IOC Report
SourceTreeSetup-3.4.19.exe

loading gif

Files

File Path
Type
Category
Malicious
SourceTreeSetup-3.4.19.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\SourceTree\Update.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\RestSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\SquirrelTemp\Update.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Atlassian\SourceTree.exe_Url_iowtohs3cjx4kmt5lg3h4wlwlg2oe3i2\3.4.19.0\Assemblies.cache
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Atlassian\SourceTree.exe_Url_iowtohs3cjx4kmt5lg3h4wlwlg2oe3i2\3.4.19.0\Composition.cache
data
dropped
C:\Users\user\AppData\Local\Atlassian\SourceTree.exe_Url_iowtohs3cjx4kmt5lg3h4wlwlg2oe3i2\3.4.19.0\Startup.Profile
data
dropped
C:\Users\user\AppData\Local\Atlassian\SourceTree\7309d2d8-dc1e-4f4a-a19f-f2735923a58asourcetree.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Atlassian\SourceTree\sourcetree.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SourceTree.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Update.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\SourceTree\SourceTree.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Atlassian.AnalyticsService.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Atlassian.FastTree.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Atlassian.GutenbergTextView.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Atlassian.PathTrimmingTextBlock.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Atlassian.Utilities.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\BitbucKit.Net.Api.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\BitbucKit.Net.Refit.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\BitbucKitServer.Net.Api.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\BitbucKitServer.Net.Refit.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\ColorCode.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\DeltaCompressionDotNet.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\DesktopBridge.Helpers.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\DevOne.Security.Cryptography.BCrypt.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Dragablz.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\DynamicData.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\EncodingTools.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\GitLabApiClient.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\GongSolutions.Wpf.DragDrop.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\HtmlAgilityPack.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Kent.Boogaart.Converters.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Kent.Boogaart.HelperTrinity.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\LibGit2Sharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Alm.Authentication.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Alm.Git.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Alm.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Expression.Interactions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Extensions.Configuration.Abstractions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Extensions.Configuration.Binder.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Extensions.Configuration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Extensions.DependencyInjection.Abstractions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Extensions.Logging.Abstractions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Extensions.Logging.Configuration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Extensions.Logging.Console.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Extensions.Logging.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Extensions.Options.ConfigurationExtensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Extensions.Options.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Extensions.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.IdentityModel.Clients.ActiveDirectory.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.IdentityModel.Logging.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.IdentityModel.Tokens.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Build.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Build.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Build2.WebApi.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Core.WebApi.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Dashboards.WebApi.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.DeleteTeamProject.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Diff.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Discussion.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.DistributedTask.Common.Contracts.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Git.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Lab.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Lab.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Lab.TestIntegration.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Lab.WorkflowIntegration.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Policy.WebApi.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.ProjectManagement.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.SharePointReporting.Integration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.SourceControl.WebApi.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Test.WebApi.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.TestImpact.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.TestManagement.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.TestManagement.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.TestManagement.WebApi.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.VersionControl.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.VersionControl.Common.Integration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.VersionControl.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Wiki.WebApi.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.Work.WebApi.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.WorkItemTracking.Client.DataStoreLoader.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.WorkItemTracking.Client.QueryLanguage.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.WorkItemTracking.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.WorkItemTracking.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.WorkItemTracking.Proxy.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.TeamFoundation.WorkItemTracking.WebApi.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.VisualStudio.Composition.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.VisualStudio.Services.Client.Interactive.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.VisualStudio.Services.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.VisualStudio.Services.WebApi.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.VisualStudio.Validation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.Web.XmlTransform.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.WindowsAPICodePack.Shell.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Microsoft.WindowsAPICodePack.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Mono.Cecil.Mdb.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Mono.Cecil.Pdb.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Mono.Cecil.Rocks.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Mono.Cecil.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\MvvmValidation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Nito.AsyncEx.Tasks.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Nito.Disposables.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\NotificationsExtensions.Win10.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\NuGet.Squirrel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Nuget.Core.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Octokit.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\ReactiveUI.WPF.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\ReactiveUI.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Refit.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Resources\auth.html
HTML document, Unicode text, UTF-8 (with BOM) text, with very long lines (13626)
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SharpCompress.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Accounts.Windows.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Analytics.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Api.Account.Basic.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Api.Account.OAuth.TwoZero.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Api.Account.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Api.Analytics.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Api.Benchmark.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Api.CustomActions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Api.Dvcs.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Api.Framework.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Api.Host.Identity.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Api.Host.Scm.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Api.Host.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Api.UI.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Api.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Dvcs.Git.UI.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Dvcs.Git.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Dvcs.Hg.Ui.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Dvcs.Hg.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Dvcs.None.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Host.AtlassianAccount.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Host.Bitbucket.Server.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Host.Bitbucket.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Host.GitHub.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Localisation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.UI.CommitContainer.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.UI.Diff.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.UI.FileListContainer.NoStaging.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.UI.Theme.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.UI.Window.Welcome.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Ui.FileList.MultiColumn.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Ui.FileList.SingleColumn.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Ui.FileList.TreeView.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.Ui.FileListContainer.Split.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Sourcetree.Analytics.Emau.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Sourcetree.Api.Account.Pat.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Sourcetree.Composition.VSMef.Net48.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Sourcetree.Host.GitLab.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Sourcetree.Host.Msft.TeamServices.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Sourcetree.Installer.Squirrel.UI.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Sourcetree.Installer.Squirrel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Splat.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Squirrel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Svg.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.Collections.Immutable.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.Composition.AttributedModel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.Composition.Convention.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.Composition.Hosting.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.Composition.Runtime.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.Composition.TypedParts.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.IdentityModel.Tokens.Jwt.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.Memory.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.Net.Http.Formatting.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.Numerics.Vectors.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.Reactive.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.Runtime.CompilerServices.Unsafe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.Threading.Tasks.Dataflow.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.Threading.Tasks.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.Web.Http.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\System.Windows.Interactivity.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\TaskDialog.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\TimeZoneConverter.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\Validation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\WeeGems.Option.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\WeeGems.Require.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\chimera.extensions.logging.log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\de\SourceTree.Localisation.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\PortableGitLfsBitbucketMediaApi-1.0.5.7z
7-zip archive data, version 0.3
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\gcmw-v1.17.1.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\gitignore_global_default.txt
ASCII text
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\hgext\hgflow\hgflow.py
Python script, ASCII text executable
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\hgignore_global_default.txt
ASCII text
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\licenses\7zip.txt
ASCII text
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\licenses\Apache2.htm
HTML document, ASCII text, with very long lines (948)
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\licenses\CPOL.htm
HTML document, Non-ISO extended-ASCII text
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\licenses\EULA.pdf
PDF document, version 1.4, 17 pages
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\licenses\GongDragDrop.htm
HTML document, ASCII text, with very long lines (759)
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\licenses\PuTTY.htm
HTML document, ASCII text, with very long lines (447)
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\licenses\WPFConverters.htm
HTML document, ASCII text, with very long lines (412)
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\licenses\gpl2.txt
ASCII text
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\licenses\json.net.htm
ASCII text
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\licenses\octokit.net.htm
ASCII text
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\licenses\slf4net.htm
HTML document, Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\extras\mcmw-v1.11.96.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\fr\SourceTree.Localisation.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\icons\Notification\SourceTree.ico
MS Windows icon resource - 5 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\icons\transparent16x16@2x.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\id\SourceTree.Localisation.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\it-IT\SourceTree.Localisation.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\ja\SourceTree.Localisation.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\ko\SourceTree.Localisation.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\lib\win32\x64\git2-106a5f2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\lib\win32\x86\git2-106a5f2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\log4net.Alpha.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\log4net.Beta.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\log4net.Custom.config
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\log4net.GA.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\log4net.Portable.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\log4net.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\pt-BR\SourceTree.Localisation.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\ru\SourceTree.Localisation.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\slf4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\slf4net.log4net.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\7z.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\7z.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\Askpass.UI.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\Askpass.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\SourceTreeShared.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\getopt.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\libiconv2.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\libintl3.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\msys-1.0.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\openssh_add.cmd
DOS batch file, ASCII text
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\patch-2.6.1-1-msys-1.0.13-src.tar.lzma
LZMA compressed data, streamed
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\patch.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\patch.exe.manifest
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\putty\pageant.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\putty\plink.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\putty\puttygen.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\stree_gri.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\tools\svn.pl
ASCII text
dropped
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\zh-CN\SourceTree.Localisation.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\SourceTree\app.ico
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\SourceTree\packages\.betaId
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\AppData\Local\SourceTree\packages\RELEASES
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\AppData\Local\SourceTree\packages\SourceTree-3.4.19-full.nupkg
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\SourceTree\packages\SquirrelTemp\tempa
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\AppData\Local\SquirrelTemp\RELEASES
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\AppData\Local\SquirrelTemp\SourceTree-3.4.19-full.nupkg
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\SquirrelTemp\SquirrelSetup.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\SquirrelTemp\background.gif
GIF image data, version 89a, 362 x 226
dropped
C:\Users\user\AppData\Local\Temp\.squirrel-lock-7FD03AB0DF75386580AE5482BAADF2764ECEC87C
ISO-8859 text, with CR line terminators
dropped
C:\Users\user\AppData\Local\Temp\.squirrel-lock-961713371D5A067DA1230C6D82D2C59030937F59
ISO-8859 text, with CR line terminators
dropped
C:\Users\user\AppData\Local\Temp\0ec06d71-9649-4362-8843-811bd9439d81.png
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Atlassian\Sourcetree.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Tue Oct 1 14:04:48 2024, mtime=Tue Oct 1 14:04:48 2024, atime=Tue Oct 1 14:04:48 2024, length=301008, window=hide
dropped
C:\Users\user\Desktop\Sourcetree.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Tue Oct 1 14:04:48 2024, mtime=Tue Oct 1 14:04:55 2024, atime=Tue Oct 1 14:04:48 2024, length=301008, window=hide
dropped
There are 243 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\SquirrelTemp\Update.exe
"C:\Users\user\AppData\Local\SquirrelTemp\Update.exe" --install . --rerunningWithoutUAC
malicious
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.exe
"C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.exe" --squirrel-install 3.4.19
malicious
C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.exe
"C:\Users\user\AppData\Local\SourceTree\app-3.4.19\SourceTree.exe" --squirrel-firstrun
malicious
C:\Users\user\Desktop\SourceTreeSetup-3.4.19.exe
"C:\Users\user\Desktop\SourceTreeSetup-3.4.19.exe"
C:\Users\user\Desktop\SourceTreeSetup-3.4.19.exe
"C:\Users\user\Desktop\SourceTreeSetup-3.4.19.exe" --rerunningWithoutUAC

URLs

Name
IP
Malicious
https://github.com/myuser/myrepo
unknown
http://defaultcontainer/lib/net45/Kent.Boogaart.HelperTrinity.dlld
unknown
http://defaultcontainer/tempfiles/sample.pngd
unknown
http://defaultcontainer/lib/net45/System.Threading.Tasks.Dataflow.dlld
unknown
http://github.com/git/git?
unknown
http://defaultcontainer/lib/net45/BitbucKit.Net.Api.dll
unknown
http://defaultcontainer/lib/net45/BitbucKitServer.Net.Api.dll
unknown
http://defaultcontainer/lib/net45/ru/SourceTree.Localisation.resources.dll
unknown
http://defaultcontainer/lib/net45/RestSharp.dlld
unknown
http://defaultcontainer/lib/net45/Refit.dlld
unknown
http://defaultcontainer/lib/net45/SourceTree.Ui.FileList.SingleColumn.Wpf.dll
unknown
http://defaultcontainer/lib/net45/Atlassian.FastTree.dlld
unknown
http://defaultcontainer/lib/net45/SourceTree.Api.Host.dlld
unknown
http://defaultcontainer/lib/net45/ReactiveUI.dlld
unknown
http://defaultcontainer/tempfiles/sample.exe
unknown
http://defaultcontainer/lib/net45/SourceTree.Api.Account.dlld
unknown
http://defaultcontainer/lib/net45/Sourcetree.Host.GitLab.dll
unknown
http://defaultcontainer/lib/net45/SourceTree.Host.Bitbucket.dlld
unknown
http://defaultcontainer/lib/net45/Sourcetree.Installer.Squirrel.dll
unknown
http://defaultcontainer/lib/net45/Microsoft.TeamFoundation.DistributedTask.Common.Contracts.dll
unknown
http://defaultcontainer/lib/net45/Microsoft.Alm.dlld
unknown
http://defaultcontainer/lib/net45/SourceTree.Api.Host.Identity.dlld
unknown
https://github.com/yadyn/WPF-Task-Dialog?
unknown
http://defaultcontainer/lib/net45/extras/PortableGitLfsBitbucketMediaApi-1.0.5.7z
unknown
http://defaultcontainer/lib/net45/DynamicData.dll
unknown
http://defaultcontainer/lib/net45/SourceTree.Api.Analytics.dlld
unknown
http://defaultcontainer/lib/net45/extras/licenses/Apache2.htmd
unknown
http://defaultcontainer/tempfiles/sample.shasumd
unknown
http://defaultcontainer/lib/net45/Microsoft.Extensions.Primitives.dll
unknown
http://defaultcontainer/lib/net45/Kent.Boogaart.Converters.dll
unknown
http://schemas.openxmlformats.or
unknown
http://defaultcontainer/lib/net45/de/SourceTree.Localisation.resources.dlld
unknown
http://defaultcontainer/tempfiles/sample.pld
unknown
http://defaultcontainer/lib/net45/SourceTree.Api.Host.dll
unknown
http://defaultcontainer/lib/net45/pt-BR/SourceTree.Localisation.resources.dll
unknown
http://defaultcontainer/lib/net45/fr/SourceTree.Localisation.resources.dlld
unknown
http://defaultcontainer/lib/net45/MvvmValidation.dlld
unknown
http://defaultcontainer/lib/net45/SourceTree.Ui.FileListContainer.Split.Wpf.dll
unknown
http://defaultcontainer/lib/net45/SourceTree.Ui.FileList.TreeView.Wpf.dll
unknown
http://defaultcontainer/lib/net45/tools/libintl3.dll
unknown
http://defaultcontainer/lib/net45/System.Composition.Runtime.dll
unknown
http://defaultcontainer/lib/net45/Validation.dlld
unknown
http://defaultcontainer/lib/net45/Atlassian.FastTree.dll
unknown
http://defaultcontainer/lib/net45/SourceTree.Api.Benchmark.dll
unknown
http://defaultcontainer/lib/net45/extras/hgext/hgflow/hgflow.py
unknown
http://defaultcontainer/lib/net45/SourceTree.Api.Account.Basic.dlld
unknown
http://defaultcontainer/lib/net45/tools/patch-2.6.1-1-msys-1.0.13-src.tar.lzma
unknown
http://defaultcontainer/SourceTree.nuspecd
unknown
http://defaultcontainer/lib/net45/System.Collections.Immutable.dlld
unknown
http://defaultcontainer/lib/net45/SourceTree.Ui.FileList.TreeView.Wpf.dlld
unknown
https://product-downloads.atlassian.com/software/sourcetree/windows/ga/sourcetree_ga.ico
3.161.73.137
http://defaultcontainer/lib/net45/Microsoft.TeamFoundation.Lab.TestIntegration.Client.dll
unknown
http://defaultcontainer/lib/net45/tools/Askpass.UI.Wpf.dll
unknown
http://openid.net/specs/jwt/1.0Hurn:ietf:params:oauth:token-type:jwt
unknown
http://defaultcontainer/lib/net45/Microsoft.TeamFoundation.VersionControl.Common.Integration.dll
unknown
http://defaultcontainer/tempfiles/sample.png
unknown
https://product-downloads.atlassian.com
unknown
https://github.com/aspnet/Extensions/tree/9bc79b2f25a3724376d7af19617c33749a30ea3a
unknown
http://defaultcontainer/lib/net45/Microsoft.TeamFoundation.WorkItemTracking.WebApi.dll
unknown
http://defaultcontainer/lib/net45/tools/putty/plink.exed
unknown
http://defaultcontainer/lib/net45/System.Numerics.Vectors.dll
unknown
http://defaultcontainer/lib/net45/Microsoft.IdentityModel.Logging.dll
unknown
http://defaultcontainer/lib/net45/Microsoft.TeamFoundation.TestManagement.Common.dlld
unknown
http://defaultcontainer/lib/net45/tools/svn.pl
unknown
http://defaultcontainer/lib/net45/SourceTree.Analytics.dll
unknown
http://dragablz.net/winfx/xaml/dragablz
unknown
http://defaultcontainer/lib/net45/Atlassian.Utilities.dll
unknown
http://defaultcontainer/lib/net45/Microsoft.TeamFoundation.Build.Client.dlld
unknown
http://defaultcontainer/lib/net45/System.Threading.Tasks.Dataflow.dll
unknown
http://defaultcontainer/lib/net45/Mono.Cecil.dll
unknown
http://defaultcontainer/lib/net45/slf4net.log4net.dlld
unknown
http://defaultcontainer/tempfiles/sample.manifest
unknown
http://defaultcontainer/lib/net45/tools/7z.dlld
unknown
https://github.com/punker76/gong-wpf-dragdrop?
unknown
http://defaultcontainer/lib/net45/Sourcetree.Installer.Squirrel.UI.dlld
unknown
http://defaultcontainer/lib/net45/extras/hgext/hgflow/hgflow.pyd
unknown
http://d145e4fdyl6drh.cloudfront.net
unknown
http://www.putty.org/?
unknown
http://defaultcontainer/lib/net45/Dragablz.dlld
unknown
http://defaultcontainer/lib/net45/Microsoft.TeamFoundation.WorkItemTracking.Proxy.dlld
unknown
http://defaultcontainer/lib/net45/Microsoft.TeamFoundation.VersionControl.Client.dll
unknown
http://defaultcontainer/tempfiles/sample.dlld
unknown
http://defaultcontainer/lib/net45/System.Reactive.dll
unknown
http://defaultcontainer/lib/net45/Atlassian.GutenbergTextView.dll
unknown
http://defaultcontainer/lib/net45/Microsoft.TeamFoundation.Common.dlld
unknown
http://defaultcontainer/tempfiles/sample.txtd
unknown
http://defaultcontainer/lib/net45/Microsoft.TeamFoundation.DeleteTeamProject.dlld
unknown
http://defaultcontainer/lib/net45/Microsoft.VisualStudio.Services.Common.dlld
unknown
http://defaultcontainer/lib/net45/SourceTree_ExecutionStub.exed
unknown
http://defaultcontainer/tempfiles/sample.lzma
unknown
http://defaultcontainer/lib/net45/fr/SourceTree.Localisation.resources.dll
unknown
http://defaultcontainer/lib/net45/DevOne.Security.Cryptography.BCrypt.dlld
unknown
https://github.com/WilliamABradley/ColorCode-Universal/blob/master/license.md?
unknown
http://defaultcontainer/lib/net45/Microsoft.Alm.Authentication.dlld
unknown
http://defaultcontainer/tempfiles/sample.htmd
unknown
https://github.com/WilliamABradley/ColorCode-Universal/?
unknown
http://defaultcontainer/lib/net45/DevOne.Security.Cryptography.BCrypt.dll
unknown
http://defaultcontainer/lib/net45/log4net.Alpha.configd
unknown
http://defaultcontainer/lib/net45/WeeGems.Require.dlld
unknown
https://github.com/ButchersBoy/Dragablz/blob/master/LICENSE?
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
d145e4fdyl6drh.cloudfront.net
3.161.73.137
product-downloads.atlassian.com
unknown

IPs

IP
Domain
Country
Malicious
3.161.73.137
d145e4fdyl6drh.cloudfront.net
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Update_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Update_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Update_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Update_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Update_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Update_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Update_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Update_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Update_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Update_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Update_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Update_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Update_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Update_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SourceTree
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SourceTree
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SourceTree
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SourceTree
InstallDate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SourceTree
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SourceTree
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SourceTree
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SourceTree
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SourceTree
URLUpdateInfo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SourceTree
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SourceTree
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SourceTree
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SourceTree
Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
SourceTree.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SourceTree_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SourceTree_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SourceTree_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SourceTree_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SourceTree_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SourceTree_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SourceTree_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SourceTree_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SourceTree_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SourceTree_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SourceTree_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SourceTree_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SourceTree_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SourceTree_RASMANCS
FileDirectory
There are 35 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1D3EBEA3000
heap
page read and write
7FF8499D2000
trusted library allocation
page read and write
7FF849470000
trusted library allocation
page read and write
7FF849330000
trusted library allocation
page read and write
1D7F455E000
unkown
page readonly
35F3000
trusted library allocation
page read and write
1D7DB560000
unkown
page readonly
62AB000
stack
page read and write
1D3EBF64000
heap
page read and write
7FF849D70000
trusted library allocation
page read and write
1D3EEB60000
unkown
page readonly
1D7F4A52000
unkown
page readonly
7FF849A60000
trusted library allocation
page read and write
7FF849D10000
trusted library allocation
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
7FF849AA0000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
1D7F4CD2000
unkown
page readonly
7FF449244000
trusted library allocation
page readonly
7FF84955A000
trusted library allocation
page read and write
341D000
trusted library allocation
page read and write
7FF849400000
trusted library allocation
page read and write
3C300FF000
stack
page read and write
7FF849660000
trusted library allocation
page read and write
B7346ED000
stack
page read and write
68E3000
heap
page read and write
1D3DF16C000
trusted library allocation
page read and write
7FF849D16000
trusted library allocation
page read and write
7FF849AD0000
trusted library allocation
page read and write
9AA000
heap
page read and write
1D3E9B90000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
1D3EDC82000
trusted library allocation
page read and write
7FF849B50000
trusted library allocation
page read and write
1D3E7C20000
trusted library allocation
page read and write
1D7DB647000
trusted library allocation
page read and write
7FF8498F0000
trusted library allocation
page read and write
1D3E9600000
trusted library allocation
page read and write
1D3CF773000
trusted library allocation
page read and write
1670000
heap
page read and write
7FF849BF8000
trusted library allocation
page read and write
1D3DF199000
trusted library allocation
page read and write
1D3CF0F0000
trusted library allocation
page read and write
68EE000
heap
page read and write
3C309FB000
stack
page read and write
7FF849990000
trusted library allocation
page read and write
7FF849587000
trusted library allocation
page read and write
375E000
trusted library allocation
page read and write
1D7F3D32000
heap
page read and write
1862000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
5AA0000
trusted library allocation
page read and write
7FF849175000
trusted library allocation
page read and write
7FF84935D000
trusted library allocation
page read and write
7FF849EC0000
trusted library allocation
page read and write
11DC000
stack
page read and write
7FF849589000
trusted library allocation
page read and write
570000
heap
page read and write
7FF8499A6000
trusted library allocation
page read and write
1D3E9B70000
unkown
page readonly
7FF849150000
trusted library allocation
page read and write
7FF849600000
trusted library allocation
page read and write
1D3CF831000
trusted library allocation
page read and write
1890000
heap
page read and write
7FF849920000
trusted library allocation
page read and write
1833000
trusted library allocation
page execute and read and write
7FF8498E0000
trusted library allocation
page read and write
7FF8491D9000
trusted library allocation
page read and write
1D7F4C92000
unkown
page readonly
7FF8491A0000
trusted library allocation
page execute and read and write
7FF84976F000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
AE7E000
stack
page read and write
7FF8492E9000
trusted library allocation
page read and write
1D7D9C4C000
unkown
page readonly
7FF849890000
trusted library allocation
page read and write
1D7F50F2000
unkown
page readonly
7FF84927D000
trusted library allocation
page read and write
7FF849800000
trusted library allocation
page read and write
DAF000
stack
page read and write
1D7F5700000
unkown
page readonly
7FF84964E000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
1D7F5402000
unkown
page readonly
37A5000
trusted library allocation
page read and write
7FF84957C000
trusted library allocation
page read and write
1820000
trusted library allocation
page read and write
7FF8492D3000
trusted library allocation
page read and write
1D7F5172000
unkown
page readonly
7FF849830000
trusted library allocation
page read and write
1D3CF42F000
trusted library allocation
page read and write
7FF849740000
trusted library allocation
page read and write
7FF84902A000
trusted library allocation
page read and write
1D7F50FE000
unkown
page readonly
7FF8499AC000
trusted library allocation
page read and write
1D3CDA60000
heap
page read and write
7FF449250000
trusted library allocation
page readonly
7FF849C9A000
trusted library allocation
page read and write
B734CFB000
stack
page read and write
37B6000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
7FF849B10000
trusted library allocation
page read and write
1D7DB5A0000
unkown
page readonly
7FF849880000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page read and write
7FF8496F0000
trusted library allocation
page read and write
7FF849810000
trusted library allocation
page read and write
7FF849913000
trusted library allocation
page read and write
1D3EBF9D000
heap
page read and write
1D7F4332000
unkown
page readonly
5A90000
trusted library allocation
page read and write
1D3CD7F9000
heap
page read and write
7FF849DB0000
trusted library allocation
page read and write
7FF849272000
trusted library allocation
page read and write
7FF8497EA000
trusted library allocation
page read and write
1D3CD720000
heap
page read and write
18C8000
heap
page read and write
7FF84956D000
trusted library allocation
page read and write
1D3EBE7C000
heap
page read and write
6991000
heap
page read and write
7FF849530000
trusted library allocation
page read and write
7FF849219000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
1D7F4C10000
unkown
page readonly
7FF849A80000
trusted library allocation
page read and write
7FF849784000
trusted library allocation
page read and write
7FF849C26000
trusted library allocation
page read and write
1D3EE24C000
heap
page read and write
7FF8492EE000
trusted library allocation
page read and write
DEE000
stack
page read and write
1D7F4B42000
unkown
page readonly
1D7F4C52000
unkown
page readonly
37F4000
trusted library allocation
page read and write
6962000
heap
page read and write
18C5000
heap
page read and write
7FF449257000
trusted library allocation
page execute read
1D3E7C00000
trusted library allocation
page read and write
1D3E8B32000
heap
page read and write
1D7F5192000
unkown
page readonly
3C302F6000
stack
page read and write
1D3EC0F3000
heap
page read and write
355E000
trusted library allocation
page read and write
1D3E7B1E000
heap
page read and write
1D7F4940000
unkown
page readonly
1D3CFB8E000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
2907000
heap
page read and write
7FF849840000
trusted library allocation
page read and write
3845000
trusted library allocation
page read and write
A2E3000
heap
page read and write
1D7F4AB0000
unkown
page readonly
B734DFB000
stack
page read and write
AD3E000
stack
page read and write
186B000
trusted library allocation
page execute and read and write
7FF849BC0000
trusted library allocation
page read and write
183D000
trusted library allocation
page execute and read and write
3924000
trusted library allocation
page read and write
6650000
heap
page read and write
7FF849490000
trusted library allocation
page read and write
1D7F3EC0000
heap
page read and write
1D7F4A82000
unkown
page readonly
7FF449262000
trusted library allocation
page readonly
7FF849270000
trusted library allocation
page read and write
7FF8491E0000
trusted library allocation
page read and write
1D7EB62B000
trusted library allocation
page read and write
7FF849960000
trusted library allocation
page read and write
1D3EE1B0000
trusted library allocation
page read and write
7FF849710000
trusted library allocation
page read and write
1D7F4C12000
unkown
page readonly
1D7F4BD2000
unkown
page readonly
1D7F5110000
unkown
page readonly
1D7F4B72000
unkown
page readonly
7FF848E14000
trusted library allocation
page read and write
2900000
heap
page read and write
1D3EE249000
heap
page read and write
1D3EC0E5000
heap
page read and write
7FF849A62000
trusted library allocation
page read and write
7FF848FA4000
trusted library allocation
page read and write
7FF8495AF000
trusted library allocation
page read and write
7FF849B90000
trusted library allocation
page read and write
558C000
stack
page read and write
7FF849018000
trusted library allocation
page read and write
7FF8495EC000
trusted library allocation
page read and write
1D7F5158000
unkown
page readonly
7FF8495D6000
trusted library allocation
page read and write
1D3EE3C9000
heap
page read and write
1D7D9A90000
heap
page read and write
7FF849590000
trusted library allocation
page read and write
93E000
stack
page read and write
1D7F46D1000
heap
page read and write
2904000
heap
page read and write
7FF8491E3000
trusted library allocation
page read and write
580000
heap
page read and write
1D7F5150000
unkown
page readonly
7FF849130000
trusted library allocation
page read and write
6916000
heap
page read and write
1D7F4AC0000
unkown
page readonly
7FF44926B000
trusted library allocation
page execute read
7FF849910000
trusted library allocation
page read and write
1D7F4A50000
unkown
page readonly
1D7F4B56000
unkown
page readonly
1D3CD7D5000
heap
page read and write
3C2F7FF000
stack
page read and write
1D7DC386000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
1D7DB558000
unkown
page readonly
7FF849587000
trusted library allocation
page read and write
7FF8497A0000
trusted library allocation
page read and write
17E0000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
1D7F3EC4000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
7FF84927C000
trusted library allocation
page read and write
3556000
trusted library allocation
page read and write
7FF849860000
trusted library allocation
page execute and read and write
1D3E8BE9000
heap
page read and write
5900000
trusted library allocation
page read and write
7FF849810000
trusted library allocation
page read and write
7FF849720000
trusted library allocation
page read and write
1D3E9BA0000
trusted library section
page readonly
3816000
trusted library allocation
page read and write
1D3EC238000
heap
page read and write
7FF8491C3000
trusted library allocation
page read and write
7FF8495D0000
trusted library allocation
page execute and read and write
7FF8491F0000
trusted library allocation
page read and write
3ECF000
stack
page read and write
7FF849520000
trusted library allocation
page read and write
7FF849820000
trusted library allocation
page read and write
1D7F5702000
unkown
page readonly
7FF849302000
trusted library allocation
page read and write
1D7F55B2000
unkown
page readonly
1D3CD7BF000
heap
page read and write
7FF8492DD000
trusted library allocation
page read and write
1D7F42B0000
unkown
page readonly
7FF849520000
trusted library allocation
page read and write
7FF849428000
trusted library allocation
page read and write
1D7F4302000
unkown
page readonly
60E0000
trusted library allocation
page execute and read and write
E81000
unkown
page execute read
7FF849AD4000
trusted library allocation
page read and write
1D7F4B92000
unkown
page readonly
28D0000
heap
page read and write
7FF8492E2000
trusted library allocation
page read and write
7FF8493A0000
trusted library allocation
page execute and read and write
7FF849950000
trusted library allocation
page execute and read and write
7FF84988C000
trusted library allocation
page read and write
7FF849C30000
trusted library allocation
page read and write
39F4000
trusted library allocation
page read and write
1D3EE3DF000
heap
page read and write
1D3E7C80000
heap
page execute and read and write
7FF8491C0000
trusted library allocation
page read and write
7FF84915D000
trusted library allocation
page read and write
63AA000
stack
page read and write
7FF8492F2000
trusted library allocation
page read and write
1D7F4B98000
unkown
page readonly
1D3CD7CD000
heap
page read and write
7FF8496C0000
trusted library allocation
page read and write
1D7F4B48000
unkown
page readonly
3803000
trusted library allocation
page read and write
1D3EC03D000
heap
page read and write
7FF84928A000
trusted library allocation
page read and write
43B1000
trusted library allocation
page read and write
7FF84931E000
trusted library allocation
page read and write
18AA000
unkown
page readonly
1D7F4312000
unkown
page readonly
7FF849282000
trusted library allocation
page read and write
7FF8497E0000
trusted library allocation
page read and write
B7356FB000
stack
page read and write
7FF849980000
trusted library allocation
page read and write
7FF849AE0000
trusted library allocation
page execute and read and write
1D7F51F0000
trusted library allocation
page read and write
28F9000
heap
page read and write
3883000
trusted library allocation
page read and write
7FF849BF4000
trusted library allocation
page read and write
7FF849DA0000
trusted library allocation
page read and write
5AF3000
heap
page read and write
1D7F4BA8000
unkown
page readonly
7FF849690000
trusted library allocation
page read and write
1D7D9C42000
unkown
page readonly
1540000
heap
page read and write
1D7D9810000
unkown
page readonly
7FF848FD0000
trusted library allocation
page read and write
1D3EBFD9000
heap
page read and write
1D7DB601000
trusted library allocation
page read and write
1D3EBEB3000
heap
page read and write
2904000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
1D3EBF99000
heap
page read and write
38D0000
trusted library allocation
page read and write
7FF849740000
trusted library allocation
page execute and read and write
7FF8492D0000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
7FF849BC0000
trusted library allocation
page read and write
F80000
unkown
page readonly
7FF849C70000
trusted library allocation
page read and write
7FF84929D000
trusted library allocation
page read and write
E60000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF84928D000
trusted library allocation
page read and write
1D7F5130000
unkown
page readonly
1860000
trusted library allocation
page read and write
7FF849DE0000
trusted library allocation
page read and write
1D7F4872000
heap
page read and write
7FF8492B0000
trusted library allocation
page read and write
1D3E9B60000
unkown
page readonly
EAA000
unkown
page readonly
1D3EC0C6000
heap
page read and write
7FF848FAC000
trusted library allocation
page read and write
7FF449266000
trusted library allocation
page readonly
1D7DBE92000
trusted library allocation
page read and write
7FF849A20000
trusted library allocation
page read and write
1D3E7B73000
heap
page read and write
E80000
unkown
page readonly
7FF8492F2000
trusted library allocation
page read and write
7FF849670000
trusted library allocation
page read and write
1D3EBEA1000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
1D3CD8A0000
heap
page execute and read and write
68F5000
heap
page read and write
6BDE000
stack
page read and write
5F50000
heap
page read and write
7FF8492C2000
trusted library allocation
page read and write
1D3E8B6A000
heap
page read and write
1D3CF78E000
trusted library allocation
page read and write
E80000
unkown
page readonly
7FF849650000
trusted library allocation
page read and write
7FF849569000
trusted library allocation
page read and write
1D7D9970000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
1D7DB8E7000
trusted library allocation
page read and write
7FF84953E000
trusted library allocation
page read and write
1D7D9B9A000
heap
page read and write
1D3CF675000
trusted library allocation
page read and write
1D7F5D62000
unkown
page readonly
7FF8492E5000
trusted library allocation
page read and write
7FF849561000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
63ED000
stack
page read and write
1D7F4BC0000
unkown
page readonly
7FF849BF0000
trusted library allocation
page read and write
1D7F4BC2000
unkown
page readonly
3C303FE000
stack
page read and write
7FF849263000
trusted library allocation
page read and write
1D7DB570000
unkown
page readonly
7FF8496E0000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
1D3CFB6E000
trusted library allocation
page read and write
7FF849C50000
trusted library allocation
page read and write
6D1E000
stack
page read and write
7FF849AC0000
trusted library allocation
page read and write
2906000
heap
page read and write
7FF849680000
trusted library allocation
page read and write
37CC000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page execute and read and write
1D7F5162000
unkown
page readonly
6660000
heap
page read and write
7FF8491FA000
trusted library allocation
page read and write
6080000
heap
page read and write
7FF849BA0000
trusted library allocation
page read and write
EAA000
unkown
page readonly
ACFE000
stack
page read and write
58EB000
trusted library allocation
page read and write
1D7F5912000
unkown
page readonly
7FF8492BE000
trusted library allocation
page read and write
7FF449253000
trusted library allocation
page execute read
7FF8497E4000
trusted library allocation
page read and write
7FF8490D4000
trusted library allocation
page read and write
7FF849BC6000
trusted library allocation
page read and write
376E000
trusted library allocation
page read and write
1834000
trusted library allocation
page read and write
7FF849BB1000
trusted library allocation
page read and write
5915000
trusted library allocation
page read and write
5920000
heap
page execute and read and write
1D7D9B60000
heap
page read and write
A543000
trusted library allocation
page read and write
E9D000
unkown
page readonly
7FF8490B0000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
7FF849B90000
trusted library allocation
page read and write
7FF849530000
trusted library allocation
page read and write
7FF8492A7000
trusted library allocation
page read and write
7FF849077000
trusted library allocation
page read and write
1D3EC0FA000
heap
page read and write
7FF8498F0000
trusted library allocation
page read and write
7FF849A50000
trusted library allocation
page read and write
1D7F4CC2000
unkown
page readonly
7FF849430000
trusted library allocation
page read and write
1D7F49A2000
unkown
page readonly
1D3CFD36000
trusted library allocation
page read and write
1D7D9A50000
heap
page read and write
3C2FBF7000
stack
page read and write
1D7D9AB5000
heap
page read and write
7FF849510000
trusted library allocation
page read and write
1D7DB974000
trusted library allocation
page read and write
7FF849620000
trusted library allocation
page read and write
1D7F4BE2000
unkown
page readonly
7FF44925C000
trusted library allocation
page readonly
1D3EC022000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
1D7F4C82000
unkown
page readonly
1D7F51B0000
unkown
page readonly
27E0000
heap
page read and write
7FF84927A000
trusted library allocation
page read and write
1D7F4350000
unkown
page readonly
7FF849360000
trusted library allocation
page read and write
7FF849273000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1D7F5312000
unkown
page readonly
7FF8491C0000
trusted library allocation
page read and write
1D7F5562000
unkown
page readonly
1D7F4B62000
unkown
page readonly
1D3EC0F0000
heap
page read and write
1D7F5400000
unkown
page readonly
1D3E7B48000
heap
page read and write
1D7F5190000
unkown
page readonly
3C304F7000
stack
page read and write
ABFD000
stack
page read and write
1D7F47F2000
heap
page read and write
7FF848E2A000
trusted library allocation
page read and write
64F0000
trusted library allocation
page execute and read and write
7FF849081000
trusted library allocation
page read and write
1D3EEB76000
unkown
page readonly
1D3E79F3000
heap
page read and write
F82000
unkown
page readonly
1D7F5322000
unkown
page readonly
7FF849410000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
7FF8490A8000
trusted library allocation
page read and write
7FF8498A0000
trusted library allocation
page read and write
1D7F4CC0000
unkown
page readonly
EA8000
unkown
page write copy
7FF8491B8000
trusted library allocation
page read and write
1D3CD809000
heap
page read and write
7FF849460000
trusted library allocation
page read and write
1D7F4A80000
unkown
page readonly
EA8000
unkown
page read and write
1D7F4AD2000
unkown
page readonly
1D7F5D54000
unkown
page readonly
1D7F4960000
unkown
page readonly
33B1000
trusted library allocation
page read and write
7FF849440000
trusted library allocation
page read and write
7FF849BD0000
trusted library allocation
page read and write
7FF849C80000
trusted library allocation
page read and write
36C4000
trusted library allocation
page read and write
7FF848EB6000
trusted library allocation
page read and write
1D3CFB88000
trusted library allocation
page read and write
1898000
heap
page read and write
7FF849C70000
trusted library allocation
page read and write
1D7F5370000
unkown
page readonly
1D3CFBA6000
trusted library allocation
page read and write
7FF8497D0000
trusted library allocation
page read and write
198B000
heap
page read and write
1D7F4950000
unkown
page readonly
7FF84924E000
trusted library allocation
page read and write
1D7F46FF000
heap
page read and write
7FF849787000
trusted library allocation
page read and write
1D3EE393000
heap
page read and write
28F5000
heap
page read and write
7FF849642000
trusted library allocation
page read and write
1D7F5320000
unkown
page readonly
7FF849300000
trusted library allocation
page read and write
37F6000
trusted library allocation
page read and write
7FF8497F0000
trusted library allocation
page read and write
5F4F000
stack
page read and write
1D3CF2B5000
trusted library allocation
page read and write
7FF849681000
trusted library allocation
page read and write
1D3EC016000
heap
page read and write
7FF84906E000
trusted library allocation
page read and write
7FF8497E7000
trusted library allocation
page read and write
A2C6000
heap
page read and write
37B0000
trusted library allocation
page read and write
1D7F42C2000
unkown
page readonly
1D3EBE61000
heap
page read and write
1D3E8CC3000
heap
page read and write
1D3CD5B0000
heap
page read and write
1D7F53FC000
unkown
page readonly
1D3EC094000
heap
page read and write
1963000
heap
page read and write
7FF849850000
trusted library allocation
page read and write
B7354FD000
stack
page read and write
7FF848EC6000
trusted library allocation
page read and write
DF0000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF849A10000
trusted library allocation
page read and write
18BA000
heap
page read and write
7FF8499A0000
trusted library allocation
page read and write
1D3E7B00000
heap
page read and write
1D7F40C0000
unkown
page readonly
A20E000
heap
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
1D7F4A02000
unkown
page readonly
7FF849590000
trusted library allocation
page read and write
7FF849940000
trusted library allocation
page read and write
68B9000
heap
page read and write
1D7DBCAB000
trusted library allocation
page read and write
1D3EE387000
heap
page read and write
1D3CF120000
trusted library allocation
page read and write
7FF8499B0000
trusted library allocation
page execute and read and write
7FF849260000
trusted library allocation
page read and write
3617000
trusted library allocation
page read and write
1D7F4B76000
unkown
page readonly
68B3000
heap
page read and write
7FF849288000
trusted library allocation
page read and write
6500000
trusted library allocation
page read and write
7FF849CF0000
trusted library allocation
page read and write
34ED000
trusted library allocation
page read and write
7FF849C80000
trusted library allocation
page read and write
7FF84948E000
trusted library allocation
page read and write
7FF849370000
trusted library allocation
page read and write
7FF849380000
trusted library allocation
page read and write
E81000
unkown
page execute read
1D7EB645000
trusted library allocation
page read and write
7FF849244000
trusted library allocation
page read and write
7FF8492A2000
trusted library allocation
page read and write
7FF8494D0000
trusted library allocation
page execute and read and write
1D3EC126000
heap
page read and write
7FF849A90000
trusted library allocation
page read and write
7FF849C1F000
trusted library allocation
page read and write
7FF8491D0000
trusted library allocation
page read and write
7FF84928A000
trusted library allocation
page read and write
7FF849AB0000
trusted library allocation
page read and write
7FF848FCB000
trusted library allocation
page read and write
7FF849A70000
trusted library allocation
page execute and read and write
1D7F4C90000
unkown
page readonly
7FF8494C0000
trusted library allocation
page read and write
7FF849C28000
trusted library allocation
page read and write
3C301FF000
stack
page read and write
7FF8494E0000
trusted library allocation
page read and write
A254000
heap
page read and write
7FF8491FD000
trusted library allocation
page read and write
7FF849910000
trusted library allocation
page read and write
E9D000
unkown
page readonly
7FF849160000
trusted library allocation
page read and write
AF7C000
stack
page read and write
399C000
trusted library allocation
page read and write
3823000
trusted library allocation
page read and write
7FF849450000
trusted library allocation
page read and write
7FF8494B2000
trusted library allocation
page read and write
1D3E7C10000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
6E5C000
stack
page read and write
7FF8492E0000
trusted library allocation
page read and write
7FF8497F0000
trusted library allocation
page read and write
B73435F000
stack
page read and write
1D3EC011000
heap
page read and write
B0BE000
stack
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF8490E0000
trusted library allocation
page read and write
1D7F4980000
unkown
page readonly
A25D000
heap
page read and write
1D7F4992000
unkown
page readonly
7FF849350000
trusted library allocation
page read and write
E2E000
stack
page read and write
39F0000
trusted library allocation
page read and write
1A99000
heap
page read and write
E80000
unkown
page readonly
7FF8494F0000
trusted library allocation
page execute and read and write
1D7DB5F0000
heap
page read and write
7FF849C40000
trusted library allocation
page read and write
1D7F5CB0000
unkown
page readonly
7FF8492CF000
trusted library allocation
page read and write
7FF8491D0000
trusted library allocation
page read and write
7FF849202000
trusted library allocation
page read and write
1D7D9C10000
trusted library allocation
page read and write
7FF8498C0000
trusted library allocation
page execute and read and write
7FF8490A0000
trusted library allocation
page read and write
1D7D9812000
unkown
page readonly
6D7D000
stack
page read and write
6770000
trusted library allocation
page read and write
1D7DC2AA000
trusted library allocation
page read and write
B7351FE000
stack
page read and write
7FF849D50000
trusted library allocation
page read and write
1D7F5112000
unkown
page readonly
7FF848E04000
trusted library allocation
page read and write
7FF8495A0000
trusted library allocation
page read and write
1D7F489D000
heap
page read and write
7FF8492FE000
trusted library allocation
page read and write
1D7F4982000
unkown
page readonly
1D7F49A0000
unkown
page readonly
7FF8495E1000
trusted library allocation
page read and write
1D7F5AA0000
unkown
page readonly
B7350FB000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
1D7F46CE000
heap
page read and write
7FF8492BA000
trusted library allocation
page read and write
1D3CF959000
trusted library allocation
page read and write
1D7F42F2000
unkown
page readonly
3C2FEFD000
stack
page read and write
32A0000
heap
page execute and read and write
6983000
heap
page read and write
B0FE000
stack
page read and write
7FF849796000
trusted library allocation
page read and write
1A9D000
heap
page read and write
1D7F4BB0000
unkown
page readonly
1D7F5362000
unkown
page readonly
1D3EC132000
heap
page read and write
1D7DBD85000
trusted library allocation
page read and write
6250000
trusted library allocation
page execute and read and write
7FF849A90000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
2700000
heap
page read and write
7FF8492A4000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF44925A000
trusted library allocation
page readonly
50B000
stack
page read and write
1D7DB562000
unkown
page readonly
7FF849470000
trusted library allocation
page read and write
7FF8496A0000
trusted library allocation
page read and write
39E3000
trusted library allocation
page read and write
3964000
trusted library allocation
page read and write
7FF849930000
trusted library allocation
page read and write
98E000
stack
page read and write
7FF84901F000
trusted library allocation
page read and write
7FF8496E0000
trusted library allocation
page read and write
1D7F5832000
unkown
page readonly
1D7F55F4000
unkown
page readonly
7FF849500000
trusted library allocation
page read and write
1D3E8C35000
heap
page read and write
17DE000
stack
page read and write
1D7F4AC2000
unkown
page readonly
7FF849730000
trusted library allocation
page read and write
7FF849320000
trusted library allocation
page read and write
7FF84985A000
trusted library allocation
page read and write
7FF84976A000
trusted library allocation
page read and write
7FF849CE0000
trusted library allocation
page read and write
1D3EE244000
heap
page read and write
7FF849C60000
trusted library allocation
page read and write
1D7F5170000
unkown
page readonly
7FF849D1C000
trusted library allocation
page read and write
7FF849295000
trusted library allocation
page read and write
7FF8492AA000
trusted library allocation
page read and write
7FF849AF0000
trusted library allocation
page read and write
381F000
trusted library allocation
page read and write
1D7F4952000
unkown
page readonly
1D7F4C50000
unkown
page readonly
7FF849960000
trusted library allocation
page read and write
2907000
heap
page read and write
7FF449252000
trusted library allocation
page readonly
7FF849230000
trusted library allocation
page read and write
7FF849B70000
trusted library allocation
page read and write
7FF849781000
trusted library allocation
page read and write
7FF849277000
trusted library allocation
page read and write
1D3DF17B000
trusted library allocation
page read and write
7FF8493D0000
trusted library allocation
page read and write
7FF849022000
trusted library allocation
page read and write
1D7D9B2A000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
7FF8492D0000
trusted library allocation
page read and write
7FF849AB0000
trusted library allocation
page read and write
1D7F46B0000
heap
page read and write
7FF849BCA000
trusted library allocation
page read and write
1D3CD78B000
heap
page read and write
7FF849357000
trusted library allocation
page read and write
7FF849BB0000
trusted library allocation
page execute and read and write
66B0000
heap
page read and write
7FF8492A7000
trusted library allocation
page read and write
7FF449249000
trusted library allocation
page execute read
7FF849314000
trusted library allocation
page read and write
28F8000
heap
page read and write
1D3CF110000
trusted library allocation
page read and write
22AA000
unkown
page readonly
1D7F5210000
unkown
page readonly
1D7F4352000
unkown
page readonly
1D7DB530000
heap
page execute and read and write
7FF848FBB000
trusted library allocation
page read and write
3760000
trusted library allocation
page read and write
7FF849CC0000
trusted library allocation
page read and write
1865000
trusted library allocation
page execute and read and write
7FF849760000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
7FF849480000
trusted library allocation
page read and write
324A000
heap
page read and write
7FF848FFA000
trusted library allocation
page read and write
1D7F40C2000
unkown
page readonly
1D7F5DEC000
unkown
page readonly
7FF849490000
trusted library allocation
page read and write
1D7F4A90000
unkown
page readonly
3806000
trusted library allocation
page read and write
16BE000
stack
page read and write
1D7F5372000
unkown
page readonly
33B9000
trusted library allocation
page read and write
22AA000
unkown
page readonly
7FF449263000
trusted library allocation
page execute read
7FF849510000
trusted library allocation
page read and write
1D7F4C80000
unkown
page readonly
68E5000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
1D7F5CB2000
unkown
page readonly
5F70000
trusted library allocation
page read and write
1D3EC231000
heap
page read and write
1D7F3DF8000
unkown
page readonly
1D3CD853000
trusted library allocation
page read and write
3A09000
trusted library allocation
page read and write
7FF8497F6000
trusted library allocation
page read and write
1D7F4954000
unkown
page readonly
7FF84987C000
trusted library allocation
page read and write
7FF849308000
trusted library allocation
page read and write
7FF449243000
trusted library allocation
page execute read
B1FE000
stack
page read and write
1D3EE1A0000
trusted library allocation
page read and write
1D7F4942000
unkown
page readonly
696A000
heap
page read and write
6E9E000
stack
page read and write
1D3CD840000
trusted library allocation
page read and write
7FF8491EA000
trusted library allocation
page read and write
1D7F500C000
unkown
page readonly
1D3EC032000
heap
page read and write
5CD000
stack
page read and write
7FF44925F000
trusted library allocation
page execute read
7FF849292000
trusted library allocation
page read and write
7FF84901B000
trusted library allocation
page read and write
1D3CD811000
heap
page read and write
7FF8494F0000
trusted library allocation
page read and write
1D7F3DF0000
unkown
page readonly
7FF849D00000
trusted library allocation
page read and write
1D7D9C50000
heap
page read and write
7FF84928D000
trusted library allocation
page read and write
1D7F42BC000
unkown
page readonly
7FF849575000
trusted library allocation
page read and write
1D3EBFE5000
heap
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
7FF849285000
trusted library allocation
page read and write
1D3EC014000
heap
page read and write
1D3E7C83000
heap
page execute and read and write
1D7F3E02000
unkown
page readonly
1D3E7180000
trusted library allocation
page read and write
1D3E8CCA000
heap
page read and write
38F6000
trusted library allocation
page read and write
6972000
heap
page read and write
1140000
unkown
page readonly
7FF8491F0000
trusted library allocation
page read and write
7FF849670000
trusted library allocation
page read and write
7FF449267000
trusted library allocation
page execute read
411F000
stack
page read and write
7FF849E00000
trusted library allocation
page execute and read and write
7FF84908D000
trusted library allocation
page read and write
6070000
heap
page execute and read and write
7FF849580000
trusted library allocation
page read and write
E81000
unkown
page execute read
7FF449255000
trusted library allocation
page execute read
7FF849251000
trusted library allocation
page read and write
1D7D9C40000
unkown
page readonly
7FF849274000
trusted library allocation
page read and write
7FF849800000
trusted library allocation
page read and write
E9D000
unkown
page readonly
1D7D9AFC000
heap
page read and write
7FF849BDA000
trusted library allocation
page read and write
28D8000
heap
page read and write
7FF849420000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
7FF8496B0000
trusted library allocation
page read and write
7FF8494B0000
trusted library allocation
page read and write
1D7F4972000
unkown
page readonly
1D7F4BF2000
unkown
page readonly
7FF849A40000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
1D7DC1F0000
trusted library allocation
page read and write
7FF849500000
trusted library allocation
page read and write
B735AFB000
stack
page read and write
1D3E8D0B000
heap
page read and write
1D7DB40E000
heap
page read and write
2904000
heap
page read and write
7FF8496C0000
trusted library allocation
page read and write
7FF8499B0000
trusted library allocation
page read and write
7FF849650000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page read and write
7FF849C0A000
trusted library allocation
page read and write
3942000
trusted library allocation
page read and write
1D7F4AA0000
unkown
page readonly
3C2F9FF000
stack
page read and write
3918000
trusted library allocation
page read and write
3C2F3FE000
stack
page read and write
37A8000
trusted library allocation
page read and write
7FF849D90000
trusted library allocation
page read and write
1D3EC23A000
heap
page read and write
3770000
trusted library allocation
page read and write
1D7F4BE0000
unkown
page readonly
1D7DB572000
unkown
page readonly
3C2FDFE000
stack
page read and write
7FF8492FB000
trusted library allocation
page read and write
3818000
trusted library allocation
page read and write
1D7DB550000
unkown
page readonly
196C000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
1D7F4CCA000
unkown
page readonly
3850000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
7FF8492C6000
trusted library allocation
page read and write
7FF8494B0000
trusted library allocation
page read and write
1D7F4AE2000
unkown
page readonly
7FF8499A3000
trusted library allocation
page read and write
7FF84905A000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
1D7F41A0000
heap
page read and write
1D3EDAD0000
trusted library allocation
page read and write
7FF849900000
trusted library allocation
page read and write
7FF849610000
trusted library allocation
page read and write
343A000
trusted library allocation
page read and write
1D7F42E0000
unkown
page readonly
7FF849550000
trusted library allocation
page read and write
7FF849970000
trusted library allocation
page read and write
7FF849580000
trusted library allocation
page read and write
D87000
stack
page read and write
1852000
trusted library allocation
page read and write
1D7F4976000
unkown
page readonly
6760000
trusted library allocation
page read and write
1D3CF781000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
1D7F3630000
trusted library allocation
page read and write
1D7F5560000
unkown
page readonly
356F000
trusted library allocation
page read and write
7FF8490A2000
trusted library allocation
page read and write
3457000
trusted library allocation
page read and write
7FF849134000
trusted library allocation
page read and write
1D7F4C42000
unkown
page readonly
1D3EDB20000
trusted library allocation
page read and write
A75C000
stack
page read and write
1D7D9A70000
heap
page read and write
7FF8491F5000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
7FF849700000
trusted library allocation
page read and write
7FF8492DA000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
7FF849BE0000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
6640000
heap
page read and write
5C3F000
stack
page read and write
AD0000
heap
page read and write
383D000
trusted library allocation
page read and write
5F0D000
stack
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF849D19000
trusted library allocation
page read and write
7FF8492B2000
trusted library allocation
page read and write
1D7F42C0000
unkown
page readonly
7FF849ACA000
trusted library allocation
page read and write
5B3E000
stack
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF849000000
trusted library allocation
page read and write
1D7DC2B1000
trusted library allocation
page read and write
7FF849425000
trusted library allocation
page read and write
7FF849770000
trusted library allocation
page read and write
7FF44926A000
trusted library allocation
page readonly
7FF8490D0000
trusted library allocation
page read and write
1D3EDC64000
trusted library allocation
page read and write
7FF84926B000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
7FF4A1DD0000
trusted library allocation
page execute and read and write
7FF849A48000
trusted library allocation
page read and write
1D3E8D01000
heap
page read and write
7FF849B80000
trusted library allocation
page read and write
7FF849C35000
trusted library allocation
page read and write
7FF849830000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page execute and read and write
E80000
unkown
page readonly
7FF849A60000
trusted library allocation
page read and write
1D7F3DF2000
unkown
page readonly
7FF8496A0000
trusted library allocation
page read and write
7FF849484000
trusted library allocation
page read and write
7FF849046000
trusted library allocation
page read and write
7FF849550000
trusted library allocation
page read and write
1D3CFAFF000
trusted library allocation
page read and write
1A96000
heap
page read and write
1D7F5DF0000
heap
page read and write
1D7F5340000
unkown
page readonly
1D7F5778000
unkown
page readonly
7FF848E1D000
trusted library allocation
page execute and read and write
6248000
stack
page read and write
7FF849572000
trusted library allocation
page read and write
39C2000
trusted library allocation
page read and write
28F8000
heap
page read and write
1D3E8B10000
heap
page read and write
1D3EC048000
heap
page read and write
28F2000
heap
page read and write
7FF849920000
trusted library allocation
page read and write
7FF84912D000
trusted library allocation
page read and write
B7357F4000
stack
page read and write
7FF849034000
trusted library allocation
page read and write
7FF8492EB000
trusted library allocation
page read and write
1D3CD6B0000
heap
page read and write
1A90000
heap
page read and write
9EB000
heap
page read and write
22AA000
unkown
page readonly
1D3E7B4E000
heap
page read and write
7FF8495A2000
trusted library allocation
page read and write
1D7F4C02000
unkown
page readonly
7FF849004000
trusted library allocation
page read and write
7FF849AD2000
trusted library allocation
page read and write
401F000
stack
page read and write
1D7F4AB2000
unkown
page readonly
1D3E8CCF000
heap
page read and write
7FF8490CA000
trusted library allocation
page read and write
7FF849CD0000
trusted library allocation
page read and write
34C3000
trusted library allocation
page read and write
548C000
stack
page read and write
1D3CD7C5000
heap
page read and write
1D7DBA9A000
trusted library allocation
page read and write
1867000
trusted library allocation
page execute and read and write
68C7000
heap
page read and write
7FF84926E000
trusted library allocation
page read and write
1D7D9B70000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
9AE000
heap
page read and write
7FF849D20000
trusted library allocation
page read and write
1D7F4CB2000
unkown
page readonly
5F60000
trusted library allocation
page read and write
1D7F53E0000
unkown
page readonly
1D3EC234000
heap
page read and write
7FF849D40000
trusted library allocation
page read and write
7FF8491E5000
trusted library allocation
page read and write
7FF44925E000
trusted library allocation
page readonly
37B9000
trusted library allocation
page read and write
18AA000
unkown
page readonly
A242000
heap
page read and write
1D7F53E2000
unkown
page readonly
1D7F4B6A000
unkown
page readonly
1D3CFB84000
trusted library allocation
page read and write
1D3EBF6C000
heap
page read and write
1D7F3E43000
heap
page execute and read and write
1D7F4B70000
unkown
page readonly
EAA000
unkown
page readonly
22AA000
unkown
page readonly
7FF849940000
trusted library allocation
page read and write
7FF849566000
trusted library allocation
page read and write
CAE000
stack
page read and write
7FF849100000
trusted library allocation
page read and write
7FF849B70000
trusted library allocation
page read and write
1D3E8B4A000
heap
page read and write
7FF8494C0000
trusted library allocation
page read and write
28F2000
heap
page read and write
6989000
heap
page read and write
7FF449248000
trusted library allocation
page readonly
1D7F5462000
unkown
page readonly
1D7F53D4000
unkown
page readonly
1D7F4A92000
unkown
page readonly
1D3E8B2C000
heap
page read and write
7FF8496D0000
trusted library allocation
page read and write
7FF849071000
trusted library allocation
page read and write
9A0000
heap
page read and write
1D7F51A0000
unkown
page readonly
34CF000
trusted library allocation
page read and write
7FF449245000
trusted library allocation
page execute read
7FF849695000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
1D7DBE51000
trusted library allocation
page read and write
1D7F42E2000
unkown
page readonly
1D7F4170000
heap
page read and write
7FF8492D5000
trusted library allocation
page read and write
7FF849840000
trusted library allocation
page read and write
1D3CD820000
trusted library allocation
page read and write
AAFE000
stack
page read and write
1D3EC05A000
heap
page read and write
1D3CD7D9000
heap
page read and write
1D7F4846000
heap
page read and write
7FF849E20000
trusted library allocation
page read and write
1D3EE253000
heap
page read and write
7FF849CA0000
trusted library allocation
page read and write
EAA000
unkown
page readonly
7FF8491E9000
trusted library allocation
page read and write
7FF849BD3000
trusted library allocation
page read and write
1D7F4BA2000
unkown
page readonly
614C000
stack
page read and write
1D7EB643000
trusted library allocation
page read and write
7FF849980000
trusted library allocation
page read and write
1D7F4754000
heap
page read and write
7FF8497D0000
trusted library allocation
page read and write
7FF849212000
trusted library allocation
page read and write
1D3E7B32000
heap
page read and write
1D7F5430000
unkown
page readonly
1D7F51B2000
unkown
page readonly
7FF849720000
trusted library allocation
page read and write
16D0000
heap
page read and write
37E1000
trusted library allocation
page read and write
1D7F4A00000
unkown
page readonly
1D7F5AA2000
unkown
page readonly
7FF8492F5000
trusted library allocation
page read and write
1D7F54A0000
unkown
page readonly
34D3000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
3849000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
1D3CD690000
heap
page read and write
7FF8492EB000
trusted library allocation
page read and write
7FF849B40000
trusted library allocation
page read and write
7FF849540000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page read and write
7FF84929B000
trusted library allocation
page read and write
1D3EE3DB000
heap
page read and write
7FF8493E0000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
1D7F4110000
heap
page execute and read and write
6DBE000
stack
page read and write
7FF849310000
trusted library allocation
page read and write
7FF849A50000
trusted library allocation
page read and write
1D7F5630000
unkown
page readonly
3928000
trusted library allocation
page read and write
39E8000
trusted library allocation
page read and write
1D3EC09D000
heap
page read and write
7FF849390000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page read and write
1D7EB60D000
trusted library allocation
page read and write
7FF849036000
trusted library allocation
page read and write
7FF849330000
trusted library allocation
page read and write
1D3E8D04000
heap
page read and write
7FF8490E4000
trusted library allocation
page read and write
A760000
heap
page read and write
7FF849DD0000
trusted library allocation
page read and write
7FF8499C0000
trusted library allocation
page read and write
7FF849056000
trusted library allocation
page read and write
7FF849DF0000
trusted library allocation
page read and write
1D7F554E000
unkown
page readonly
1D7F46EF000
heap
page read and write
1D7F40CE000
unkown
page readonly
7FF848E2B000
trusted library allocation
page execute and read and write
7FF849C32000
trusted library allocation
page read and write
1D7F5460000
unkown
page readonly
7FF84966A000
trusted library allocation
page read and write
7FF849646000
trusted library allocation
page read and write
7FF8492DD000
trusted library allocation
page read and write
7FF8495C0000
trusted library allocation
page read and write
1D3EE288000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
7FF449241000
trusted library allocation
page execute read
B734AFC000
stack
page read and write
7FF849B20000
trusted library allocation
page read and write
7FF849310000
trusted library allocation
page read and write
6993000
heap
page read and write
7FF8491E0000
trusted library allocation
page read and write
1D3CF7A5000
trusted library allocation
page read and write
7FF8497C5000
trusted library allocation
page read and write
1D7F5142000
unkown
page readonly
1D3EBE85000
heap
page read and write
1D7F4A42000
unkown
page readonly
7FF849B30000
trusted library allocation
page read and write
7FF849209000
trusted library allocation
page read and write
1D7F4B80000
unkown
page readonly
7FF849050000
trusted library allocation
page read and write
7FF849215000
trusted library allocation
page read and write
7FF849350000
trusted library allocation
page execute and read and write
7FF849267000
trusted library allocation
page read and write
7FF849081000
trusted library allocation
page read and write
7FF84905E000
trusted library allocation
page read and write
1D7F5390000
unkown
page readonly
B734FFF000
stack
page read and write
18AA000
unkown
page readonly
5E7D000
stack
page read and write
7FF849E40000
trusted library allocation
page execute and read and write
7FF849750000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1D3E8C9A000
heap
page read and write
7FF849BB7000
trusted library allocation
page read and write
7FF8491ED000
trusted library allocation
page read and write
1D7F4B40000
unkown
page readonly
1D7F5152000
unkown
page readonly
7FF8497C0000
trusted library allocation
page read and write
1D3E7B2C000
heap
page read and write
1D7F4BD0000
unkown
page readonly
1D7F5168000
unkown
page readonly
7FF849B68000
trusted library allocation
page read and write
A9FE000
stack
page read and write
5AED000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
7FF849016000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7FF849690000
trusted library allocation
page read and write
1D3CF100000
trusted library allocation
page read and write
1D7F5632000
unkown
page readonly
1D3E7B07000
heap
page read and write
A24B000
heap
page read and write
37C8000
trusted library allocation
page read and write
7FF849C90000
trusted library allocation
page read and write
7FF849A80000
trusted library allocation
page read and write
7FF8495B0000
trusted library allocation
page execute and read and write
1880000
trusted library allocation
page read and write
1D7F4570000
unkown
page readonly
1D7F4BF0000
unkown
page readonly
7FF8490F0000
trusted library allocation
page read and write
699E000
heap
page read and write
6780000
trusted library allocation
page execute and read and write
1856000
trusted library allocation
page execute and read and write
7FF848E12000
trusted library allocation
page read and write
7FF8490B2000
trusted library allocation
page read and write
1D7D9AFE000
heap
page read and write
7FF8492F5000
trusted library allocation
page read and write
1D7F4AA2000
unkown
page readonly
58D0000
trusted library allocation
page read and write
3F10000
heap
page read and write
1D3EBFCD000
heap
page read and write
1D3EC167000
heap
page read and write
7FF849856000
trusted library allocation
page read and write
7FF449264000
trusted library allocation
page readonly
1D7F4B82000
unkown
page readonly
2900000
heap
page read and write
7FF849BF0000
trusted library allocation
page execute and read and write
5F77000
trusted library allocation
page read and write
3C2F8FF000
stack
page read and write
3838000
trusted library allocation
page read and write
EA8000
unkown
page read and write
7FF849460000
trusted library allocation
page read and write
EAA000
unkown
page readonly
1D3E8C9F000
heap
page read and write
28F5000
heap
page read and write
1D3EC0E7000
heap
page read and write
7FF849AD5000
trusted library allocation
page read and write
1D3E9B80000
trusted library allocation
page read and write
37B3000
trusted library allocation
page read and write
1D3E8CF2000
heap
page read and write
7FF84990B000
trusted library allocation
page read and write
A2C9000
heap
page read and write
3998000
trusted library allocation
page read and write
1D7F542C000
unkown
page readonly
7FF849287000
trusted library allocation
page read and write
14F7000
stack
page read and write
5D7B000
stack
page read and write
1D3E8610000
heap
page read and write
7FF849340000
trusted library allocation
page read and write
7FF849025000
trusted library allocation
page read and write
1D7F4572000
unkown
page readonly
1D7F5262000
unkown
page readonly
1D3CD8B5000
heap
page read and write
7FF8499F0000
trusted library allocation
page read and write
1D7D9AC0000
heap
page read and write
1D7EB61C000
trusted library allocation
page read and write
EA8000
unkown
page write copy
7FF849850000
trusted library allocation
page read and write
1D7F4970000
unkown
page readonly
1D7F3E00000
unkown
page readonly
33AE000
stack
page read and write
381A000
trusted library allocation
page read and write
7FF8492F8000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
3240000
heap
page read and write
7FF849013000
trusted library allocation
page read and write
1D3CD787000
heap
page read and write
1D7F4AC6000
unkown
page readonly
1D7F48B2000
unkown
page readonly
7FF84948A000
trusted library allocation
page read and write
1D7F4B50000
unkown
page readonly
1D3EC130000
heap
page read and write
7FF44925B000
trusted library allocation
page execute read
1D7F481B000
heap
page read and write
1D7F4AB4000
unkown
page readonly
1D3E8CE1000
heap
page read and write
1D3CF7A7000
trusted library allocation
page read and write
7FF449247000
trusted library allocation
page execute read
7FF849861000
trusted library allocation
page read and write
7FF84956F000
trusted library allocation
page read and write
328E000
stack
page read and write
7FF849205000
trusted library allocation
page read and write
1D3CF151000
trusted library allocation
page read and write
1D3EC00D000
heap
page read and write
1D3EBE93000
heap
page read and write
6060000
trusted library allocation
page execute and read and write
7FF8495AA000
trusted library allocation
page read and write
385D000
trusted library allocation
page read and write
391C000
trusted library allocation
page read and write
1D3E9B62000
unkown
page readonly
7FF849413000
trusted library allocation
page read and write
1D7F51A2000
unkown
page readonly
1D7F5212000
unkown
page readonly
68E8000
heap
page read and write
1D7F5E0B000
heap
page read and write
7FF849C00000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
1D7EB601000
trusted library allocation
page read and write
E81000
unkown
page execute read
1D3CF453000
trusted library allocation
page read and write
7FF8498E0000
trusted library allocation
page read and write
1D7D9AE6000
heap
page read and write
1D7F4994000
unkown
page readonly
1D7F3E40000
heap
page execute and read and write
7FF8498D0000
trusted library allocation
page read and write
7FF849158000
trusted library allocation
page read and write
1D7F4CA2000
unkown
page readonly
7FF849047000
trusted library allocation
page read and write
3C308F9000
stack
page read and write
7FF8491C8000
trusted library allocation
page read and write
1D7F4C00000
unkown
page readonly
1D7F5392000
unkown
page readonly
34A8000
trusted library allocation
page read and write
1D3CD7D7000
heap
page read and write
A2CD000
heap
page read and write
7FF8496F0000
trusted library allocation
page read and write
7FF84912F000
trusted library allocation
page read and write
1D7F5140000
unkown
page readonly
AFBE000
stack
page read and write
1D7F4BFC000
unkown
page readonly
E9D000
unkown
page readonly
7FF849B60000
trusted library allocation
page read and write
1D3EBFEC000
heap
page read and write
7FF849A30000
trusted library allocation
page read and write
6678000
heap
page read and write
1D3E8D06000
heap
page read and write
7FF849710000
trusted library allocation
page read and write
1D3CFB5B000
trusted library allocation
page read and write
16D5000
heap
page read and write
1D7F48B0000
unkown
page readonly
1D3E7990000
trusted library section
page read and write
7FF8490D0000
trusted library allocation
page read and write
1D3EE1C0000
heap
page read and write
1D7F4300000
unkown
page readonly
1D3E7D90000
trusted library allocation
page read and write
1D7F3DD0000
heap
page read and write
7FF449261000
trusted library allocation
page execute read
7FF849950000
trusted library allocation
page read and write
7FF8495F4000
trusted library allocation
page read and write
1D7EB627000
trusted library allocation
page read and write
7FF8490D2000
trusted library allocation
page read and write
1D7F5910000
unkown
page readonly
7FF849CB0000
trusted library allocation
page read and write
3C2F3BE000
stack
page read and write
7FF449256000
trusted library allocation
page readonly
7FF8498B0000
trusted library allocation
page read and write
7FF449251000
trusted library allocation
page execute read
1D7F4CD0000
unkown
page readonly
1D7F533C000
unkown
page readonly
6DFE000
stack
page read and write
5AF0000
heap
page read and write
1D3DF151000
trusted library allocation
page read and write
1D3CD728000
heap
page read and write
1D7DB5A2000
unkown
page readonly
B7352FE000
stack
page read and write
1D7F5432000
unkown
page readonly
5F80000
trusted library allocation
page read and write
1D7F5260000
unkown
page readonly
53B8000
trusted library allocation
page read and write
1D3EDB40000
trusted library allocation
page read and write
7FF8492A5000
trusted library allocation
page read and write
68EB000
heap
page read and write
7FF8499A1000
trusted library allocation
page read and write
38A9000
trusted library allocation
page read and write
7FF8499B4000
trusted library allocation
page read and write
7FF849BF6000
trusted library allocation
page read and write
7FF8492EE000
trusted library allocation
page read and write
A2BF000
heap
page read and write
7FF848FFF000
trusted library allocation
page read and write
7FF84957A000
trusted library allocation
page read and write
4600000
heap
page read and write
18AA000
unkown
page readonly
7FF849C90000
trusted library allocation
page read and write
7FF84946E000
trusted library allocation
page read and write
7FF849A30000
trusted library allocation
page read and write
7FF8496B0000
trusted library allocation
page read and write
1D3CD850000
trusted library allocation
page read and write
1D7F55B0000
unkown
page readonly
3C2FCFF000
stack
page read and write
7FF8493F0000
trusted library allocation
page read and write
7FF849496000
trusted library allocation
page read and write
1A8E000
stack
page read and write
7FF849304000
trusted library allocation
page read and write
7FF849BA0000
trusted library allocation
page read and write
B7353FB000
stack
page read and write
7FF849B60000
trusted library allocation
page read and write
1D3EDAC0000
trusted library allocation
page read and write
1D7F3DD3000
heap
page read and write
7FF8494A0000
trusted library allocation
page read and write
2900000
heap
page read and write
5F90000
trusted library allocation
page read and write
1D7F4342000
unkown
page readonly
7FF849660000
trusted library allocation
page read and write
7FF8499D0000
trusted library allocation
page read and write
1D3EBF0D000
heap
page read and write
7FF8495B0000
trusted library allocation
page read and write
1D3E8CF8000
heap
page read and write
7FF848FEA000
trusted library allocation
page read and write
1D3E79D0000
heap
page execute and read and write
1D7F4B84000
unkown
page readonly
1D3EEB62000
unkown
page readonly
1D3CFB56000
trusted library allocation
page read and write
7FF849990000
trusted library allocation
page read and write
7FF849B80000
trusted library allocation
page read and write
2904000
heap
page read and write
7FF8492A2000
trusted library allocation
page read and write
1620000
heap
page read and write
7FF849E10000
trusted library allocation
page read and write
1D7F4899000
heap
page read and write
1D7F5310000
unkown
page readonly
7FF849320000
trusted library allocation
page read and write
1D3E79F0000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
7FF84923E000
trusted library allocation
page read and write
1D3E7150000
trusted library allocation
page read and write
7FF449242000
trusted library allocation
page readonly
7FF848F20000
trusted library allocation
page execute and read and write
1D7F5D60000
unkown
page readonly
166E000
stack
page read and write
7FF8492C0000
trusted library allocation
page read and write
7FF849A70000
trusted library allocation
page read and write
7FF849098000
trusted library allocation
page read and write
3969000
trusted library allocation
page read and write
1D3EBF6E000
heap
page read and write
7FF849790000
trusted library allocation
page read and write
6C1E000
stack
page read and write
1D7F4B52000
unkown
page readonly
44B0000
heap
page read and write
7FF849487000
trusted library allocation
page read and write
1D3EC115000
heap
page read and write
2907000
heap
page read and write
37F0000
trusted library allocation
page read and write
7FF8496D0000
trusted library allocation
page read and write
A1B0000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
1D7F4895000
heap
page read and write
1D7DC32D000
trusted library allocation
page read and write
3C306F4000
stack
page read and write
7FF849230000
trusted library allocation
page read and write
1D3EC01B000
heap
page read and write
1D3EBEA6000
heap
page read and write
3C2F6ED000
stack
page read and write
1D7F4B28000
unkown
page readonly
7FF849A40000
trusted library allocation
page read and write
7FF8492D6000
trusted library allocation
page read and write
7FF8497E1000
trusted library allocation
page read and write
1D7F4BA0000
unkown
page readonly
18AE000
heap
page read and write
C8B000
stack
page read and write
7FF849430000
trusted library allocation
page read and write
1D7F4B90000
unkown
page readonly
7FF849020000
trusted library allocation
page read and write
68CC000
heap
page read and write
1D3E74D4000
heap
page read and write
7FF849D30000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page read and write
7FF849D60000
trusted library allocation
page read and write
1D7F42DC000
unkown
page readonly
1D7D9BF0000
trusted library allocation
page read and write
7FF8491EB000
trusted library allocation
page read and write
3C30AFF000
stack
page read and write
6668000
heap
page read and write
7FF8495C0000
trusted library allocation
page read and write
1D3EBE8E000
heap
page read and write
39BE000
trusted library allocation
page read and write
7FF849554000
trusted library allocation
page read and write
36C6000
trusted library allocation
page read and write
7FF449246000
trusted library allocation
page readonly
1D7DB540000
unkown
page read and write
7FF849930000
trusted library allocation
page read and write
7FF849730000
trusted library allocation
page read and write
68D8000
heap
page read and write
1D3E8590000
heap
page read and write
1D7F4AE0000
unkown
page readonly
1D3E7C30000
trusted library allocation
page read and write
7FF849A00000
trusted library allocation
page read and write
1D7F54A2000
unkown
page readonly
EAA000
unkown
page readonly
1D7D9C55000
heap
page read and write
1D3CF792000
trusted library allocation
page read and write
1D3EE207000
heap
page read and write
6B9E000
stack
page read and write
7FF449254000
trusted library allocation
page readonly
7FF848E1D000
trusted library allocation
page execute and read and write
7FF849110000
trusted library allocation
page read and write
1D3EBFC3000
heap
page read and write
7FF849AA0000
trusted library allocation
page read and write
1D3CDA65000
heap
page read and write
1D3EBECC000
heap
page read and write
7FF849556000
trusted library allocation
page read and write
1D3EBE50000
heap
page read and write
1D3CFAAF000
trusted library allocation
page read and write
1D7F5A8E000
unkown
page readonly
7FF849700000
trusted library allocation
page read and write
1D7F3CC0000
heap
page read and write
AE3F000
stack
page read and write
7FF849D80000
trusted library allocation
page read and write
7FF849820000
trusted library allocation
page read and write
7FF849AE0000
trusted library allocation
page read and write
184D000
trusted library allocation
page execute and read and write
7FF849D24000
trusted library allocation
page read and write
1850000
trusted library allocation
page read and write
1D3CF130000
trusted library allocation
page read and write
1D7F4A88000
unkown
page readonly
1843000
trusted library allocation
page read and write
A1EE000
heap
page read and write
64EA000
stack
page read and write
1D7F51A8000
unkown
page readonly
1D7F4340000
unkown
page readonly
B7349FE000
stack
page read and write
7FF849312000
trusted library allocation
page read and write
1D3EC036000
heap
page read and write
1D7F4962000
unkown
page readonly
7FF849E30000
trusted library allocation
page read and write
1D7D98CC000
unkown
page readonly
3290000
trusted library allocation
page execute and read and write
1D7F42F0000
unkown
page readonly
1D7F4330000
unkown
page readonly
7FF849340000
trusted library allocation
page read and write
7FF8494A0000
trusted library allocation
page read and write
9D3000
heap
page read and write
1D7F4C74000
unkown
page readonly
7FF8499E0000
trusted library allocation
page read and write
7FF8490E2000
trusted library allocation
page read and write
7FF849DC0000
trusted library allocation
page read and write
3A0D000
trusted library allocation
page read and write
3C2FFFA000
stack
page read and write
1D7DB76B000
trusted library allocation
page read and write
D8C000
stack
page read and write
7FF849AC0000
trusted library allocation
page read and write
1D7DB552000
unkown
page readonly
1D7F5830000
unkown
page readonly
5924000
heap
page execute and read and write
2905000
heap
page read and write
1D7D9810000
unkown
page readonly
7FF44925D000
trusted library allocation
page execute read
1D3EBF95000
heap
page read and write
7FF8494E0000
trusted library allocation
page read and write
3419000
trusted library allocation
page read and write
7FF849BC5000
trusted library allocation
page read and write
7FF849B00000
trusted library allocation
page read and write
7FF8497CA000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
1D7F4CA0000
unkown
page readonly
1D3EC01E000
heap
page read and write
7FF849067000
trusted library allocation
page read and write
7FF849540000
trusted library allocation
page read and write
1D3EE9C0000
trusted library allocation
page read and write
3C307F5000
stack
page read and write
1830000
trusted library allocation
page read and write
1D3CD75C000
heap
page read and write
1D7F4310000
unkown
page readonly
6260000
trusted library allocation
page read and write
184A000
trusted library allocation
page read and write
1D3CD75E000
heap
page read and write
1D7F4BB2000
unkown
page readonly
1D7F4990000
unkown
page readonly
1D3E8CD4000
heap
page read and write
1D3EC1FB000
heap
page read and write
398C000
trusted library allocation
page read and write
7FF849290000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
3C305F5000
stack
page read and write
7FF849450000
trusted library allocation
page read and write
7FF849480000
trusted library allocation
page read and write
7FF848FBC000
trusted library allocation
page read and write
7FF84979D000
trusted library allocation
page read and write
7FF8491DB000
trusted library allocation
page read and write
7FF849C15000
trusted library allocation
page read and write
34C7000
trusted library allocation
page read and write
1D7F5132000
unkown
page readonly
7FF849240000
trusted library allocation
page read and write
7FF849420000
trusted library allocation
page read and write
8FA000
stack
page read and write
1D3CD6D0000
heap
page read and write
1D7F5360000
unkown
page readonly
1627000
heap
page read and write
7FF8497EE000
trusted library allocation
page read and write
1D3EBF3F000
heap
page read and write
1D7F4751000
heap
page read and write
1D7F5342000
unkown
page readonly
7FF848FB0000
trusted library allocation
page read and write
7FF849BB4000
trusted library allocation
page read and write
A770000
heap
page read and write
7FF8494D0000
trusted library allocation
page read and write
1D3E8CB8000
heap
page read and write
B734EFA000
stack
page read and write
1D3CDA50000
unkown
page read and write
1D7DBE4E000
trusted library allocation
page read and write
1D3EBF77000
heap
page read and write
1D3CF140000
heap
page read and write
1D7F42B2000
unkown
page readonly
1D3CD8B0000
heap
page read and write
1D7D9AB0000
heap
page read and write
7FF849235000
trusted library allocation
page read and write
1D7F4C06000
unkown
page readonly
7FF849440000
trusted library allocation
page read and write
1D7F4B60000
unkown
page readonly
7FF449240000
trusted library allocation
page readonly
7FF848EE6000
trusted library allocation
page execute and read and write
7FF849282000
trusted library allocation
page read and write
1D3E7C40000
trusted library allocation
page read and write
1D3CFB76000
trusted library allocation
page read and write
7FF849044000
trusted library allocation
page read and write
3C2FAFE000
stack
page read and write
7FF8490DA000
trusted library allocation
page read and write
7FF449265000
trusted library allocation
page execute read
7FF848FE0000
trusted library allocation
page read and write
1D3EC10E000
heap
page read and write
7FF849277000
trusted library allocation
page read and write
7FF849C20000
trusted library allocation
page read and write
7FF849252000
trusted library allocation
page read and write
7FF849900000
trusted library allocation
page read and write
5D3C000
stack
page read and write
7FF849140000
trusted library allocation
page read and write
7FF849970000
trusted library allocation
page read and write
1D7F50F0000
unkown
page readonly
A540000
trusted library allocation
page read and write
1D3E7A00000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
1D3E7B60000
heap
page read and write
1D7F4AD0000
unkown
page readonly
1D7F5160000
unkown
page readonly
1D3EDB30000
trusted library allocation
page read and write
There are 1481 hidden memdumps, click here to show them.