IOC Report
Zn0uX5K1ez.exe

loading gif

Files

File Path
Type
Category
Malicious
Zn0uX5K1ez.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\conhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\lsass.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Zn0uX5K1ez.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\bpgiaqs4\bpgiaqs4.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\explorer.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\klrkJh2DBx.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\AEdPygqV.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\JfNMDZUx.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\SIVCnSke.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\admBIJoy.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\crpSXvpM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\iGvrsCDf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\kRRssUig.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\mFVAeiee.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Globalization\Time Zone\backgroundTaskHost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\System32\SecurityHealthSystray.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\appcompat\hPeZTHbzcsUskSflSyozwAqUA.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\debug\explorer.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\blockhostnet\dbHnJe8FTGPofdGpjq0jOMhg.vbe
data
dropped
malicious
C:\blockhostnet\msinto.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\088424020bedd6
ASCII text, with very long lines (672), with no line terminators
dropped
C:\Program Files (x86)\Microsoft\Edge\Application\CSC35F53CF7FFB422D917B12E88668AC1.TMP
MSVC .res
dropped
C:\Recovery\6203df4a6bafc7
ASCII text, with very long lines (624), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\explorer.exe.log
Unknown
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\hPeZTHbzcsUskSflSyozwAqUA.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\lsass.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\msinto.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\0Pm77lbqFT
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\0Vly4rb0Si
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\11uhx2F3CP
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\1DxqRxk8bq
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\1Kvz5y8Ca4
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\1klv68wD2l
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\1rnGnDJLqJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\2ZSNH411D5
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\3XlCUqcTzr
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\45Vfev9VJv
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\4OIxrbYGAr
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\4tkQ0vq0N8
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\50jvMOzwte
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\5OLZIPm8PU
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\5QWAKoy45Q
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\5U0HZQC3zV
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\5o7cJ7Im4F
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\5sGFcDTLSn
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\668erleKw1
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\6EGHrLU0vt
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\6J9ChqA1b4
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\6ZJQ6CCfnc
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\6ZWUupkEGN
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\6e2TaqttNM
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\6s1ziqsIZc
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\75aflUCIGP
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\7F3R8PyIkY
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\7VBuABSra7
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\7hXzMxXBcs
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\7zg8VazFlR
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\8B9aVxycY9
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\8rXEZe6CF9
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\9WjvQxChlE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\9bqTQD7mg4
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\9nUVX9qu0n
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\9tsrFuWIFr
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\ACTMglw1Qq
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\ArqBHgCW2A
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\AzFu3DMnII
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\B91mR4iHlu
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\BDY3PUpcIe
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\BO1PqXaXQw
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Br1PSAOT8a
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\BuJ4t1oyHW
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\C24CrujGfu
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Ciak75H4AT
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\CwMt7bcHRC
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\DD2edtdqtd
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\DDvSsmjtpi
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\DNmksqN4xo
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\DXmKq18qjf
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\DwfjkLxx3h
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\EZUK6wT2fs
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\Ed6V3YDlvI
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\EoVx0OUOoI
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\Ew1WvbFVwh
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\FGR9CJDNPx
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\Fley9WoZPq
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\FmJXJ8jLxc
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\FrjkeQmAk5
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Fu2umj89xv
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\GNLabV2Ykv
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\GREWlFOgP4
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\GV7A6dmMNf
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\HVm4DAR9Q6
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\ILxWYyh7K0
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\IeQNnKkkIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Ih2SaagdCC
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\J3zegzBECf
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\JXIq7FFQof
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\JZpGSOYWzI
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\JbPrHCpl0Q
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\Jnm3NrZPsm
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\JzklBumnIX
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\K0PcHuLlF7
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\KBpeOZl6LK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\KIkNHLF8GE
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\L8NH8KRgYq
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\LEAWzJEZrl
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\LaCiZSN0Kz
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\MdDUdCiqAh
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\MqlTjuXSt5
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\NA0MqSscMm
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\NhntyXLImc
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\NmZvQoTSfS
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\NvKDCWqVy1
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\O8VQksHBkn
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\OHWh9jYDpn
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\OLVVh7sjwH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\OUyQUACOjc
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\PIPGFiJ8oE
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\PzBISDI1Z2
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\QAJjLADhO2
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\QXVXjZD2zC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\QfcqH8pF1l
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\RESB3CA.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6cc, 10 symbols, created Tue Oct 1 05:21:33 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RESB531.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6e4, 10 symbols, created Tue Oct 1 05:21:33 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RaPgmKAOR9
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\RoMifF7wY4
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\SD2KZXiywA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\SFE7n9qKqI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\SaT7d6HNAy
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\Sq75iLEnrZ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\T2KOcy4LfE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\TEE1N6jNBN
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\TK1GnnCPbs
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\TY8wXaUeS2
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\TtvA5qNwDZ
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\U2DUjEdNDl
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\U787fSRxaR
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\UUrWWPwHOt
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\UjjiqG5BgE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\UldxNUOpgA
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\Uyp5F18egV
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\V50nUUP70f
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\V7XD663msp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Vk3Mw1W2Qt
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\VyJoKrdJMr
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\W7mQTfLiwC
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\WGoFBNvEfo
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\WHJxM6AYOO
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\WbsJo8BSbk
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\X1XyXuc1da
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\X7ug62kExG
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\XInuknzGr5
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\XJFf8mDCqH
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\XQUBwTn67Y
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\XSaeMjsDfA
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\XhE7H3lWiP
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\XmwhVYgp79
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\XrYw0FZllb
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\Y2G0PM3AJh
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\YCPE8fxbBu
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\YMuthXahhK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\YW0xy0wJbX
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Yk8nNAmod6
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\YqDMoObmj9
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Z7SOrF37Zk
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\ZDhtWMKIVq
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\ZEEkdFsWOI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\ZYbVYOz1sR
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\ZeUdmK43gT
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\ZnZBKKpGAd
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Zt5ys2tWg6
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\aUDfp3N2kY
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\aXRR3PLz73
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\aizoXTHDJQ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\ak3B5ey2Im
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\argUH8ktjB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\b8i0avu0ST
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\bF6W7GMVNu
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\bpgiaqs4\bpgiaqs4.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\bpgiaqs4\bpgiaqs4.out
Unicode text, UTF-8 (with BOM) text, with very long lines (340), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\cEWquYTWM8
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\cqDbNFEjza
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\d6IG2VxpRi
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\eRmxc4BNpu
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\ekm6vOcB9B
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\ew1vPjSH17
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\f0ojr9cU5L
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\fKyZvnP0UO
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\fkffivkAfN
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\g0LcWYZoL5
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\g0l7jtJsdI
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\gCsv4sRiLc
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\gDiYCnYxyI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\gJDwQ5XnXs
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\gMtBEv7h5P
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\gQ6v8ORoA0
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\gus8gVV6Z1
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\gxZeSFkrNg
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\hDwgTH0tbd
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\hmy311ZT3s
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\iErH2toz9w
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\jHZzNC0WzG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\jS9YrnT28m
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\jhDwJJ7iHa
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\jnvGp6Bhas
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\kFlkgvqUCX
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\kLpULUaATZ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\kc1V1W839y
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\kfgfe9Ek7x
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\kleO6Ve14y
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\lN2bG9CLsz
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\lQem7jzZVe
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\lWE4TC1R9e
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\lvnr1uZbta
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\m7kRG13W4C
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\mJfyJCPtth
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\mSuoaerc8j
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\mWJ8NP0pgg
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\maEyxkcciQ
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\moWJ7vPpTK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\nHQaSafXya
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\nhADnqzdYk
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\nss67rS6AA
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\nuAd5dbLcZ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\o10jWHG1nh
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\oDRVBntoMb
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\oKNTnMdpLV
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\oVabryO8e6
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\obIgWi6YqM
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\p38Mz0Ynk5
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\p8SIgjxvSm
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\p8dfP89Eqx
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\pGs1MDRVYz
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\pjW976mdgs
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\psvsWE0Pyu
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\pwBP4xtbEe
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\q9BeTagoKR
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\qQ2lkg6djB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\qQgl6qH9I2
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\qZ8g3iO1Sz
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\qexFrRmODw
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\qfnbNOzX4A
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\qs5FL9Yii3
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\rbps293mSf
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\rcBJxo3cbc
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\rcdCKsYyfx
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\sKznzmWELT
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\sL0GQhUBHe
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\sQg2vF3n7W
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\sVy9l92p5W
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\saMGhM4Fpv
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\suK33mj6ya
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\t6y0dZWVbR
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tNVv3dMcbu
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tZ78MruFmP
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tcgkwiyn\tcgkwiyn.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\tcgkwiyn\tcgkwiyn.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tcgkwiyn\tcgkwiyn.out
Unicode text, UTF-8 (with BOM) text, with very long lines (325), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\tmlGOQoRe1
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\toL4r4u6Eo
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\u0VHRtdnUD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\u7cJv2xbXB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\uHJ3LU8Rq2
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\uLOcB8Fjvq
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\uRCQmSSpT4
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\uZ6lA9XmoJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\uyPzPggcgy
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\v9809xfPvp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\w255U3kdbR
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\w6BjO9jd6l
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\wEHCT33DJm
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\wQ5uk0sHqU
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\wQGTEPWHw7
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\wV48f1Blat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\wa5FzuMjZ9
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\x1GDgPwVXk
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\x2sMQXDUeq
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\x9DTrljyyG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\xpxA8xR8rc
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\yAWK8lSrMR
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\ygLAnTmETA
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\yudNqMqwS6
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\zF6QXkRpJW
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Windows\Globalization\Time Zone\eddb19405b7ce1
ASCII text, with no line terminators
dropped
C:\Windows\System32\CSCEBFD873D95F4D378C8CAFD01222E4F7.TMP
MSVC .res
dropped
C:\Windows\appcompat\d612fdb7e553d0
ASCII text, with very long lines (560), with no line terminators
dropped
C:\Windows\debug\7a0fd90576e088
ASCII text, with very long lines (900), with no line terminators
dropped
C:\blockhostnet\2b1188ec723c42
ASCII text, with very long lines (823), with no line terminators
dropped
C:\blockhostnet\iXSXm.bat
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text
dropped
There are 285 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Zn0uX5K1ez.exe
"C:\Users\user\Desktop\Zn0uX5K1ez.exe"
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
"C:\Users\user\AppData\Local\Temp\svchost.exe"
malicious
C:\Users\user\AppData\Local\Temp\explorer.exe
"C:\Users\user\AppData\Local\Temp\explorer.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\blockhostnet\dbHnJe8FTGPofdGpjq0jOMhg.vbe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\blockhostnet\msinto.exe
"C:\blockhostnet/msinto.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\bpgiaqs4\bpgiaqs4.cmdline"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\tcgkwiyn\tcgkwiyn.cmdline"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\conhost.exe
"C:\Program Files (x86)\msbuild\Microsoft\Windows Workflow Foundation\conhost.exe"
malicious
C:\Windows\appcompat\hPeZTHbzcsUskSflSyozwAqUA.exe
"C:\Windows\appcompat\hPeZTHbzcsUskSflSyozwAqUA.exe"
malicious
C:\Recovery\lsass.exe
"C:\Recovery\lsass.exe"
malicious
C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\conhost.exe
"C:\Program Files (x86)\msbuild\Microsoft\Windows Workflow Foundation\conhost.exe"
malicious
C:\Windows\debug\explorer.exe
"C:\Windows\debug\explorer.exe"
malicious
C:\blockhostnet\msinto.exe
"C:\blockhostnet\msinto.exe"
malicious
C:\Windows\appcompat\hPeZTHbzcsUskSflSyozwAqUA.exe
"C:\Windows\appcompat\hPeZTHbzcsUskSflSyozwAqUA.exe"
malicious
C:\Recovery\lsass.exe
"C:\Recovery\lsass.exe"
malicious
C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\conhost.exe
"C:\Program Files (x86)\msbuild\Microsoft\Windows Workflow Foundation\conhost.exe"
malicious
C:\Windows\debug\explorer.exe
"C:\Windows\debug\explorer.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c cls
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\blockhostnet\iXSXm.bat" "
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB3CA.tmp" "c:\Program Files (x86)\Microsoft\Edge\Application\CSC35F53CF7FFB422D917B12E88668AC1.TMP"
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB531.tmp" "c:\Windows\System32\CSCEBFD873D95F4D378C8CAFD01222E4F7.TMP"
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\klrkJh2DBx.bat"
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
There are 19 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://664930cm.n9shka.top
unknown
malicious
http://664930cm.n9shka.top/
unknown
malicious
http://664930cm.n9shka.top/VideojavascriptAuthdefaultSqllinuxwindowsprivatetempuploads.php
37.44.238.250
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://664930cm.n9P
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
664930cm.n9shka.top
37.44.238.250
malicious

IPs

IP
Domain
Country
Malicious
37.44.238.250
664930cm.n9shka.top
France
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
hPeZTHbzcsUskSflSyozwAqUA
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
hPeZTHbzcsUskSflSyozwAqUA
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
lsass
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
lsass
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
conhost
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
conhost
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
explorer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
explorer
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
backgroundTaskHost
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
backgroundTaskHost
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
msinto
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
msinto
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\75472e49aa35f90923997bea41421d62d8a205f1
0b307dbcf3b08f015ba524aa2bb53fb0bea4ba1c
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\conhost_RASMANCS
FileDirectory
There are 28 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6800000
heap
page read and write
malicious
294B000
trusted library allocation
page read and write
malicious
1312B000
trusted library allocation
page read and write
malicious
6000000
heap
page read and write
malicious
2AE0000
trusted library allocation
page read and write
malicious
B12000
unkown
page readonly
malicious
4625000
trusted library allocation
page read and write
malicious
2651000
trusted library allocation
page read and write
malicious
A02000
unkown
page readonly
malicious
5801000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
13DEC000
trusted library allocation
page read and write
12C41000
trusted library allocation
page read and write
12BA7000
trusted library allocation
page read and write
325D000
trusted library allocation
page read and write
2810000
heap
page read and write
13A0D000
trusted library allocation
page read and write
31C9000
trusted library allocation
page read and write
17B0339C000
heap
page read and write
5B4E000
stack
page read and write
13644000
trusted library allocation
page read and write
FEC000
heap
page read and write
140008000
unkown
page readonly
140348000
unkown
page execute read
1CAFE000
stack
page read and write
31AF000
trusted library allocation
page read and write
1383D000
trusted library allocation
page read and write
2D35000
trusted library allocation
page read and write
DA9000
heap
page read and write
140347000
unkown
page read and write
12D30000
trusted library allocation
page read and write
13B61000
trusted library allocation
page read and write
1332F000
trusted library allocation
page read and write
1340000
heap
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
129E8000
trusted library allocation
page read and write
1B2D0000
heap
page read and write
27E4000
heap
page read and write
1344F000
trusted library allocation
page read and write
1150000
heap
page read and write
13505000
trusted library allocation
page read and write
DBA000
heap
page read and write
7FFD3484C000
trusted library allocation
page execute and read and write
7FFD34948000
trusted library allocation
page read and write
17B033AF000
heap
page read and write
17B033AB000
heap
page read and write
27CB000
heap
page read and write
7FFD34AB2000
trusted library allocation
page read and write
571E000
stack
page read and write
27D4000
heap
page read and write
3759000
trusted library allocation
page read and write
2DE3000
trusted library allocation
page read and write
7FFD34793000
trusted library allocation
page read and write
136A8000
trusted library allocation
page read and write
125EF000
trusted library allocation
page read and write
1200000
heap
page read and write
336B000
trusted library allocation
page read and write
3416000
trusted library allocation
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
1BC5C000
stack
page read and write
12C92000
trusted library allocation
page read and write
7FFD347B4000
trusted library allocation
page read and write
138E7000
trusted library allocation
page read and write
136F2000
trusted library allocation
page read and write
9585D0E000
stack
page read and write
2D61000
trusted library allocation
page read and write
1050000
heap
page read and write
1BEE4000
heap
page read and write
1150000
heap
page read and write
7FFD347DC000
trusted library allocation
page execute and read and write
26B5D020000
heap
page read and write
7FFD34783000
trusted library allocation
page read and write
17D5E874000
heap
page read and write
51AB000
stack
page read and write
2C8F000
trusted library allocation
page read and write
13E5B000
trusted library allocation
page read and write
21B0000
trusted library allocation
page read and write
2C68000
trusted library allocation
page read and write
17B032F9000
direct allocation
page read and write
1408C0000
unkown
page readonly
2F77000
trusted library allocation
page read and write
7FFD34945000
trusted library allocation
page read and write
1280D000
trusted library allocation
page read and write
2C2F000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
10A82C41000
heap
page read and write
17B033B8000
heap
page read and write
7FFD3483C000
trusted library allocation
page execute and read and write
7FFD34C70000
trusted library allocation
page read and write
890000
heap
page read and write
7FFD34946000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page execute and read and write
5A60000
trusted library allocation
page read and write
2788000
heap
page read and write
7FFD34936000
trusted library allocation
page read and write
1369F000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page read and write
7FFD34943000
trusted library allocation
page read and write
7FFD3499E000
trusted library allocation
page read and write
7FFD349A4000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
12DD1000
trusted library allocation
page read and write
12831000
trusted library allocation
page read and write
21C3000
trusted library allocation
page read and write
DFAC6FB000
stack
page read and write
18B0000
trusted library allocation
page read and write
25FD000
trusted library allocation
page read and write
27CE000
heap
page read and write
12A01000
trusted library allocation
page read and write
130F9000
trusted library allocation
page read and write
130F0000
trusted library allocation
page read and write
7FFD34C67000
trusted library allocation
page read and write
128B6000
trusted library allocation
page read and write
2D56000
trusted library allocation
page read and write
BE0000
heap
page read and write
7FFD348C3000
trusted library allocation
page execute and read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
7FFD34876000
trusted library allocation
page execute and read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
17B033C2000
heap
page read and write
3500000
trusted library allocation
page read and write
2481000
trusted library allocation
page read and write
13E4B000
trusted library allocation
page read and write
1100000
heap
page read and write
2200000
heap
page read and write
7FFD3485C000
trusted library allocation
page execute and read and write
B10000
unkown
page readonly
3000000
trusted library allocation
page read and write
13381000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
1058000
heap
page read and write
1281F000
trusted library allocation
page read and write
2BA9000
trusted library allocation
page read and write
26AB000
trusted library allocation
page read and write
17B03160000
heap
page read and write
7FFD34910000
trusted library allocation
page read and write
A00000
heap
page read and write
7FFD3479B000
trusted library allocation
page execute and read and write
7FFD34948000
trusted library allocation
page read and write
7FFD3496C000
trusted library allocation
page read and write
17B0350D000
direct allocation
page read and write
1C66E000
stack
page read and write
26B5CDA0000
heap
page read and write
7FFD34982000
trusted library allocation
page read and write
5401000
heap
page read and write
2990000
trusted library allocation
page read and write
7FFD349F0000
trusted library allocation
page read and write
2CEC000
trusted library allocation
page read and write
13277000
trusted library allocation
page read and write
12631000
trusted library allocation
page read and write
7FFD34D20000
trusted library allocation
page read and write
10E1000
stack
page read and write
12961000
trusted library allocation
page read and write
14B4000
heap
page read and write
7FFD347EC000
trusted library allocation
page execute and read and write
10A82C67000
heap
page read and write
26B5D024000
heap
page read and write
25EE000
trusted library allocation
page read and write
7FFD34816000
trusted library allocation
page read and write
2441000
trusted library allocation
page read and write
C8A000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
12824000
trusted library allocation
page read and write
10A82C88000
heap
page read and write
1D85F000
stack
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
2D6E000
stack
page read and write
1118000
heap
page read and write
2DD1000
trusted library allocation
page read and write
C4D000
heap
page read and write
1BAF0000
heap
page read and write
26BC000
trusted library allocation
page read and write
12BA1000
trusted library allocation
page read and write
80F000
heap
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
10A84610000
heap
page read and write
2D9A000
stack
page read and write
10A845D0000
direct allocation
page read and write
1220000
heap
page read and write
1B7B0000
heap
page execute and read and write
7FFD3495C000
trusted library allocation
page read and write
3127000
trusted library allocation
page read and write
10B7000
heap
page read and write
27E8000
heap
page read and write
33C2000
trusted library allocation
page read and write
2540000
heap
page execute and read and write
1148000
heap
page read and write
6000000
trusted library allocation
page read and write
1E7F2000
trusted library allocation
page read and write
315C000
trusted library allocation
page read and write
7FFD347DC000
trusted library allocation
page execute and read and write
7FFD34C30000
trusted library allocation
page read and write
136B1000
trusted library allocation
page read and write
124D6000
trusted library allocation
page read and write
2859000
trusted library allocation
page read and write
17B04E54000
heap
page read and write
2490000
trusted library allocation
page read and write
12F30000
trusted library allocation
page read and write
2E30000
heap
page execute and read and write
12561000
trusted library allocation
page read and write
27A7000
heap
page read and write
7FFD34876000
trusted library allocation
page execute and read and write
26AD000
trusted library allocation
page read and write
1388A000
trusted library allocation
page read and write
13C6E000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
2827000
trusted library allocation
page read and write
12FF1000
trusted library allocation
page read and write
17B033C9000
heap
page read and write
12DD6000
trusted library allocation
page read and write
12F74000
trusted library allocation
page read and write
7FFD34953000
trusted library allocation
page read and write
12551000
trusted library allocation
page read and write
C2D000
heap
page read and write
59AB000
stack
page read and write
1273D000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
7FFD34970000
trusted library allocation
page read and write
7FFD34794000
trusted library allocation
page read and write
13CA4000
trusted library allocation
page read and write
27D0000
heap
page execute and read and write
12B49000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page execute and read and write
10A82C1E000
heap
page read and write
10A82C41000
heap
page read and write
180E000
stack
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
F21000
stack
page read and write
1382F000
trusted library allocation
page read and write
13825000
trusted library allocation
page read and write
1286C000
trusted library allocation
page read and write
1BAA0000
heap
page read and write
1570000
heap
page read and write
2CB6000
trusted library allocation
page read and write
C00000
heap
page read and write
13DF5000
trusted library allocation
page read and write
12BE9000
trusted library allocation
page read and write
1BA7E000
stack
page read and write
33D9000
trusted library allocation
page read and write
2DD0000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
2811FD80000
heap
page read and write
7FFD3495C000
trusted library allocation
page read and write
18CB000
trusted library allocation
page execute and read and write
11FE000
heap
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
602000
heap
page read and write
312D000
trusted library allocation
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
7FFD34790000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
134AA000
trusted library allocation
page read and write
13692000
trusted library allocation
page read and write
3D0000
heap
page read and write
13E42000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
17B033AF000
heap
page read and write
1B97E000
stack
page read and write
1B18E000
stack
page read and write
2D3A000
trusted library allocation
page read and write
143F000
stack
page read and write
13972000
trusted library allocation
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
7FFD34774000
trusted library allocation
page read and write
29C0000
heap
page read and write
7FFD347A4000
trusted library allocation
page read and write
33FE000
stack
page read and write
2713000
trusted library allocation
page read and write
7FFD349B2000
trusted library allocation
page read and write
130E1000
trusted library allocation
page read and write
1AD6D000
heap
page read and write
7FFD34994000
trusted library allocation
page read and write
2CB9000
trusted library allocation
page read and write
281A000
heap
page read and write
7FFD3482C000
trusted library allocation
page execute and read and write
2D03000
trusted library allocation
page read and write
2B4E000
stack
page read and write
7FFD3483C000
trusted library allocation
page execute and read and write
2811FD70000
heap
page read and write
7FFD3498C000
trusted library allocation
page read and write
167E000
stack
page read and write
2C64000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD347FC000
trusted library allocation
page execute and read and write
F80000
heap
page read and write
1076000
heap
page read and write
27C7000
heap
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
12C98000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
7FFD347CC000
trusted library allocation
page execute and read and write
138D4000
trusted library allocation
page read and write
7FFD34784000
trusted library allocation
page read and write
17B03349000
heap
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
3387000
trusted library allocation
page read and write
1B825000
stack
page read and write
2E79000
trusted library allocation
page read and write
1350A000
trusted library allocation
page read and write
17D5E770000
heap
page read and write
17B03397000
heap
page read and write
1B500000
heap
page read and write
7FFD347A3000
trusted library allocation
page read and write
25DF000
trusted library allocation
page read and write
10A82BF9000
heap
page read and write
13ABC000
trusted library allocation
page read and write
2E62000
unkown
page readonly
10A845BB000
direct allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
17B0339C000
heap
page read and write
289F000
trusted library allocation
page read and write
7FFD349A4000
trusted library allocation
page read and write
131D3000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
7FFD34994000
trusted library allocation
page read and write
1301B000
trusted library allocation
page read and write
27E6000
heap
page read and write
C3D000
heap
page read and write
13C0A000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
295B000
trusted library allocation
page read and write
33EA000
trusted library allocation
page read and write
14C000
stack
page read and write
1BDCA000
stack
page read and write
136F9000
trusted library allocation
page read and write
1AF0000
heap
page read and write
A30000
heap
page read and write
17B0337C000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
1A9CB000
stack
page read and write
3213000
trusted library allocation
page read and write
69FF000
stack
page read and write
26B5CDB7000
heap
page read and write
A20000
heap
page read and write
23C0000
heap
page read and write
323D000
heap
page read and write
17D5E670000
heap
page read and write
10B3F4000
stack
page read and write
10A82D90000
direct allocation
page read and write
12C32000
trusted library allocation
page read and write
49E0000
heap
page read and write
1BE10000
heap
page execute and read and write
7FFD347A4000
trusted library allocation
page read and write
128C3000
trusted library allocation
page read and write
17B033D7000
heap
page read and write
132CF000
trusted library allocation
page read and write
3399000
trusted library allocation
page read and write
17B03369000
heap
page read and write
13893000
trusted library allocation
page read and write
7FFD34846000
trusted library allocation
page read and write
2F7E000
trusted library allocation
page read and write
1AE90000
heap
page read and write
12BD6000
trusted library allocation
page read and write
893000
unkown
page write copy
32B1000
heap
page read and write
7FFD34C6F000
trusted library allocation
page read and write
4D0000
trusted library allocation
page read and write
2E98000
unkown
page readonly
2E60000
unkown
page readonly
3795000
trusted library allocation
page read and write
7FFD34CA0000
trusted library allocation
page execute and read and write
17B033C0000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
367D000
trusted library allocation
page read and write
33CF000
trusted library allocation
page read and write
1AADD000
stack
page read and write
10A84614000
heap
page read and write
970000
trusted library allocation
page read and write
7FFD347BB000
trusted library allocation
page execute and read and write
27DC000
heap
page read and write
7FFD34840000
trusted library allocation
page read and write
1381E000
trusted library allocation
page read and write
7FFD34783000
trusted library allocation
page execute and read and write
1C150000
stack
page read and write
1E628017000
heap
page read and write
285E000
trusted library allocation
page read and write
7FFD347BB000
trusted library allocation
page execute and read and write
2EE0000
heap
page read and write
13DFF000
trusted library allocation
page read and write
1B40D000
stack
page read and write
7FFD349A0000
trusted library allocation
page read and write
48DE000
stack
page read and write
2D80000
trusted library allocation
page read and write
14B0000
heap
page read and write
281A000
heap
page read and write
3251000
heap
page read and write
1913000
heap
page read and write
7FFD34826000
trusted library allocation
page read and write
7FFD347A3000
trusted library allocation
page execute and read and write
13285000
trusted library allocation
page read and write
136BB000
trusted library allocation
page read and write
13071000
trusted library allocation
page read and write
2809000
heap
page read and write
17B0351F000
direct allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
68FE000
stack
page read and write
2C19000
trusted library allocation
page read and write
E25000
heap
page read and write
27D3000
heap
page read and write
297D000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
12F81000
trusted library allocation
page read and write
12DBE000
trusted library allocation
page read and write
12A43000
trusted library allocation
page read and write
130E7000
trusted library allocation
page read and write
1C26E000
stack
page read and write
2BAB000
trusted library allocation
page read and write
7FFD347AB000
trusted library allocation
page execute and read and write
7FFD348A0000
trusted library allocation
page execute and read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD34946000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
6E0000
heap
page read and write
7FFD3493A000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
13C04000
trusted library allocation
page read and write
3E0000
heap
page read and write
22608660000
heap
page read and write
12EF8000
trusted library allocation
page read and write
18B6000
trusted library allocation
page execute and read and write
13C0000
heap
page read and write
12954000
trusted library allocation
page read and write
7FFD347BD000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
3421000
trusted library allocation
page read and write
17B03500000
direct allocation
page read and write
30DC000
trusted library allocation
page read and write
1ECC8000
stack
page read and write
7FFD3495C000
trusted library allocation
page read and write
132A1000
trusted library allocation
page read and write
7FFD34794000
trusted library allocation
page read and write
5BF0000
heap
page read and write
27E8000
heap
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
1345C000
trusted library allocation
page read and write
111F000
heap
page read and write
3500000
heap
page readonly
135AA000
trusted library allocation
page read and write
9585C8B000
stack
page read and write
7FFD34974000
trusted library allocation
page read and write
2959000
trusted library allocation
page read and write
B01000
stack
page read and write
7FFD34970000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page execute and read and write
831000
unkown
page execute read
1B990000
heap
page execute and read and write
3679000
trusted library allocation
page read and write
294B000
trusted library allocation
page read and write
A42000
unkown
page readonly
1880000
trusted library allocation
page read and write
1056000
heap
page read and write
49DF000
stack
page read and write
7FFD34876000
trusted library allocation
page execute and read and write
12F3D000
trusted library allocation
page read and write
7FFD348D1000
trusted library allocation
page execute and read and write
1BE72000
heap
page read and write
1AD7F000
heap
page read and write
28AC000
trusted library allocation
page read and write
13C12000
trusted library allocation
page read and write
13843000
trusted library allocation
page read and write
27E6000
heap
page read and write
2D90000
heap
page read and write
17B0336C000
heap
page read and write
12E0000
heap
page read and write
1933000
heap
page read and write
10A82C29000
heap
page read and write
11C0000
trusted library allocation
page read and write
7FFD34764000
trusted library allocation
page read and write
1234000
heap
page read and write
27C2000
heap
page read and write
1369000
heap
page read and write
12A5F000
trusted library allocation
page read and write
13D0000
heap
page read and write
13E50000
trusted library allocation
page read and write
12F2E000
trusted library allocation
page read and write
1B6DD000
stack
page read and write
13346000
trusted library allocation
page read and write
10A82C3D000
heap
page read and write
15909FE000
stack
page read and write
13A7E000
trusted library allocation
page read and write
5C0000
heap
page read and write
134C6000
trusted library allocation
page read and write
68C33FF000
stack
page read and write
7FFD34958000
trusted library allocation
page read and write
27D1000
heap
page read and write
13E4E000
trusted library allocation
page read and write
F70000
heap
page read and write
37DD000
trusted library allocation
page read and write
280C000
trusted library allocation
page read and write
339F000
trusted library allocation
page read and write
132D3000
trusted library allocation
page read and write
33D7000
trusted library allocation
page read and write
24FB000
stack
page read and write
1B7C0000
heap
page read and write
30E2000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
DFAC7FF000
unkown
page read and write
7FFD34C70000
trusted library allocation
page read and write
A00000
unkown
page readonly
4621000
trusted library allocation
page read and write
13DF2000
trusted library allocation
page read and write
243E000
stack
page read and write
134C6000
trusted library allocation
page read and write
1139000
heap
page read and write
10A82C51000
heap
page read and write
10A855B0000
direct allocation
page read and write
940000
trusted library allocation
page read and write
1294E000
trusted library allocation
page read and write
10A82C47000
heap
page read and write
2830000
trusted library allocation
page read and write
7FFD34C50000
trusted library allocation
page read and write
7FFD349B4000
trusted library allocation
page read and write
33EC000
trusted library allocation
page read and write
7FFD34784000
trusted library allocation
page read and write
7FFD34953000
trusted library allocation
page read and write
7FFD34D30000
trusted library allocation
page execute and read and write
26CF000
trusted library allocation
page read and write
12C3000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page read and write
1326E000
trusted library allocation
page read and write
10A82BD0000
heap
page read and write
12C2B000
trusted library allocation
page read and write
2DCB000
trusted library allocation
page read and write
1378A000
trusted library allocation
page read and write
2809000
heap
page read and write
13329000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
581A000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page execute and read and write
7FFD347B4000
trusted library allocation
page read and write
7FFD348E1000
trusted library allocation
page execute and read and write
2BBB000
trusted library allocation
page read and write
27CA000
heap
page read and write
10A82C50000
heap
page read and write
328C000
trusted library allocation
page read and write
3261000
heap
page read and write
10E1000
stack
page read and write
132B1000
trusted library allocation
page read and write
7FFD34958000
trusted library allocation
page read and write
7FFD34948000
trusted library allocation
page read and write
132DE000
trusted library allocation
page read and write
5F00000
heap
page read and write
30FC000
trusted library allocation
page read and write
13899000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
7FFD34793000
trusted library allocation
page read and write
7FFD34C20000
trusted library allocation
page read and write
125F1000
trusted library allocation
page read and write
1D0000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
1BBAE000
stack
page read and write
9B0000
heap
page read and write
2EB4000
unkown
page readonly
7FFD349A2000
trusted library allocation
page read and write
13322000
trusted library allocation
page read and write
26C2000
trusted library allocation
page read and write
7FFD3495C000
trusted library allocation
page read and write
340E000
trusted library allocation
page read and write
12F1B000
trusted library allocation
page read and write
7FFD34773000
trusted library allocation
page read and write
7FFD3495C000
trusted library allocation
page read and write
2D49000
trusted library allocation
page read and write
1B5DE000
stack
page read and write
7AC000
heap
page read and write
8F0000
heap
page read and write
17B0338B000
heap
page read and write
7FFD349A7000
trusted library allocation
page read and write
A02000
unkown
page readonly
1CB55000
stack
page read and write
7FFD34886000
trusted library allocation
page execute and read and write
10A85570000
direct allocation
page read and write
10A82C79000
heap
page read and write
12A46000
trusted library allocation
page read and write
1AE30000
heap
page read and write
7FFD34C80000
trusted library allocation
page read and write
863000
unkown
page readonly
6F0000
heap
page read and write
138E1000
trusted library allocation
page read and write
875000
unkown
page read and write
1370000
heap
page read and write
6E5000
heap
page read and write
7FFD3496C000
trusted library allocation
page read and write
51E000
stack
page read and write
296C000
trusted library allocation
page read and write
53E0000
heap
page read and write
7FFD34D50000
trusted library allocation
page read and write
799000
heap
page read and write
7FFD34994000
trusted library allocation
page read and write
134B7000
trusted library allocation
page read and write
1B993000
heap
page execute and read and write
12FA1000
trusted library allocation
page read and write
761000
heap
page read and write
13BF5000
trusted library allocation
page read and write
1360000
heap
page read and write
3450000
heap
page read and write
3104000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
13283000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
12585000
trusted library allocation
page read and write
17B03379000
heap
page read and write
1BECE000
stack
page read and write
134B1000
trusted library allocation
page read and write
1287A000
trusted library allocation
page read and write
3230000
heap
page read and write
710000
heap
page read and write
3277000
heap
page read and write
1429000
heap
page read and write
13274000
trusted library allocation
page read and write
12827000
trusted library allocation
page read and write
12BF9000
trusted library allocation
page read and write
7FFD34C90000
trusted library allocation
page execute and read and write
2FE2000
trusted library allocation
page read and write
28CB000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page execute and read and write
17B033D7000
heap
page read and write
12D2B000
trusted library allocation
page read and write
17B033AE000
heap
page read and write
7FFD347C0000
trusted library allocation
page read and write
10A82C3A000
heap
page read and write
13473000
trusted library allocation
page read and write
1290000
heap
page read and write
7FFD34794000
trusted library allocation
page read and write
2832000
heap
page read and write
299E000
stack
page read and write
30F4000
trusted library allocation
page read and write
13A78000
trusted library allocation
page read and write
17D5E870000
heap
page read and write
2982000
trusted library allocation
page read and write
130F4000
trusted library allocation
page read and write
368E000
stack
page read and write
660E000
stack
page read and write
33BC000
trusted library allocation
page read and write
1AEE000
stack
page read and write
64C0000
heap
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
14000C000
unkown
page read and write
1BDD3000
heap
page read and write
26B5CD80000
heap
page read and write
12E36000
trusted library allocation
page read and write
2CEA000
trusted library allocation
page read and write
12B2000
unkown
page readonly
1BC02000
heap
page read and write
13A68000
trusted library allocation
page read and write
297F000
trusted library allocation
page read and write
26B2000
trusted library allocation
page read and write
108D000
heap
page read and write
1499000
heap
page read and write
10A82D37000
direct allocation
page read and write
3783000
trusted library allocation
page read and write
3102000
trusted library allocation
page read and write
28C9000
trusted library allocation
page read and write
10A82C14000
heap
page read and write
BC0000
trusted library allocation
page read and write
27CE000
heap
page read and write
13838000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
298A000
trusted library allocation
page read and write
7FFD348D3000
trusted library allocation
page execute and read and write
7FFD34960000
trusted library allocation
page read and write
2811FD40000
heap
page read and write
25DD000
trusted library allocation
page read and write
1BBCE000
stack
page read and write
3674000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
18FA000
heap
page read and write
7FFD34C10000
trusted library allocation
page read and write
C09000
heap
page read and write
7FFD34783000
trusted library allocation
page execute and read and write
2D69000
trusted library allocation
page read and write
C3B000
heap
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
7FFD3479D000
trusted library allocation
page execute and read and write
489F000
stack
page read and write
13CAA000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
1308000
heap
page read and write
A35000
unkown
page readonly
3292000
trusted library allocation
page read and write
1AE68000
heap
page read and write
12C47000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
10A82A60000
heap
page read and write
7FFD34D80000
trusted library allocation
page read and write
27A7000
heap
page read and write
1446000
heap
page read and write
2811FD50000
heap
page read and write
10A82B60000
heap
page read and write
1B8D6000
heap
page read and write
27EE000
heap
page read and write
7FFD3494C000
trusted library allocation
page read and write
13028000
trusted library allocation
page read and write
27DF000
heap
page read and write
17B03363000
heap
page read and write
7FFD34997000
trusted library allocation
page read and write
12FF7000
trusted library allocation
page read and write
4DBF000
stack
page read and write
12811000
trusted library allocation
page read and write
27A1000
heap
page read and write
10A82C2A000
heap
page read and write
1A470000
trusted library allocation
page read and write
1178000
heap
page read and write
268B000
trusted library allocation
page read and write
1380000
heap
page read and write
21F0000
heap
page read and write
341D000
trusted library allocation
page read and write
1363D000
trusted library allocation
page read and write
10A82C1B000
heap
page read and write
12E0000
trusted library allocation
page read and write
2F69000
trusted library allocation
page read and write
658000
heap
page read and write
5CCE000
stack
page read and write
2DF0000
heap
page read and write
326C000
trusted library allocation
page read and write
3110000
heap
page execute and read and write
17B03371000
heap
page read and write
2C20000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
26B5CD60000
heap
page read and write
2D04000
trusted library allocation
page read and write
13CB6000
trusted library allocation
page read and write
2809000
heap
page read and write
7FFD34940000
trusted library allocation
page execute and read and write
3313000
heap
page read and write
17B03340000
heap
page read and write
7FFD34938000
trusted library allocation
page read and write
2D69000
stack
page read and write
316F000
trusted library allocation
page read and write
337F000
trusted library allocation
page read and write
1E628144000
heap
page read and write
7FFD34D60000
trusted library allocation
page read and write
7FFD34937000
trusted library allocation
page read and write
5F00000
heap
page read and write
1695000
heap
page read and write
12557000
trusted library allocation
page read and write
2CD9000
trusted library allocation
page read and write
7FFD347CD000
trusted library allocation
page execute and read and write
7FFD349C0000
trusted library allocation
page read and write
3440000
trusted library allocation
page execute and read and write
60FE000
stack
page read and write
13785000
trusted library allocation
page read and write
2FE8000
trusted library allocation
page read and write
13C57000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
13C0000
trusted library allocation
page read and write
7FFD347C4000
trusted library allocation
page read and write
2DC1000
trusted library allocation
page read and write
33B5000
trusted library allocation
page read and write
18C0000
trusted library allocation
page read and write
62E000
heap
page read and write
DBC000
heap
page read and write
13478000
trusted library allocation
page read and write
126AB000
trusted library allocation
page read and write
7FFD3497D000
trusted library allocation
page read and write
12D24000
trusted library allocation
page read and write
12F38000
trusted library allocation
page read and write
12DC5000
trusted library allocation
page read and write
12A04000
trusted library allocation
page read and write
127C3000
trusted library allocation
page read and write
1B5DE000
stack
page read and write
3173000
trusted library allocation
page read and write
7A6000
heap
page read and write
D20000
trusted library allocation
page read and write
1346B000
trusted library allocation
page read and write
2D1D000
trusted library allocation
page read and write
17B033CF000
heap
page read and write
C13000
heap
page read and write
17B034C0000
direct allocation
page read and write
13103000
trusted library allocation
page read and write
10B7FE000
stack
page read and write
1C814000
heap
page read and write
7FFD347EC000
trusted library allocation
page execute and read and write
7FFD34846000
trusted library allocation
page read and write
12872000
trusted library allocation
page read and write
7FFD34836000
trusted library allocation
page read and write
2C1B000
trusted library allocation
page read and write
13B5000
heap
page read and write
1900000
heap
page read and write
1105000
heap
page read and write
319F000
trusted library allocation
page read and write
1397F000
trusted library allocation
page read and write
1B57D000
stack
page read and write
7FFD34970000
trusted library allocation
page read and write
17B033C7000
heap
page read and write
2D8F000
trusted library allocation
page read and write
114E000
heap
page read and write
2339000
heap
page read and write
329D000
trusted library allocation
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
338D000
trusted library allocation
page read and write
34F1000
trusted library allocation
page read and write
127A3000
trusted library allocation
page read and write
127BB000
trusted library allocation
page read and write
7FFD347EC000
trusted library allocation
page execute and read and write
7FFD34784000
trusted library allocation
page read and write
1D044000
heap
page read and write
52DE000
stack
page read and write
12DE1000
trusted library allocation
page read and write
7FFD34C90000
trusted library allocation
page read and write
62C000
heap
page read and write
27E3000
heap
page read and write
2A9E000
stack
page read and write
7FFD347B0000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
1D0000
heap
page read and write
155F000
stack
page read and write
22608640000
heap
page read and write
312B000
trusted library allocation
page read and write
10A82BF0000
heap
page read and write
13A20000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
1BD60000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
1BD92000
heap
page read and write
13B55000
trusted library allocation
page read and write
12C11000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
133F000
stack
page read and write
7FFD348D1000
trusted library allocation
page execute and read and write
6FC000
heap
page read and write
134C9000
trusted library allocation
page read and write
133C2000
trusted library allocation
page read and write
2913000
trusted library allocation
page read and write
2F39000
trusted library allocation
page read and write
17B033C2000
heap
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
138DA000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
426E000
stack
page read and write
10A82C81000
heap
page read and write
18FE000
heap
page read and write
13C63000
trusted library allocation
page read and write
13C17000
trusted library allocation
page read and write
10A82C1A000
heap
page read and write
12DB8000
trusted library allocation
page read and write
13511000
trusted library allocation
page read and write
7FFD349A2000
trusted library allocation
page read and write
13280000
trusted library allocation
page read and write
36CC000
trusted library allocation
page read and write
12BE0000
trusted library allocation
page read and write
FF5000
heap
page read and write
27E7000
heap
page read and write
129F5000
trusted library allocation
page read and write
2EBD000
trusted library allocation
page read and write
7FFD34794000
trusted library allocation
page read and write
12BB1000
trusted library allocation
page read and write
10BD000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
B40000
heap
page read and write
3002000
heap
page read and write
7FFD348C3000
trusted library allocation
page execute and read and write
17B04E50000
heap
page read and write
1B36F000
stack
page read and write
184E000
stack
page read and write
2971000
trusted library allocation
page read and write
310D000
trusted library allocation
page read and write
17B03240000
heap
page read and write
13AC2000
trusted library allocation
page read and write
17B03390000
heap
page read and write
7FFD349AD000
trusted library allocation
page read and write
7FFD34866000
trusted library allocation
page execute and read and write
7FFD34960000
trusted library allocation
page execute and read and write
2D1F000
trusted library allocation
page read and write
10A85590000
direct allocation
page read and write
136B6000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
13141000
trusted library allocation
page read and write
136AE000
trusted library allocation
page read and write
7FFD34836000
trusted library allocation
page read and write
2689000
trusted library allocation
page read and write
63BC000
stack
page read and write
1C1E000
stack
page read and write
25CA000
trusted library allocation
page read and write
135A3000
trusted library allocation
page read and write
7FFD34782000
trusted library allocation
page read and write
10A82DC0000
heap
page read and write
14E9000
heap
page read and write
27DA000
heap
page read and write
37DB000
trusted library allocation
page read and write
1AF60000
trusted library allocation
page read and write
27E3000
heap
page read and write
1359D000
trusted library allocation
page read and write
1B06E000
stack
page read and write
CE1000
stack
page read and write
30ED000
trusted library allocation
page read and write
1B87A000
heap
page read and write
1AD10000
heap
page read and write
2F31000
trusted library allocation
page read and write
12C45000
trusted library allocation
page read and write
1455000
heap
page read and write
1B26E000
stack
page read and write
27A0000
heap
page read and write
2930000
heap
page read and write
1AA0D000
stack
page read and write
17B03460000
direct allocation
page read and write
2968000
trusted library allocation
page read and write
9F0000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
12CF1000
trusted library allocation
page read and write
27CD000
heap
page read and write
378D000
trusted library allocation
page read and write
2643000
trusted library allocation
page read and write
FA2000
heap
page read and write
1BAAE000
stack
page read and write
2CDD000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
17B04D70000
direct allocation
page read and write
27C2000
heap
page read and write
12561000
trusted library allocation
page read and write
560000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
132D1000
trusted library allocation
page read and write
7FFD347DC000
trusted library allocation
page execute and read and write
7FFD34943000
trusted library allocation
page read and write
7FFD34793000
trusted library allocation
page read and write
1444000
heap
page read and write
13B5A000
trusted library allocation
page read and write
134BB000
trusted library allocation
page read and write
7FFD3498D000
trusted library allocation
page read and write
2551000
trusted library allocation
page read and write
12A54000
trusted library allocation
page read and write
7FFD34798000
trusted library allocation
page read and write
7FFD349BD000
trusted library allocation
page read and write
1B28F000
stack
page read and write
13455000
trusted library allocation
page read and write
1AF60000
heap
page execute and read and write
17B03387000
heap
page read and write
7FFD34783000
trusted library allocation
page execute and read and write
1B4E0000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
12A4A000
trusted library allocation
page read and write
108A000
heap
page read and write
10A82C8A000
heap
page read and write
13DF0000
trusted library allocation
page read and write
33C5000
trusted library allocation
page read and write
30CF000
trusted library allocation
page read and write
17B03310000
heap
page read and write
7FFD348D1000
trusted library allocation
page execute and read and write
22608694000
heap
page read and write
3680000
trusted library allocation
page read and write
650000
heap
page read and write
17B03371000
heap
page read and write
13A06000
trusted library allocation
page read and write
29C9000
heap
page read and write
25CE000
trusted library allocation
page read and write
12AAA000
trusted library allocation
page read and write
13C5A000
trusted library allocation
page read and write
1B908000
heap
page read and write
17B033C9000
heap
page read and write
DAE000
heap
page read and write
13C73000
trusted library allocation
page read and write
17B0336C000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
7FFD34836000
trusted library allocation
page read and write
7FFD349A7000
trusted library allocation
page read and write
7FFD347B3000
trusted library allocation
page read and write
25B9000
trusted library allocation
page read and write
7FFD34D70000
trusted library allocation
page read and write
27C4000
heap
page read and write
1400000
heap
page read and write
2E77000
trusted library allocation
page read and write
12BEE000
trusted library allocation
page read and write
26B5CDB9000
heap
page read and write
64BC000
stack
page read and write
10A82D19000
direct allocation
page read and write
7FFD349BD000
trusted library allocation
page read and write
133B5000
trusted library allocation
page read and write
1BA66000
stack
page read and write
2CBB000
trusted library allocation
page read and write
1E628140000
heap
page read and write
1DDE0000
heap
page read and write
830000
unkown
page readonly
2FEE000
stack
page read and write
22608890000
heap
page read and write
3162000
trusted library allocation
page read and write
13290000
trusted library allocation
page read and write
7FFD348D3000
trusted library allocation
page execute and read and write
7FFD348B0000
trusted library allocation
page execute and read and write
7FFD3497D000
trusted library allocation
page read and write
637F000
stack
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
17B033D9000
heap
page read and write
3121000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
3414000
trusted library allocation
page read and write
314B000
trusted library allocation
page read and write
12A0000
heap
page read and write
4DC0000
heap
page read and write
7FFD349AE000
trusted library allocation
page read and write
10A82C2E000
heap
page read and write
DE7000
heap
page read and write
281A000
heap
page read and write
27CA000
heap
page read and write
12C0000
trusted library allocation
page read and write
1BE6A000
heap
page read and write
13141000
trusted library allocation
page read and write
1387A000
trusted library allocation
page read and write
2811FDE8000
heap
page read and write
2D78000
stack
page read and write
2DC3000
trusted library allocation
page read and write
2EA2000
unkown
page readonly
17B0337B000
heap
page read and write
8B0000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
12666000
trusted library allocation
page read and write
10A845B0000
direct allocation
page read and write
140000000
unkown
page readonly
22608694000
heap
page read and write
196E000
heap
page read and write
1B8E0000
heap
page read and write
7E5000
heap
page read and write
7FF4B0780000
trusted library allocation
page execute and read and write
7D0000
heap
page read and write
34FF000
trusted library allocation
page read and write
1C602000
heap
page read and write
5FFE000
stack
page read and write
2994000
trusted library allocation
page read and write
1BEA6000
heap
page read and write
7FFD34846000
trusted library allocation
page read and write
10A82C5A000
heap
page read and write
3245000
trusted library allocation
page read and write
17B0337E000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page execute and read and write
7FFD34984000
trusted library allocation
page read and write
135F2000
trusted library allocation
page read and write
12C8B000
trusted library allocation
page read and write
13DFA000
trusted library allocation
page read and write
13E38000
trusted library allocation
page read and write
313A000
trusted library allocation
page read and write
1C551000
stack
page read and write
1870000
trusted library allocation
page read and write
131B000
heap
page read and write
2449000
trusted library allocation
page read and write
133BB000
trusted library allocation
page read and write
68C35FF000
stack
page read and write
18A0000
heap
page read and write
7FFD34763000
trusted library allocation
page execute and read and write
12F25000
trusted library allocation
page read and write
7FFD34C40000
trusted library allocation
page read and write
7FFD34984000
trusted library allocation
page read and write
17B03371000
heap
page read and write
2610000
heap
page read and write
17D5E580000
heap
page read and write
10A82C76000
heap
page read and write
2D99000
heap
page read and write
7FFD34778000
trusted library allocation
page read and write
1AD53000
heap
page read and write
10A855D0000
direct allocation
page read and write
2E82000
unkown
page readonly
7FFD347AD000
trusted library allocation
page execute and read and write
7FFD34DA0000
trusted library allocation
page read and write
2847000
trusted library allocation
page read and write
13847000
trusted library allocation
page read and write
CCD000
heap
page read and write
1BB56000
heap
page read and write
2CD7000
trusted library allocation
page read and write
12F97000
trusted library allocation
page read and write
12D1E000
trusted library allocation
page read and write
26BE000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page execute and read and write
2809000
heap
page read and write
12A6C000
trusted library allocation
page read and write
3200000
heap
page read and write
12B0000
trusted library allocation
page read and write
10A82C4C000
heap
page read and write
1E627EF0000
heap
page read and write
1BD02000
heap
page execute and read and write
1102000
heap
page read and write
FD0000
heap
page execute and read and write
2C37000
trusted library allocation
page read and write
12A59000
trusted library allocation
page read and write
72F000
heap
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
32A1000
trusted library allocation
page read and write
2829000
trusted library allocation
page read and write
1240000
heap
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
1B9BF000
stack
page read and write
17B04D10000
direct allocation
page read and write
3401000
trusted library allocation
page read and write
17B03390000
heap
page read and write
1590AFF000
stack
page read and write
104F000
stack
page read and write
1B965000
stack
page read and write
1C800000
heap
page read and write
12F91000
trusted library allocation
page read and write
13890000
trusted library allocation
page read and write
130BE000
trusted library allocation
page read and write
13880000
trusted library allocation
page read and write
1BA60000
heap
page execute and read and write
12862000
trusted library allocation
page read and write
17B03389000
heap
page read and write
7FFD34DB0000
trusted library allocation
page read and write
1BE62000
heap
page read and write
313F000
trusted library allocation
page read and write
7FFD34784000
trusted library allocation
page read and write
1BAB0000
trusted library section
page read and write
33A4000
trusted library allocation
page read and write
7CC000
heap
page read and write
7FFD34930000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
12C21000
trusted library allocation
page read and write
2EA0000
unkown
page readonly
623E000
stack
page read and write
1BD69000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
120F000
stack
page read and write
7FFD349B2000
trusted library allocation
page read and write
13147000
trusted library allocation
page read and write
7FFD34C20000
trusted library allocation
page read and write
1137000
heap
page read and write
1CC55000
stack
page read and write
13CB1000
trusted library allocation
page read and write
130DA000
trusted library allocation
page read and write
13AC9000
trusted library allocation
page read and write
1364D000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
1D3FE000
stack
page read and write
7FFD347A0000
trusted library allocation
page read and write
893000
unkown
page readonly
D90000
heap
page read and write
2D8C000
stack
page read and write
2D4D000
trusted library allocation
page read and write
FAA000
heap
page read and write
3290000
trusted library allocation
page read and write
127C1000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
BE8000
heap
page read and write
1500000
heap
page read and write
570000
heap
page read and write
310F000
trusted library allocation
page read and write
31B1000
trusted library allocation
page read and write
354D000
stack
page read and write
FE0000
heap
page read and write
7FFD347B4000
trusted library allocation
page read and write
10A82D4B000
direct allocation
page read and write
2F29000
heap
page read and write
7FFD34914000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
10A82C5C000
heap
page read and write
9F9000
heap
page read and write
13465000
trusted library allocation
page read and write
7FFD34926000
trusted library allocation
page read and write
7FFD34876000
trusted library allocation
page execute and read and write
7FFD34850000
trusted library allocation
page execute and read and write
7FFD3478D000
trusted library allocation
page execute and read and write
1329000
heap
page read and write
3790000
heap
page read and write
1894000
trusted library allocation
page read and write
7FFD34984000
trusted library allocation
page read and write
2DBF000
trusted library allocation
page read and write
A00000
unkown
page readonly
7FFD34990000
trusted library allocation
page read and write
53DE000
stack
page read and write
17B0345B000
direct allocation
page read and write
17B033BF000
heap
page read and write
34B3000
trusted library allocation
page read and write
33F3000
trusted library allocation
page read and write
574000
heap
page read and write
10A82C41000
heap
page read and write
17B04D30000
direct allocation
page read and write
990000
heap
page read and write
22608900000
heap
page read and write
27B0000
heap
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
1328B000
trusted library allocation
page read and write
68C31F5000
stack
page read and write
7FFD347A3000
trusted library allocation
page read and write
1B19D000
stack
page read and write
7FFD34860000
trusted library allocation
page execute and read and write
1B2B2000
heap
page read and write
313B000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
1B8F3000
heap
page read and write
7FFD3484C000
trusted library allocation
page execute and read and write
7FFD3479D000
trusted library allocation
page execute and read and write
7FFD34762000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
12B3C000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
FCF000
stack
page read and write
341F000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
19CF000
heap
page read and write
10BA000
heap
page read and write
C42000
heap
page read and write
13C68000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
26A1000
trusted library allocation
page read and write
2C49000
trusted library allocation
page read and write
2250000
heap
page execute and read and write
10A82C8A000
heap
page read and write
1ADEF000
heap
page read and write
3127000
trusted library allocation
page read and write
2CF3000
trusted library allocation
page read and write
13E3F000
trusted library allocation
page read and write
7E2000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
7FFD347BD000
trusted library allocation
page execute and read and write
7FFD34820000
trusted library allocation
page execute and read and write
7FFD349A0000
trusted library allocation
page read and write
4CBE000
stack
page read and write
2601000
trusted library allocation
page read and write
1BB50000
heap
page read and write
1B38E000
stack
page read and write
812000
heap
page read and write
129F9000
trusted library allocation
page read and write
2E97000
trusted library allocation
page read and write
7FFD34C42000
trusted library allocation
page read and write
17E0000
heap
page read and write
10A855B5000
direct allocation
page read and write
12F0000
heap
page read and write
7FFD34C80000
trusted library allocation
page read and write
2CE1000
trusted library allocation
page read and write
7FFD3497D000
trusted library allocation
page read and write
55C000
heap
page read and write
30EB000
trusted library allocation
page read and write
12DDC000
trusted library allocation
page read and write
13979000
trusted library allocation
page read and write
1C170000
heap
page read and write
F50000
heap
page read and write
1AF9E000
stack
page read and write
7FFD349C0000
trusted library allocation
page execute and read and write
27D0000
heap
page read and write
10A82C76000
heap
page read and write
13699000
trusted library allocation
page read and write
71B000
heap
page read and write
7FFD3481C000
trusted library allocation
page execute and read and write
1470000
unkown
page readonly
361E000
stack
page read and write
132E6000
trusted library allocation
page read and write
2D6B000
trusted library allocation
page read and write
25BB000
trusted library allocation
page read and write
58AB000
stack
page read and write
7FFD347A3000
trusted library allocation
page read and write
13A1C000
trusted library allocation
page read and write
2CDF000
trusted library allocation
page read and write
7FFD348D3000
trusted library allocation
page execute and read and write
13DD6000
trusted library allocation
page read and write
17B03480000
direct allocation
page read and write
E20000
heap
page read and write
12F31000
trusted library allocation
page read and write
1C370000
heap
page read and write
329E000
stack
page read and write
17B03443000
direct allocation
page read and write
DE5000
heap
page read and write
27ED000
heap
page read and write
5D5D000
stack
page read and write
338F000
trusted library allocation
page read and write
3272000
trusted library allocation
page read and write
7FFD3476D000
trusted library allocation
page execute and read and write
1451000
heap
page read and write
13E48000
trusted library allocation
page read and write
550000
heap
page read and write
7FFD34C60000
trusted library allocation
page read and write
7FFD34846000
trusted library allocation
page read and write
13F0000
heap
page read and write
17B032D0000
direct allocation
page read and write
12A11000
trusted library allocation
page read and write
965000
heap
page read and write
129EE000
trusted library allocation
page read and write
7FFD34984000
trusted library allocation
page read and write
7FFD34798000
trusted library allocation
page read and write
13001000
trusted library allocation
page read and write
1C702000
heap
page execute and read and write
12AA3000
trusted library allocation
page read and write
1BACE000
stack
page read and write
12816000
trusted library allocation
page read and write
2707000
trusted library allocation
page read and write
2992000
trusted library allocation
page read and write
1C191000
heap
page read and write
1ADF9000
heap
page read and write
130E0000
trusted library allocation
page read and write
C8396FF000
stack
page read and write
2728000
trusted library allocation
page read and write
2D90000
heap
page read and write
114C000
heap
page read and write
7FFD34866000
trusted library allocation
page execute and read and write
131B6000
trusted library allocation
page read and write
B2E000
stack
page read and write
13D3D000
trusted library allocation
page read and write
17B033D8000
heap
page read and write
2FF1000
trusted library allocation
page read and write
DF0000
heap
page read and write
7FFD34D90000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
377D000
trusted library allocation
page read and write
7FFD34943000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
25E1000
trusted library allocation
page read and write
7FFD34994000
trusted library allocation
page read and write
33DF000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
12A0C000
trusted library allocation
page read and write
13468000
trusted library allocation
page read and write
1120000
heap
page read and write
10A82CF0000
direct allocation
page read and write
2D5F000
trusted library allocation
page read and write
7FFD3499C000
trusted library allocation
page read and write
132C9000
trusted library allocation
page read and write
140001000
unkown
page execute read
7FFD34830000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
7FFD34984000
trusted library allocation
page read and write
7FFD347AB000
trusted library allocation
page execute and read and write
324B000
trusted library allocation
page read and write
7FFD349AE000
trusted library allocation
page read and write
13647000
trusted library allocation
page read and write
29E1000
trusted library allocation
page read and write
326A000
trusted library allocation
page read and write
14003E000
unkown
page read and write
12F7B000
trusted library allocation
page read and write
2698000
trusted library allocation
page read and write
10B5FE000
stack
page read and write
5C4E000
stack
page read and write
25E4000
trusted library allocation
page read and write
284B000
trusted library allocation
page read and write
14FF000
stack
page read and write
1B87F000
stack
page read and write
C48000
heap
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
613E000
stack
page read and write
7FFD34980000
trusted library allocation
page read and write
17B03390000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
17B04D53000
direct allocation
page read and write
1426000
heap
page read and write
7FFD349B0000
trusted library allocation
page execute and read and write
376D000
trusted library allocation
page read and write
1170000
heap
page read and write
327B000
trusted library allocation
page read and write
30EF000
trusted library allocation
page read and write
1300000
heap
page read and write
2F6C000
trusted library allocation
page read and write
13135000
trusted library allocation
page read and write
260E000
stack
page read and write
12F6F000
trusted library allocation
page read and write
7FFD34C30000
trusted library allocation
page read and write
313C000
trusted library allocation
page read and write
1113000
heap
page read and write
17B03440000
direct allocation
page read and write
17B03447000
direct allocation
page read and write
31C6000
trusted library allocation
page read and write
1B16E000
stack
page read and write
314D000
trusted library allocation
page read and write
3288000
heap
page read and write
134CE000
trusted library allocation
page read and write
12B36000
trusted library allocation
page read and write
2856000
trusted library allocation
page read and write
25D2000
trusted library allocation
page read and write
7FFD349BD000
trusted library allocation
page read and write
12BE6000
trusted library allocation
page read and write
17CF000
stack
page read and write
14BF000
stack
page read and write
12829000
trusted library allocation
page read and write
2E80000
unkown
page readonly
B80000
heap
page read and write
7FFD347A2000
trusted library allocation
page read and write
2C96000
stack
page read and write
7FFD34D20000
trusted library allocation
page read and write
1C050000
stack
page read and write
33FB000
trusted library allocation
page read and write
3395000
trusted library allocation
page read and write
3138000
trusted library allocation
page read and write
2D8D000
trusted library allocation
page read and write
627E000
stack
page read and write
10A855B3000
direct allocation
page read and write
1B88E000
heap
page read and write
2626000
heap
page read and write
2D14000
trusted library allocation
page read and write
506E000
stack
page read and write
1490000
heap
page execute and read and write
12A50000
trusted library allocation
page read and write
33EE000
trusted library allocation
page read and write
13887000
trusted library allocation
page read and write
13655000
trusted library allocation
page read and write
7CE000
heap
page read and write
3149000
trusted library allocation
page read and write
25BF000
trusted library allocation
page read and write
188D000
trusted library allocation
page execute and read and write
D10000
trusted library allocation
page read and write
7FFD34994000
trusted library allocation
page read and write
7FFD34953000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
226088FC000
heap
page read and write
12AB0000
trusted library allocation
page read and write
7FFD34936000
trusted library allocation
page read and write
1B0F0000
heap
page read and write
10A82C38000
heap
page read and write
7FFD3494A000
trusted library allocation
page read and write
316D000
trusted library allocation
page read and write
9D0000
heap
page read and write
6D0000
heap
page read and write
1383A000
trusted library allocation
page read and write
142E000
heap
page read and write
1E627FF0000
heap
page read and write
130EB000
trusted library allocation
page read and write
7FFD349A7000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
133E000
heap
page read and write
12880000
trusted library allocation
page read and write
13650000
trusted library allocation
page read and write
1AE93000
heap
page execute and read and write
27D2000
heap
page read and write
131DA000
trusted library allocation
page read and write
13A22000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
14000D000
unkown
page readonly
13D4F000
trusted library allocation
page read and write
12491000
trusted library allocation
page read and write
7FFD3496C000
trusted library allocation
page read and write
10A84570000
direct allocation
page read and write
20B6000
heap
page read and write
1B4D0000
heap
page execute and read and write
1270000
heap
page read and write
1BDDF000
heap
page read and write
327D000
trusted library allocation
page read and write
1B19E000
stack
page read and write
132DC000
trusted library allocation
page read and write
1327D000
trusted library allocation
page read and write
12BEC000
trusted library allocation
page read and write
C24000
heap
page read and write
10A82C2C000
heap
page read and write
5CC000
heap
page read and write
3300000
heap
page read and write
10A82D70000
direct allocation
page read and write
7FFD34850000
trusted library allocation
page execute and read and write
268F000
trusted library allocation
page read and write
33DD000
trusted library allocation
page read and write
1B83F000
heap
page read and write
343D000
stack
page read and write
22608630000
heap
page read and write
17B03260000
heap
page read and write
1360000
heap
page read and write
7FFD349AD000
trusted library allocation
page read and write
10A82C21000
heap
page read and write
269A000
trusted library allocation
page read and write
831000
unkown
page execute read
2FD9000
trusted library allocation
page read and write
1331D000
trusted library allocation
page read and write
FC3000
heap
page read and write
1B9E0000
heap
page execute and read and write
7FFD349A0000
trusted library allocation
page execute and read and write
E2E000
heap
page read and write
12885000
trusted library allocation
page read and write
7FFD34936000
trusted library allocation
page read and write
1A7CB000
heap
page read and write
1396D000
trusted library allocation
page read and write
2C9F000
trusted library allocation
page read and write
13797000
trusted library allocation
page read and write
20B0000
heap
page read and write
136A3000
trusted library allocation
page read and write
52AC000
stack
page read and write
132E1000
trusted library allocation
page read and write
33CC000
trusted library allocation
page read and write
633000
heap
page read and write
7C4000
heap
page read and write
75C000
heap
page read and write
299D000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page execute and read and write
CDE000
heap
page read and write
2809000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page execute and read and write
17B03560000
heap
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
7FFD349D0000
trusted library allocation
page execute and read and write
33FF000
trusted library allocation
page read and write
17B0338D000
heap
page read and write
C76000
heap
page read and write
10A82C7A000
heap
page read and write
7FFD3499E000
trusted library allocation
page read and write
190000
heap
page read and write
7FFD348A0000
trusted library allocation
page execute and read and write
13A17000
trusted library allocation
page read and write
13BFB000
trusted library allocation
page read and write
269E000
trusted library allocation
page read and write
A0845BC000
stack
page read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD34784000
trusted library allocation
page read and write
17B0337E000
heap
page read and write
C50000
heap
page read and write
126A6000
trusted library allocation
page read and write
1C757000
stack
page read and write
268D000
trusted library allocation
page read and write
17B034A0000
direct allocation
page read and write
3361000
trusted library allocation
page read and write
26C4000
trusted library allocation
page read and write
12DD4000
trusted library allocation
page read and write
1BCCF000
stack
page read and write
5EFE000
stack
page read and write
86E000
unkown
page read and write
5501000
heap
page read and write
2FCA000
trusted library allocation
page read and write
17B033C7000
heap
page read and write
2330000
heap
page read and write
27BE000
heap
page read and write
1BBBE000
stack
page read and write
22608830000
heap
page read and write
298C000
trusted library allocation
page read and write
12481000
trusted library allocation
page read and write
7FFD34956000
trusted library allocation
page read and write
1BDAE000
stack
page read and write
12F5000
heap
page read and write
1884000
trusted library allocation
page read and write
2809000
heap
page read and write
2C17000
trusted library allocation
page read and write
12C54000
trusted library allocation
page read and write
590000
heap
page read and write
1ADAD000
stack
page read and write
7FFD34798000
trusted library allocation
page read and write
1B3DF000
stack
page read and write
17B033BE000
heap
page read and write
18E0000
trusted library allocation
page read and write
1BB8E000
stack
page read and write
960000
heap
page read and write
7FFD34846000
trusted library allocation
page execute and read and write
13D49000
trusted library allocation
page read and write
5290000
heap
page read and write
3A1000
stack
page read and write
13BEE000
trusted library allocation
page read and write
7FFD34984000
trusted library allocation
page read and write
10A82C8A000
heap
page read and write
16F7000
stack
page read and write
13267000
trusted library allocation
page read and write
C8395FE000
stack
page read and write
336E000
trusted library allocation
page read and write
13A7B000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
1B86F000
stack
page read and write
7FFD349B0000
trusted library allocation
page read and write
1B3DE000
stack
page read and write
22608904000
heap
page read and write
2811FDEA000
heap
page read and write
7FFD349A4000
trusted library allocation
page read and write
2FB5000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
28C0000
heap
page read and write
4C7E000
stack
page read and write
7FFD34940000
trusted library allocation
page read and write
12C4F000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
14B4000
heap
page read and write
7FFD34856000
trusted library allocation
page execute and read and write
27B1000
heap
page read and write
269C000
trusted library allocation
page read and write
1595000
heap
page read and write
8EF000
stack
page read and write
10A82D30000
direct allocation
page read and write
2BA7000
trusted library allocation
page read and write
329F000
trusted library allocation
page read and write
12FC6000
trusted library allocation
page read and write
134C0000
trusted library allocation
page read and write
1313A000
trusted library allocation
page read and write
131A1000
trusted library allocation
page read and write
2D41000
trusted library allocation
page read and write
13E0000
heap
page read and write
22608694000
heap
page read and write
7FFD34948000
trusted library allocation
page read and write
23CE000
stack
page read and write
30C9000
trusted library allocation
page read and write
1CA55000
stack
page read and write
10A82C1E000
heap
page read and write
22608693000
heap
page read and write
13517000
trusted library allocation
page read and write
135AF000
trusted library allocation
page read and write
1B59D000
stack
page read and write
7FFD34928000
trusted library allocation
page read and write
2D60000
stack
page read and write
3364000
trusted library allocation
page read and write
D79000
heap
page read and write
7FFD34856000
trusted library allocation
page read and write
3F0000
heap
page read and write
1C957000
stack
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
113E000
heap
page read and write
1389E000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
18C7000
trusted library allocation
page execute and read and write
297B000
trusted library allocation
page read and write
2F71000
trusted library allocation
page read and write
13653000
trusted library allocation
page read and write
117A000
heap
page read and write
126B0000
trusted library allocation
page read and write
13D42000
trusted library allocation
page read and write
27E9000
heap
page read and write
2811FDE0000
heap
page read and write
7FFD347DC000
trusted library allocation
page execute and read and write
27BF000
heap
page read and write
15BE000
stack
page read and write
33DB000
trusted library allocation
page read and write
17B0336C000
heap
page read and write
7FFD349C2000
trusted library allocation
page read and write
10A84590000
direct allocation
page read and write
3412000
trusted library allocation
page read and write
7FFD34940000
trusted library allocation
page read and write
17D5E790000
heap
page read and write
A0848FF000
stack
page read and write
7FFD349C0000
trusted library allocation
page execute and read and write
BFB000
heap
page read and write
2E75000
trusted library allocation
page read and write
C8394FC000
stack
page read and write
A25000
heap
page read and write
7FFD34974000
trusted library allocation
page read and write
1B8C0000
heap
page read and write
7FFD34DC0000
trusted library allocation
page execute and read and write
10A82C1E000
heap
page read and write
7FFD347A3000
trusted library allocation
page read and write
7FFD3498D000
trusted library allocation
page read and write
1B9C0000
heap
page read and write
30DA000
trusted library allocation
page read and write
2945000
trusted library allocation
page read and write
1382B000
trusted library allocation
page read and write
D02000
heap
page read and write
17B03357000
heap
page read and write
1CBFE000
stack
page read and write
10A82C5D000
heap
page read and write
12B0000
unkown
page readonly
6AFC000
stack
page read and write
33C8000
trusted library allocation
page read and write
CD6000
heap
page read and write
1925000
heap
page read and write
25EC000
trusted library allocation
page read and write
14000E000
unkown
page execute read
10A82C60000
heap
page read and write
2CFB000
trusted library allocation
page read and write
33E1000
trusted library allocation
page read and write
37E1000
trusted library allocation
page read and write
1340B000
trusted library allocation
page read and write
13E32000
trusted library allocation
page read and write
7FFD3494C000
trusted library allocation
page read and write
1DDF2000
heap
page read and write
138A3000
trusted library allocation
page read and write
3294000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
140000000
unkown
page readonly
10A82C7C000
heap
page read and write
2E7D000
trusted library allocation
page read and write
1079000
heap
page read and write
3257000
trusted library allocation
page read and write
30CD000
trusted library allocation
page read and write
132C2000
trusted library allocation
page read and write
26B5CDA8000
heap
page read and write
7FFD34D10000
trusted library allocation
page read and write
337B000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
21C0000
trusted library allocation
page read and write
1BD5D000
stack
page read and write
272E000
stack
page read and write
1C0FD000
stack
page read and write
10A82C20000
heap
page read and write
7FFD349AE000
trusted library allocation
page read and write
130D1000
trusted library allocation
page read and write
7FFD349C4000
trusted library allocation
page read and write
5C8E000
stack
page read and write
1B8F2000
heap
page read and write
366B000
trusted library allocation
page read and write
10A82DC4000
heap
page read and write
1AE4A000
heap
page read and write
2D9D000
stack
page read and write
584000
heap
page read and write
10A82C72000
heap
page read and write
1C802000
heap
page read and write
7FFD34D40000
trusted library allocation
page read and write
7FFD34994000
trusted library allocation
page read and write
7FFD348E1000
trusted library allocation
page execute and read and write
22608880000
heap
page read and write
7FFD347BC000
trusted library allocation
page execute and read and write
2D58000
trusted library allocation
page read and write
129D1000
trusted library allocation
page read and write
315A000
trusted library allocation
page read and write
7FFD34C40000
trusted library allocation
page read and write
10A82C71000
heap
page read and write
322B000
heap
page read and write
296A000
trusted library allocation
page read and write
132EB000
trusted library allocation
page read and write
17B03520000
direct allocation
page read and write
2CF0000
trusted library allocation
page read and write
299F000
trusted library allocation
page read and write
140044000
unkown
page execute read
7FFD347A4000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
B60000
heap
page read and write
13A2A000
trusted library allocation
page read and write
3280000
heap
page read and write
5D9E000
stack
page read and write
2EE9000
heap
page read and write
571000
heap
page read and write
13E56000
trusted library allocation
page read and write
10A82D33000
direct allocation
page read and write
7FFD34788000
trusted library allocation
page read and write
19A6000
heap
page read and write
13121000
trusted library allocation
page read and write
7FFD3494A000
trusted library allocation
page read and write
604000
heap
page read and write
12C3C000
trusted library allocation
page read and write
1C1A4000
heap
page read and write
13C60000
trusted library allocation
page read and write
295F000
trusted library allocation
page read and write
17B04D55000
direct allocation
page read and write
7FFD34957000
trusted library allocation
page read and write
3129000
trusted library allocation
page read and write
7FFD34997000
trusted library allocation
page read and write
790000
trusted library allocation
page read and write
3510000
heap
page execute and read and write
13201000
trusted library allocation
page read and write
12A5000
heap
page read and write
2F20000
heap
page read and write
5D0B000
stack
page read and write
2DB1000
trusted library allocation
page read and write
13A72000
trusted library allocation
page read and write
17B03381000
heap
page read and write
28AF000
trusted library allocation
page read and write
7FFD34948000
trusted library allocation
page read and write
10A82C2E000
heap
page read and write
25F2000
trusted library allocation
page read and write
13EA7000
trusted library allocation
page read and write
130F6000
trusted library allocation
page read and write
3375000
trusted library allocation
page read and write
12BF4000
trusted library allocation
page read and write
D25000
heap
page read and write
17B034E0000
direct allocation
page read and write
2F7B000
trusted library allocation
page read and write
2C93000
trusted library allocation
page read and write
13022000
trusted library allocation
page read and write
126B8000
trusted library allocation
page read and write
10A82C76000
heap
page read and write
12875000
trusted library allocation
page read and write
9585D8E000
stack
page read and write
7FFD34974000
trusted library allocation
page read and write
FBF000
heap
page read and write
12A5D000
trusted library allocation
page read and write
128BC000
trusted library allocation
page read and write
7FFD34948000
trusted library allocation
page read and write
18B2000
trusted library allocation
page read and write
1BE70000
heap
page read and write
22608694000
heap
page read and write
13A86000
trusted library allocation
page read and write
13131000
trusted library allocation
page read and write
2BEF000
trusted library allocation
page read and write
1BAE0000
trusted library section
page readonly
13216000
trusted library allocation
page read and write
1AE80000
heap
page execute and read and write
2D5E000
stack
page read and write
A08487F000
stack
page read and write
3067000
trusted library allocation
page read and write
1AE52000
heap
page read and write
7FFD34770000
trusted library allocation
page read and write
32E1000
trusted library allocation
page read and write
12487000
trusted library allocation
page read and write
1A0000
heap
page read and write
2470000
heap
page execute and read and write
7FFD34840000
trusted library allocation
page read and write
12441000
trusted library allocation
page read and write
12D51000
trusted library allocation
page read and write
7A0000
heap
page read and write
26CD000
trusted library allocation
page read and write
980000
heap
page read and write
316B000
trusted library allocation
page read and write
B70000
heap
page read and write
12807000
trusted library allocation
page read and write
1BEBA000
heap
page read and write
295D000
trusted library allocation
page read and write
2D8B000
trusted library allocation
page read and write
10A82C55000
heap
page read and write
1C808000
heap
page read and write
10A82C55000
heap
page read and write
7FFD34866000
trusted library allocation
page execute and read and write
894000
unkown
page readonly
314F000
trusted library allocation
page read and write
1B09F000
stack
page read and write
12A07000
trusted library allocation
page read and write
26AF000
trusted library allocation
page read and write
131E0000
trusted library allocation
page read and write
18BA000
trusted library allocation
page execute and read and write
2811FD74000
heap
page read and write
132A7000
trusted library allocation
page read and write
17B0350B000
direct allocation
page read and write
F60000
heap
page read and write
3377000
trusted library allocation
page read and write
112B000
heap
page read and write
1CD57000
stack
page read and write
2F3F000
stack
page read and write
28C6000
trusted library allocation
page read and write
1ADFB000
heap
page read and write
2D12000
trusted library allocation
page read and write
650E000
stack
page read and write
10A82C41000
heap
page read and write
730000
heap
page read and write
7FFD349D0000
trusted library allocation
page execute and read and write
1D000000
heap
page read and write
34FB000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
99E000
stack
page read and write
7FFD34940000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page read and write
9A0000
heap
page read and write
7FFD3499E000
trusted library allocation
page read and write
13DDD000
trusted library allocation
page read and write
22608884000
heap
page read and write
13DE3000
trusted library allocation
page read and write
133B000
heap
page read and write
13C50000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
13C66000
trusted library allocation
page read and write
12BD0000
trusted library allocation
page read and write
13FE000
stack
page read and write
339D000
trusted library allocation
page read and write
7FFD3478B000
trusted library allocation
page execute and read and write
2300000
trusted library allocation
page read and write
136FF000
trusted library allocation
page read and write
3147000
trusted library allocation
page read and write
7FFD349B4000
trusted library allocation
page read and write
7FFD34927000
trusted library allocation
page read and write
325F000
trusted library allocation
page read and write
3671000
trusted library allocation
page read and write
2780000
heap
page read and write
281A000
heap
page read and write
13A8B000
trusted library allocation
page read and write
2CC5000
trusted library allocation
page read and write
2D89000
stack
page read and write
F8C000
heap
page read and write
7FFD34836000
trusted library allocation
page read and write
1367000
heap
page read and write
34F7000
trusted library allocation
page read and write
13C5000
heap
page read and write
3244000
heap
page read and write
2FDF000
trusted library allocation
page read and write
3420000
heap
page read and write
218B000
stack
page read and write
7FFD34930000
trusted library allocation
page read and write
7FFD34798000
trusted library allocation
page read and write
12F33000
trusted library allocation
page read and write
13792000
trusted library allocation
page read and write
1BDD1000
heap
page read and write
1B7D6000
heap
page read and write
3241000
heap
page read and write
25CC000
trusted library allocation
page read and write
2C46000
trusted library allocation
page read and write
7FFD347A4000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
13DE7000
trusted library allocation
page read and write
27C7000
heap
page read and write
13C0D000
trusted library allocation
page read and write
13660000
trusted library allocation
page read and write
2230000
heap
page read and write
13A25000
trusted library allocation
page read and write
1100000
heap
page read and write
2577000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
1B10000
heap
page read and write
18F0000
heap
page read and write
2CDB000
trusted library allocation
page read and write
C40000
heap
page read and write
17B033C2000
heap
page read and write
1285C000
trusted library allocation
page read and write
136AC000
trusted library allocation
page read and write
2F80000
heap
page execute and read and write
33A8000
trusted library allocation
page read and write
3463000
trusted library allocation
page read and write
26B5CC80000
heap
page read and write
7FFD34760000
trusted library allocation
page read and write
1917000
heap
page read and write
17D5E679000
heap
page read and write
1B4BB000
stack
page read and write
7FFD34920000
trusted library allocation
page read and write
12800000
trusted library allocation
page read and write
7FFD347A4000
trusted library allocation
page read and write
327F000
trusted library allocation
page read and write
1450000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
1D054000
heap
page read and write
1BF1F000
stack
page read and write
131CD000
trusted library allocation
page read and write
7FFD347A8000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
2874000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
3621000
trusted library allocation
page read and write
13223000
trusted library allocation
page read and write
2DED000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
1BB10000
trusted library section
page read and write
7FFD34900000
trusted library allocation
page read and write
1E627FD0000
heap
page read and write
7FFD3498D000
trusted library allocation
page read and write
1472000
unkown
page readonly
7FFD34866000
trusted library allocation
page execute and read and write
27D9000
heap
page read and write
33BF000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD348E1000
trusted library allocation
page execute and read and write
15908FC000
stack
page read and write
B3F000
stack
page read and write
24CF000
stack
page read and write
117D000
heap
page read and write
12797000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
1BE78000
heap
page read and write
2FEF000
trusted library allocation
page read and write
133C7000
trusted library allocation
page read and write
126E000
stack
page read and write
1346D000
trusted library allocation
page read and write
143D000
heap
page read and write
12DCE000
trusted library allocation
page read and write
27CE000
stack
page read and write
27ED000
heap
page read and write
120A000
heap
page read and write
1B71D000
stack
page read and write
7FFD34797000
trusted library allocation
page read and write
13A2F000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
1478000
heap
page read and write
2190000
trusted library allocation
page read and write
7FFD349AD000
trusted library allocation
page read and write
7FFD34909000
trusted library allocation
page read and write
1365B000
trusted library allocation
page read and write
1002000
heap
page read and write
17B03390000
heap
page read and write
13A62000
trusted library allocation
page read and write
7FFD349B2000
trusted library allocation
page read and write
7FFD34792000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
10A845CF000
direct allocation
page read and write
143F000
heap
page read and write
7FFD34850000
trusted library allocation
page read and write
25FF000
trusted library allocation
page read and write
7FFD3495C000
trusted library allocation
page read and write
13A80000
trusted library allocation
page read and write
12A9E000
trusted library allocation
page read and write
2260000
heap
page execute and read and write
7FFD34967000
trusted library allocation
page read and write
A46000
unkown
page readonly
1230000
heap
page read and write
C1A000
heap
page read and write
7FFD34810000
trusted library allocation
page read and write
1070000
heap
page read and write
27C2000
heap
page read and write
1400000
heap
page read and write
86E000
unkown
page write copy
7FFD34C57000
trusted library allocation
page read and write
12C4A000
trusted library allocation
page read and write
1301000
stack
page read and write
10A82C55000
heap
page read and write
7FFD349D0000
trusted library allocation
page execute and read and write
1590000
heap
page read and write
7FFD3497D000
trusted library allocation
page read and write
10A82C2D000
heap
page read and write
7FFD34C60000
trusted library allocation
page read and write
863000
unkown
page readonly
12F2A000
trusted library allocation
page read and write
34F4000
trusted library allocation
page read and write
7FFD34992000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page execute and read and write
7FFD347EC000
trusted library allocation
page execute and read and write
1BA20000
heap
page read and write
1883000
trusted library allocation
page execute and read and write
7FFD349A4000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
7FFD347CB000
trusted library allocation
page execute and read and write
2FA9000
heap
page read and write
1EDC8000
stack
page read and write
13B67000
trusted library allocation
page read and write
7FFD34946000
trusted library allocation
page read and write
2BA1000
trusted library allocation
page read and write
1502000
heap
page read and write
7FFD34C63000
trusted library allocation
page read and write
7FFD34794000
trusted library allocation
page read and write
13A13000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
2BF3000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
1440000
heap
page read and write
7FFD349AD000
trusted library allocation
page read and write
1B85D000
heap
page read and write
30E0000
trusted library allocation
page read and write
12B43000
trusted library allocation
page read and write
5DF0000
heap
page execute and read and write
1CCFF000
stack
page read and write
751000
stack
page read and write
281A000
heap
page read and write
30D1000
trusted library allocation
page read and write
25DB000
trusted library allocation
page read and write
12776000
trusted library allocation
page read and write
2C1F000
trusted library allocation
page read and write
732000
heap
page read and write
1295B000
trusted library allocation
page read and write
134D3000
trusted library allocation
page read and write
2D92000
stack
page read and write
13C4A000
trusted library allocation
page read and write
BCF000
stack
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
7FFD349A2000
trusted library allocation
page read and write
7D3000
heap
page read and write
7FFD349B2000
trusted library allocation
page read and write
7FFD3490C000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
17B033DB000
heap
page read and write
7FFD34994000
trusted library allocation
page read and write
7FFD348C3000
trusted library allocation
page execute and read and write
1420000
heap
page read and write
1C451000
stack
page read and write
1480000
heap
page execute and read and write
1BEAE000
stack
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
2560000
trusted library allocation
page read and write
5F00000
heap
page read and write
2F74000
trusted library allocation
page read and write
1413000
heap
page read and write
28F8000
trusted library allocation
page read and write
132D8000
trusted library allocation
page read and write
12BDD000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
2620000
heap
page read and write
C45000
heap
page read and write
1110000
heap
page read and write
D20000
heap
page read and write
3100000
trusted library allocation
page read and write
33BA000
trusted library allocation
page read and write
7FFD347A8000
trusted library allocation
page read and write
13B0000
heap
page read and write
12A62000
trusted library allocation
page read and write
7FFD347A8000
trusted library allocation
page read and write
2D82000
trusted library allocation
page read and write
7FFD34938000
trusted library allocation
page read and write
1802000
heap
page read and write
28BE000
stack
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
7FFD34960000
trusted library allocation
page read and write
1281C000
trusted library allocation
page read and write
12A68000
trusted library allocation
page read and write
13127000
trusted library allocation
page read and write
DFAC8FF000
stack
page read and write
13896000
trusted library allocation
page read and write
5DA0000
heap
page read and write
F2E000
stack
page read and write
7FFD34970000
trusted library allocation
page read and write
10A82C73000
heap
page read and write
3151000
trusted library allocation
page read and write
5DDE000
stack
page read and write
12901000
trusted library allocation
page read and write
2B9F000
stack
page read and write
7FFD348A0000
trusted library allocation
page execute and read and write
5F00000
heap
page read and write
7FFD3496C000
trusted library allocation
page read and write
1AE90000
heap
page execute and read and write
2D6D000
trusted library allocation
page read and write
1281A000
trusted library allocation
page read and write
25F4000
trusted library allocation
page read and write
17B03564000
heap
page read and write
129FE000
trusted library allocation
page read and write
7FFD3493A000
trusted library allocation
page read and write
1B800000
heap
page read and write
BF0000
heap
page read and write
1B670000
heap
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
12DC6000
trusted library allocation
page read and write
282B000
trusted library allocation
page read and write
10A82C7C000
heap
page read and write
1B77E000
stack
page read and write
12C81000
trusted library allocation
page read and write
7A0000
heap
page read and write
7FFD34AA2000
trusted library allocation
page read and write
3149000
trusted library allocation
page read and write
2C00000
heap
page execute and read and write
10A82D50000
direct allocation
page read and write
1B6DE000
stack
page read and write
2D4B000
trusted library allocation
page read and write
13637000
trusted library allocation
page read and write
106D000
heap
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
1890000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
283B000
trusted library allocation
page read and write
1326D000
trusted library allocation
page read and write
1BE20000
heap
page read and write
366E000
trusted library allocation
page read and write
7FFD347BD000
trusted library allocation
page execute and read and write
1D2FE000
stack
page read and write
364F000
stack
page read and write
892000
unkown
page read and write
2CFF000
trusted library allocation
page read and write
1345F000
trusted library allocation
page read and write
17B033D5000
heap
page read and write
7FFD34964000
trusted library allocation
page read and write
D70000
heap
page read and write
7FFD34958000
trusted library allocation
page read and write
13835000
trusted library allocation
page read and write
1B10A000
heap
page read and write
1290000
trusted library allocation
page read and write
770000
trusted library allocation
page read and write
2D85000
stack
page read and write
7FFD34792000
trusted library allocation
page read and write
27CE000
heap
page read and write
12821000
trusted library allocation
page read and write
378E000
stack
page read and write
1E628010000
heap
page read and write
7FFD3493C000
trusted library allocation
page read and write
2819000
heap
page read and write
128C8000
trusted library allocation
page read and write
12C86000
trusted library allocation
page read and write
22608690000
heap
page read and write
281A000
heap
page read and write
7FFD349C4000
trusted library allocation
page read and write
7FFD34938000
trusted library allocation
page read and write
2C2B000
trusted library allocation
page read and write
10A82C3C000
heap
page read and write
3309000
heap
page read and write
1BCAE000
stack
page read and write
130FF000
trusted library allocation
page read and write
7FFD34793000
trusted library allocation
page read and write
580000
heap
page read and write
2260866B000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
1B4EC000
heap
page read and write
1AE40000
heap
page read and write
1C36B000
stack
page read and write
1C160000
heap
page read and write
2FA0000
heap
page read and write
7FFD34C1C000
trusted library allocation
page read and write
2D7A000
trusted library allocation
page read and write
7FFD34772000
trusted library allocation
page read and write
A35000
heap
page read and write
7FFD34997000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
516F000
stack
page read and write
7FFD347B8000
trusted library allocation
page read and write
10A82C31000
heap
page read and write
1B4DE000
stack
page read and write
13015000
trusted library allocation
page read and write
25F6000
trusted library allocation
page read and write
140348000
unkown
page execute read
25B7000
trusted library allocation
page read and write
12C38000
trusted library allocation
page read and write
3283000
trusted library allocation
page read and write
7FFD347B4000
trusted library allocation
page read and write
3212000
heap
page read and write
12DC8000
trusted library allocation
page read and write
1EEC5000
stack
page read and write
25BD000
trusted library allocation
page read and write
2E5E000
stack
page read and write
135B000
stack
page read and write
7B0000
heap
page read and write
381000
stack
page read and write
1BABE000
stack
page read and write
10A82B40000
heap
page read and write
C1D000
heap
page read and write
1ADC1000
heap
page read and write
2D47000
trusted library allocation
page read and write
1C510000
heap
page execute and read and write
2FEC000
trusted library allocation
page read and write
2D7C000
trusted library allocation
page read and write
7FFD349BD000
trusted library allocation
page read and write
17B04D50000
direct allocation
page read and write
12878000
trusted library allocation
page read and write
1B630000
heap
page execute and read and write
1902000
heap
page read and write
1208000
heap
page read and write
325B000
trusted library allocation
page read and write
12F14000
trusted library allocation
page read and write
136EC000
trusted library allocation
page read and write
7FFD3498D000
trusted library allocation
page read and write
CE0000
heap
page read and write
1408C0000
unkown
page readonly
22608694000
heap
page read and write
1B08E000
stack
page read and write
17D0000
heap
page execute and read and write
9D0000
heap
page read and write
830000
unkown
page readonly
7FFD34783000
trusted library allocation
page execute and read and write
23C9000
heap
page read and write
2F6F000
trusted library allocation
page read and write
1962000
heap
page read and write
5EC000
heap
page read and write
7FFD3495C000
trusted library allocation
page read and write
12DC1000
trusted library allocation
page read and write
13A6F000
trusted library allocation
page read and write
2D5A000
trusted library allocation
page read and write
EFE000
stack
page read and write
7FFD347A8000
trusted library allocation
page read and write
1370000
heap
page read and write
33B9000
trusted library allocation
page read and write
3367000
trusted library allocation
page read and write
26D1000
trusted library allocation
page read and write
13C08000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
6F0000
heap
page read and write
12C17000
trusted library allocation
page read and write
10A845BD000
direct allocation
page read and write
4B7E000
stack
page read and write
3129000
trusted library allocation
page read and write
2C11000
trusted library allocation
page read and write
13ACE000
trusted library allocation
page read and write
22608693000
heap
page read and write
3259000
trusted library allocation
page read and write
13BFF000
trusted library allocation
page read and write
7FFD3494C000
trusted library allocation
page read and write
7FFD349A2000
trusted library allocation
page read and write
D88000
heap
page read and write
C11000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
13451000
trusted library allocation
page read and write
33FD000
trusted library allocation
page read and write
199E000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
1690000
heap
page read and write
134C4000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
12869000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
12F21000
trusted library allocation
page read and write
1449000
heap
page read and write
CB4000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
3676000
trusted library allocation
page read and write
There are 2218 hidden memdumps, click here to show them.