read and write
1156000
heap
page read and write
7FF848CF6000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
274E000
stack
page read and write
76D000
unkown
page readonly
5BCD000
stack
page read and write
52C2000
trusted library allocation
page read and write
2A4A000
heap
page read and write
3224000
heap
page read and write
6767000
trusted library allocation
page read and write
22F0000
heap
page read and write
1230000
heap
page read and write
5C03000
heap
page read and write
53B000
stack
page read and write
D6A000
heap
page read and write
BFC000
unkown
page write copy
2F8F000
unkown
page read and write
B70000
heap
page read and write
1384000
heap
page read and write
11D4000
heap
page read and write
F90000
trusted library allocation
page read and write
1BDBE000
stack
page read and write
10F6000
heap
page read and write
38CD000
stack
page read and write
10D6000
heap
page read and write
2614F5C2000
heap
page read and write
3088000
heap
page read and write
D7F000
stack
page read and write
1900000
trusted library allocation
page read and write
32A3000
trusted library allocation
page read and write
7FF848C70000
trusted library allocation
page read and write
65F1000
heap
page read and write
220BB400000
direct allocation
page read and write
1215000
heap
page read and write
7AF000
unkown
page read and write
ABE000
stack
page read and write
12E2000
heap
page read and write
BE0000
heap
page read and write
5AC000
stack
page read and write
3483000
trusted library allocation
page read and write
781000
unkown
page readonly
12B2000
heap
page read and write
76D000
unkown
page readonly
7FF848C6B000
trusted library allocation
page execute and read and write
D15000
heap
page read and write
3489000
trusted library allocation
page read and write
30E7000
trusted library allocation
page read and write
731000
unkown
page execute read
13A1000
heap
page read and write
1001000
heap
page read and write
1BFBF000
stack
page read and write
10B5000
heap
page read and write
4564000
heap
page read and write
33CE000
unkown
page read and write
603E000
stack
page read and write
1112000
heap
page read and write
33D7000
heap
page read and write
220B9000000
direct allocation
page read and write
2349000
trusted library allocation
page read and write
A19000
unkown
page readonly
11DD000
heap
page read and write
4141000
heap
page read and write
985000
unkown
page read and write
493E000
stack
page read and write
199000
stack
page read and write
5813000
heap
page read and write
BFE000
stack
page read and write
2FE4000
trusted library allocation
page read and write
2259000
trusted library allocation
page read and write
34A6000
trusted library allocation
page read and write
1226000
heap
page read and write
7FF848E0D000
trusted library allocation
page read and write
10BC000
heap
page read and write
56AF000
heap
page read and write
2C6C000
stack
page read and write
A14000
unkown
page write copy
A0D000
heap
page read and write
5C6000
heap
page read and write
107A000
trusted library allocation
page execute and read and write
D2C000
heap
page read and write
52D0000
trusted library allocation
page read and write
2AA0000
heap
page read and write
7B4000
heap
page read and write
6380000
heap
page read and write
11E7000
heap
page read and write
2D30000
heap
page read and write
1BC79000
heap
page read and write
7FF848C30000
trusted library allocation
page read and write
12B8000
heap
page read and write
5EFE000
stack
page read and write
546C000
stack
page read and write
FA0000
heap
page read and write
7B4000
heap
page read and write
B6F000
stack
page read and write
CDE000
unkown
page read and write
2614F60F000
heap
page read and write
1072000
heap
page read and write
2589202F000
heap
page read and write
2403000
trusted library allocation
page read and write
7FF617D11000
unkown
page execute read
D22000
heap
page read and write
970000
heap
page read and write
2614F5A0000
heap
page read and write
341B000
trusted library allocation
page read and write
689000
stack
page read and write
1352000
heap
page read and write
323D000
stack
page read and write
25891FDC000
heap
page read and write
730000
unkown
page readonly
4141000
heap
page read and write
1120000
heap
page read and write
11B2000
heap
page read and write
13E1000
heap
page read and write
10AB000
heap
page read and write
1250000
heap
page read and write
43F0000
trusted library allocation
page read and write
50B000
remote allocation
page execute and read and write
1140000
heap
page read and write
110E000
heap
page read and write
1213000
heap
page read and write
13C8000
heap
page read and write
30CE000
trusted library allocation
page read and write
1141000
heap
page read and write
2AED000
stack
page read and write
1206000
heap
page read and write
2E19000
heap
page read and write
114B000
heap
page read and write
FFC000
stack
page read and write
2276000
trusted library allocation
page read and write
1098000
heap
page read and write
3090000
heap
page read and write
2266000
trusted library allocation
page read and write
CCF000
stack
page read and write
D22000
heap
page read and write
E48000
stack
page read and write
32A0000
trusted library allocation
page read and write
1243000
heap
page read and write
3A1E000
stack
page read and write
1786000
heap
page read and write
10C0000
heap
page read and write
1061000
heap
page read and write
3A70000
remote allocation
page read and write
1900000
trusted library allocation
page read and write
1DC1000
trusted library allocation
page read and write
646E000
stack
page read and write
225F000
stack
page read and write
2F4E000
stack
page read and write
11D0000
trusted library allocation
page execute and read and write
76D000
unkown
page readonly
4920000
trusted library allocation
page read and write
2271000
trusted library allocation
page read and write
BFF000
unkown
page readonly
2AE1000
heap
page read and write
1166000
heap
page read and write
159F000
heap
page read and write
731000
unkown
page execute read
3CFF000
stack
page read and write
1BC1000
trusted library allocation
page read and write
5F3000
unkown
page read and write
2AB4000
heap
page read and write
507E000
stack
page read and write
1DC1000
trusted library allocation
page read and write
5B8D000
stack
page read and write
37BE000
stack
page read and write
4141000
heap
page read and write
1D839880000
heap
page read and write
2589201B000
heap
page read and write
25891FF5000
heap
page read and write
1050000
trusted library allocation
page read and write
1B7AA000
stack
page read and write
25891FE1000
heap
page read and write
1224000
heap
page read and write
D01000
heap
page read and write
21C4000
trusted library allocation
page read and write
EF7000
stack
page read and write
7FF617F88000
unkown
page write copy
9B0000
heap
page read and write
7FF848C7D000
trusted library allocation
page execute and read and write
3881000
heap
page read and write
94BE000
stack
page read and write
F7D000
stack
page read and write
1C2BE000
stack
page read and write
EAE000
stack
page read and write
4BEE000
stack
page read and write
9C0000
heap
page read and write
47E000
stack
page read and write
331E000
stack
page read and write
59BE000
stack
page read and write
F65000
heap
page read and write
46B2000
trusted library allocation
page read and write
1672000
trusted library allocation
page read and write
220B7810000
heap
page read and write
F90000
trusted library allocation
page read and write
873000
unkown
page readonly
953000
trusted library allocation
page execute and read and write
CFC000
heap
page read and write
1520000
trusted library allocation
page read and write
4F9000
remote allocation
page execute and read and write
7FF848C44000
trusted library allocation
page read and write
1110000
heap
page read and write
5CFE000
stack
page read and write
220B7689000
heap
page read and write
21CA000
trusted library allocation
page read and write
11D8000
heap
page read and write
1674000
heap
page read and write
104C000
heap
page read and write
679000
unkown
page readonly
599B000
stack
page read and write
4DB8000
trusted library allocation
page read and write
43C000
stack
page read and write
220B76B4000
heap
page read and write
43F0000
trusted library allocation
page read and write
FEC6AFF000
stack
page read and write
349F000
stack
page read and write
940000
heap
page read and write
76D000
unkown
page readonly
361E000
stack
page read and write
22A8000
trusted library allocation
page read and write
1360000
heap
page read and write
50A000
heap
page read and write
144E000
stack
page read and write
21CA000
trusted library allocation
page read and write
A50000
heap
page read and write
25892190000
heap
page read and write
666000
unkown
page readonly
500000
heap
page read and write
EF1000
stack
page read and write
1B9B0000
heap
page execute and read and write
7FF848C8D000
trusted library allocation
page execute and read and write
25891FED000
heap
page read and write
21C7000
trusted library allocation
page read and write
391E000
stack
page read and write
4141000
heap
page read and write
11FE000
heap
page read and write
44FE000
trusted library allocation
page read and write
F70000
heap
page read and write
21C1000
trusted library allocation
page read and write
37A5000
trusted library allocation
page read and write
670000
unkown
page read and write
730000
unkown
page readonly
114C000
heap
page read and write
34BF000
trusted library allocation
page read and write
4141000
heap
page read and write
7FF848CF0000
trusted library allocation
page execute and read and write
25E0000
trusted library allocation
page read and write
2E90000
heap
page read and write
302F000
stack
page read and write
DF6000
heap
page read and write
2DEE000
stack
page read and write
3411000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
2D7E000
stack
page read and write
1D8397F0000
heap
page read and write
9B000
stack
page read and write
1850000
trusted library allocation
page read and write
2295000
trusted library allocation
page read and write
442C000
trusted library allocation
page read and write
21C7000
trusted library allocation
page read and write
95BE000
stack
page read and write
23EA000
heap
page read and write
12F0000
heap
page read and write
2589202F000
heap
page read and write
1BAB0000
heap
page execute and read and write
BF0000
unkown
page readonly
1220000
heap
page read and write
1372000
heap
page read and write
1280000
heap
page read and write
12B5000
heap
page read and write
31BA000
trusted library allocation
page read and write
4141000
heap
page read and write
305A2F9000
stack
page read and write
2ACC000
heap
page read and write
46A000
remote allocation
page execute and read and write
1077000
heap
page read and write
21FCFFF000
stack
page read and write
11E0000
trusted library allocation
page read and write
21C8000
trusted library allocation
page read and write
2614F5A2000
heap
page read and write
FED000
heap
page read and write
970000
heap
page read and write
77E000
unkown
page read and write
305A4FF000
stack
page read and write
12D9000
heap
page read and write
13EA000
heap
page read and write
65F0000
heap
page read and write
670000
unkown
page write copy
2090000
trusted library allocation
page read and write
167B000
trusted library allocation
page execute and read and write
260CD00F000
direct allocation
page read and write
F25000
heap
page read and write
119F000
heap
page read and write
11A9000
heap
page read and write
7FF848DD8000
trusted library allocation
page read and write
1C40E000
stack
page read and write
58A000
heap
page read and write
1C2FE000
stack
page read and write
17FE000
stack
page read and write
2F93000
trusted library allocation
page read and write
2B90000
heap
page read and write
60AE000
stack
page read and write
1900000
trusted library allocation
page read and write
1274000
heap
page read and write
2D9C000
heap
page read and write
1C1FD000
stack
page read and write
30E3000
trusted library allocation
page read and write
1337000
stack
page read and write
FE0000
heap
page read and write
529E000
trusted library allocation
page read and write
7B4000
heap
page read and write
165F000
stack
page read and write
666000
unkown
page readonly
D04000
heap
page read and write
3455000
trusted library allocation
page read and write
1746000
heap
page read and write
21FD6FE000
stack
page read and write
3410000
heap
page read and write
3491000
trusted library allocation
page read and write
1E0000
heap
page read and write
21CA000
trusted library allocation
page read and write
1796000
heap
page read and write
25891FF5000
heap
page read and write
348B000
trusted library allocation
page read and write
22B0000
heap
page execute and read and write
9B0000
heap
page read and write
12B68000
trusted library allocation
page read and write
10A0000
heap
page read and write
F10000
heap
page read and write
12F8000
heap
page read and write
780000
heap
page read and write
2299000
trusted library allocation
page read and write
7FD40000
trusted library allocation
page execute and read and write
16EA000
heap
page read and write
5500000
heap
page execute and read and write
220B7691000
heap
page read and write
220BF00A000
direct allocation
page read and write
21C0000
trusted library allocation
page read and write
1040000
heap
page read and write
2614F525000
heap
page read and write
109F000
heap
page read and write
6B0E000
trusted library allocation
page read and write
1240000
heap
page read and write
104B000
heap
page read and write
790000
heap
page read and write
6769000
trusted library allocation
page read and write
1143000
heap
page read and write
2614F5A0000
heap
page read and write
3126000
trusted library allocation
page read and write
1044000
heap
page read and write
2E40000
trusted library allocation
page read and write
122B000
heap
page read and write
13038000
trusted library allocation
page read and write
D15000
heap
page read and write
321F000
stack
page read and write
123E000
stack
page read and write
311E000
stack
page read and write
310E000
stack
page read and write
7FF617D10000
unkown
page readonly
1BC1000
trusted library allocation
page read and write
3093000
trusted library allocation
page read and write
1369000
heap
page read and write
7FF848D1C000
trusted library allocation
page execute and read and write
2F0F000
stack
page read and write
25891FE7000
heap
page read and write
43F0000
trusted library allocation
page read and write
9F7000
heap
page read and write
29FE000
heap
page read and write
7FF848C3D000
trusted library allocation
page execute and read and write
11DF000
heap
page read and write
1900000
trusted library allocation
page read and write
731000
unkown
page execute read
401000
unkown
page execute read
781000
unkown
page readonly
220BE600000
direct allocation
page read and write
2C70000
trusted library allocation
page read and write
7FF848CEC000
trusted library allocation
page execute and read and write
65F1000
heap
page read and write
15A4000
heap
page read and write
4141000
heap
page read and write
4141000
heap
page read and write
C6B000
heap
page read and write
13B0000
heap
page read and write
2614F5C2000
heap
page read and write
10A5000
heap
page read and write
1674000
heap
page read and write
1166000
heap
page read and write
1379000
heap
page read and write
11C9000
heap
page read and write
920000
heap
page read and write
1840000
trusted library allocation
page read and write
11ED000
heap
page read and write
1674000
heap
page read and write
324F000
trusted library allocation
page read and write
10AC000
heap
page read and write
1674000
heap
page read and write
4141000
heap
page read and write
111C000
heap
page read and write
21CD000
trusted library allocation
page read and write
580000
heap
page read and write
CFD000
heap
page read and write
3419000
trusted library allocation
page read and write
33EC000
trusted library allocation
page read and write
2254000
trusted library allocation
page read and write
3286000
trusted library allocation
page read and write
FF4000
heap
page read and write
92C000
unkown
page readonly
2DFD000
heap
page read and write
100F000
heap
page read and write
4F4E000
stack
page read and write
7B4000
heap
page read and write
10A5000
heap
page read and write
29F0000
heap
page read and write
22AB000
trusted library allocation
page read and write
21FD5FF000
stack
page read and write
2BEF000
stack
page read and write
6AE0000
trusted library allocation
page read and write
43F1000
trusted library allocation
page read and write
1215000
heap
page read and write
45A0000
heap
page read and write
42D1000
trusted library allocation
page read and write
670000
unkown
page read and write
D26000
heap
page read and write
335F000
stack
page read and write
21C4000
trusted library allocation
page read and write
C8E000
stack
page read and write
2274000
trusted library allocation
page read and write
2614F5A2000
heap
page read and write
7FF848C64000
trusted library allocation
page read and write
1674000
heap
page read and write
9C4000
heap
page read and write
1D839868000
heap
page read and write
1B660000
heap
page read and write
3550000
heap
page read and write
2E2A000
heap
page read and write
2DFF000
heap
page read and write
1141000
heap
page read and write
3600000
remote allocation
page read and write
3870000
heap
page read and write
35DC000
stack
page read and write
640000
unkown
page readonly
5F3D000
stack
page read and write
5AB000
unkown
page write copy
4E5000
heap
page read and write
1198000
heap
page read and write
25892015000
heap
page read and write
102C000
heap
page read and write
912000
unkown
page readonly
27A1000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page execute and read and write
321B000
heap
page read and write
220B7490000
heap
page read and write
1215000
heap
page read and write
59F5000
heap
page read and write
1660000
trusted library allocation
page read and write
112A000
heap
page read and write
FEA000
heap
page read and write
1082000
heap
page read and write
308A000
trusted library allocation
page read and write
C93000
heap
page read and write
1B930000
heap
page read and write
237C000
heap
page read and write
21C6000
trusted library allocation
page read and write
1038000
heap
page read and write
77E000
unkown
page write copy
5AF000
heap
page read and write
10FC000
stack
page read and write
126E000
heap
page read and write
220B767E000
heap
page read and write
4F10000
heap
page read and write
2614F5BF000
heap
page read and write
7FF848DD0000
trusted library allocation
page read and write
21FD3FF000
stack
page read and write
21C1000
trusted library allocation
page read and write
118F000
heap
page read and write
1155000
heap
page read and write
10FB000
heap
page read and write
3880000
heap
page read and write
9B0000
heap
page read and write
F30000
trusted library allocation
page read and write
2D1E000
unkown
page read and write
FAE000
heap
page read and write
16A0000
trusted library allocation
page execute and read and write
13C8000
heap
page read and write
228A000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
E63000
stack
page read and write
12AE000
heap
page read and write
32E2000
trusted library allocation
page read and write
858000
heap
page read and write
2B20000
heap
page execute and read and write
4B60000
heap
page read and write
344F000
trusted library allocation
page read and write
363F000
stack
page read and write
21CA000
trusted library allocation
page read and write
31B0000
heap
page read and write
7CE000
stack
page read and write
CD4000
trusted library allocation
page read and write
3380000
heap
page read and write
640000
unkown
page readonly
781000
unkown
page readonly
1093000
heap
page read and write
21CD000
trusted library allocation
page read and write
23C5000
heap
page read and write
1205000
heap
page read and write
100B000
heap
page read and write
29C000
stack
page read and write
2DB3000
heap
page read and write
640000
unkown
page readonly
CFE000
heap
page read and write
16C8000
heap
page read and write
2F44000
trusted library allocation
page read and write
307F000
trusted library allocation
page read and write
1D8398C1000
heap
page read and write
1B060000
trusted library allocation
page read and write
11BB000
heap
page read and write
C90000
unkown
page readonly
1339000
heap
page read and write
77F000
stack
page read and write
1226000
heap
page read and write
226F000
trusted library allocation
page read and write
3881000
heap
page read and write
4141000
heap
page read and write
105F000
heap
page read and write
D33000
heap
page read and write
12DC000
heap
page read and write
4431000
trusted library allocation
page read and write
1D839C05000
heap
page read and write
7FF848D80000
trusted library allocation
page execute and read and write
9B4000
heap
page read and write
25891FFD000
heap
page read and write
2614F5EA000
heap
page read and write
1D839C00000
heap
page read and write
400000
unkown
page readonly
1058000
heap
page read and write
1203000
heap
page read and write
5443000
heap
page read and write
1110000
heap
page read and write
1053000
trusted library allocation
page execute and read and write
D22000
heap
page read and write
1053000
heap
page read and write
10E7000
heap
page read and write
31FD000
heap
page read and write
1055000
heap
page read and write
34AC000
trusted library allocation
page read and write
9FE000
stack
page read and write
3C55000
heap
page read and write
2064000
trusted library allocation
page read and write
1674000
heap
page read and write
1F0000
heap
page read and write
179A000
heap
page read and write
220B7830000
heap
page read and write
18FF000
stack
page read and write
1291000
heap
page read and write
731000
unkown
page execute read
E253000
heap
page read and write
232A000
trusted library allocation
page read and write
1010000
heap
page read and write
D1E000
heap
page read and write
5BF0000
heap
page read and write
6680000
trusted library allocation
page execute and read and write
1520000
heap
page read and write
106A000
heap
page read and write
12FA000
heap
page read and write
1095000
heap
page read and write
2F9E000
stack
page read and write
4E9000
remote allocation
page execute and read and write
7FF848C40000
trusted library allocation
page read and write
341F000
trusted library allocation
page read and write
333D000
stack
page read and write
10DC000
heap
page read and write
3193000
trusted library allocation
page read and write
229D000
trusted library allocation
page read and write
106E000
stack
page read and write
31E0000
heap
page read and write
C9F000
stack
page read and write
284E000
unkown
page readonly
13B5000
heap
page read and write
7BFE000
stack
page read and write
10BB000
heap
page read and write
140000
unkown
page readonly
1485000
heap
page read and write
2C84000
trusted library allocation
page read and write
9B0000
heap
page read and write
1001000
heap
page read and write
1860000
heap
page read and write
340E000
stack
page read and write
22A1000
trusted library allocation
page read and write
3229000
heap
page read and write
34F0000
heap
page read and write
7E0000
heap
page read and write
1D0000
heap
page read and write
22C0000
trusted library allocation
page execute and read and write
575000
heap
page read and write
2614F5C9000
heap
page read and write
2CA0000
heap
page read and write
4141000
heap
page read and write
276D000
stack
page read and write
1074000
heap
page read and write
5B1000
unkown
page execute read
7B0000
heap
page read and write
4141000
heap
page read and write
59A4000
trusted library allocation
page read and write
220B76F8000
heap
page read and write
43F0000
trusted library allocation
page read and write
448F000
stack
page read and write
980000
unkown
page read and write
CF0000
heap
page read and write
101F000
heap
page read and write
CE2000
heap
page read and write
21C9000
trusted library allocation
page read and write
220BF000000
direct allocation
page read and write
7FF848E00000
trusted library allocation
page execute and read and write
1777000
heap
page read and write
2589200E000
heap
page read and write
220BCC00000
direct allocation
page read and write
25891FC0000
heap
page read and write
1130000
heap
page read and write
1052000
heap
page read and write
17A1000
heap
page read and write
1C1BE000
stack
page read and write
503F000
stack
page read and write
D30000
heap
page read and write
2BF4000
trusted library allocation
page read and write
2441000
heap
page read and write
609C000
stack
page read and write
3E0F000
heap
page read and write
307F000
stack
page read and write
32B5000
trusted library allocation
page read and write
1BEBD000
stack
page read and write
5290000
trusted library allocation
page read and write
C3F000
stack
page read and write
3457000
trusted library allocation
page read and write
1C3BE000
stack
page read and write
C20000
heap
page read and write
730000
unkown
page readonly
1109000
heap
page read and write
2D9F000
stack
page read and write
23EF000
heap
page read and write
101F000
heap
page read and write
21C5000
trusted library allocation
page read and write
21C0000
trusted library allocation
page read and write
11CE000
heap
page read and write
4570000
heap
page read and write
F24000
heap
page read and write
7FF848C50000
trusted library allocation
page read and write
91E000
stack
page read and write
126E000
heap
page read and write
1674000
heap
page read and write
1275000
heap
page read and write
6B20000
trusted library allocation
page read and write
34BB000
trusted library allocation
page read and write
21CB000
trusted library allocation
page read and write
1215000
heap
page read and write
1211000
heap
page read and write
CE2000
heap
page read and write
34C5000
trusted library allocation
page read and write
1329000
heap
page read and write
3BFD000
stack
page read and write
138C000
heap
page read and write
2E23000
heap
page read and write
23E2000
heap
page read and write
BC0000
heap
page read and write
1500000
heap
page read and write
232F000
trusted library allocation
page read and write
2E25000
heap
page read and write
3453000
trusted library allocation
page read and write
1118000
heap
page read and write
1109000
heap
page read and write
228E000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
45EF000
trusted library allocation
page read and write
DFE000
heap
page read and write
21CA000
trusted library allocation
page read and write
2EEB000
trusted library allocation
page read and write
5294000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
321B000
heap
page read and write
1202000
heap
page read and write
25891FEE000
heap
page read and write
11EE000
heap
page read and write
81DC000
stack
page read and write
13EE000
heap
page read and write
C61000
heap
page read and write
13A4000
heap
page read and write
2288000
trusted library allocation
page read and write
32F1000
heap
page read and write
2F2E000
stack
page read and write
12A2000
heap
page read and write
3472000
trusted library allocation
page read and write
34BE000
stack
page read and write
137B000
heap
page read and write
42D5000
trusted library allocation
page read and write
3BAF000
stack
page read and write
43F0000
trusted library allocation
page read and write
130E000
heap
page read and write
220B76BD000
heap
page read and write
17DE000
stack
page read and write
6C00000
trusted library allocation
page read and write
340000
heap
page read and write
2DD6000
heap
page read and write
1B71000
heap
page read and write
21FD2FE000
stack
page read and write
107B000
heap
page read and write
3487000
trusted library allocation
page read and write
1BA0E000
stack
page read and write
31FA000
trusted library allocation
page read and write
12DE1000
trusted library allocation
page read and write
C9D000
heap
page read and write
11E5000
heap
page read and write
316C000
stack
page read and write
1BB0E000
stack
page read and write
118B000
heap
page read and write
4141000
heap
page read and write
CFE000
heap
page read and write
31AC000
trusted library allocation
page read and write
DFD000
stack
page read and write
5851000
heap
page read and write
21C9000
trusted library allocation
page read and write
220B76B4000
heap
page read and write
C85000
heap
page read and write
121D000
heap
page read and write
32CD000
trusted library allocation
page read and write
226F000
trusted library allocation
page read and write
45C1000
trusted library allocation
page read and write
1154000
heap
page read and write
2285000
trusted library allocation
page read and write
DBF000
stack
page read and write
14ED000
stack
page read and write
7FF848DDD000
trusted library allocation
page read and write
1000000
heap
page read and write
1D83989E000
heap
page read and write
105D000
trusted library allocation
page execute and read and write
11C0000
heap
page read and write
DC0000
heap
page read and write
7FF848CBC000
trusted library allocation
page execute and read and write
21C5000
trusted library allocation
page read and write
34A2000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page execute and read and write
CF3000
heap
page read and write
EEE000
stack
page read and write
D660000
heap
page read and write
1170000
heap
page read and write
25892350000
heap
page read and write
1C0BE000
stack
page read and write
1234000
heap
page read and write
D15000
heap
page read and write
1222000
heap
page read and write
7AFD000
stack
page read and write
104B000
heap
page read and write
105A000
heap
page read and write
34AE000
trusted library allocation
page read and write
1D83988F000
heap
page read and write
1BBBE000
stack
page read and write
1674000
heap
page read and write
2402000
trusted library allocation
page execute and read and write
1BE4000
heap
page read and write
420000
heap
page read and write
AFA000
stack
page read and write
400000
remote allocation
page execute and read and write
23CD000
heap
page read and write
8F0000
heap
page read and write
781000
unkown
page readonly
F10000
remote allocation
page read and write
D6C000
heap
page read and write
1276000
heap
page read and write
4141000
heap
page read and write
2614F5C2000
heap
page read and write
6BFE000
trusted library allocation
page read and write
46D000
unkown
page execute and read and write
D680000
heap
page read and write
284E000
unkown
page readonly
1180000
heap
page read and write
32F0000
heap
page read and write
D26000
heap
page read and write
3224000
heap
page read and write
3445000
trusted library allocation
page read and write
FE8000
heap
page read and write
119E000
stack
page read and write
4D74000
trusted library allocation
page read and write
3224000
heap
page read and write
5630000
heap
page read and write
1202000
heap
page read and write
1988000
heap
page read and write
2589202F000
heap
page read and write
11C0000
heap
page read and write
400000
unkown
page readonly
2614F5D2000
heap
page read and write
265E000
stack
page read and write
220B76B8000
heap
page read and write
121B000
heap
page read and write
1010000
heap
page read and write
1D8398B9000
heap
page read and write
2614F60C000
heap
page read and write
325F000
trusted library allocation
page read and write
178D000
heap
page read and write
11D5000
heap
page read and write
1DC1000
trusted library allocation
page read and write
2E98000
trusted library allocation
page read and write
2AD4000
heap
page read and write
106F000
heap
page read and write
2DE8000
heap
page read and write
7FF421760000
trusted library allocation
page execute and read and write
1677000
trusted library allocation
page execute and read and write
77E000
unkown
page read and write
25891FFE000
heap
page read and write
39FF000
stack
page read and write
2E19000
heap
page read and write
1062000
heap
page read and write
2ACC000
heap
page read and write
1110000
heap
page read and write
11D5000
heap
page read and write
331B000
trusted library allocation
page read and write
1040000
heap
page read and write
11CA000
heap
page read and write
4141000
heap
page read and write
1205000
heap
page read and write
14E0000
heap
page read and write
FAE000
stack
page read and write
2B50000
heap
page read and write
3346000
trusted library allocation
page read and write
121B000
heap
page read and write
731000
unkown
page execute read
5EC000
stack
page read and write
326B000
trusted library allocation
page read and write
1D8398B8000
heap
page read and write
11D5000
heap
page read and write
25891FE1000
heap
page read and write
114A000
heap
page read and write
38E000
stack
page read and write
2ADE000
heap
page read and write
1674000
heap
page read and write
6750000
trusted library allocation
page read and write
1B933000
heap
page read and write
1215000
heap
page read and write
1BD49000
heap
page read and write
12B6000
heap
page read and write
2614F5A0000
heap
page read and write
112C000
heap
page read and write
52D5000
trusted library allocation
page read and write
4580000
heap
page read and write
3441000
trusted library allocation
page read and write
A30000
heap
page read and write
FFF000
heap
page read and write
7FF848D26000
trusted library allocation
page execute and read and write
118B000
heap
page read and write
4141000
heap
page read and write
108B000
trusted library allocation
page execute and read and write
1100000
heap
page read and write
322C000
heap
page read and write
220B76F8000
heap
page read and write
1D8398B3000
heap
page read and write
13F3000
heap
page read and write
105C000
heap
page read and write
992000
unkown
page read and write
1119000
heap
page read and write
CCD000
unkown
page readonly
11B1000
heap
page read and write
1F53000
trusted library allocation
page read and write
7AC000
stack
page read and write
CE4000
trusted library allocation
page read and write
636E000
stack
page read and write
4141000
heap
page read and write
23FF000
heap
page read and write
9B5000
heap
page read and write
1D8398B3000
heap
page read and write
10E7000
heap
page read and write
7FF848C4D000
trusted library allocation
page execute and read and write
142000
unkown
page readonly
3570000
heap
page read and write
11B0000
heap
page read and write
B40000
heap
page read and write
1025000
heap
page read and write
2C98000
trusted library allocation
page read and write
1D83988F000
heap
page read and write
2EA3000
trusted library allocation
page read and write
FEC68FE000
stack
page read and write
FC0000
heap
page read and write
34DC000
stack
page read and write
DE0000
heap
page read and write
21CC000
trusted library allocation
page read and write
3080000
heap
page read and write
4E0000
heap
page read and write
E85000
heap
page read and write
564C000
heap
page read and write
8FB000
stack
page read and write
1BFFE000
stack
page read and write
11DF000
heap
page read and write
10BF000
heap
page read and write
FEC6BFF000
stack
page read and write
AC0000
heap
page read and write
F63000
trusted library allocation
page read and write
1097000
heap
page read and write
4141000
heap
page read and write
2294000
trusted library allocation
page read and write
2E2A000
heap
page read and write
1050000
heap
page read and write
6B02000
trusted library allocation
page read and write
1BC1000
trusted library allocation
page read and write
1061000
heap
page read and write
2FAE000
stack
page read and write
11F1000
heap
page read and write
2E2F000
trusted library allocation
page read and write
21CD000
trusted library allocation
page read and write
A70000
heap
page read and write
3336000
trusted library allocation
page read and write
77E000
unkown
page write copy
220B76F8000
heap
page read and write
4F14000
heap
page read and write
C85000
heap
page read and write
B48000
heap
page read and write
E4C000
stack
page read and write
1690000
trusted library allocation
page read and write
6660000
trusted library allocation
page execute and read and write
5AB000
unkown
page read and write
6B11000
trusted library allocation
page read and write
5A40000
heap
page execute and read and write
3281000
trusted library allocation
page read and write
220B76A0000
heap
page read and write
FCC000
heap
page read and write
1674000
heap
page read and write
FAA000
heap
page read and write
25892027000
heap
page read and write
7F0000
heap
page read and write
F90000
trusted library allocation
page read and write
2AA3000
heap
page read and write
1666000
trusted library allocation
page execute and read and write
1162000
heap
page read and write
1069000
heap
page read and write
44F0000
trusted library allocation
page read and write
11DF000
heap
page read and write
2E25000
heap
page read and write
773E000
stack
page read and write
1005000
heap
page read and write
2614F5C2000
heap
page read and write
227A000
trusted library allocation
page read and write
2E6E000
stack
page read and write
DFF000
stack
page read and write
1BC1000
trusted library allocation
page read and write
D68A000
heap
page read and write
3507000
trusted library allocation
page read and write
2A70000
heap
page read and write
D01000
heap
page read and write
82E0000
trusted library allocation
page read and write
1D8397D0000
heap
page read and write
5840000
trusted library allocation
page read and write
5BF5000
heap
page read and write
2252000
trusted library allocation
page read and write
22B1000
trusted library allocation
page read and write
309B000
trusted library allocation
page read and write
114C000
heap
page read and write
400000
remote allocation
page execute and read and write
B4A000
stack
page read and write
4D75000
trusted library allocation
page read and write
11B5000
heap
page read and write
6C30000
trusted library allocation
page read and write
339E000
stack
page read and write
1079000
heap
page read and write
14F0000
heap
page read and write
C48000
heap
page read and write
3600000
remote allocation
page read and write
7FF848D00000
trusted library allocation
page execute and read and write
C78000
heap
page read and write
2614F60C000
heap
page read and write
2614F5D2000
heap
page read and write
21C3000
trusted library allocation
page read and write
781000
unkown
page readonly
D15000
heap
page read and write
94B000
stack
page read and write
1167000
heap
page read and write
220B7691000
heap
page read and write
45B3000
trusted library allocation
page read and write
330D000
stack
page read and write
3264000
trusted library allocation
page read and write
310E000
stack
page read and write
2A55000
heap
page read and write
21C4000
trusted library allocation
page read and write
1D839895000
heap
page read and write
2D5C000
stack
page read and write
2BD0000
heap
page execute and read and write
19A000
stack
page read and write
D15000
heap
page read and write
112E000
heap
page read and write
35BF000
stack
page read and write
10E8000
heap
page read and write
3600000
remote allocation
page read and write
236C000
trusted library allocation
page read and write
2614F522000
heap
page read and write
5850000
trusted library allocation
page execute and read and write
10D5000
heap
page read and write
10FB000
heap
page read and write
12B8000
heap
page read and write
750E000
heap
page read and write
2DA0000
heap
page read and write
1D8397C0000
heap
page read and write
2B40000
trusted library section
page read and write
1E85000
trusted library allocation
page read and write
345B000
trusted library allocation
page read and write
4B5F000
stack
page read and write
530E000
trusted library allocation
page read and write
1D8398C0000
heap
page read and write
13DB000
heap
page read and write
998000
unkown
page read and write
1105000
heap
page read and write
101F000
heap
page read and write
21C1000
trusted library allocation
page read and write
10E0000
heap
page read and write
6C10000
trusted library allocation
page read and write
21C6000
trusted library allocation
page read and write
11EE000
heap
page read and write
731000
unkown
page execute read
4141000
heap
page read and write
21C0000
trusted library allocation
page read and write
2860000
heap
page read and write
2614F60F000
heap
page read and write
1076000
trusted library allocation
page execute and read and write
6A0000
heap
page read and write
11DA000
heap
page read and write
1226000
heap
page read and write
118B000
heap
page read and write
1D8398C9000
heap
page read and write
11CB000
heap
page read and write
F0E000
stack
page read and write
70E000
stack
page read and write
3474000
trusted library allocation
page read and write
430000
heap
page read and write
1867000
heap
page read and write
128F000
heap
page read and write
31BC000
trusted library allocation
page read and write
21CF000
trusted library allocation
page read and write
2284000
trusted library allocation
page read and write
1BCC0000
heap
page read and write
11F7000
heap
page read and write
5352000
trusted library allocation
page read and write
339E000
stack
page read and write
1390000
heap
page read and write
1202000
heap
page read and write
65B8000
trusted library allocation
page read and write
12B0000
heap
page read and write
50E000
unkown
page readonly
2C90000
trusted library allocation
page read and write
672E000
heap
page read and write
CE0000
trusted library allocation
page read and write
1171000
heap
page read and write
30D2000
trusted library allocation
page read and write
7FF848C4D000
trusted library allocation
page execute and read and write
5B0000
unkown
page readonly
10DD000
heap
page read and write
1072000
trusted library allocation
page read and write
2B61000
trusted library allocation
page read and write
30DB000
trusted library allocation
page read and write
1392000
heap
page read and write
109E000
heap
page read and write
13031000
trusted library allocation
page read and write
1313000
heap
page read and write
C91000
unkown
page execute read
CF3000
heap
page read and write
5694000
heap
page read and write
21CB000
trusted library allocation
page read and write
2E38000
trusted library allocation
page read and write
2614F5C2000
heap
page read and write
1BA3E000
stack
page read and write
1900000
trusted library allocation
page read and write
1290000
heap
page read and write
2DDE000
stack
page read and write
7FF848D60000
trusted library allocation
page execute and read and write
11B6000
heap
page read and write
5AD000
unkown
page readonly
305A3FF000
stack
page read and write
2E0E000
stack
page read and write
10DD000
heap
page read and write
1175000
heap
page read and write
220BCC5F000
direct allocation
page read and write
6C20000
trusted library allocation
page read and write
11C0000
heap
page read and write
1550000
heap
page read and write
52A2000
trusted library allocation
page read and write
2589201D000
heap
page read and write
924000
heap
page read and write
32DE000
trusted library allocation
page read and write
DE5000
heap
page read and write
320A000
trusted library allocation
page read and write
11BF000
heap
page read and write
2B96000
heap
page read and write
2614F520000
heap
page read and write
FEC66FA000
stack
page read and write
22AE000
stack
page read and write
1AE10000
trusted library allocation
page read and write
F90000
trusted library allocation
page read and write
5B0000
unkown
page readonly
5BB0000
heap
page read and write
2770000
heap
page execute and read and write
32F1000
heap
page read and write
11B6000
heap
page read and write
76D000
unkown
page readonly
7FF617E51000
unkown
page read and write
2AAF000
stack
page read and write
64AD000
stack
page read and write
1A1F000
stack
page read and write
32F1000
heap
page read and write
920000
heap
page read and write
2589201D000
heap
page read and write
25C0000
trusted library allocation
page read and write
13A4000
heap
page read and write
4B80000
heap
page read and write
104B000
heap
page read and write
325E000
stack
page read and write
1B36D000
stack
page read and write
7FF848C50000
trusted library allocation
page read and write
58E000
heap
page read and write
120A000
heap
page read and write
1096000
heap
page read and write
6C50000
trusted library allocation
page read and write
F60000
heap
page read and write
130E000
heap
page read and write
34FF000
stack
page read and write
E10000
heap
page read and write
1226000
heap
page read and write
7FF848C8C000
trusted library allocation
page execute and read and write
21C6000
trusted library allocation
page read and write
11DF000
heap
page read and write
E80000
heap
page read and write
401000
unkown
page execute read
1000000
heap
page read and write
1792000
heap
page read and write
348D000
trusted library allocation
page read and write
25891FF5000
heap
page read and write
910000
unkown
page readonly
CF7000
heap
page read and write
3459000
trusted library allocation
page read and write
2BBF000
stack
page read and write
10F4000
heap
page read and write
1D839888000
heap
page read and write
21C9000
trusted library allocation
page read and write
CF5000
heap
page read and write
1BC1000
trusted library allocation
page read and write
2396000
heap
page read and write
7A8000
unkown
page read and write
DE9000
stack
page read and write
ED0000
heap
page read and write
3881000
heap
page read and write
1D83B6E0000
heap
page read and write
304E000
stack
page read and write
D01000
heap
page read and write
22B6000
trusted library allocation
page read and write
2A80000
heap
page read and write
4141000
heap
page read and write
22BC000
trusted library allocation
page read and write
D3F000
heap
page read and write
220B7620000
heap
page read and write
1735000
heap
page read and write
6D0000
heap
page read and write
2380000
heap
page read and write
119A000
heap
page read and write
2614F5A6000
heap
page read and write
400000
unkown
page readonly
220B76B4000
heap
page read and write
6BFB000
trusted library allocation
page read and write
2AD7000
heap
page read and write
3451000
trusted library allocation
page read and write
172B000
heap
page read and write
121B000
heap
page read and write
691C000
stack
page read and write
220B7835000
heap
page read and write
21C6000
trusted library allocation
page read and write
220B7688000
heap
page read and write
D01000
heap
page read and write
1D8398B3000
heap
page read and write
25891F90000
heap
page read and write
12A8000
heap
page read and write
9BA000
heap
page read and write
117B000
heap
page read and write
6C90000
trusted library allocation
page read and write
950000
heap
page read and write
59B0000
trusted library allocation
page execute and read and write
220B76B4000
heap
page read and write
30DF000
trusted library allocation
page read and write
52B1000
trusted library allocation
page read and write
3150000
heap
page read and write
5BCD000
heap
page read and write
220BB800000
direct allocation
page read and write
5B1000
unkown
page execute read
154D000
trusted library allocation
page execute and read and write
1244000
heap
page read and write
1674000
heap
page read and write
21C7000
trusted library allocation
page read and write
408000
unkown
page readonly
1154000
heap
page read and write
2D90000
heap
page read and write
A10000
unkown
page write copy
6AF1000
trusted library allocation
page read and write
9B000
stack
page read and write
326F000
stack
page read and write
2DEF000
stack
page read and write
12B61000
trusted library allocation
page read and write
2DD0000
heap
page read and write
F90000
trusted library allocation
page read and write
1096000
heap
page read and write
38BF000
stack
page read and write
6B25000
trusted library allocation
page read and write
5682000
heap
page read and write
1C0FE000
stack
page read and write
2276000
trusted library allocation
page read and write
25893AB0000
heap
page read and write
FBE000
stack
page read and write
2E31000
heap
page read and write
31CF000
stack
page read and write
7FF617F97000
unkown
page readonly
11EE000
heap
page read and write
71A000
stack
page read and write
106D000
trusted library allocation
page execute and read and write
11E0000
heap
page read and write
D26000
heap
page read and write
52E0000
trusted library allocation
page read and write
7FF617F8F000
unkown
page read and write
3434000
trusted library allocation
page read and write
402000
unkown
page readonly
10FA000
heap
page read and write
272F000
stack
page read and write
25892026000
heap
page read and write
33CE000
trusted library allocation
page read and write
13AC000
heap
page read and write
32B3000
trusted library allocation
page read and write
1360000
heap
page read and write
4D7E000
trusted library allocation
page read and write
2A5E000
stack
page read and write
CE1000
unkown
page readonly
9E9000
heap
page read and write
401000
unkown
page execute read
1022000
heap
page read and write
10B2000
heap
page read and write
1244000
heap
page read and write
322C000
heap
page read and write
6760000
trusted library allocation
page read and write
666000
unkown
page readonly
4141000
heap
page read and write
11CE000
stack
page read and write
342B000
trusted library allocation
page read and write
730000
unkown
page readonly
2268000
trusted library allocation
page read and write
5658000
heap
page read and write
3223000
heap
page read and write
232F000
trusted library allocation
page read and write
9BE000
heap
page read and write
1118000
heap
page read and write
114C000
heap
page read and write
220B76B0000
heap
page read and write
3097000
trusted library allocation
page read and write
11DA000
heap
page read and write
2A3F000
stack
page read and write
BFC000
unkown
page read and write
4141000
heap
page read and write
2AD7000
heap
page read and write
1DC1000
trusted library allocation
page read and write
D0C000
heap
page read and write
1249000
heap
page read and write
1256000
heap
page read and write
5AD000
unkown
page readonly
666000
unkown
page readonly
4141000
heap
page read and write
82DC000
stack
page read and write
101F000
heap
page read and write
7FE000
stack
page read and write
2589201A000
heap
page read and write
1900000
trusted library allocation
page read and write
13A4000
heap
page read and write
CFC000
heap
page read and write
1080000
trusted library allocation
page read and write
1D83988F000
heap
page read and write
320E000
stack
page read and write
2298000
trusted library allocation
page read and write
2614F5A0000
heap
page read and write
CF7000
heap
page read and write
CFC000
heap
page read and write
1345000
heap
page read and write
FEC6DFE000
stack
page read and write
98E000
stack
page read and write
3620000
heap
page read and write
FEC6EFE000
stack
page read and write
1153000
heap
page read and write
59FE000
stack
page read and write
D0E000
heap
page read and write
25892027000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
10A4000
heap
page read and write
1B4AD000
stack
page read and write
44DD000
stack
page read and write
7FF617EB7000
unkown
page readonly
1BC17000
heap
page read and write
2DC000
stack
page read and write
1340000
heap
page read and write
325F000
stack
page read and write
1250000
heap
page read and write
4EA0000
heap
page read and write
321B000
heap
page read and write
8C9000
stack
page read and write
25893E40000
heap
page read and write
9F6000
unkown
page read and write
166A000
trusted library allocation
page execute and read and write
314F000
stack
page read and write
2614F5B1000
heap
page read and write
6D20000
trusted library allocation
page read and write
2614F60C000
heap
page read and write
10DE000
heap
page read and write
25891FF5000
heap
page read and write
4141000
heap
page read and write
A10000
heap
page read and write
29FA000
heap
page read and write
97D000
unkown
page read and write
5BD1000
heap
page read and write
3377000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
220B76B1000
heap
page read and write
115F000
heap
page read and write
220B7590000
heap
page read and write
450000
unkown
page write copy
5296000
trusted library allocation
page read and write
7B4000
heap
page read and write
3DD2000
trusted library allocation
page read and write
1219000
heap
page read and write
1395000
heap
page read and write
3415000
trusted library allocation
page read and write
88F000
stack
page read and write
2276000
trusted library allocation
page read and write
367E000
stack
page read and write
1BDE000
stack
page read and write
BFF000
unkown
page readonly
3020000
heap
page execute and read and write
1072000
heap
page read and write
6BF0000
trusted library allocation
page read and write
12FA000
heap
page read and write
F53000
trusted library allocation
page read and write
1266000
heap
page read and write
22AF000
trusted library allocation
page read and write
E5B000
stack
page read and write
2BEF000
stack
page read and write
25892022000
heap
page read and write
10E7000
heap
page read and write
7FF848D20000
trusted library allocation
page execute and read and write
C61000
heap
page read and write
1662000
trusted library allocation
page read and write
77E000
unkown
page write copy
6AEB000
trusted library allocation
page read and write
1243000
trusted library allocation
page read and write
7FF848C53000
trusted library allocation
page read and write
5B7D000
stack
page read and write
2DB5000
heap
page read and write
2614F535000
heap
page read and write
5870000
trusted library allocation
page read and write
FCD000
stack
page read and write
25891FEE000
heap
page read and write
B90000
heap
page read and write
25892016000
heap
page read and write
1B0EC000
stack
page read and write
21C6000
trusted library allocation
page read and write
5650000
heap
page read and write
11B4000
heap
page read and write
6BF5000
trusted library allocation
page read and write
1372000
heap
page read and write
77E000
unkown
page write copy
65D0000
trusted library allocation
page read and write
2DB2000
heap
page read and write
5AA000
heap
page read and write
11C1000
heap
page read and write
11F2000
heap
page read and write
2589200C000
heap
page read and write
1020000
heap
page read and write
1215000
heap
page read and write
43F0000
trusted library allocation
page read and write
679000
unkown
page readonly
730000
heap
page read and write
43F1000
trusted library allocation
page read and write
133A000
heap
page read and write
1399000
heap
page read and write
987000
unkown
page read and write
318E000
stack
page read and write
2DE0000
heap
page read and write
D23000
heap
page read and write
7DF000
unkown
page read and write
50E0000
heap
page read and write
7FF617D11000
unkown
page execute read
10BF000
heap
page read and write
4141000
heap
page read and write
D0D000
heap
page read and write
D15000
heap
page read and write
118B000
heap
page read and write
1C4BE000
stack
page read and write
1281000
heap
page read and write
D1B000
heap
page read and write
D11000
heap
page read and write
D1E000
heap
page read and write
1B8DE000
stack
page read and write
11B0000
heap
page read and write
FEC67FF000
stack
page read and write
108D000
heap
page read and write
C7F000
stack
page read and write
21C7000
trusted library allocation
page read and write
679000
unkown
page readonly
CD3000
trusted library allocation
page execute and read and write
28AE000
stack
page read and write
341D000
trusted library allocation
page read and write
1521000
heap
page read and write
7FF848C63000
trusted library allocation
page execute and read and write
10D4000
heap
page read and write
1674000
heap
page read and write
22D0000
heap
page read and write
2293000
trusted library allocation
page read and write
76D000
unkown
page readonly
3279000
trusted library allocation
page read and write
1D839895000
heap
page read and write
7FF848C60000
trusted library allocation
page read and write
933E000
stack
page read and write
13A4000
heap
page read and write
2285000
trusted library allocation
page read and write
1025000
heap
page read and write
1D8398BC000
heap
page read and write
1E1F000
stack
page read and write
305A5FE000
stack
page read and write
220BDC00000
direct allocation
page read and write
1155000
heap
page read and write
228B000
trusted library allocation
page read and write
1085000
trusted library allocation
page execute and read and write
220B7570000
heap
page read and write
C7E000
stack
page read and write
937E000
stack
page read and write
2589235C000
heap
page read and write
34C1000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
9A0000
heap
page read and write
4E90000
heap
page read and write
850000
heap
page read and write
1025000
heap
page read and write
13AF000
heap
page read and write
3423000
trusted library allocation
page read and write
2E20000
heap
page read and write
D53C000
heap
page read and write
3438000
trusted library allocation
page read and write
1042000
heap
page read and write
C0A000
unkown
page readonly
4240000
trusted library allocation
page read and write
7FF848C9C000
trusted library allocation
page execute and read and write
D15000
heap
page read and write
58B0000
heap
page read and write
299D000
stack
page read and write
11AF000
heap
page read and write
23D5000
heap
page read and write
1780000
heap
page read and write
7FF848C54000
trusted library allocation
page read and write
1096000
heap
page read and write
10A5000
heap
page read and write
2E02000
heap
page read and write
2360000
heap
page read and write
437000
remote allocation
page execute and read and write
1900000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
1058000
heap
page read and write
BB0000
heap
page read and write
376F000
unkown
page read and write
7FF617F97000
unkown
page readonly
10FD000
heap
page read and write
1EA7000
trusted library allocation
page read and write
220B75D0000
direct allocation
page read and write
22A0000
trusted library allocation
page read and write
353E000
stack
page read and write
345C000
stack
page read and write
1CD000
stack
page read and write
2401000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
2287000
trusted library allocation
page read and write
1030000
heap
page read and write
226F000
trusted library allocation
page read and write
3493000
trusted library allocation
page read and write
123B000
heap
page read and write
1BC19000
heap
page read and write
1072000
heap
page read and write
138C000
heap
page read and write
225A000
trusted library allocation
page read and write
34CC000
heap
page read and write
343B000
trusted library allocation
page read and write
C10000
heap
page read and write
43F0000
trusted library allocation
page read and write
1208000
heap
page read and write
23C0000
heap
page read and write
13DB000
heap
page read and write
1900000
trusted library allocation
page read and write
65B0000
trusted library allocation
page read and write
11F0000
heap
page execute and read and write
1239000
stack
page read and write
FC9000
heap
page read and write
9A8000
heap
page read and write
11DE000
heap
page read and write
316E000
stack
page read and write
377F000
stack
page read and write
890000
heap
page read and write
2EEF000
stack
page read and write
414000
unkown
page execute read
34B0000
trusted library allocation
page read and write
619C000
stack
page read and write
BA0000
heap
page read and write
42E000
remote allocation
page execute and read and write
22A4000
trusted library allocation
page read and write
102A000
heap
page read and write
57E0000
trusted library allocation
page read and write
13BE000
heap
page read and write
318F000
stack
page read and write
CDF000
heap
page read and write
1123000
heap
page read and write
3A70000
remote allocation
page read and write
2DFD000
heap
page read and write
10B2000
heap
page read and write
52B6000
trusted library allocation
page read and write
12B8000
heap
page read and write
1087000
trusted library allocation
page execute and read and write
4D7B000
trusted library allocation
page read and write
433000
unkown
page read and write
AC5000
heap
page read and write
2E27000
heap
page read and write
12EE000
heap
page read and write
183E000
stack
page read and write
4CA0000
trusted library allocation
page read and write
33D3000
trusted library allocation
page read and write
11C2000
heap
page read and write
321B000
heap
page read and write
1674000
heap
page read and write
1674000
heap
page read and write
14D4000
heap
page read and write
1219000
heap
page read and write
4141000
heap
page read and write
674000
unkown
page write copy
1674000
heap
page read and write
7FF848DF0000
trusted library allocation
page execute and read and write
135A000
heap
page read and write
1365000
heap
page read and write
220B77E9000
heap
page read and write
C89000
heap
page read and write
D74D000
heap
page read and write
76C000
stack
page read and write
21CC000
trusted library allocation
page read and write
D22000
heap
page read and write
37A1000
trusted library allocation
page read and write
D41000
stack
page read and write
5F3000
unkown
page read and write
1172000
heap
page read and write
22AD000
trusted library allocation
page read and write
400000
unkown
page readonly
6C40000
trusted library allocation
page execute and read and write
954000
trusted library allocation
page read and write
76D000
unkown
page readonly
A10000
heap
page read and write
1BA80000
heap
page read and write
34C7000
trusted library allocation
page read and write
1141000
heap
page read and write
2283000
trusted library allocation
page read and write
3224000
trusted library allocation
page read and write
9B000
stack
page read and write
10CF000
heap
page read and write
CCD000
unkown
page readonly
1B7D0000
heap
page read and write
10A7000
heap
page read and write
7B4000
heap
page read and write
7C02000
trusted library allocation
page read and write
117D000
heap
page read and write
1674000
heap
page read and write
30CE000
stack
page read and write
F80000
heap
page read and write
305A6FE000
stack
page read and write
1DC1000
trusted library allocation
page read and write
30F3000
trusted library allocation
page read and write
1247000
heap
page read and write
7B0000
heap
page read and write
1356000
heap
page read and write
731000
unkown
page execute read
1324000
heap
page read and write
106C000
heap
page read and write
D90000
heap
page read and write
197E000
stack
page read and write
220B780D000
heap
page read and write
220B7720000
heap
page read and write
6CC0000
trusted library allocation
page execute and read and write
1D8398AB000
heap
page read and write
2299000
trusted library allocation
page read and write
11C0000
heap
page read and write
21C3000
trusted library allocation
page read and write
2614F539000
heap
page read and write
F0000
heap
page read and write
21CD000
trusted library allocation
page read and write
117A000
heap
page read and write
1340000
heap
page read and write
F10000
remote allocation
page read and write
1093000
heap
page read and write
7FF848CF0000
trusted library allocation
page read and write
11E1000
heap
page read and write
50E000
heap
page read and write
22A0000
trusted library allocation
page read and write
30A8000
trusted library allocation
page read and write
3436000
trusted library allocation
page read and write
11A1000
heap
page read and write
8A0000
heap
page read and write
63B0000
heap
page read and write
116C000
heap
page read and write
7FF848C33000
trusted library allocation
page execute and read and write
1000000
heap
page read and write
1187000
heap
page read and write
25892355000
heap
page read and write
5503000
heap
page execute and read and write
255E000
stack
page read and write
40B000
unkown
page write copy
1110000
heap
page read and write
3AAE000
stack
page read and write
F10000
remote allocation
page read and write
2614F5C6000
heap
page read and write
3202000
heap
page read and write
1060000
trusted library allocation
page read and write
21FD4FF000
stack
page read and write
781000
unkown
page readonly
2FDE000
stack
page read and write
6765000
trusted library allocation
page read and write
40B000
unkown
page read and write
16C0000
heap
page read and write
5610000
heap
page read and write
2614F5A6000
heap
page read and write
2273000
trusted library allocation
page read and write
2282000
trusted library allocation
page read and write
333A000
trusted library allocation
page read and write
FEC6CFE000
stack
page read and write
990000
heap
page read and write
3390000
heap
page read and write
111E000
heap
page read and write
D0E000
heap
page read and write
570000
heap
page read and write
328D000
trusted library allocation
page read and write
6B2B000
trusted library allocation
page read and write
2E2A000
heap
page read and write
306C000
stack
page read and write
1BABF000
stack
page read and write
2589201A000
heap
page read and write
3202000
heap
page read and write
44F2000
stack
page read and write
D00000
heap
page read and write
3289000
trusted library allocation
page read and write
7B4000
heap
page read and write
21C0000
trusted library allocation
page read and write
348F000
trusted library allocation
page read and write
100F000
heap
page read and write
924000
heap
page read and write
1C62000
trusted library allocation
page read and write
2272000
trusted library allocation
page read and write
1D8398AB000
heap
page read and write
CE1000
unkown
page readonly
1D839C0C000
heap
page read and write
400000
unkown
page readonly
386F000
stack
page read and write
7FF848DE0000
trusted library allocation
page read and write
34BD000
trusted library allocation
page read and write
28F0000
heap
page read and write
2E19000
heap
page read and write
21CC000
trusted library allocation
page read and write
52BD000
trusted library allocation
page read and write
3426000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
1D83987B000
heap
page read and write
7FF848CE6000
trusted library allocation
page read and write
11C8000
heap
page read and write
11B2000
heap
page read and write
231D000
trusted library allocation
page read and write
1500000
heap
page read and write
1B168000
heap
page read and write
1555000
heap
page read and write
7FF848C6D000
trusted library allocation
page execute and read and write
3DBF000
trusted library allocation
page read and write
1154000
heap
page read and write
22A1000
trusted library allocation
page read and write
408000
unkown
page readonly
7A0000
heap
page read and write
220B762C000
heap
page read and write
4141000
heap
page read and write
9F4000
heap
page read and write
1218000
heap
page read and write
781000
unkown
page readonly
105B000
heap
page read and write
6D10000
trusted library allocation
page execute and read and write
5B8000
heap
page read and write
23DA000
heap
page read and write
259E000
stack
page read and write
25892024000
heap
page read and write
220B7626000
heap
page read and write
2E19000
heap
page read and write
5BDD000
heap
page read and write
27A3000
trusted library allocation
page read and write
6730000
heap
page read and write
1739000
heap
page read and write
6720000
heap
page read and write
13DB000
heap
page read and write
6B1A000
trusted library allocation
page read and write
1120000
heap
page read and write
F90000
trusted library allocation
page read and write
1109000
heap
page read and write
3DB1000
trusted library allocation
page read and write
13DB000
heap
page read and write
11F5000
heap
page read and write
1E97000
trusted library allocation
page read and write
11C8000
heap
page read and write
15A1000
heap
page read and write
116F000
stack
page read and write
1366000
heap
page read and write
C40000
heap
page read and write
1D839889000
heap
page read and write
2DB1000
trusted library allocation
page read and write
220B76B4000
heap
page read and write
F14000
heap
page read and write
5890000
trusted library section
page readonly
29AE000
stack
page read and write
7FF848CE0000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
15CC000
heap
page read and write
5B1000
unkown
page execute read
21CB000
trusted library allocation
page read and write
1D83B390000
heap
page read and write
947F000
stack
page read and write
101F000
heap
page read and write
130F000
heap
page read and write
220B75C0000
direct allocation
page read and write
2780000
trusted library allocation
page execute and read and write
14AE000
stack
page read and write
780000
heap
page read and write
106F000
stack
page read and write
There are 2273 hidden memdumps, click here to show them.