IOC Report
Portal.msi

loading gif

Files

File Path
Type
Category
Malicious
Portal.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: PDQConnectAgent, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic and data required to install PDQConnectAgent., Template: x64;1033, Revision Number: {BBBF9B45-7132-4A74-8235-C1D5ECC6E746}, Create Time/Date: Tue Sep 17 15:34:46 2024, Last Saved Time/Date: Tue Sep 17 15:34:46 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
initial sample
malicious
C:\Program Files\PDQ\PDQConnectAgent\pdq-connect-agent.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Config.Msi\6a12ca.rbs
data
modified
C:\Program Files\PDQ\PDQConnectAgent\LICENSE.html
HTML document, ASCII text, with CRLF, LF line terminators
dropped
C:\ProgramData\PDQ\PDQConnectAgent\PDQConnectAgent.db
SQLite 3.x database, user version 7, last written using SQLite version 3045000, file counter 4, database pages 9, cookie 0x8, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\PDQ\PDQConnectAgent\PDQConnectAgent.db-journal
SQLite Rollback Journal
dropped
C:\ProgramData\PDQ\PDQConnectAgent\Updates\PDQConnectUpdater-0.3.0.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: PDQConnectUpdater, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic and data required to install PDQConnectUpdater., Template: x64;1033, Revision Number: {680478D0-253F-4DCD-9B76-6390D88203FC}, Create Time/Date: Mon Aug 26 16:00:00 2024, Last Saved Time/Date: Mon Aug 26 16:00:00 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
dropped
C:\ProgramData\PDQ\PDQConnectAgent\token
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Windows\Installer\6a12c9.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: PDQConnectAgent, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic and data required to install PDQConnectAgent., Template: x64;1033, Revision Number: {BBBF9B45-7132-4A74-8235-C1D5ECC6E746}, Create Time/Date: Tue Sep 17 15:34:46 2024, Last Saved Time/Date: Tue Sep 17 15:34:46 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
dropped
C:\Windows\Installer\6a12cb.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: PDQConnectAgent, Author: PDQ.com, Keywords: Installer, Comments: This installer database contains the logic and data required to install PDQConnectAgent., Template: x64;1033, Revision Number: {BBBF9B45-7132-4A74-8235-C1D5ECC6E746}, Create Time/Date: Tue Sep 17 15:34:46 2024, Last Saved Time/Date: Tue Sep 17 15:34:46 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: WiX Toolset (5.0.0.0), Security: 2
dropped
C:\Windows\Installer\MSI146E.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI1F2D.tmp
data
dropped
C:\Windows\Installer\MSI1F3E.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSI1F6E.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI2451.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSI24EE.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSI2676.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI2C05.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI328E.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
dropped
C:\Windows\Installer\MSI3B87.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\MSI3BA8.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\SFXCA363E23D38342B28859B2E30EB0910098\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\SFXCA363E23D38342B28859B2E30EB0910098\WixSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA363E23D38342B28859B2E30EB0910098\WixToolset.Dtf.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA363E23D38342B28859B2E30EB0910098\pdqconnectagent-setup.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA363E23D38342B28859B2E30EB0910098\pdqconnectagent-setup.pdb
MSVC program database ver 7.00, 512*59 bytes
dropped
C:\Windows\Installer\SFXCA87E78A4C484AC7BA8DC6E0B5627E7F20\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\SFXCA87E78A4C484AC7BA8DC6E0B5627E7F20\WixSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA87E78A4C484AC7BA8DC6E0B5627E7F20\WixToolset.Dtf.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA87E78A4C484AC7BA8DC6E0B5627E7F20\pdqconnectagent-setup.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA87E78A4C484AC7BA8DC6E0B5627E7F20\pdqconnectagent-setup.pdb
MSVC program database ver 7.00, 512*59 bytes
dropped
C:\Windows\Installer\SFXCA9B20618A2F4D43A947D4DDC1A40E47B6\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\SFXCA9B20618A2F4D43A947D4DDC1A40E47B6\WixSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA9B20618A2F4D43A947D4DDC1A40E47B6\WixToolset.Dtf.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCA9B20618A2F4D43A947D4DDC1A40E47B6\pdqconnectagent-setup.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCABAC30776D64ECC5AFC62613A5E146B74\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\SFXCABAC30776D64ECC5AFC62613A5E146B74\WixSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCABAC30776D64ECC5AFC62613A5E146B74\WixToolset.Dtf.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCABAC30776D64ECC5AFC62613A5E146B74\pdqconnectagent-setup.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCABAC30776D64ECC5AFC62613A5E146B74\pdqconnectagent-setup.pdb
MSVC program database ver 7.00, 512*59 bytes
dropped
C:\Windows\Installer\SFXCAFF0EF70119428EDA813B551E8FF8FDE9\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\SFXCAFF0EF70119428EDA813B551E8FF8FDE9\WixSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCAFF0EF70119428EDA813B551E8FF8FDE9\WixToolset.Dtf.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SFXCAFF0EF70119428EDA813B551E8FF8FDE9\pdqconnectagent-setup.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SourceHash{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}\app_icon.ico
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_1m44divj.iz0.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_cd4wqici.roe.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_czxpmajg.uv5.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_ddfckiqe.mra.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_fqdsmjgg.czo.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_jr3d42m2.5eo.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_jyt4hf5r.oxg.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_ln1cpdfj.mbo.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_qzoekg4v.02b.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_s4ss1wwl.emd.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_trk2nsoc.ipi.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_uawecekx.5en.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_vbvyo202.wf5.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_x0pboxue.trd.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_yizrlkhf.pzn.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_yrx5l2vd.4kk.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\~DF10256FF6D7A7FC78.TMP
data
dropped
C:\Windows\Temp\~DF128E950177FB706E.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF2CA530A658F0423A.TMP
data
dropped
C:\Windows\Temp\~DF6A53496975B6DE4C.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF7361AF4F4FCDF5C2.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF9BE1662B759EAFF5.TMP
data
dropped
C:\Windows\Temp\~DFA43BB4BE1CC147CC.TMP
data
dropped
C:\Windows\Temp\~DFAEE45B9A02DA4483.TMP
data
dropped
C:\Windows\Temp\~DFAF8F7F1FCA8EE369.TMP
data
dropped
C:\Windows\Temp\~DFDA5904711AC03E39.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFDFA2DA48022812CB.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFF7E26199D5F30E14.TMP
data
dropped
There are 68 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI146E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6952171 2 WixSharp!WixSharp.ManagedProjectActions.WixSharp_InitRuntime_Action
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI1F6E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6954890 16 WixSharp!WixSharp.ManagedProjectActions.WixSharp_BeforeInstall_Action
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI2676.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6956718 38 pdqconnectagent-setup!pdqconnectagent_setup.CustomActions.CreateEventSource
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI2C05.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6958093 44 pdqconnectagent-setup!pdqconnectagent_setup.CustomActions.WriteToken
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI328E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6959781 50 pdqconnectagent-setup!pdqconnectagent_setup.CustomActions.StartService
malicious
C:\Program Files\PDQ\PDQConnectAgent\pdq-connect-agent.exe
"C:\Program Files\PDQ\PDQConnectAgent\pdq-connect-agent.exe" --service
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -NoLogo -NonInteractive -NoProfile -ExecutionPolicy Bypass -Command -
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Portal.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\msiexec.exe
C:\Windows\System32\MsiExec.exe -Embedding 6CC2AEC21F9691D9400C52C3CC91B334
C:\Windows\System32\msiexec.exe
C:\Windows\System32\MsiExec.exe -Embedding F809AF2B04EF2DCECEB62F05202EAA97 E Global\MSI0000
C:\Windows\System32\sc.exe
"C:\Windows\system32\sc.exe" start "PDQConnectAgent"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://app.pdq.com/v1/devices/release-channels/stable/manifest.jsonD
unknown
http://wixtoolset.org/schemas/v4/wxs/netfx-WixToolset.Http.wixext
unknown
http://wixtoolset.org/schemas/v4/wxs/difxappZhttp://wixtoolset.org/schemas/v4/wxs/firewallRhttp://wi
unknown
http://wixtoolset.org/schemas/v4/wxs/powershellNhttp://wixtoolset.org/schemas/v4/wxs/vsRhttp://wixto
unknown
https://contoso.com/License
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
http://wixtoolset.org/schemas/v4/wxs/vs-WixToolset.Msmq.wixext
unknown
https://app.pdq.com/Hardcoded
unknown
https://app.pdq.com/v1/devices/registeristration
unknown
http://wixtoolset.org/schemas/v4/wxs/difxapp5WixToolset.Firewall.wixext
unknown
https://pdqinstallers.e9d69694c3d8f7465fd531512c22bd0f.r2.cloudflarestorage.com/connect-agent/PDQCon
unknown
https://github.com/clap-rs/clap/issues
unknown
http://wixtoolset.org/schemas/v4/wxs/dependency3WixToolset.DirectX.wixext
unknown
http://wixtoolset.org/schemas/v4/wxs/ui9WixToolset.PowerShell.wixext
unknown
https://app.pdq.com/v1/devices/release-channels/stable/manifest.json
unknown
https://github.com/clap-rs/clap/issues0#
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://app.pdq.com/D
unknown
https://oneget.orgX
unknown
http://wixtoolset.org/schemas/v4/wxs/iis
unknown
https://app.pdq.com/
unknown
https://github.com/clap-rs/clap/issues/rustc/eeb90cda1969383f56a2637cbd3037bdf598841c
unknown
https://app.pdq.com/v1/devices/auth-challenge
unknown
http://wixtoolset.org/schemas/v4/wxs/firewall-WixToolset.Util.wixext
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://app.pdq.com/v1/devices/auth-challenge0
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://github.com/clap-rs/clap/issuesC:
unknown
https://app.pdq.com/v1/devices/auth-challenge$
unknown
https://app.pdq.com/v1/devices/auth-challengel~
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://wixtoolset.org/schemas/v4/wxs/directx
unknown
https://github.com/clap-rs/clap/issues0#n
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://wixtoolset.org/schemas/v4/wxs/bal
unknown
https://contoso.com/Icon
unknown
https://app.pdq.com/ul
unknown
https://o192192.ingest.sentry.io/api/6095569/envelope/
unknown
http://wixtoolset.org/schemas/v4/wxs/msmq3WixToolset.ComPlus.wixext
unknown
https://github.com/Pester/Pester
unknown
http://wixtoolset.org/schemas/v4/wxs/dependencyXhttp://wixtoolset.org/schemas/v4/wxs/directx
unknown
https://github.com/clap-rs/clap/issuesx
unknown
https://app.pdq.com/v1/devices/register
unknown
https://github.com/oleg-shilo/wixsharp/issues/1396#issuecomment-1849731522
unknown
http://wixtoolset.org/schemas/v4/wxs/powershell=WixToolset.VisualStudio.wixext
unknown
http://wixtoolset.org/schemas/v4/wxs/complus9WixToolset.Dependency.wixext
unknown
http://wixtoolset.org/schemas/v4/wxs
unknown
https://wixtoolset.org/
unknown
http://wixtoolset.org/schemas/v4/wxs/sql/WixToolset.Netfx.wixext
unknown
http://go.microsoft.c
unknown
http://wixtoolset.org/schemas/v4/wxs/http
unknown
http://go.microsoft.ctain
unknown
https://aka.ms/pscore68
unknown
http://www.test.com/xml/2015
unknown
https://o192192.ingest.sentry.io/api/6095569/envelope/3
unknown
http://wixtoolset.org/schemas/v4/wxs/util
unknown
https://websocket.app.pdq.com:443/v1/devices/socket/websocket?device_id=dvc_cf03d73e6c6b34abc8bc8409f8ee13c1
34.128.163.126
https://oneget.org
unknown
There are 51 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pdqinstallers.e9d69694c3d8f7465fd531512c22bd0f.r2.cloudflarestorage.com
162.159.140.238
malicious
app.pdq.com
104.16.77.47
websocket.app.pdq.com
34.128.163.126

IPs

IP
Domain
Country
Malicious
162.159.140.238
pdqinstallers.e9d69694c3d8f7465fd531512c22bd0f.r2.cloudflarestorage.com
United States
malicious
34.128.163.126
websocket.app.pdq.com
United States
104.16.77.47
app.pdq.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6a12ca.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6a12ca.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A6386C99F8
2B61430F79C84CC45887F5A6853FBE48
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A6C3D6A20F
2B61430F79C84CC45887F5A6853FBE48
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A61DD4B302
2B61430F79C84CC45887F5A6853FBE48
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A65E431729
2B61430F79C84CC45887F5A6853FBE48
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2B61430F79C84CC45887F5A6ACEAC9E8
2B61430F79C84CC45887F5A6853FBE48
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\ProgramData\PDQ\PDQConnectAgent\Downloads\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\PDQ\PDQConnectAgent\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files\PDQ\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\2B61430F79C84CC45887F5A6803ABC48
2B61430F79C84CC45887F5A6853FBE48
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\2B61430F79C84CC45887F5A6853FBE48
Complete
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\Features
Complete
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Windows\Installer\{F03416B2-8C97-4CC4-8578-5F6A58F3EB84}\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\2B61430F79C84CC45887F5A6853FBE48\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
ProductIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\2B61430F79C84CC45887F5A6803ABC48
2B61430F79C84CC45887F5A6853FBE48
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\2B61430F79C84CC45887F5A6853FBE48\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com
MaxSize
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com\PDQ.com
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com\PDQConnectAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\PDQ.com
MaxSize
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
There are 86 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1F970B91000
trusted library allocation
page read and write
236BBC7A000
trusted library allocation
page read and write
B0D14FE000
stack
page read and write
1E34146C000
heap
page read and write
1E341954000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
1F0B030F000
heap
page read and write
7FF78C9F0000
unkown
page readonly
36044F0000
stack
page read and write
645007C000
stack
page read and write
24569AFB000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
1E3414D6000
heap
page read and write
7FF8489FE000
trusted library allocation
page read and write
219102E9000
trusted library allocation
page read and write
7FF848A90000
trusted library allocation
page read and write
1B489437000
heap
page read and write
7FF848A40000
trusted library allocation
page read and write
236BAD10000
trusted library allocation
page read and write
1B48B0A0000
trusted library allocation
page read and write
24569B0A000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
7FF848BB0000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
236D2AC7000
heap
page execute and read and write
1B2FCE60000
trusted library allocation
page read and write
7FF848C80000
trusted library allocation
page execute and read and write
27C62900000
heap
page read and write
1F0B0301000
heap
page read and write
7FF848AD0000
trusted library allocation
page read and write
7FF848A29000
trusted library allocation
page read and write
CD2887F000
stack
page read and write
1E3414D6000
heap
page read and write
7DF4A7D00000
trusted library allocation
page execute and read and write
7FF8489D0000
trusted library allocation
page read and write
2418007A000
trusted library allocation
page read and write
7FF848C40000
trusted library allocation
page read and write
7FF848BC0000
trusted library allocation
page read and write
E931AD3000
stack
page read and write
1E34146C000
heap
page read and write
241F1B40000
heap
page readonly
236D2CEE000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
1E3414B8000
heap
page read and write
27C49D0C000
heap
page read and write
1F0B0210000
heap
page read and write
7FF848C90000
trusted library allocation
page read and write
7FF848A32000
trusted library allocation
page read and write
7FF8488E0000
trusted library allocation
page read and write
7FF84890C000
trusted library allocation
page execute and read and write
1E341904000
heap
page read and write
2197B314000
heap
page read and write
236BB088000
trusted library allocation
page read and write
644F7FE000
stack
page read and write
1B48B090000
trusted library allocation
page read and write
7FF848854000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
7FF78D21D000
unkown
page write copy
7FF848C3C000
trusted library allocation
page read and write
27C62C42000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1B48B0A0000
trusted library allocation
page read and write
27C5A97D000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1E3414D6000
heap
page read and write
27C49C60000
heap
page read and write
7FF848A50000
trusted library allocation
page read and write
7FF848C33000
trusted library allocation
page read and write
1E341929000
heap
page read and write
7FF848950000
trusted library allocation
page execute and read and write
7FF848B80000
trusted library allocation
page read and write
7FF848AAB000
trusted library allocation
page read and write
1B2FCF72000
heap
page read and write
27C4A792000
heap
page read and write
1B2FCE50000
trusted library allocation
page read and write
7FF848C70000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
7FF848853000
trusted library allocation
page execute and read and write
7FF848834000
trusted library allocation
page read and write
1E341972000
heap
page read and write
1E3414F0000
heap
page read and write
7FF848AA0000
trusted library allocation
page read and write
236B9DC0000
heap
page read and write
1F0B1E80000
trusted library allocation
page read and write
1F0B1EC0000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
644FA7E000
stack
page read and write
2197A9E0000
heap
page execute and read and write
1F970BC0000
trusted library allocation
page read and write
1E340F5B000
heap
page read and write
1F0B0298000
heap
page read and write
1E341436000
heap
page read and write
27C4A3D0000
trusted library allocation
page read and write
644FEF8000
stack
page read and write
1B48B0B0000
trusted library allocation
page read and write
1F970BA0000
trusted library allocation
page read and write
1E3414B9000
heap
page read and write
27C4AD29000
trusted library allocation
page read and write
7FF848BB0000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
7FF84885B000
trusted library allocation
page read and write
1F0B1E70000
trusted library allocation
page read and write
1E341560000
heap
page read and write
2456B5F0000
trusted library allocation
page read and write
B0D15FD000
stack
page read and write
2456B600000
trusted library allocation
page read and write
1B2FB5C0000
heap
page read and write
27C4C145000
trusted library allocation
page read and write
2456B620000
trusted library allocation
page read and write
7FF848A20000
trusted library allocation
page execute and read and write
7FF8488E6000
trusted library allocation
page read and write
2456B6F0000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
3FF17BE000
stack
page read and write
1B48B090000
trusted library allocation
page read and write
2197A359000
heap
page read and write
2456B5E0000
trusted library allocation
page read and write
236D2CDC000
heap
page read and write
21900709000
trusted library allocation
page read and write
2456B600000
trusted library allocation
page read and write
7FF848B20000
trusted library allocation
page read and write
1F0B0240000
heap
page read and write
7FF848854000
trusted library allocation
page read and write
7FF848C70000
trusted library allocation
page read and write
7FF8489E8000
trusted library allocation
page execute and read and write
27C49D14000
heap
page read and write
1B28001E000
trusted library allocation
page read and write
7FF848824000
trusted library allocation
page read and write
21900EC0000
trusted library allocation
page read and write
1E341515000
heap
page read and write
1F0B1E80000
trusted library allocation
page read and write
1E341463000
heap
page read and write
1B2FCE50000
trusted library allocation
page read and write
241F214B000
heap
page read and write
7FF848A40000
trusted library allocation
page read and write
1F96EFB0000
heap
page read and write
FDD8E73000
stack
page read and write
241F1FB4000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
1F0C2111000
trusted library allocation
page read and write
1E34151D000
heap
page read and write
2197B2BE000
heap
page read and write
7FF848870000
trusted library allocation
page read and write
2456B620000
trusted library allocation
page read and write
7FF848CB0000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
236D2CF9000
heap
page read and write
1B2FCE70000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
24569A00000
heap
page read and write
2197A3B0000
heap
page read and write
241F2203000
heap
page read and write
7FF78D21F000
unkown
page write copy
241902F1000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
7FF8488F0000
trusted library allocation
page execute and read and write
7E8A5CC000
stack
page read and write
7FF848B40000
trusted library allocation
page read and write
1B48AED0000
heap
page read and write
B0D1123000
stack
page read and write
2418093E000
trusted library allocation
page read and write
7FF78D218000
unkown
page write copy
1F96EFD7000
heap
page read and write
1E3418E8000
heap
page read and write
1B489421000
heap
page read and write
24569DE0000
trusted library allocation
page read and write
7A90FFC000
stack
page read and write
7FF848B98000
trusted library allocation
page read and write
1E340E80000
remote allocation
page read and write
7FF848CB0000
trusted library allocation
page read and write
1B2FD480000
heap
page execute and read and write
1F0B1E80000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
7FF848845000
trusted library allocation
page read and write
7FF848B10000
trusted library allocation
page read and write
7FF848910000
trusted library allocation
page execute and read and write
24569AC0000
heap
page read and write
2197A320000
heap
page read and write
1B2FB5B0000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
24569AEA000
heap
page read and write
36069FF000
stack
page read and write
1E3414D6000
heap
page read and write
1E341507000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
236B9F13000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
21900228000
trusted library allocation
page read and write
36066FE000
stack
page read and write
7FF848AF0000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1F96F255000
heap
page read and write
1E341968000
heap
page read and write
236B9EF8000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
3FF15FE000
stack
page read and write
1B2FCE50000
trusted library allocation
page read and write
1F0B02D4000
heap
page read and write
1F0B02AE000
heap
page read and write
7FF848BB2000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
236BA535000
heap
page read and write
2197A570000
trusted library allocation
page read and write
1E341463000
heap
page read and write
27C4C516000
trusted library allocation
page read and write
CD288FF000
stack
page read and write
1E341904000
heap
page read and write
7FF848900000
trusted library allocation
page execute and read and write
1B48B080000
trusted library allocation
page read and write
7FF848860000
trusted library allocation
page read and write
236D2B83000
heap
page read and write
27C62CA6000
heap
page read and write
1B2FB39C000
heap
page read and write
236D2D1A000
heap
page read and write
24180F8F000
trusted library allocation
page read and write
27C4BD8A000
trusted library allocation
page read and write
7FF848AA1000
trusted library allocation
page read and write
22C06B71000
heap
page read and write
7FF8488F6000
trusted library allocation
page read and write
7E8A64E000
stack
page read and write
7FF8489E2000
trusted library allocation
page read and write
7FF848CA0000
trusted library allocation
page read and write
7FF848840000
trusted library allocation
page read and write
27C4B88A000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
7FF84882D000
trusted library allocation
page execute and read and write
27C62BF8000
heap
page read and write
7FF848A50000
trusted library allocation
page read and write
236D2D77000
heap
page read and write
236BC3CF000
trusted library allocation
page read and write
FB7E9FF000
stack
page read and write
1B48B080000
trusted library allocation
page read and write
7FF848AD0000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
7FF78CF92000
unkown
page readonly
7FF848AA0000
trusted library allocation
page read and write
7FF848A00000
trusted library allocation
page read and write
7E8967F000
stack
page read and write
1E3418C8000
heap
page read and write
27C4BCED000
trusted library allocation
page read and write
24190071000
trusted library allocation
page read and write
7FF848AC0000
trusted library allocation
page read and write
1E341460000
heap
page read and write
236BA530000
heap
page read and write
2456B600000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
7FF848B00000
trusted library allocation
page read and write
2456B700000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1E341904000
heap
page read and write
2197A950000
trusted library allocation
page read and write
1E341518000
heap
page read and write
7FF848BA4000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1B48943A000
heap
page read and write
1E341966000
heap
page read and write
1E3414B6000
heap
page read and write
2197A220000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
1B48B0A0000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1E340FC9000
heap
page read and write
1F0B1E81000
trusted library allocation
page read and write
1B48AEB0000
trusted library allocation
page read and write
22C069B0000
heap
page read and write
1F0B1E90000
trusted library allocation
page read and write
7FF848AD8000
trusted library allocation
page read and write
7FF8488F0000
trusted library allocation
page execute and read and write
7FF848852000
trusted library allocation
page read and write
236B9DD0000
heap
page read and write
7FF848A20000
trusted library allocation
page execute and read and write
7DF4A7960000
trusted library allocation
page execute and read and write
7FF848B10000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
7FF84885D000
trusted library allocation
page execute and read and write
27C4A901000
trusted library allocation
page read and write
27C4ADAF000
trusted library allocation
page read and write
1F970A30000
trusted library allocation
page read and write
7FF848CC0000
trusted library allocation
page read and write
21910011000
trusted library allocation
page read and write
241F2442000
heap
page read and write
1B2FCE50000
trusted library allocation
page read and write
7FF848916000
trusted library allocation
page execute and read and write
2197A39A000
heap
page read and write
1E341904000
heap
page read and write
1B2FCE50000
trusted library allocation
page read and write
7FF848A90000
trusted library allocation
page read and write
7FF848936000
trusted library allocation
page execute and read and write
2197AB15000
heap
page read and write
7FF848BC0000
trusted library allocation
page read and write
1B2FCE20000
trusted library allocation
page read and write
7FF848BA0000
trusted library allocation
page read and write
1E3418DF000
heap
page read and write
1E3414FC000
heap
page read and write
7FF78D218000
unkown
page read and write
7FF848C80000
trusted library allocation
page read and write
1B48B0C0000
trusted library allocation
page read and write
27C62BED000
heap
page read and write
7FF78D224000
unkown
page readonly
7FF848A00000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
24569D80000
heap
page read and write
7FF848B20000
trusted library allocation
page read and write
236B9F6D000
heap
page read and write
1B4895D0000
trusted library allocation
page read and write
241F1584000
heap
page read and write
1E34144E000
heap
page read and write
1B489418000
heap
page read and write
7E894FE000
stack
page read and write
1B48B080000
trusted library allocation
page read and write
7FF848A10000
trusted library allocation
page execute and read and write
7FF848840000
trusted library allocation
page read and write
7FF848832000
trusted library allocation
page read and write
6450C4C000
stack
page read and write
7FF8488F0000
trusted library allocation
page read and write
2418136E000
trusted library allocation
page read and write
236D2887000
heap
page read and write
7E89AFE000
stack
page read and write
1B48B080000
trusted library allocation
page read and write
241F23F2000
heap
page read and write
FDD9079000
stack
page read and write
1E34198B000
heap
page read and write
236BA3D0000
heap
page readonly
1E3414B6000
heap
page read and write
236CA8A1000
trusted library allocation
page read and write
24510001000
trusted library allocation
page read and write
E931EFD000
stack
page read and write
236CAB6F000
trusted library allocation
page read and write
1E340F56000
heap
page read and write
1B2FB399000
heap
page read and write
1F0B1E80000
trusted library allocation
page read and write
7FF848ADB000
trusted library allocation
page read and write
2456B780000
heap
page execute and read and write
7FF848832000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
24569DA0000
heap
page read and write
236BC110000
trusted library allocation
page read and write
644FF7F000
stack
page read and write
241902EF000
trusted library allocation
page read and write
1B48B090000
trusted library allocation
page read and write
1E3414E7000
heap
page read and write
27C4A986000
trusted library allocation
page read and write
1F9712A0000
heap
page execute and read and write
1F0B1DC0000
heap
page readonly
241804B4000
trusted library allocation
page read and write
241F1C00000
heap
page execute and read and write
1F900001000
trusted library allocation
page read and write
7FF848875000
trusted library allocation
page read and write
7FF848844000
trusted library allocation
page read and write
7FF848A30000
trusted library allocation
page execute and read and write
1F0B1EA0000
trusted library allocation
page read and write
1B48B090000
trusted library allocation
page read and write
FDD92F6000
stack
page read and write
1F970B90000
trusted library allocation
page read and write
236D2B14000
heap
page read and write
7FF8489FD000
trusted library allocation
page execute and read and write
1B2FCFB0000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1F96EF90000
heap
page read and write
1E3418C8000
heap
page read and write
1B2FCE50000
trusted library allocation
page read and write
7FF848CA0000
trusted library allocation
page read and write
7FF8488E0000
trusted library allocation
page read and write
2456B600000
trusted library allocation
page read and write
1E34146C000
heap
page read and write
7FF848B00000
trusted library allocation
page read and write
2197B287000
heap
page read and write
1E341463000
heap
page read and write
644FD79000
stack
page read and write
1E34196B000
heap
page read and write
236BA908000
trusted library allocation
page read and write
1B2FB2E0000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
236D2BB1000
heap
page read and write
1E3418FD000
heap
page read and write
1F970BA0000
trusted library allocation
page read and write
1F970BB0000
trusted library allocation
page read and write
1E3418B1000
heap
page read and write
7FF848A0E000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
21910021000
trusted library allocation
page read and write
7FF848A94000
trusted library allocation
page read and write
7FF848AF0000
trusted library allocation
page read and write
1B48B083000
trusted library allocation
page read and write
27C5A901000
trusted library allocation
page read and write
1B48B090000
trusted library allocation
page read and write
1E341465000
heap
page read and write
1B2FD370000
trusted library allocation
page read and write
1B2FCE9C000
heap
page read and write
1B2FCE50000
trusted library allocation
page read and write
7FF848B60000
trusted library allocation
page read and write
236BBBEF000
trusted library allocation
page read and write
24180228000
trusted library allocation
page read and write
3FF1779000
stack
page read and write
2197B06A000
heap
page read and write
7FF848A09000
trusted library allocation
page read and write
7FF848C60000
trusted library allocation
page read and write
1F0B1F47000
heap
page read and write
7FF848A70000
trusted library allocation
page read and write
7FF848B30000
trusted library allocation
page read and write
1E341986000
heap
page read and write
241F1C06000
heap
page execute and read and write
7FF848835000
trusted library allocation
page read and write
2197B2AE000
heap
page read and write
7FF848906000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1B489590000
heap
page read and write
1B48B090000
trusted library allocation
page read and write
1F970BA0000
trusted library allocation
page read and write
1B2FCE70000
trusted library allocation
page read and write
1E341951000
heap
page read and write
27C62A10000
heap
page execute and read and write
64500FE000
stack
page read and write
7FF848B60000
trusted library allocation
page read and write
7FF848A80000
trusted library allocation
page read and write
7FF848B60000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
1E341513000
heap
page read and write
7FF848AC4000
trusted library allocation
page read and write
2197AB00000
trusted library allocation
page read and write
7FF848B89000
trusted library allocation
page read and write
1E341904000
heap
page read and write
1B48B0B0000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
7FF78C9F0000
unkown
page readonly
1B48B080000
trusted library allocation
page read and write
22C06B68000
heap
page read and write
1E340F28000
heap
page read and write
21901C10000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
2456B600000
trusted library allocation
page read and write
1B2FCE70000
trusted library allocation
page read and write
7FF84884D000
trusted library allocation
page execute and read and write
3FF1A3E000
stack
page read and write
1B48B080000
trusted library allocation
page read and write
1E340ED0000
heap
page read and write
241F1540000
heap
page read and write
3FF260E000
stack
page read and write
1F0B1E80000
trusted library allocation
page read and write
FDD90FE000
stack
page read and write
7FF848B94000
trusted library allocation
page read and write
1E3418CD000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
2456B620000
trusted library allocation
page read and write
1E3414E9000
heap
page read and write
1B48AE90000
trusted library allocation
page read and write
7A90F7D000
stack
page read and write
241F1775000
heap
page read and write
1E34152D000
heap
page read and write
1E341955000
heap
page read and write
7FF848A12000
trusted library allocation
page read and write
1F970D6C000
heap
page read and write
236D2AD6000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
7FF848BA0000
trusted library allocation
page read and write
1F970BA0000
trusted library allocation
page read and write
1F0B02DC000
heap
page read and write
1E341430000
heap
page read and write
1B4894A9000
heap
page read and write
1F970C90000
trusted library allocation
page read and write
7FF848AC0000
trusted library allocation
page read and write
7FF8489F0000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
24181C14000
trusted library allocation
page read and write
1B48B090000
trusted library allocation
page read and write
3FF1ABE000
stack
page read and write
24510009000
trusted library allocation
page read and write
27C4A8F0000
heap
page read and write
1B4893F8000
heap
page read and write
36045FF000
stack
page read and write
1B48B083000
trusted library allocation
page read and write
2197B308000
heap
page read and write
7A90B8E000
stack
page read and write
7FF848B40000
trusted library allocation
page read and write
7FF848A34000
trusted library allocation
page read and write
1E341510000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
FDD9179000
stack
page read and write
1E3418F4000
heap
page read and write
1E341972000
heap
page read and write
2197A940000
heap
page readonly
7FF848A00000
trusted library allocation
page execute and read and write
1F96F07D000
heap
page read and write
7FF84886B000
trusted library allocation
page read and write
27C4A360000
trusted library allocation
page read and write
7E8A54E000
stack
page read and write
1F970B90000
trusted library allocation
page read and write
1F970B73000
trusted library allocation
page read and write
7FF848A10000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
FDD9FCE000
stack
page read and write
1B48949B000
heap
page read and write
1B2FCE30000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
3FF1679000
stack
page read and write
1B2FB40B000
heap
page read and write
7FF848830000
trusted library allocation
page read and write
1E341465000
heap
page read and write
7FF848AB0000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
241F21AD000
heap
page read and write
1F96F047000
heap
page read and write
1B2FCFC0000
trusted library allocation
page read and write
1E34193C000
heap
page read and write
6450B4E000
stack
page read and write
2191007C000
trusted library allocation
page read and write
1E3418B0000
heap
page read and write
1F0B1E80000
trusted library allocation
page read and write
2197B068000
heap
page read and write
1F970BA0000
trusted library allocation
page read and write
1E341465000
heap
page read and write
27C4B105000
trusted library allocation
page read and write
27C49D18000
heap
page read and write
1B2FB1E0000
heap
page read and write
7DF43D860000
trusted library allocation
page execute and read and write
241F157C000
heap
page read and write
1B2FCE60000
trusted library allocation
page read and write
241F1C60000
heap
page read and write
7FF848B70000
trusted library allocation
page read and write
1E3418F4000
heap
page read and write
1F910009000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
7FF8489E8000
trusted library allocation
page execute and read and write
1E34193E000
heap
page read and write
27C4BC6D000
trusted library allocation
page read and write
1F0B0260000
heap
page read and write
241804B6000
trusted library allocation
page read and write
2456B600000
trusted library allocation
page read and write
FDD94FF000
stack
page read and write
7FF8489E4000
trusted library allocation
page execute and read and write
7DF485130000
trusted library allocation
page execute and read and write
1E34193F000
heap
page read and write
2456B620000
trusted library allocation
page read and write
3606BFE000
stack
page read and write
3FF11DE000
stack
page read and write
1E34150C000
heap
page read and write
236BA480000
trusted library allocation
page read and write
2456B600000
trusted library allocation
page read and write
7FF848A60000
trusted library allocation
page read and write
7A90E7E000
stack
page read and write
7FF8489E0000
trusted library allocation
page read and write
7FF848C2A000
trusted library allocation
page read and write
1B489464000
heap
page read and write
1E3418E6000
heap
page read and write
1E341463000
heap
page read and write
236BA450000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
645017B000
stack
page read and write
7FF8489EA000
trusted library allocation
page read and write
7FF848832000
trusted library allocation
page read and write
1B48B090000
trusted library allocation
page read and write
24180001000
trusted library allocation
page read and write
236D2DC0000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
24569DC0000
heap
page read and write
241F157E000
heap
page read and write
7FF848AD0000
trusted library allocation
page read and write
1B48B083000
trusted library allocation
page read and write
7FF848A18000
trusted library allocation
page execute and read and write
21900492000
trusted library allocation
page read and write
1F970BC0000
trusted library allocation
page read and write
FDD9279000
stack
page read and write
CD289FD000
stack
page read and write
2190186B000
trusted library allocation
page read and write
236BC495000
trusted library allocation
page read and write
7E897F9000
stack
page read and write
1B48B080000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
27C5A971000
trusted library allocation
page read and write
236CAB77000
trusted library allocation
page read and write
27C49CA0000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
1B2FB3D6000
heap
page read and write
1F970B93000
trusted library allocation
page read and write
7FF848BA9000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1F970BA0000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1B2FCE70000
trusted library allocation
page read and write
1E341975000
heap
page read and write
7DF4A7D10000
trusted library allocation
page execute and read and write
1B48B080000
trusted library allocation
page read and write
1F0B1E90000
trusted library allocation
page read and write
1E341465000
heap
page read and write
27C49D55000
heap
page read and write
27C4A445000
heap
page read and write
1F0B1D90000
trusted library allocation
page read and write
1E34146E000
heap
page read and write
1B489428000
heap
page read and write
7E89978000
stack
page read and write
3604AFF000
stack
page read and write
1F970BC0000
trusted library allocation
page read and write
1E340F3E000
heap
page read and write
7FF848AF0000
trusted library allocation
page read and write
1F0B1DF0000
heap
page read and write
1B2FCE50000
trusted library allocation
page read and write
1E341904000
heap
page read and write
1B2FCE43000
trusted library allocation
page read and write
7FF848860000
trusted library allocation
page read and write
7FF848900000
trusted library allocation
page read and write
2197B271000
heap
page read and write
236BB80A000
trusted library allocation
page read and write
7FF78C9F1000
unkown
page execute read
7FF8489E0000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
1F970BA0000
trusted library allocation
page read and write
2456B620000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
2197A444000
heap
page read and write
1E3414E4000
heap
page read and write
1E341504000
heap
page read and write
B0D147D000
stack
page read and write
1F970B90000
trusted library allocation
page read and write
7E89A7E000
stack
page read and write
2197A3D8000
heap
page read and write
1B2FCE50000
trusted library allocation
page read and write
24569B3A000
heap
page read and write
7FF848A92000
trusted library allocation
page read and write
7FF8488E0000
trusted library allocation
page execute and read and write
1B48B080000
trusted library allocation
page read and write
236B9CB0000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
7FF848850000
trusted library allocation
page read and write
1E34196B000
heap
page read and write
1E3418CB000
heap
page read and write
1B2FCFB0000
trusted library allocation
page read and write
1B2FCE70000
trusted library allocation
page read and write
7FF84890C000
trusted library allocation
page execute and read and write
1B2FCD90000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
241F20C0000
heap
page execute and read and write
7E898FA000
stack
page read and write
27C4B114000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
7FF848A80000
trusted library allocation
page read and write
1F970B60000
trusted library allocation
page read and write
1E341452000
heap
page read and write
3FF1BBE000
stack
page read and write
1F970A40000
heap
page readonly
7E8A6CA000
stack
page read and write
27C49D58000
heap
page read and write
7FF8489D5000
trusted library allocation
page read and write
7FF848A0A000
trusted library allocation
page read and write
7FF848B70000
trusted library allocation
page read and write
644FB79000
stack
page read and write
1B2FB5C5000
heap
page read and write
7FF8489F0000
trusted library allocation
page read and write
219102F5000
trusted library allocation
page read and write
1B48B090000
trusted library allocation
page read and write
1F96F01B000
heap
page read and write
2197A390000
heap
page read and write
1B2FCE50000
trusted library allocation
page read and write
7FF8489F0000
trusted library allocation
page read and write
24569AFC000
heap
page read and write
7FF848853000
trusted library allocation
page execute and read and write
1B48B080000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
2456B620000
trusted library allocation
page read and write
27C62C8D000
heap
page read and write
27C62E10000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
7FF848BB8000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1B48B090000
trusted library allocation
page read and write
847ACFF000
stack
page read and write
1B2FCE70000
trusted library allocation
page read and write
3FF1153000
stack
page read and write
241F1520000
heap
page read and write
7FF848AA2000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
27C4A050000
heap
page read and write
1E341904000
heap
page read and write
1E341904000
heap
page read and write
1E3414E6000
heap
page read and write
1E341463000
heap
page read and write
2456B79D000
heap
page read and write
7E89878000
stack
page read and write
2456B603000
trusted library allocation
page read and write
1B49B0E9000
trusted library allocation
page read and write
7FF848A22000
trusted library allocation
page read and write
7FF848BB8000
trusted library allocation
page read and write
27C62C72000
heap
page read and write
7FF848AE0000
trusted library allocation
page read and write
2456B623000
trusted library allocation
page read and write
7FF848B10000
trusted library allocation
page read and write
1F0B1EB0000
trusted library allocation
page read and write
7FF848AC0000
trusted library allocation
page read and write
1F0B1EA0000
trusted library allocation
page read and write
1F0B1E83000
trusted library allocation
page read and write
1F970D25000
heap
page read and write
27C62C9E000
heap
page read and write
644FCFD000
stack
page read and write
1E34146A000
heap
page read and write
1E34152D000
heap
page read and write
1F0B1EA0000
trusted library allocation
page read and write
236CAB71000
trusted library allocation
page read and write
1E3418E9000
heap
page read and write
1E3418DA000
heap
page read and write
2456B600000
trusted library allocation
page read and write
7FF78D220000
unkown
page read and write
7FF848926000
trusted library allocation
page execute and read and write
1E341989000
heap
page read and write
1F970BA0000
trusted library allocation
page read and write
7FF848C90000
trusted library allocation
page read and write
2456B5F3000
trusted library allocation
page read and write
7FF848C60000
trusted library allocation
page read and write
1B48B081000
trusted library allocation
page read and write
1E3414B8000
heap
page read and write
644F73E000
stack
page read and write
2456B600000
trusted library allocation
page read and write
22C06B60000
heap
page read and write
27C4AD61000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
1F0B1EA0000
trusted library allocation
page read and write
2456B5B0000
trusted library allocation
page read and write
644FE7C000
stack
page read and write
1B2FCE70000
trusted library allocation
page read and write
7FF8489D4000
trusted library allocation
page execute and read and write
1F970BB0000
trusted library allocation
page read and write
3FF19BE000
stack
page read and write
7FF8489F0000
trusted library allocation
page read and write
1E34190A000
heap
page read and write
2197A930000
trusted library allocation
page read and write
1E340FB5000
heap
page read and write
3605FFE000
stack
page read and write
24181873000
trusted library allocation
page read and write
7FF848A70000
trusted library allocation
page read and write
36059EC000
stack
page read and write
1F970B90000
trusted library allocation
page read and write
27C62AD0000
heap
page read and write
2456B600000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1B48B083000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
7FF848B00000
trusted library allocation
page read and write
2418081E000
trusted library allocation
page read and write
1E3414F0000
heap
page read and write
236B9EBC000
heap
page read and write
1F0B1E80000
trusted library allocation
page read and write
36055F2000
stack
page read and write
7FF848852000
trusted library allocation
page read and write
7FF848BB0000
trusted library allocation
page read and write
1E34151D000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
7FF848A40000
trusted library allocation
page execute and read and write
241F2449000
heap
page read and write
2197B050000
heap
page read and write
1E341955000
heap
page read and write
27C5A921000
trusted library allocation
page read and write
2456B620000
trusted library allocation
page read and write
27C5ABEA000
trusted library allocation
page read and write
236BA3E0000
trusted library allocation
page read and write
1B2FB3DC000
heap
page read and write
7FF848970000
trusted library allocation
page execute and read and write
7FF848A10000
trusted library allocation
page execute and read and write
1B489494000
heap
page read and write
236B9E60000
trusted library allocation
page read and write
1E341457000
heap
page read and write
7DF4993E0000
trusted library allocation
page execute and read and write
27C5A910000
trusted library allocation
page read and write
7FF848A00000
trusted library allocation
page execute and read and write
7FF848950000
trusted library allocation
page execute and read and write
2197B279000
heap
page read and write
7FF848A70000
trusted library allocation
page read and write
1B2FB2C0000
heap
page read and write
FDD9379000
stack
page read and write
1F970A60000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
7FF848A20000
trusted library allocation
page execute and read and write
1F970B90000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1E341465000
heap
page read and write
27C4A350000
heap
page readonly
7FF848AE6000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
1B4894F0000
heap
page read and write
1E341929000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
3605DFE000
stack
page read and write
1E341463000
heap
page read and write
7FF8489D5000
trusted library allocation
page read and write
1F970BD0000
heap
page read and write
27C4C1CB000
trusted library allocation
page read and write
21900813000
trusted library allocation
page read and write
7FF8489E1000
trusted library allocation
page read and write
1F970BA0000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
2197B06E000
heap
page read and write
24181C18000
trusted library allocation
page read and write
1F96EF80000
heap
page read and write
1E34150B000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
36053EF000
stack
page read and write
7FF848AC1000
trusted library allocation
page read and write
1E3414E9000
heap
page read and write
1E3414E1000
heap
page read and write
1E341502000
heap
page read and write
2456B620000
trusted library allocation
page read and write
1E3418CA000
heap
page read and write
1B4893C0000
heap
page read and write
2456B600000
trusted library allocation
page read and write
1B4895A0000
heap
page read and write
7FF848AD1000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
7FF848B30000
trusted library allocation
page read and write
1F0B0292000
heap
page read and write
7FF848AA8000
trusted library allocation
page read and write
1B2FCFD0000
trusted library allocation
page read and write
1E341461000
heap
page read and write
236B9D90000
heap
page read and write
7FF848CA0000
trusted library allocation
page read and write
7FF8488E6000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
1B48B090000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
847AC73000
stack
page read and write
1E340F96000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
21901840000
trusted library allocation
page read and write
CD28A7C000
stack
page read and write
1F0B1E80000
trusted library allocation
page read and write
7FF84886B000
trusted library allocation
page read and write
1F96F250000
heap
page read and write
27C62BF0000
heap
page read and write
24569B34000
heap
page read and write
241F242A000
heap
page read and write
1F0B02F9000
heap
page read and write
B0D157E000
stack
page read and write
1B48AF53000
trusted library allocation
page read and write
1B4894CB000
heap
page read and write
7FF848B30000
trusted library allocation
page read and write
7FF848865000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
7FF848A80000
trusted library allocation
page read and write
1B4A3470000
heap
page execute and read and write
1B29000E000
trusted library allocation
page read and write
241F1C40000
heap
page read and write
1E341514000
heap
page read and write
7FF848B50000
trusted library allocation
page read and write
2197AA10000
trusted library allocation
page read and write
7FF848C40000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1B489466000
heap
page read and write
1E341460000
heap
page read and write
2456B6F0000
trusted library allocation
page read and write
7FF848A00000
trusted library allocation
page execute and read and write
3605BE5000
stack
page read and write
27C49D12000
heap
page read and write
241F2428000
heap
page read and write
1F970BA0000
trusted library allocation
page read and write
7FF848A90000
trusted library allocation
page read and write
241902EA000
trusted library allocation
page read and write
27C4AB28000
trusted library allocation
page read and write
7FF848AE2000
trusted library allocation
page read and write
7FF848BA9000
trusted library allocation
page read and write
7FF84883D000
trusted library allocation
page execute and read and write
1B48B0A0000
trusted library allocation
page read and write
36059F8000
stack
page read and write
1E34196B000
heap
page read and write
1B2FCE50000
trusted library allocation
page read and write
7FF848C70000
trusted library allocation
page execute and read and write
1E340D50000
heap
page read and write
7FF848A30000
trusted library allocation
page read and write
1B4895F0000
heap
page read and write
FDD8BEE000
stack
page read and write
7FF848C90000
trusted library allocation
page read and write
2456B630000
heap
page read and write
1B48B0A0000
trusted library allocation
page read and write
1F0B02AB000
heap
page read and write
24569B08000
heap
page read and write
236BC499000
trusted library allocation
page read and write
24569B36000
heap
page read and write
236D2BF5000
heap
page read and write
7FF848862000
trusted library allocation
page read and write
236D2B9C000
heap
page read and write
7FF8489E0000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
241F2290000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
7FF848B80000
trusted library allocation
page read and write
1E341952000
heap
page read and write
E931BDE000
stack
page read and write
7FF848CB0000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
7FF848AA0000
trusted library allocation
page read and write
7FF848A04000
trusted library allocation
page execute and read and write
7DF4D4690000
trusted library allocation
page execute and read and write
2456B600000
trusted library allocation
page read and write
7FF848A30000
trusted library allocation
page read and write
7FF848A20000
trusted library allocation
page read and write
1F970D20000
heap
page read and write
2197B2FB000
heap
page read and write
1F0B028C000
heap
page read and write
7FF848A00000
trusted library allocation
page read and write
E931E7F000
stack
page read and write
1B48AEA0000
heap
page readonly
7FF848B83000
trusted library allocation
page read and write
24569B77000
heap
page read and write
1B48B0A0000
trusted library allocation
page read and write
7FF848A50000
trusted library allocation
page read and write
7FF848B50000
trusted library allocation
page read and write
2456B620000
trusted library allocation
page read and write
7FF848AD2000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
7DF456370000
trusted library allocation
page execute and read and write
1B48B080000
trusted library allocation
page read and write
2456B620000
trusted library allocation
page read and write
1B4894B8000
heap
page read and write
1E3414E7000
heap
page read and write
7FF8489DD000
trusted library allocation
page execute and read and write
27C4AD69000
trusted library allocation
page read and write
1F0B1EA0000
trusted library allocation
page read and write
7FF848936000
trusted library allocation
page execute and read and write
7FF8489DD000
trusted library allocation
page execute and read and write
7FF8489F3000
trusted library allocation
page read and write
7FF848A30000
trusted library allocation
page execute and read and write
2197A392000
heap
page read and write
1E3414E6000
heap
page read and write
7FF848970000
trusted library allocation
page execute and read and write
7DF476900000
trusted library allocation
page execute and read and write
1B2FCE40000
trusted library allocation
page read and write
7FF848900000
trusted library allocation
page read and write
7FF848A2E000
trusted library allocation
page read and write
7FF848A60000
trusted library allocation
page read and write
1B28001B000
trusted library allocation
page read and write
7E895FA000
stack
page read and write
1E341942000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
1F0C2119000
trusted library allocation
page read and write
7FF848A34000
trusted library allocation
page read and write
7DF4A7CF0000
trusted library allocation
page execute and read and write
7DF4D46A0000
trusted library allocation
page execute and read and write
1B4893F0000
heap
page read and write
7FF848AA2000
trusted library allocation
page read and write
1B48B090000
trusted library allocation
page read and write
1F0B0430000
heap
page read and write
7FF848AF0000
trusted library allocation
page read and write
644F7BE000
stack
page read and write
3FF268D000
stack
page read and write
7FF848BBA000
trusted library allocation
page read and write
1F0B1D50000
heap
page read and write
241F1BC0000
trusted library allocation
page read and write
2456B5C0000
heap
page readonly
1F970B90000
trusted library allocation
page read and write
236BBC68000
trusted library allocation
page read and write
1B2FCD72000
heap
page read and write
241F15C5000
heap
page read and write
27C4B234000
trusted library allocation
page read and write
2456B5D0000
trusted library allocation
page read and write
27C4C44C000
trusted library allocation
page read and write
1F0B02A8000
heap
page read and write
1E340F85000
heap
page read and write
1B2FCDA0000
heap
page readonly
7FF8489CD000
trusted library allocation
page execute and read and write
21900001000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
236D2AD0000
heap
page read and write
7FF848A32000
trusted library allocation
page read and write
7DF49C5A0000
trusted library allocation
page execute and read and write
1F0B1E80000
trusted library allocation
page read and write
7DF4993F0000
trusted library allocation
page execute and read and write
1B489426000
heap
page read and write
7FF848C5C000
trusted library allocation
page read and write
241F158A000
heap
page read and write
27C629AE000
heap
page read and write
7FF848ACA000
trusted library allocation
page read and write
2197A39E000
heap
page read and write
2456B620000
trusted library allocation
page read and write
1B48B090000
trusted library allocation
page read and write
27C49CD0000
heap
page read and write
1E340F0C000
heap
page read and write
1B2FD380000
trusted library allocation
page read and write
236B9E40000
trusted library allocation
page read and write
7FF8489F0000
trusted library allocation
page execute and read and write
1E34152B000
heap
page read and write
7FF848A01000
trusted library allocation
page read and write
1F96F018000
heap
page read and write
2456B600000
trusted library allocation
page read and write
236D2BF9000
heap
page read and write
7FF848A16000
trusted library allocation
page execute and read and write
7FF848B50000
trusted library allocation
page read and write
7E896F9000
stack
page read and write
236CA8F2000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1E341940000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
7E899FE000
stack
page read and write
7E8977D000
stack
page read and write
2197A9B0000
heap
page execute and read and write
1B290009000
trusted library allocation
page read and write
2197AA40000
trusted library allocation
page read and write
1B2FB360000
heap
page read and write
1E3418FD000
heap
page read and write
1F0B0268000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
3FF157A000
stack
page read and write
1B2FCE50000
trusted library allocation
page read and write
1F96F002000
heap
page read and write
7FF8488D0000
trusted library allocation
page read and write
236D2B7C000
heap
page read and write
27C4B019000
trusted library allocation
page read and write
7FF848A05000
trusted library allocation
page read and write
241F1420000
heap
page read and write
1F0B1E80000
trusted library allocation
page read and write
1B2FCFB0000
trusted library allocation
page read and write
7FF848BB2000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1B2FB388000
heap
page read and write
1F0B1E83000
trusted library allocation
page read and write
241F2170000
heap
page read and write
7FF848940000
trusted library allocation
page execute and read and write
7FF848A00000
trusted library allocation
page read and write
FDD947E000
stack
page read and write
7FF848AE0000
trusted library allocation
page read and write
FDD91FD000
stack
page read and write
1E3418F4000
heap
page read and write
219102ED000
trusted library allocation
page read and write
7FF848C30000
trusted library allocation
page read and write
1B2FCE73000
trusted library allocation
page read and write
7FF848C60000
trusted library allocation
page read and write
7FF848AB2000
trusted library allocation
page read and write
7FF848BBC000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
236CAB79000
trusted library allocation
page read and write
7FF84883D000
trusted library allocation
page execute and read and write
7FF848B20000
trusted library allocation
page read and write
7E8957E000
stack
page read and write
FDD93F9000
stack
page read and write
27C62C48000
heap
page read and write
1B48AF60000
heap
page read and write
1E341461000
heap
page read and write
1B48B0A0000
trusted library allocation
page read and write
1F0B1E73000
trusted library allocation
page read and write
644FFFE000
stack
page read and write
1E341526000
heap
page read and write
7FF848960000
trusted library allocation
page execute and read and write
1B2FCFA0000
heap
page execute and read and write
219102EF000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
2456B700000
trusted library allocation
page read and write
FB7E5FD000
stack
page read and write
1F0B031B000
heap
page read and write
3FF1837000
stack
page read and write
7FF848AC0000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
7FF848AE0000
trusted library allocation
page read and write
1B2FCE60000
trusted library allocation
page read and write
24569DF0000
heap
page read and write
36068FF000
stack
page read and write
1E3418E9000
heap
page read and write
7FF848980000
trusted library allocation
page execute and read and write
7FF8489D8000
trusted library allocation
page execute and read and write
7FF848852000
trusted library allocation
page read and write
2197B040000
heap
page execute and read and write
7DF49C590000
trusted library allocation
page execute and read and write
241F23F5000
heap
page read and write
6450BCE000
stack
page read and write
1B48B0E2000
heap
page read and write
7FF848B90000
trusted library allocation
page read and write
1B48B0E1000
trusted library allocation
page read and write
1B2FCFD0000
trusted library allocation
page read and write
27C49D2C000
heap
page read and write
2456B7A6000
heap
page read and write
7FF848BB5000
trusted library allocation
page read and write
24569DA5000
heap
page read and write
241F1B50000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
1F96F045000
heap
page read and write
7FF848B92000
trusted library allocation
page read and write
2456B600000
trusted library allocation
page read and write
1B48B090000
trusted library allocation
page read and write
7FF8489F2000
trusted library allocation
page read and write
1F970BB0000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1B2FB3A7000
heap
page read and write
7FF848A50000
trusted library allocation
page read and write
7FF8489D0000
trusted library allocation
page read and write
1E340EDC000
heap
page read and write
241F1770000
heap
page read and write
7FF848C20000
trusted library allocation
page read and write
7DF476910000
trusted library allocation
page execute and read and write
3FF18B9000
stack
page read and write
7FF8489F1000
trusted library allocation
page read and write
1B2FCFB0000
trusted library allocation
page read and write
7FF848A06000
trusted library allocation
page execute and read and write
7FF848A80000
trusted library allocation
page read and write
1F96EFD0000
heap
page read and write
24181848000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
7FF848823000
trusted library allocation
page execute and read and write
1B2FCE50000
trusted library allocation
page read and write
7FF848AC0000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
7FF848842000
trusted library allocation
page read and write
1B2FB43D000
heap
page read and write
7FF8489F9000
trusted library allocation
page read and write
7FF848B10000
trusted library allocation
page read and write
1B489422000
heap
page read and write
7FF848C30000
trusted library allocation
page read and write
236BA881000
trusted library allocation
page read and write
1B48B090000
trusted library allocation
page read and write
21900490000
trusted library allocation
page read and write
7FF8488F0000
trusted library allocation
page execute and read and write
1F970B90000
trusted library allocation
page read and write
7FF848834000
trusted library allocation
page read and write
1E3418F4000
heap
page read and write
7FF8489F0000
trusted library allocation
page read and write
1E34191C000
heap
page read and write
1F96F08B000
heap
page read and write
B0D11AE000
stack
page read and write
1E3418DB000
heap
page read and write
241F159C000
heap
page read and write
236BC14F000
trusted library allocation
page read and write
1E340F71000
heap
page read and write
236BA4E0000
heap
page execute and read and write
7FF848A10000
trusted library allocation
page read and write
7FF848B60000
trusted library allocation
page read and write
1E3418CB000
heap
page read and write
1E341461000
heap
page read and write
1F0B1E80000
trusted library allocation
page read and write
21901B47000
trusted library allocation
page read and write
7DF4D4680000
trusted library allocation
page execute and read and write
241F1C65000
heap
page read and write
2456BDA0000
heap
page execute and read and write
FDDA04C000
stack
page read and write
1F970B90000
trusted library allocation
page read and write
7FF848A0D000
trusted library allocation
page execute and read and write
1F970A50000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
7FF848936000
trusted library allocation
page execute and read and write
7FF848C50000
trusted library allocation
page read and write
7FF848C80000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
27C4A055000
heap
page read and write
7E89B7C000
stack
page read and write
236BB097000
trusted library allocation
page read and write
1E3414E4000
heap
page read and write
7FF848916000
trusted library allocation
page execute and read and write
1B48B080000
trusted library allocation
page read and write
7FF848A0A000
trusted library allocation
page read and write
1F970B93000
trusted library allocation
page read and write
241F21C1000
heap
page read and write
236BC0C7000
trusted library allocation
page read and write
24190021000
trusted library allocation
page read and write
7FF8488EC000
trusted library allocation
page execute and read and write
24569DF5000
heap
page read and write
7FF848A10000
trusted library allocation
page execute and read and write
1B48B080000
trusted library allocation
page read and write
1E341452000
heap
page read and write
1B2FCE50000
trusted library allocation
page read and write
7FF848A40000
trusted library allocation
page execute and read and write
1B2FCE85000
heap
page read and write
7FF848B90000
trusted library allocation
page read and write
21900719000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
27C4C170000
trusted library allocation
page read and write
7E891B2000
stack
page read and write
1F0B2111000
trusted library allocation
page read and write
7FF848AF0000
trusted library allocation
page read and write
27C49D10000
heap
page read and write
1F0B1E80000
trusted library allocation
page read and write
7A90B02000
stack
page read and write
7FF78D224000
unkown
page readonly
1F0B1E80000
trusted library allocation
page read and write
21910001000
trusted library allocation
page read and write
7FF848B84000
trusted library allocation
page read and write
236BAF9C000
trusted library allocation
page read and write
1F0B1E06000
heap
page read and write
7FF848854000
trusted library allocation
page read and write
7FF848BA8000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1B2FCE51000
trusted library allocation
page read and write
241813D9000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
1F970BB0000
trusted library allocation
page read and write
7FF8489D3000
trusted library allocation
page read and write
1E341952000
heap
page read and write
236BC0F2000
trusted library allocation
page read and write
2197A530000
heap
page read and write
3FF250E000
stack
page read and write
1B48B083000
trusted library allocation
page read and write
1B2FCFC0000
trusted library allocation
page read and write
7FF848906000
trusted library allocation
page execute and read and write
644FC79000
stack
page read and write
1E3418F4000
heap
page read and write
241818CE000
trusted library allocation
page read and write
1E341951000
heap
page read and write
7FF848ACA000
trusted library allocation
page read and write
1B2FCE70000
trusted library allocation
page read and write
21910070000
trusted library allocation
page read and write
1F970BA0000
trusted library allocation
page read and write
1F0C211E000
trusted library allocation
page read and write
1E3418B9000
heap
page read and write
1B2FD390000
trusted library allocation
page read and write
FDD95FB000
stack
page read and write
7FF848B00000
trusted library allocation
page read and write
7FF8489C0000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
1F970B93000
trusted library allocation
page read and write
7FF848970000
trusted library allocation
page execute and read and write
7FF848A39000
trusted library allocation
page read and write
236BA520000
trusted library allocation
page read and write
236B9EBA000
heap
page read and write
7FF848B40000
trusted library allocation
page read and write
24569A20000
heap
page read and write
7FF848C4A000
trusted library allocation
page read and write
236D2DE1000
heap
page read and write
1B2FCE80000
heap
page read and write
1B48946A000
heap
page read and write
2197AE6C000
heap
page read and write
1F96F210000
heap
page read and write
1F0B1F35000
heap
page read and write
3FF14FE000
stack
page read and write
CD2897E000
stack
page read and write
24190010000
trusted library allocation
page read and write
21900F8A000
trusted library allocation
page read and write
241F2600000
trusted library allocation
page read and write
1F0B0245000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
36063FB000
stack
page read and write
7DF485120000
trusted library allocation
page execute and read and write
1B2FCE50000
trusted library allocation
page read and write
7FF848AE0000
trusted library allocation
page read and write
7FF848A08000
trusted library allocation
page execute and read and write
1F0B1ED0000
heap
page execute and read and write
241F23E0000
heap
page read and write
7FF848C70000
trusted library allocation
page execute and read and write
FB7E8FF000
stack
page read and write
27C49DB1000
heap
page read and write
1B290001000
trusted library allocation
page read and write
236D2DE5000
heap
page read and write
1E34196A000
heap
page read and write
27C4A040000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1E34145C000
heap
page read and write
1B2FCE50000
trusted library allocation
page read and write
7FF848AA4000
trusted library allocation
page read and write
241F23FD000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
7FF848B73000
trusted library allocation
page read and write
241F22B0000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
241F23C0000
heap
page execute and read and write
7FF848906000
trusted library allocation
page read and write
1F96F04C000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
2197B350000
heap
page read and write
1B2FCE50000
trusted library allocation
page read and write
2197B258000
heap
page read and write
24180724000
trusted library allocation
page read and write
236B9E70000
heap
page read and write
7FF848B20000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
2197A595000
heap
page read and write
7FF848822000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
2456B600000
trusted library allocation
page read and write
644FBFE000
stack
page read and write
2197B282000
heap
page read and write
27C4C511000
trusted library allocation
page read and write
219018C6000
trusted library allocation
page read and write
1E34190B000
heap
page read and write
7FF848C50000
trusted library allocation
page read and write
1F970B6C000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
FDD8FFE000
stack
page read and write
236D2D6A000
heap
page read and write
7FF848910000
trusted library allocation
page read and write
21900086000
trusted library allocation
page read and write
1B2FCE73000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
241F1500000
heap
page read and write
1B2FCE53000
trusted library allocation
page read and write
1B2FCFD0000
trusted library allocation
page read and write
2197AB10000
heap
page read and write
1B4895F5000
heap
page read and write
1E3414FF000
heap
page read and write
7FF8488FC000
trusted library allocation
page execute and read and write
7FF78D21E000
unkown
page read and write
3FF1B3B000
stack
page read and write
1E3418F4000
heap
page read and write
1B2FCE50000
trusted library allocation
page read and write
2197B148000
heap
page read and write
236BBC7E000
trusted library allocation
page read and write
241F1582000
heap
page read and write
7FF8489D0000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
644FAFE000
stack
page read and write
1F0B1E80000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1B48942C000
heap
page read and write
7FF848864000
trusted library allocation
page read and write
1B2FCE70000
trusted library allocation
page read and write
2456B5A6000
heap
page read and write
236B9EB0000
heap
page read and write
7FF848A9B000
trusted library allocation
page read and write
241F1580000
heap
page read and write
1F970BA0000
trusted library allocation
page read and write
7FF848AA6000
trusted library allocation
page read and write
22C06A90000
heap
page read and write
7FF848B50000
trusted library allocation
page read and write
236CA881000
trusted library allocation
page read and write
1B2FCFC0000
trusted library allocation
page read and write
1F970BA0000
trusted library allocation
page read and write
1F0B1DB0000
trusted library allocation
page read and write
3FF147E000
stack
page read and write
3604CFF000
stack
page read and write
1B49B0E1000
trusted library allocation
page read and write
1E341904000
heap
page read and write
27C4A8C0000
heap
page execute and read and write
2456B620000
trusted library allocation
page read and write
7FF848C80000
trusted library allocation
page read and write
1B2FD370000
trusted library allocation
page read and write
7FF848AB0000
trusted library allocation
page read and write
1E34151E000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
2456B620000
trusted library allocation
page read and write
27C62C2A000
heap
page read and write
7FF848AC4000
trusted library allocation
page read and write
21900ECC000
trusted library allocation
page read and write
1E340E80000
remote allocation
page read and write
1E3414E2000
heap
page read and write
7FF84884B000
trusted library allocation
page read and write
2456B620000
trusted library allocation
page read and write
847AE7D000
stack
page read and write
1E341904000
heap
page read and write
7FF848A60000
trusted library allocation
page read and write
2456B6F0000
trusted library allocation
page read and write
1F0B2100000
heap
page execute and read and write
27C4A390000
trusted library allocation
page read and write
27C62916000
heap
page read and write
7FF848843000
trusted library allocation
page execute and read and write
1B48AF50000
trusted library allocation
page read and write
7FF8489FA000
trusted library allocation
page read and write
27C4A440000
heap
page read and write
21900805000
trusted library allocation
page read and write
241F2499000
heap
page read and write
1B2FB3AA000
heap
page read and write
1E34151D000
heap
page read and write
7FF848AC0000
trusted library allocation
page read and write
1F970BB0000
trusted library allocation
page read and write
7FF848AD0000
trusted library allocation
page read and write
7FF848C50000
trusted library allocation
page read and write
1B2FCD70000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1B48B0A0000
trusted library allocation
page read and write
236D2DCE000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
236D2CF1000
heap
page read and write
236D2AC0000
heap
page execute and read and write
1B49B0EF000
trusted library allocation
page read and write
1F0B02D9000
heap
page read and write
1F0B1E80000
trusted library allocation
page read and write
1B2FCE70000
trusted library allocation
page read and write
2456B620000
trusted library allocation
page read and write
1E3414F0000
heap
page read and write
241F242E000
heap
page read and write
7FF848A01000
trusted library allocation
page read and write
7FF8489D0000
trusted library allocation
page read and write
1F970BB0000
trusted library allocation
page read and write
2456B601000
trusted library allocation
page read and write
7FF848AB0000
trusted library allocation
page read and write
3FF258C000
stack
page read and write
7E8947E000
stack
page read and write
1B48B080000
trusted library allocation
page read and write
1E340E60000
heap
page read and write
27C62AB0000
heap
page read and write
7FF8489C4000
trusted library allocation
page read and write
241F2167000
heap
page read and write
2419007D000
trusted library allocation
page read and write
7FF848A14000
trusted library allocation
page execute and read and write
27C4BA4B000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
7FF848A80000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1F970BA0000
trusted library allocation
page read and write
7FF8488E0000
trusted library allocation
page read and write
7FF848C5C000
trusted library allocation
page read and write
7FF848B56000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
236D2DEB000
heap
page read and write
1F96EFF9000
heap
page read and write
FDD957E000
stack
page read and write
1F0B1E90000
trusted library allocation
page read and write
236CA8FE000
trusted library allocation
page read and write
241F1730000
heap
page read and write
1F96F00D000
heap
page read and write
1E34194C000
heap
page read and write
24181B4F000
trusted library allocation
page read and write
1E341465000
heap
page read and write
7FF848A70000
trusted library allocation
page read and write
1E3414E4000
heap
page read and write
3FF1938000
stack
page read and write
236D2CFD000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
7FF848853000
trusted library allocation
page execute and read and write
236BA440000
heap
page read and write
27C62982000
heap
page read and write
1F0B1EB0000
trusted library allocation
page read and write
7DF4A7950000
trusted library allocation
page execute and read and write
1F0B1E80000
trusted library allocation
page read and write
7DF4768F0000
trusted library allocation
page execute and read and write
7FF8489E0000
trusted library allocation
page read and write
7FF848833000
trusted library allocation
page execute and read and write
644F6B3000
stack
page read and write
1F0B0289000
heap
page read and write
36052FF000
stack
page read and write
2456B600000
trusted library allocation
page read and write
FDD8F7E000
stack
page read and write
1F0B1E80000
trusted library allocation
page read and write
27C49C40000
heap
page read and write
3FF16FD000
stack
page read and write
1E3414B8000
heap
page read and write
644FDF6000
stack
page read and write
24569B6B000
heap
page read and write
2456B600000
trusted library allocation
page read and write
1E3418BF000
heap
page read and write
2197B2EC000
heap
page read and write
236CAB6B000
trusted library allocation
page read and write
236BAAA9000
trusted library allocation
page read and write
241813F1000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
1B2FCFE0000
heap
page read and write
236B9EFC000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
3604EFE000
stack
page read and write
1E340F64000
heap
page read and write
1E3418F4000
heap
page read and write
1B48AEE2000
heap
page read and write
1E341463000
heap
page read and write
7FF848AB0000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
1F96F01F000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
7FF848A09000
trusted library allocation
page read and write
7FF848A14000
trusted library allocation
page read and write
3606CFF000
stack
page read and write
1F970B93000
trusted library allocation
page read and write
21901C0C000
trusted library allocation
page read and write
1E341514000
heap
page read and write
7E891FE000
stack
page read and write
2456B600000
trusted library allocation
page read and write
E931B5E000
stack
page read and write
1F970B90000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
1F96F098000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
2197B250000
heap
page read and write
1E341438000
heap
page read and write
1F970B70000
trusted library allocation
page read and write
24180810000
trusted library allocation
page read and write
27C4AD67000
trusted library allocation
page read and write
236D2D26000
heap
page read and write
24569B62000
heap
page read and write
7FF848B63000
trusted library allocation
page read and write
7FF848A10000
trusted library allocation
page execute and read and write
7FF848A60000
trusted library allocation
page read and write
1E341565000
heap
page read and write
7FF848834000
trusted library allocation
page read and write
1E341479000
heap
page read and write
2456B610000
trusted library allocation
page read and write
7FF848C60000
trusted library allocation
page execute and read and write
1E341521000
heap
page read and write
1E340FA6000
heap
page read and write
1E341914000
heap
page read and write
7FF8489D6000
trusted library allocation
page execute and read and write
2456B610000
trusted library allocation
page read and write
7FF848BAC000
trusted library allocation
page read and write
1F970BA0000
trusted library allocation
page read and write
2456B600000
trusted library allocation
page read and write
36047FE000
stack
page read and write
27C5ABF8000
trusted library allocation
page read and write
1E34196B000
heap
page read and write
236CA890000
trusted library allocation
page read and write
21900933000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
2456B620000
trusted library allocation
page read and write
1F970B80000
heap
page execute and read and write
1F970B90000
trusted library allocation
page read and write
1E34198B000
heap
page read and write
1B2FB391000
heap
page read and write
2197AA00000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
7FF848A10000
trusted library allocation
page execute and read and write
7FF848AAA000
trusted library allocation
page read and write
7FF848B80000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
2197A590000
heap
page read and write
2456B620000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1F970A10000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
1E341442000
heap
page read and write
1F0B1EA0000
trusted library allocation
page read and write
1B2FCE70000
trusted library allocation
page read and write
7FF848845000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
27C4BCE5000
trusted library allocation
page read and write
1E34151A000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
7DF499400000
trusted library allocation
page execute and read and write
27C5ABEE000
trusted library allocation
page read and write
1B48B0D0000
heap
page execute and read and write
1E3418E3000
heap
page read and write
847AD7E000
stack
page read and write
7FF848B40000
trusted library allocation
page read and write
7FF848C40000
trusted library allocation
page read and write
236B9ED0000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
1E340E30000
heap
page read and write
2456B600000
trusted library allocation
page read and write
36055F4000
stack
page read and write
1F0B0294000
heap
page read and write
7FF848950000
trusted library allocation
page execute and read and write
7FF848833000
trusted library allocation
page execute and read and write
1B48B080000
trusted library allocation
page read and write
1F0B1DE0000
trusted library allocation
page read and write
7FF848C90000
trusted library allocation
page read and write
27C62BD0000
heap
page read and write
7FF848AB0000
trusted library allocation
page read and write
1B2FCE70000
trusted library allocation
page read and write
1E341968000
heap
page read and write
7FF848AD0000
trusted library allocation
page read and write
7FF848B9C000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
1F0B029A000
heap
page read and write
7FF8489E4000
trusted library allocation
page execute and read and write
36050FC000
stack
page read and write
1F910001000
trusted library allocation
page read and write
36061FE000
stack
page read and write
27C6295F000
heap
page read and write
1F0B1F00000
heap
page read and write
1E3418F4000
heap
page read and write
1F0B029D000
heap
page read and write
1E3418B4000
heap
page read and write
7DF4A7940000
trusted library allocation
page execute and read and write
7FF84885D000
trusted library allocation
page execute and read and write
1F0B1E80000
trusted library allocation
page read and write
7FF848910000
trusted library allocation
page execute and read and write
236D2D5C000
heap
page read and write
1F0B1DD0000
trusted library allocation
page read and write
1E340E80000
remote allocation
page read and write
1E34190F000
heap
page read and write
1E34152D000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
7DF49C5B0000
trusted library allocation
page execute and read and write
1E341514000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
7FF848A40000
trusted library allocation
page execute and read and write
1F970BA0000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
7FF84885D000
trusted library allocation
page execute and read and write
FDDA0CE000
stack
page read and write
22C06E55000
heap
page read and write
241F2405000
heap
page read and write
241F1B10000
trusted library allocation
page read and write
1B2FCE70000
trusted library allocation
page read and write
2197B046000
heap
page execute and read and write
7DF456360000
trusted library allocation
page execute and read and write
7FF848CA6000
trusted library allocation
page read and write
27C62C08000
heap
page read and write
7FF8489E6000
trusted library allocation
page execute and read and write
7FF8489E6000
trusted library allocation
page execute and read and write
24190001000
trusted library allocation
page read and write
27C49C30000
heap
page read and write
7FF848BA4000
trusted library allocation
page read and write
236D2B16000
heap
page read and write
7FF848C40000
trusted library allocation
page read and write
236D2DB1000
heap
page read and write
241F15C8000
heap
page read and write
1B2FCE50000
trusted library allocation
page read and write
2456B600000
trusted library allocation
page read and write
7FF848B30000
trusted library allocation
page read and write
1E341452000
heap
page read and write
1B48B090000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
236BB5AC000
trusted library allocation
page read and write
236D2BF0000
heap
page read and write
236D2D36000
heap
page read and write
1B4892E0000
heap
page read and write
27C4A340000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
22C06AB0000
heap
page read and write
2197B2FD000
heap
page read and write
236BA4F0000
heap
page execute and read and write
241F1B80000
trusted library allocation
page read and write
1F0B0220000
heap
page read and write
2418047D000
trusted library allocation
page read and write
1E3414B6000
heap
page read and write
1E3418F4000
heap
page read and write
7FF848A90000
trusted library allocation
page read and write
1B48B090000
trusted library allocation
page read and write
7FF848A90000
trusted library allocation
page read and write
B0D167C000
stack
page read and write
64501FE000
stack
page read and write
1F970B90000
trusted library allocation
page read and write
7FF848900000
trusted library allocation
page read and write
2197B0AB000
heap
page read and write
7FF848AA0000
trusted library allocation
page read and write
1B2FB570000
heap
page read and write
27C62A36000
heap
page execute and read and write
1F970BB0000
trusted library allocation
page read and write
245699F0000
heap
page read and write
24500001000
trusted library allocation
page read and write
7FF848CA3000
trusted library allocation
page read and write
2456B620000
trusted library allocation
page read and write
847AEFC000
stack
page read and write
2456B600000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
7FF848916000
trusted library allocation
page execute and read and write
27C62A30000
heap
page execute and read and write
7FF848863000
trusted library allocation
page execute and read and write
24569AF1000
heap
page read and write
1F970B90000
trusted library allocation
page read and write
1F0B1F30000
heap
page read and write
7FF848860000
trusted library allocation
page read and write
1E341465000
heap
page read and write
36048FF000
stack
page read and write
1E34196E000
heap
page read and write
7FF848AB0000
trusted library allocation
page read and write
7FF84883D000
trusted library allocation
page execute and read and write
1B48B080000
trusted library allocation
page read and write
1F970BA0000
trusted library allocation
page read and write
7FF848B70000
trusted library allocation
page read and write
2197B150000
heap
page read and write
7FF848920000
trusted library allocation
page execute and read and write
1B2FB3D4000
heap
page read and write
7FF848B99000
trusted library allocation
page read and write
1F970BA0000
trusted library allocation
page read and write
1E341904000
heap
page read and write
FDD8EFE000
stack
page read and write
2456B620000
trusted library allocation
page read and write
1F0B1E90000
trusted library allocation
page read and write
1B280001000
trusted library allocation
page read and write
E931F7C000
stack
page read and write
1F970D31000
heap
page read and write
1F0B1E80000
trusted library allocation
page read and write
7FF8489F0000
trusted library allocation
page read and write
22C06E50000
heap
page read and write
2456B610000
trusted library allocation
page read and write
7FF848910000
trusted library allocation
page execute and read and write
2197B0C1000
heap
page read and write
1B48AF7E000
heap
page read and write
1E34146C000
heap
page read and write
236B9DC5000
heap
page read and write
1B2FCE70000
trusted library allocation
page read and write
236D2DB9000
heap
page read and write
236D2CD0000
heap
page read and write
24181370000
trusted library allocation
page read and write
2456B600000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
2197A300000
heap
page read and write
1B2FCFD0000
trusted library allocation
page read and write
1E3418F4000
heap
page read and write
7FF848833000
trusted library allocation
page execute and read and write
7FF848BA0000
trusted library allocation
page read and write
2197A350000
heap
page read and write
2456B600000
trusted library allocation
page read and write
2456B6F0000
trusted library allocation
page read and write
1E340ED6000
heap
page read and write
847ADFE000
stack
page read and write
1B48B080000
trusted library allocation
page read and write
FDDA14C000
stack
page read and write
27C4BDE2000
trusted library allocation
page read and write
1E340FC4000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
1E3418FD000
heap
page read and write
2197B0E2000
heap
page read and write
27C62BFB000
heap
page read and write
241F1B30000
trusted library allocation
page read and write
1B48B083000
trusted library allocation
page read and write
241813E9000
trusted library allocation
page read and write
1B2FCE50000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1B48B080000
trusted library allocation
page read and write
1E3414E2000
heap
page read and write
1B48B080000
trusted library allocation
page read and write
2197A3DC000
heap
page read and write
36057EE000
stack
page read and write
7FF848840000
trusted library allocation
page read and write
236BBC70000
trusted library allocation
page read and write
236D2BD0000
heap
page read and write
7A90EFE000
stack
page read and write
7DF43D850000
trusted library allocation
page execute and read and write
1B2FB393000
heap
page read and write
1B48AEC0000
trusted library allocation
page read and write
2456B600000
trusted library allocation
page read and write
7FF848946000
trusted library allocation
page execute and read and write
36064FE000
stack
page read and write
1B2FCE50000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1F0B2006000
heap
page read and write
1B2FB419000
heap
page read and write
7FF848A20000
trusted library allocation
page read and write
27C62CA0000
heap
page read and write
7FF848BBC000
trusted library allocation
page read and write
236BACB9000
trusted library allocation
page read and write
219102F7000
trusted library allocation
page read and write
236BB1B7000
trusted library allocation
page read and write
241902F7000
trusted library allocation
page read and write
2197B0B9000
heap
page read and write
7FF848B83000
trusted library allocation
page read and write
7FF848A24000
trusted library allocation
page read and write
1F0B1E80000
trusted library allocation
page read and write
CD285C3000
stack
page read and write
2456B600000
trusted library allocation
page read and write
7FF848A90000
trusted library allocation
page read and write
236B9E00000
heap
page read and write
1B2FCE60000
trusted library allocation
page read and write
7FF78C9F1000
unkown
page execute read
241F2120000
heap
page read and write
2197B346000
heap
page read and write
7FF78CF92000
unkown
page readonly
1B489595000
heap
page read and write
1F0B1E80000
trusted library allocation
page read and write
2456B610000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
1F970B90000
trusted library allocation
page read and write
2197B170000
heap
page read and write
7FF84886D000
trusted library allocation
page execute and read and write
There are 1735 hidden memdumps, click here to show them.