IOC Report
installcriptocns.exe

loading gif

Files

File Path
Type
Category
Malicious
installcriptocns.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\CriptoCNS\Update.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\squirrel.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\SquirrelTemp\Update.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\Squirrel-UpdateSelf.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\criptocns.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\d3dcompiler_47.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\ffmpeg.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\icudtl.dat
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\libEGL.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\libGLESv2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\am.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\ar.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\bg.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\bn.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\ca.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\cs.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\da.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\de.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\el.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\es.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\et.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\fa.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\fi.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\fil.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\fr.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\gu.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\he.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\hi.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\hr.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\hu.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\id.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\it.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\ja.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\kn.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\ko.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\lt.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\lv.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\ml.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\mr.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\ms.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\nb.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\nl.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\pl.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\ro.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\ru.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\sk.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\sl.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\sr.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\sv.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\sw.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\ta.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\te.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\th.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\tr.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\uk.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\vi.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources.pak
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice\ask.js
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice\config.js
C++ source, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice\distribution.json
JSON data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice\main.js
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice\module.js
C++ source, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice\options.js
Unicode text, UTF-8 text, with very long lines (477), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice\res\ask.html
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice\res\defender.png
PNG image data, 521 x 373, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice\res\help.html
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice\res\options.html
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice\res\origens.png
PNG image data, 784 x 470, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice\res\signature-32x32.ico
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice\res\system-tray.png
PNG image data, 340 x 100, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice\res\w3pro.css
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice\service.js
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\components\aroari.js
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\components\hamahiri-native.node
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\components\hamahiri.js
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\components\hekura-schema.json
Unicode text, UTF-8 text, with very long lines (16573), with no line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\components\hekura.js
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\components\lock-native.node
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\components\lock.js
C++ source, Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\components\options.js
Unicode text, UTF-8 text, with very long lines (479), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\components\update.js
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\components\wanhamou.js
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\alert\.editorconfig
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\alert\.gitattributes
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\alert\.github\CONTRIBUTING.md
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\alert\.github\FUNDING.yml
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\alert\.github\ISSUE_TEMPLATE.md
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\alert\.github\PULL_REQUEST_TEMPLATE.md
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\alert\.github\workflows\test.yml
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\alert\LICENSE.md
Unicode text, UTF-8 text, with very long lines (460)
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\alert\README.md
ASCII text, with very long lines (303)
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\alert\alert.d.ts
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\alert\cli.js
a /usr/bin/env node script, ASCII text executable
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\alert\index.js
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\alert\msgbox.vbs
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\alert\node.js
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\alert\package.json
JSON data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\asn1js\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\asn1js\README.md
ASCII text, with very long lines (537)
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\asn1js\build\asn1.js
C++ source, ASCII text, with very long lines (998)
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\asn1js\build\asn1.js.map
JSON data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\asn1js\index.d.ts
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\asn1js\package.json
JSON data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\asn1js\src\asn1.js
C++ source, ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\is-program-installed\.editorconfig
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\is-program-installed\.gitattributes
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\is-program-installed\.github\CONTRIBUTING.md
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\is-program-installed\.github\FUNDING.yml
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\is-program-installed\.github\ISSUE_TEMPLATE.md
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\is-program-installed\.github\PULL_REQUEST_TEMPLATE.md
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\is-program-installed\.github\SECURITY.md
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\is-program-installed\.github\workflows\test.yml
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\is-program-installed\LICENSE.md
Unicode text, UTF-8 text, with very long lines (460)
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\is-program-installed\README.md
ASCII text, with very long lines (303)
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\is-program-installed\index.js
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\is-program-installed\index.test.js
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\is-program-installed\package.json
JSON data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\LICENSE.md
ASCII text, with very long lines (460)
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\README.md
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\common.gypi
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\except.gypi
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\index.js
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\napi-inl.deprecated.h
C++ source, ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\napi-inl.h
C++ source, ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\napi.h
C++ source, ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\node_api.gyp
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\noexcept.gypi
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\package-support.json
JSON data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\package.json
JSON data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\tools\README.md
ASCII text, with very long lines (339)
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\tools\check-napi.js
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\tools\clang-format.js
a /usr/bin/env node script, ASCII text executable
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\tools\conversion.js
a /usr/bin/env node script, ASCII text executable, with very long lines (454)
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\node-addon-api\tools\eslint-format.js
a /usr/bin/env node script, ASCII text executable
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\pvutils\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\pvutils\README.md
ASCII text
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\pvutils\build\index.d.ts
ASCII text, with very long lines (309)
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\pvutils\build\utils.es.js
Algol 68 source, ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\pvutils\build\utils.js
Algol 68 source, ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\node_modules\pvutils\package.json
JSON data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\package.json
JSON data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\swiftshader\libEGL.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\swiftshader\libGLESv2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\vk_swiftshader.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\vulkan-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\CriptoCNS\criptocns.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\CriptoCNS\packages\CriptoCNS-1.1.1-full.nupkg
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\CriptoCNS\packages\RELEASES
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\AppData\Local\CriptoCNS\packages\SquirrelTemp\tempa
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\AppData\Local\SquirrelTemp\CriptoCNS-1.1.1-full.nupkg
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\SquirrelTemp\RELEASES
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\AppData\Local\SquirrelTemp\Squirrel-Install.log
Unicode text, UTF-8 (with BOM) text, with very long lines (509), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\SquirrelTemp\background.gif
GIF image data, version 89a, 600 x 225
dropped
C:\Users\user\AppData\Local\SquirrelTemp\setupIcon.ico
MS Windows icon resource - 1 icon, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\.squirrel-lock-80FE40C371EE331E8AAC12FD0CE045EE05CB9C25
ISO-8859 text, with CR line terminators
dropped
C:\Users\user\AppData\Roaming\criptocns\32aa2630-bb3e-4df1-bab5-34a7af0d1e4e.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\criptocns\3a4253e9-0892-4ff7-9b9e-143f035bef57.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\criptocns\Cache\Cache_Data\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\criptocns\Cache\Cache_Data\data_1
data
dropped
C:\Users\user\AppData\Roaming\criptocns\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Roaming\criptocns\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Roaming\criptocns\Cache\Cache_Data\index
FoxPro FPT, blocks size 512, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\criptocns\Code Cache\js\index
data
dropped
C:\Users\user\AppData\Roaming\criptocns\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Roaming\criptocns\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Roaming\criptocns\Code Cache\wasm\index
data
dropped
C:\Users\user\AppData\Roaming\criptocns\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Roaming\criptocns\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Roaming\criptocns\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Roaming\criptocns\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Roaming\criptocns\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Roaming\criptocns\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Roaming\criptocns\GPUCache\index
FoxPro FPT, blocks size 512, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Roaming\criptocns\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\criptocns\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\criptocns\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\criptocns\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Roaming\criptocns\Preferences (copy)
JSON data
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 183 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\SquirrelTemp\Update.exe
"C:\Users\user\AppData\Local\SquirrelTemp\Update.exe" --install . --rerunningWithoutUAC
malicious
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\squirrel.exe
"C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\Squirrel.exe" --updateSelf=C:\Users\user\AppData\Local\SquirrelTemp\Update.exe
malicious
C:\Users\user\Desktop\installcriptocns.exe
"C:\Users\user\Desktop\installcriptocns.exe"
C:\Users\user\Desktop\installcriptocns.exe
"C:\Users\user\Desktop\installcriptocns.exe" --rerunningWithoutUAC
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\criptocns.exe
"C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\criptocns.exe" --squirrel-install 1.1.1
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\criptocns.exe
"C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\criptocns.exe" --squirrel-firstrun
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\criptocns.exe
"C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\criptocns.exe" --type=gpu-process --user-data-dir="C:\Users\user\AppData\Roaming\criptocns" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1656,i,17898378316754652978,529011506488449579,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\criptocns.exe
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\criptocns.exe C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app\appservice/service.js "--log={\"path\":\"C:\\Users\\user\\.criptocns\",\"fname\":\"criptocns-n.log\",\"maxSize\":2048,\"rotate\":5,\"level\":1}" "--server={\"port\":9171,\"maxAge\":1800,\"trustedOrigins\":{\"warning\":true,\"origins\":[]}}" --service=CriptoCNS
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\criptocns.exe
"C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\criptocns.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --user-data-dir="C:\Users\user\AppData\Roaming\criptocns" --mojo-platform-channel-handle=2012 --field-trial-handle=1656,i,17898378316754652978,529011506488449579,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "hash kdialog 2>/dev/null"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "osascript -e 'id of application "kdialog"' 2>&1>/dev/null"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where kdialog"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\where.exe
where kdialog
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where kdialog.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\where.exe
where kdialog.exe
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where.exe kdialog"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\where.exe
where.exe kdialog
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where.exe kdialog.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\where.exe
where.exe kdialog.exe
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "hash zenity 2>/dev/null"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "osascript -e 'id of application "zenity"' 2>&1>/dev/null"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where zenity"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\where.exe
where zenity
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where zenity.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\where.exe
where zenity.exe
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where.exe zenity"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\where.exe
where.exe zenity
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where.exe zenity.exe"
C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\criptocns.exe
"C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\criptocns.exe" --type=renderer --user-data-dir="C:\Users\user\AppData\Roaming\criptocns" --app-user-model-id=com.squirrel.CriptoCNS.criptocns --app-path="C:\Users\user\AppData\Local\CriptoCNS\app-1.1.1\resources\app" --no-sandbox --no-zygote --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --launch-time-ticks=4564869468 --mojo-platform-channel-handle=2308 --field-trial-handle=1656,i,17898378316754652978,529011506488449579,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\where.exe
where.exe zenity.exe
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "hash yad 2>/dev/null"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "osascript -e 'id of application "yad"' 2>&1>/dev/null"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where yad"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\where.exe
where yad
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where yad.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\where.exe
where yad.exe
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where.exe yad"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\where.exe
where.exe yad
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "where.exe yad.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\where.exe
where.exe yad.exe
There are 49 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://github.com/myuser/myrepo
unknown
https://www.google.com/speech-api/full-duplex/v1
unknown
http://defaultcontainer/lib/net45/locales/tr.pak
unknown
https://url.spec.whatwg.org/#concept-url-origin
unknown
https://tools.ietf.org/html/rfc6455#section-1.3
unknown
http://defaultcontainer/lib/net45/resources/app/node_modules/alert/node.js
unknown
http://defaultcontainer/tempfiles/sample.css
unknown
https://support.google.com/chrome/answer/6098869
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
http://defaultcontainer/lib/net45/resources/app/node_modules/alert/.github/ISSUE_TEMPLATE.md
unknown
http://defaultcontainer/lib/net45/resources/app/node_modules/asn1js/package.json
unknown
http://defaultcontainer/tempfiles/sample.exe
unknown
https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new
unknown
http://www.color.org
unknown
http://defaultcontainer/lib/net45/resources/app/node_modules/is-program-installed/.github/CONTRIBUTI
unknown
http://defaultcontainer/lib/net45/locales/fi.pak
unknown
https://encoding.spec.whatwg.org/#textencoder
unknown
http://defaultcontainer/lib/net45/resources/app/appservice/res/origens.png
unknown
https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/
unknown
https://github.com/tc39/proposal-weakrefs
unknown
https://goo.gl/t5IS6M).
unknown
https://github.com/google/caja/blob/HEAD/src/com/google/caja/ses/repairES5.js
unknown
https://tc39.github.io/ecma262/#sec-%iteratorprototype%-object
unknown
https://url.spec.whatwg.org/#concept-urlencoded-serializer
unknown
https://www.chromestatus.com/feature/5629582019395584.
unknown
https://www.chromium.org/blink/origin-trials/portals.
unknown
https://wiki.squid-cache.org/SquidFaq/InnerWorkings#What_is_a_half-closed_filedescriptor.3F
unknown
http://schemas.openxmlformats.or
unknown
http://defaultcontainer/lib/net45/locales/kn.pak
unknown
https://nodejs.org/api/fs.html
unknown
https://chromium.googlesource.com/chromium/src/
unknown
http://defaultcontainer/lib/net45/locales/he.pak
unknown
http://defaultcontainer/lib/net45/locales/es-419.pak
unknown
http://defaultcontainer/lib/net45/locales/en-GB.pak
unknown
https://github.com/nodejs/node/pull/21313
unknown
http://defaultcontainer/lib/net45/resources/app/node_modules/node-addon-api/napi-inl.h
unknown
https://www.chromium.org/blink/origin-trials/portals.The
unknown
https://www.chromestatus.com/feature/%s
unknown
http://defaultcontainer/lib/net45/resources/app/node_modules/pvutils/README.md
unknown
http://defaultcontainer/lib/net45/locales/ja.pak
unknown
http://www.midnight-commander.org/browser/lib/tty/key.c
unknown
https://nodejs.org/
unknown
https://tools.ietf.org/html/rfc7540#section-8.1.2.5
unknown
https://wwww.certigna.fr/autorites/0m
unknown
http://defaultcontainer/lib/net45/resources/app/node_modules/node-addon-api/noexcept.gypi
unknown
http://www.squid-cache.org/Doc/config/half_closed_clients/
unknown
http://defaultcontainer/lib/net45/locales/en-US.pak
unknown
http://defaultcontainer/lib/net45/locales/ca.pak
unknown
http://127.0.0.1
unknown
https://github.com/nodejs/node/pull/33661
unknown
http://narwhaljs.org)
unknown
https://crbug.com/1234857.
unknown
http://defaultcontainer/lib/net45/resources/app/appservice/res/defender.png
unknown
http://localhosthttp://127.0.0.1object-src
unknown
https://chrome-devtools-frontend.appspot.com/serve_rev/%s/%s.html/devtools/page/%s?ws=%s%s%sMalforme
unknown
https://code.google.com/p/chromium/issues/detail?id=25916
unknown
http://defaultcontainer/lib/net45/resources/app/node_modules/alert/.github/workflows/test.yml
unknown
http://defaultcontainer/lib/net45/resources/app/node_modules/is-program-installed/.github/workflows/
unknown
http://defaultcontainer/lib/net45/resources/app/node_modules/node-addon-api/index.js
unknown
https://github.com/electron/electron/issues/18397.Module
unknown
http://www.xfa.org/schema/xdc/
unknown
https://github.com/nodejs/node/pull/12607
unknown
http://defaultcontainer/lib/net45/resources/app/appservice/config.js
unknown
https://www.ecma-international.org/ecma-262/#sec-line-terminators
unknown
https://www.unicode.org/Public/UNIDATA/EastAsianWidth.txt
unknown
http://defaultcontainer/lib/net45/resources/app/node_modules/alert/.editorconfig
unknown
https://goo.gl/LdLk22Failed
unknown
https://tools.ietf.org/html/rfc3492)
unknown
http://defaultcontainer/CriptoCNS.nuspec
unknown
http://defaultcontainer/tempfiles/sample.png
unknown
http://html4/loose.dtd
unknown
http://defaultcontainer/lib/net45/locales/de.pak
unknown
https://crbug.com/1053756
unknown
http://defaultcontainer/lib/net45/locales/fa.pak
unknown
http://defaultcontainer/lib/net45/libGLESv2.dll
unknown
http://defaultcontainer/lib/net45/resources/app/node_modules/alert/LICENSE.md
unknown
https://developer.chrome.com/docs/extensions/mv3/cross-origin-isolation/.
unknown
https://github.com/WICG/construct-stylesheets/issues/119#issuecomment-588352418.
unknown
http://defaultcontainer/lib/net45/resources/app/node_modules/is-program-installed/.github/FUNDING.ym
unknown
https://github.com/w3c/webappsec-trusted-types/wiki/Trusted-Types-for-function-constructor
unknown
https://heycam.github.io/webidl/#es-iterable-entries
unknown
https://heycam.github.io/webidl/#es-interfaces
unknown
http://defaultcontainer/lib/net45/locales/gu.pak
unknown
http://www.xfa.org/schema/xfa-template/
unknown
https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/Cloudflare
unknown
http://defaultcontainer/tempfiles/sample.css0y
unknown
https://html.spec.whatwg.org/multipage/browsers.html#concept-origin-opaque
unknown
http://defaultcontainer/lib/net45/locales/sl.pak
unknown
https://github.com/nodejs/node/issues
unknown
http://www.quovadisglobal.com/cps0
unknown
https://bit.ly/31yqMJR.GpuLockdownDefaultDacl
unknown
https://tc39.github.io/ecma262/#sec-object.prototype.tostring
unknown
https://url.spec.whatwg.org/#urlsearchparams
unknown
http://defaultcontainer/lib/net45/locales/ko.pak
unknown
http://defaultcontainer/lib/net45/locales/hu.pak
unknown
http://defaultcontainer/lib/net45/resources/app/node_modules/is-program-installed/README.md
unknown
https://www.chromestatus.com/feature/5749447073988608Added
unknown
http://defaultcontainer/tempfiles/sample.map
unknown
https://heycam.github.io/webidl/#Replaceable
unknown
https://github.com/nodejs/node/pull/30380#issuecomment-552948364
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
162.159.61.3

IPs

IP
Domain
Country
Malicious
162.159.61.3
chrome.cloudflare-dns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Update_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Update_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Update_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Update_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Update_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Update_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Update_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Update_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Update_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Update_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Update_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Update_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Update_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Update_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CriptoCNS
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CriptoCNS
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CriptoCNS
InstallDate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CriptoCNS
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CriptoCNS
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CriptoCNS
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CriptoCNS
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CriptoCNS
URLUpdateInfo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CriptoCNS
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CriptoCNS
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CriptoCNS
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CriptoCNS
Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
50740085C000
direct allocation
page read and write
19A384FE000
unkown
page readonly
19A38517000
unkown
page readonly
2306A372000
unkown
page readonly
507400824000
direct allocation
page read and write
169B57DB000
unkown
page readonly
1D6000710000
direct allocation
page read and write
19A384F2000
unkown
page readonly
169B5036000
unkown
page readonly
169B5775000
unkown
page readonly
A7EB3FF000
stack
page read and write
2306A931000
heap
page read and write
19327722000
unkown
page readonly
2306A930000
heap
page read and write
19A37E17000
unkown
page readonly
2363D000
stack
page read and write
19327D04000
unkown
page readonly
43B0000
unkown
page read and write
15881F0000
stack
page read and write
A22295E000
stack
page read and write
19A37DB2000
unkown
page readonly
2390F000
stack
page read and write
2306A7D8000
unkown
page readonly
B1C000
heap
page read and write
BAD0000
unkown
page readonly
169B5B0C000
unkown
page readonly
B14000
heap
page read and write
169B514A000
unkown
page readonly
19A37CE8000
unkown
page readonly
C0EB000
unkown
page read and write
C44000
heap
page read and write
BC45000
unkown
page read and write
169B5748000
unkown
page readonly
7FF54B682000
unkown
page readonly
7B43000
unkown
page read and write
169B3020000
heap
page read and write
169B5823000
unkown
page readonly
386E8FF000
stack
page read and write
169B57F4000
unkown
page readonly
390E00508000
direct allocation
page read and write
1D60003CC000
direct allocation
page read and write
3009000
unkown
page read and write
22679C75000
heap
page read and write
2DE0000
unkown
page readonly
1D60006D8000
direct allocation
page read and write
19A37D38000
unkown
page readonly
22672053000
heap
page read and write
7150000
unkown
page read and write
D8855FE000
stack
page read and write
1D600063A000
direct allocation
page read and write
7FFEC80AB000
trusted library allocation
page read and write
5074003BC000
direct allocation
page read and write
193275A8000
unkown
page readonly
50740080C000
direct allocation
page read and write
2306A8C1000
unkown
page readonly
2306A34D000
unkown
page readonly
75C0000
unkown
page readonly
7FF54B8EC000
unkown
page readonly
7C01000
unkown
page read and write
AE0000
heap
page read and write
507400854000
direct allocation
page read and write
1BDD8700000
heap
page read and write
1BDD8710000
heap
page read and write
19A38541000
unkown
page readonly
161A2DA0000
heap
page read and write
7C06000
unkown
page read and write
1D60006D8000
direct allocation
page read and write
C3B8CFC000
stack
page read and write
23314A05000
heap
page read and write
E7D13FF000
stack
page read and write
2306A7BD000
unkown
page readonly
7FFEC82D0000
trusted library allocation
page execute and read and write
19A3851C000
unkown
page readonly
A7EABFE000
stack
page read and write
1D6000648000
direct allocation
page read and write
1FB79910000
heap
page read and write
169B4FE3000
unkown
page readonly
5074003A8000
direct allocation
page read and write
255BCB40000
heap
page read and write
88E4000
unkown
page read and write
FCB13FF000
stack
page read and write
1006C000
unkown
page read and write
19A37DF3000
unkown
page readonly
7FFEC80AD000
trusted library allocation
page execute and read and write
18726970000
heap
page read and write
1D600063C000
direct allocation
page read and write
28AF0070000
heap
page read and write
169B4FD9000
unkown
page readonly
2306A10E000
unkown
page readonly
276057E0000
heap
page read and write
4DC200308000
direct allocation
page read and write
2FE9000
unkown
page read and write
23068200000
trusted library section
page readonly
B02000
heap
page read and write
5CFA000
stack
page read and write
7FFEC8358000
trusted library allocation
page read and write
89B3000
unkown
page read and write
19A37E23000
unkown
page readonly
19A37FA5000
unkown
page readonly
507400370000
direct allocation
page read and write
193275A4000
unkown
page readonly
2306AEC2000
unkown
page readonly
18B93995000
heap
page read and write
1D60006D8000
direct allocation
page read and write
14A3E500000
heap
page read and write
7FFEC8286000
trusted library allocation
page read and write
169B5116000
unkown
page readonly
BB8B000
unkown
page read and write
1BD32000
heap
page read and write
7FF54BCDF000
unkown
page readonly
BBE000
heap
page read and write
50740034A000
direct allocation
page read and write
22671E9E000
heap
page read and write
1D929000
heap
page read and write
7FF54B911000
unkown
page readonly
7144000
unkown
page read and write
790E000
stack
page read and write
7555000
unkown
page read and write
7114000
unkown
page read and write
5074003A9000
direct allocation
page read and write
71C0000
unkown
page read and write
19A37DDA000
unkown
page readonly
7FF54BB4D000
unkown
page readonly
D79000
heap
page read and write
193276D2000
unkown
page readonly
7FF54BCA0000
unkown
page readonly
7FF54BAD0000
unkown
page readonly
22674902000
heap
page read and write
169B52F7000
unkown
page readonly
BB68000
unkown
page read and write
303A000
unkown
page read and write
1D6000D48000
direct allocation
page read and write
9D6F000
unkown
page read and write
169B577E000
unkown
page readonly
19327C3F000
unkown
page readonly
390E00402000
direct allocation
page read and write
D886DFE000
stack
page read and write
1BD87000
heap
page read and write
169B5107000
unkown
page readonly
19327CAB000
unkown
page readonly
7FF54BB0A000
unkown
page readonly
B4E000
heap
page read and write
22674925000
heap
page read and write
B1F0000
unkown
page readonly
7500000
unkown
page read and write
AA00000
unkown
page readonly
19A37CB2000
unkown
page readonly
7FF54BDC5000
unkown
page readonly
4DC200375000
direct allocation
page read and write
1D60006E8000
direct allocation
page read and write
4DC200374000
direct allocation
page read and write
70D0000
unkown
page read and write
8879000
unkown
page read and write
40160040C000
direct allocation
page read and write
22679C9D000
heap
page read and write
2306A8D6000
unkown
page readonly
476A37F000
stack
page read and write
169B5120000
unkown
page readonly
390E0042B000
direct allocation
page read and write
19327486000
unkown
page readonly
7620000
unkown
page read and write
169B573F000
unkown
page readonly
19A3850F000
unkown
page readonly
1D60006E0000
direct allocation
page read and write
7FFEC8260000
trusted library allocation
page read and write
7FF74BC78000
unkown
page readonly
2306A368000
unkown
page readonly
19A37D8D000
unkown
page readonly
169B508C000
unkown
page readonly
E77E7FF000
stack
page read and write
71E1000
unkown
page read and write
169B50D5000
unkown
page readonly
1488FFF000
stack
page read and write
910000
heap
page read and write
212DF40B000
heap
page read and write
2267A5E0000
unclassified section
page readonly
7A5D000
unkown
page read and write
19A37DFD000
unkown
page readonly
70A0000
unkown
page read and write
7580000
unkown
page read and write
7FFEC828A000
trusted library allocation
page read and write
2306A8EB000
unkown
page readonly
1D6000634000
direct allocation
page read and write
7FF54BC7F000
unkown
page readonly
23068220000
heap
page read and write
8842000
unkown
page read and write
A87D000
stack
page read and write
226740F9000
unkown
page readonly
19A37D5A000
unkown
page readonly
C15B000
unkown
page read and write
1D60006D0000
direct allocation
page read and write
1FC80000
heap
page read and write
7B39000
unkown
page read and write
2A6B000
stack
page read and write
2F60000
unkown
page read and write
169B5145000
unkown
page readonly
5074003E8000
direct allocation
page read and write
1D60006D8000
direct allocation
page read and write
79E0000
unkown
page read and write
169B584B000
unkown
page readonly
2306B7CF000
heap
page read and write
169B5A3E000
unkown
page readonly
1D60006E8000
direct allocation
page read and write
399D004B7000
direct allocation
page read and write
22674079000
unkown
page readonly
561000
unkown
page execute read
22679C72000
heap
page read and write
83E0000
unkown
page read and write
7FFEC8233000
trusted library allocation
page read and write
1D6000740000
direct allocation
page read and write
2F59000
trusted library allocation
page read and write
8B0A000
unkown
page read and write
7FF54BA3D000
unkown
page readonly
88E2000
unkown
page read and write
E6600304000
direct allocation
page read and write
7A17000
unkown
page read and write
169B5056000
unkown
page readonly
8917000
unkown
page read and write
3042000
unkown
page read and write
1B71C000
heap
page read and write
476A27E000
stack
page read and write
7A8F000
unkown
page read and write
23314A69000
heap
page read and write
262505A0000
heap
page read and write
1D6000648000
direct allocation
page read and write
7FF54BD68000
unkown
page readonly
19327C66000
unkown
page readonly
8B0D000
unkown
page read and write
9CE8000
unkown
page read and write
169B5B07000
unkown
page readonly
A444CFF000
unkown
page read and write
255BCAF0000
heap
page read and write
2306A886000
unkown
page readonly
22671E49000
heap
page read and write
22673BF0000
trusted library allocation
page read and write
212DF370000
heap
page read and write
169B515A000
unkown
page readonly
A7E6BFE000
stack
page read and write
BB77000
unkown
page read and write
386E7FE000
unkown
page read and write
7E31000
unkown
page read and write
193277A0000
unkown
page readonly
8787000
unkown
page read and write
7FF54B8AE000
unkown
page readonly
50740080C000
direct allocation
page read and write
7FF54BC00000
unkown
page readonly
7E36000
unkown
page read and write
22671E20000
heap
page read and write
7FF54BA79000
unkown
page readonly
7FFEC8288000
trusted library allocation
page read and write
19A384A0000
unkown
page readonly
2306A7B3000
unkown
page readonly
7BD4000
unkown
page read and write
FC0000
heap
page read and write
D8835FE000
stack
page read and write
19A38815000
unkown
page readonly
169B5003000
unkown
page readonly
2306A0EC000
unkown
page readonly
1932747E000
unkown
page readonly
19A3855D000
unkown
page readonly
71A8000
unkown
page read and write
1D60006D8000
direct allocation
page read and write
BE1000
heap
page read and write
401600858000
direct allocation
page read and write
7FFEC8291000
trusted library allocation
page read and write
200D1920000
heap
page read and write
28AF0077000
heap
page read and write
7255000
unkown
page read and write
BDA000
heap
page read and write
1B44E000
stack
page read and write
476A2FE000
stack
page read and write
BD6000
heap
page read and write
399D00142000
direct allocation
page read and write
1B78A000
heap
page read and write
7B8E000
unkown
page read and write
7FF54B7A4000
unkown
page readonly
200D1A90000
heap
page read and write
7FFEC8380000
trusted library allocation
page read and write
2267407E000
unkown
page readonly
401600680000
direct allocation
page read and write
3CB000
stack
page read and write
169B3070000
heap
page read and write
232E2998000
heap
page read and write
4DC200364000
direct allocation
page read and write
226740B0000
unkown
page readonly
19327B7E000
unkown
page readonly
399D00442000
direct allocation
page read and write
19327541000
unkown
page readonly
22673F37000
unkown
page readonly
507400340000
direct allocation
page read and write
6D603FE000
stack
page read and write
1D60006E0000
direct allocation
page read and write
7FF74B7C0000
unkown
page readonly
19A37FA9000
unkown
page readonly
19A3843D000
unkown
page readonly
7FF54B95B000
unkown
page readonly
2A69000
stack
page read and write
2BC77610000
heap
page read and write
507400854000
direct allocation
page read and write
1932778D000
unkown
page readonly
1D6000650000
direct allocation
page read and write
7FFEC824E000
trusted library allocation
page read and write
79A4000
unkown
page read and write
7FF54B8E7000
unkown
page readonly
9C0B000
unkown
page read and write
B7AA000
stack
page read and write
7FF74B7B9000
unkown
page readonly
2306A1D1000
unkown
page readonly
226740A7000
unkown
page readonly
19A384E7000
unkown
page readonly
1D6000A8D000
direct allocation
page read and write
158D9FD000
stack
page read and write
1D6000655000
direct allocation
page read and write
507400374000
direct allocation
page read and write
7FF54BC61000
unkown
page readonly
2306AED6000
unkown
page readonly
19A37FBB000
unkown
page readonly
B21000
heap
page read and write
9C39000
unkown
page read and write
A7E9BFC000
stack
page read and write
77D0000
unkown
page readonly
2306A1B0000
unkown
page readonly
1D600065A000
direct allocation
page read and write
2306A346000
unkown
page readonly
19327BDC000
unkown
page readonly
2306A94C000
heap
page read and write
BC47000
unkown
page read and write
B98000
heap
page read and write
1D6000650000
direct allocation
page read and write
507400334000
direct allocation
page read and write
4402000
unkown
page read and write
1932771E000
unkown
page readonly
19A384DA000
unkown
page readonly
7FF745347000
unkown
page execute read
8770000
unkown
page read and write
19A384F6000
unkown
page readonly
226746B1000
unkown
page readonly
19327646000
unkown
page readonly
1FB79962000
heap
page read and write
B95000
heap
page read and write
390E00002000
direct allocation
page readonly
19A37FC5000
unkown
page readonly
193275D8000
unkown
page readonly
BD08000
unkown
page read and write
BF65000
unkown
page read and write
390E004C2000
direct allocation
page read and write
1D600063A000
direct allocation
page read and write
169B50DA000
unkown
page readonly
9BEF000
unkown
page read and write
50740082C000
direct allocation
page read and write
BA4F000
stack
page read and write
19A35D99000
heap
page read and write
1D60003B8000
direct allocation
page read and write
50740082C000
direct allocation
page read and write
7FFEC8310000
trusted library allocation
page read and write
7FF74C97B000
unkown
page readonly
2306A08B000
unkown
page readonly
19327C05000
unkown
page readonly
20D64110000
heap
page read and write
226741D1000
unkown
page readonly
284BAFF000
stack
page read and write
105E000
heap
page read and write
7544000
unkown
page read and write
5FA4000
heap
page read and write
7FF54BE5B000
unkown
page readonly
7FF54B807000
unkown
page readonly
1D60006B8000
direct allocation
page read and write
2BC77860000
heap
page read and write
1FB71000
heap
page read and write
88B6000
unkown
page read and write
22679C98000
heap
page read and write
22674057000
unkown
page readonly
4DC200314000
direct allocation
page read and write
883D000
unkown
page read and write
1D60003D7000
direct allocation
page read and write
B14000
heap
page read and write
212DF350000
heap
page read and write
74711FE000
stack
page read and write
B0D000
heap
page read and write
169B5705000
unkown
page readonly
193276CD000
unkown
page readonly
3023000
unkown
page read and write
E660040C000
direct allocation
page read and write
87AD000
unkown
page read and write
19A38419000
unkown
page readonly
8610000
unkown
page read and write
390E00518000
direct allocation
page read and write
19A37CC5000
unkown
page readonly
9C2D000
unkown
page read and write
169B5023000
unkown
page readonly
399D003C2000
direct allocation
page read and write
D70000
heap
page read and write
A7F33FB000
stack
page read and write
886E000
unkown
page read and write
B38000
heap
page read and write
25F0000
unkown
page readonly
14A3E6D0000
heap
page read and write
2267405C000
unkown
page readonly
1D600084C000
direct allocation
page read and write
4DC200290000
direct allocation
page read and write
5074003A8000
direct allocation
page read and write
D8A6AFC000
stack
page read and write
7DF44C900000
unkown
page readonly
8D09000
stack
page read and write
187269B4000
heap
page read and write
169B583E000
unkown
page readonly
7CAB000
unkown
page read and write
193276C3000
unkown
page readonly
1D6000A64000
direct allocation
page read and write
A7E7BFE000
stack
page read and write
22EDB890000
heap
page read and write
23C1E000
stack
page read and write
2306B7C1000
heap
page read and write
22674769000
unkown
page readonly
169B5127000
unkown
page readonly
883A000
unkown
page read and write
7FF54B834000
unkown
page readonly
2306A925000
heap
page read and write
7FF74CD2B000
unkown
page readonly
450000
unkown
page readonly
5CD1000
heap
page read and write
7DFF000
unkown
page read and write
4406000
unkown
page read and write
5074003C4000
direct allocation
page read and write
1D6000648000
direct allocation
page read and write
A10000
heap
page read and write
50740080C000
direct allocation
page read and write
19A37DB7000
unkown
page readonly
1CCB0460000
heap
page read and write
8942000
unkown
page read and write
19327602000
unkown
page readonly
5BB4F7E000
stack
page read and write
4DC2003C0000
direct allocation
page read and write
1D6000655000
direct allocation
page read and write
8733000
unkown
page read and write
390E004BE000
direct allocation
page read and write
19A37F4A000
unkown
page readonly
7FF54BA0F000
unkown
page readonly
43C0000
unkown
page read and write
22673DBD000
unclassified section
page readonly
7CC4000
unkown
page read and write
19A38AA8000
heap
page read and write
1BBCC000
stack
page read and write
2620000
heap
page read and write
A7EFBFA000
stack
page read and write
19A383E6000
unkown
page readonly
3005000
unkown
page read and write
22671DED000
remote allocation
page execute read
1D6000D34000
direct allocation
page read and write
19327BD3000
unkown
page readonly
2306A727000
unkown
page readonly
723F000
unkown
page read and write
18726B60000
heap
page read and write
2306A185000
unkown
page readonly
22674013000
unkown
page readonly
1D6000860000
direct allocation
page read and write
19A37B6F000
unkown
page readonly
7FF54B8E4000
unkown
page readonly
7FF74C2A0000
unkown
page readonly
7FF54BCBF000
unkown
page readonly
7FFEC80B0000
trusted library allocation
page read and write
19A37B71000
unkown
page readonly
7FF54BD89000
unkown
page readonly
B85000
heap
page read and write
A2228DC000
stack
page read and write
2267A5A3000
unclassified section
page readonly
399D0045A000
direct allocation
page read and write
7FF54BB1D000
unkown
page readonly
226740A1000
unkown
page readonly
1D60006D0000
direct allocation
page read and write
1D60003E0000
direct allocation
page read and write
B52000
heap
page read and write
1BDD8980000
heap
page read and write
2306A879000
unkown
page readonly
2267402E000
unkown
page readonly
7C24000
unkown
page read and write
35A847E000
stack
page read and write
25E0000
unkown
page readonly
CD6BBCC000
stack
page read and write
9CA3000
unkown
page read and write
622000
unkown
page readonly
7FF54B88E000
unkown
page readonly
C0FB000
unkown
page read and write
19A37F07000
unkown
page readonly
5074003A4000
direct allocation
page read and write
19A37E09000
unkown
page readonly
6ED16FF000
stack
page read and write
50740033C000
direct allocation
page read and write
7DEE000
stack
page read and write
2267491B000
heap
page read and write
28AF0098000
heap
page read and write
12858000
trusted library allocation
page read and write
7FFEC80BD000
trusted library allocation
page execute and read and write
169B504B000
unkown
page readonly
22679C81000
heap
page read and write
169B5ACB000
unkown
page readonly
C3B8FFF000
stack
page read and write
2D6A000
unkown
page read and write
4DC200364000
direct allocation
page read and write
7FF54B8AC000
unkown
page readonly
4DC2002FC000
direct allocation
page read and write
401600638000
direct allocation
page read and write
1D600063C000
direct allocation
page read and write
1CCB0870000
heap
page read and write
15881FB000
stack
page read and write
1143000
unkown
page readonly
7BB1000
unkown
page read and write
1D60006E8000
direct allocation
page read and write
2306A74C000
unkown
page readonly
2D41000
unkown
page read and write
22674038000
unkown
page readonly
18B93990000
heap
page read and write
7A3A000
unkown
page read and write
200D1840000
heap
page read and write
1FB58000
heap
page read and write
169B5B76000
unkown
page readonly
507400368000
direct allocation
page read and write
BBAA000
unkown
page read and write
2306A931000
heap
page read and write
7159000
unkown
page read and write
2306A213000
unkown
page readonly
1FE8C000
heap
page read and write
FFF000
trusted library allocation
page read and write
293BE550000
heap
page read and write
151198C8000
heap
page read and write
7DF44C8F0000
unkown
page readonly
1D60006E0000
direct allocation
page read and write
50740082C000
direct allocation
page read and write
169B309D000
heap
page read and write
1D6000650000
direct allocation
page read and write
7CAE000
stack
page read and write
1D7DA000
heap
page read and write
193274EF000
unkown
page readonly
443B000
unkown
page read and write
19327527000
unkown
page readonly
4DC2002B4000
direct allocation
page read and write
B8D000
heap
page read and write
7DEB000
unkown
page read and write
1480FFE000
stack
page read and write
28AF0380000
heap
page read and write
2FFD000
unkown
page read and write
9D01000
unkown
page read and write
2306A8B4000
unkown
page readonly
A40C97F000
stack
page read and write
C3B8EFE000
stack
page read and write
2306A8BA000
unkown
page readonly
7B16000
unkown
page read and write
2306AEDB000
unkown
page readonly
7FF54BD39000
unkown
page readonly
BD1000
heap
page read and write
89C9000
unkown
page read and write
1D6000634000
direct allocation
page read and write
BFF0000
unkown
page read and write
399D00459000
direct allocation
page read and write
19327B92000
unkown
page readonly
1D6000A28000
direct allocation
page read and write
7FF74B949000
unkown
page readonly
7B4A000
unkown
page read and write
19327D1E000
unkown
page readonly
7FF74B92E000
unkown
page readonly
111B000
unkown
page readonly
CD6BEFF000
unkown
page read and write
2306A92C000
heap
page read and write
D80000
unkown
page readonly
2306B843000
heap
page read and write
EDC0000
unkown
page read and write
169B5032000
unkown
page readonly
7B85000
unkown
page read and write
7FF54B89C000
unkown
page readonly
22674796000
unkown
page readonly
18726B80000
heap
page read and write
7AA8000
unkown
page read and write
3EEE4FB000
stack
page read and write
193275BD000
unkown
page readonly
399D00482000
direct allocation
page read and write
19A38414000
unkown
page readonly
169B50B9000
unkown
page readonly
1B8C4000
stack
page read and write
2306A94C000
heap
page read and write
1932771B000
unkown
page readonly
1B4C0000
heap
page read and write
161A2E32000
heap
page read and write
19A38513000
unkown
page readonly
BE7B000
unkown
page read and write
169B56EB000
unkown
page readonly
2306A0D5000
unkown
page readonly
7EEF000
stack
page read and write
8888000
unkown
page read and write
28AF03A0000
heap
page read and write
1BD7C000
heap
page read and write
2306A1CB000
unkown
page readonly
7DF44C910000
unkown
page readonly
19327C8D000
unkown
page readonly
7CF6000
unkown
page read and write
19A384CF000
unkown
page readonly
4016006A8000
direct allocation
page read and write
7226000
unkown
page read and write
169B50AC000
unkown
page readonly
26250820000
heap
page read and write
1B191045000
heap
page read and write
169B5B10000
unkown
page readonly
A7EC3FE000
stack
page read and write
169B5763000
unkown
page readonly
1285C000
trusted library allocation
page read and write
7470DDD000
stack
page read and write
7DF5000
unkown
page read and write
8859000
unkown
page read and write
507400388000
direct allocation
page read and write
7FF54B4D6000
unkown
page readonly
161A3145000
heap
page read and write
19327796000
unkown
page readonly
7FF54BD0D000
unkown
page readonly
507400811000
direct allocation
page read and write
19A3842A000
unkown
page readonly
D882DFE000
stack
page read and write
1B2291A0000
heap
page read and write
169B56DC000
unkown
page readonly
7FF54BBF6000
unkown
page readonly
89DA000
unkown
page read and write
19327250000
trusted library allocation
page read and write
9D7A000
unkown
page read and write
1BDD87D7000
heap
page read and write
7C4F000
stack
page read and write
19327C8A000
unkown
page readonly
5074003A9000
direct allocation
page read and write
7AB2000
unkown
page read and write
193275B8000
unkown
page readonly
A7F63FC000
stack
page read and write
19A383BB000
unkown
page readonly
7FF54BABF000
unkown
page readonly
1ACBD000
heap
page read and write
9D72000
unkown
page read and write
E77E6FF000
stack
page read and write
1D60003A0000
direct allocation
page read and write
4DC200398000
direct allocation
page read and write
6D60BFE000
stack
page read and write
169B5AF1000
unkown
page readonly
7B63000
unkown
page read and write
7D9B000
unkown
page read and write
2306A223000
unkown
page readonly
1D6000650000
direct allocation
page read and write
390E00442000
direct allocation
page read and write
7DAF000
unkown
page read and write
22EDB990000
heap
page read and write
22673FBE000
unkown
page readonly
7FA0000
unkown
page read and write
50740080C000
direct allocation
page read and write
7FF54B4D2000
unkown
page readonly
255BCCE0000
heap
page read and write
1B190CE0000
heap
page read and write
7FFEC8239000
trusted library allocation
page read and write
44AD000
unkown
page read and write
89B2000
unkown
page read and write
2306A136000
unkown
page readonly
1B7B2000
heap
page read and write
BDD1000
unkown
page read and write
22679CB6000
heap
page read and write
1D8C2000
heap
page read and write
22674061000
unkown
page readonly
1D60006B0000
direct allocation
page read and write
1D60006AB000
direct allocation
page read and write
93DB000
stack
page read and write
2267409C000
unkown
page readonly
19A37A70000
heap
page read and write
19325430000
heap
page read and write
4DC2002B8000
direct allocation
page read and write
1D60006B8000
direct allocation
page read and write
9BB3000
unkown
page read and write
5074003A4000
direct allocation
page read and write
19A37CCB000
unkown
page readonly
1EE3DDE0000
heap
page read and write
EDF5000
unkown
page read and write
19A37D0A000
unkown
page readonly
71C9000
unkown
page read and write
2306A894000
unkown
page readonly
1D60006B8000
direct allocation
page read and write
19327D1A000
unkown
page readonly
390E00368000
direct allocation
page read and write
7FFEC823F000
trusted library allocation
page read and write
1D60006E8000
direct allocation
page read and write
19A3840A000
unkown
page readonly
22673F5D000
unkown
page readonly
1D6000655000
direct allocation
page read and write
872A000
unkown
page read and write
20D64320000
heap
page read and write
390E00162000
direct allocation
page read and write
390E00494000
direct allocation
page read and write
2B6A000
stack
page read and write
5074003A4000
direct allocation
page read and write
22674649000
unkown
page readonly
7DF44C911000
unkown
page execute read
226741CD000
unkown
page readonly
1C52F570000
heap
page read and write
5074003BC000
direct allocation
page read and write
A80000
unkown
page read and write
5DB0000
heap
page read and write
19A38460000
unkown
page readonly
19A37FCE000
unkown
page readonly
2306A830000
unkown
page readonly
19327581000
unkown
page readonly
B30000
heap
page read and write
6F1A000
stack
page read and write
19327B5D000
unkown
page readonly
1D6000650000
direct allocation
page read and write
7FF54BB90000
unkown
page readonly
169B5B18000
unkown
page readonly
19A38AAA000
heap
page read and write
2306A923000
heap
page read and write
19A38811000
unkown
page readonly
7660000
unkown
page readonly
18B93629000
heap
page read and write
1FA8B000
stack
page read and write
7FFEC825C000
trusted library allocation
page read and write
68E8DDF000
stack
page read and write
D80000
heap
page read and write
19327BA2000
unkown
page readonly
169B56FD000
unkown
page readonly
226748F8000
heap
page read and write
22673D0A000
heap
page read and write
1485FFC000
stack
page read and write
A7EBBFE000
stack
page read and write
401600624000
direct allocation
page read and write
1D60006D8000
direct allocation
page read and write
7FF54B916000
unkown
page readonly
7FF54BA41000
unkown
page readonly
7FF54BD29000
unkown
page readonly
226740AC000
unkown
page readonly
58C000
unkown
page readonly
7D70000
unkown
page read and write
1D600063C000
direct allocation
page read and write
507400844000
direct allocation
page read and write
7FFEC8246000
trusted library allocation
page read and write
19327586000
unkown
page readonly
7FFEC8140000
trusted library allocation
page read and write
2306A92E000
heap
page read and write
226747AE000
unkown
page readonly
19A37D10000
unkown
page readonly
22673F6D000
unkown
page readonly
22673F89000
unkown
page readonly
169B5813000
unkown
page readonly
7FF54BCC4000
unkown
page readonly
88F7000
unkown
page read and write
2306A15E000
unkown
page readonly
14A3E800000
heap
page read and write
1D60006E0000
direct allocation
page read and write
9BAF000
unkown
page read and write
1BACE000
stack
page read and write
1D6000634000
direct allocation
page read and write
19A38457000
unkown
page readonly
169B51A1000
unkown
page readonly
226746F4000
unkown
page readonly
19327BF6000
unkown
page readonly
14A3E6F0000
heap
page read and write
A7EDBFD000
stack
page read and write
1D6000660000
direct allocation
page read and write
7FF54BA16000
unkown
page readonly
226740B5000
unkown
page readonly
22674943000
heap
page read and write
19A384C4000
unkown
page readonly
BB94000
unkown
page read and write
19A38524000
unkown
page readonly
1D6000A64000
direct allocation
page read and write
193277AA000
unkown
page readonly
22673D4B000
unclassified section
page readonly
AF30000
unkown
page read and write
7FF54BBBA000
unkown
page readonly
169B4E02000
unkown
page readonly
23068314000
heap
page read and write
1932755F000
unkown
page readonly
22673D78000
unclassified section
page readonly
284BC6A0000
heap
page read and write
2306AB80000
heap
page read and write
87D8000
unkown
page read and write
301F000
unkown
page read and write
7FFEC825C000
trusted library allocation
page read and write
7FF74C359000
unkown
page readonly
18726940000
heap
page read and write
BD3D000
unkown
page read and write
79A9000
unkown
page read and write
22674051000
unkown
page readonly
CD6BFFF000
stack
page read and write
193275C2000
unkown
page readonly
2306A787000
unkown
page readonly
7FFEC8370000
trusted library allocation
page read and write
7400000
unkown
page read and write
169B50E5000
unkown
page readonly
D85000
heap
page read and write
193275DD000
unkown
page readonly
1D60006E0000
direct allocation
page read and write
A7F1BFE000
stack
page read and write
19A387AC000
unkown
page readonly
19A384BC000
unkown
page readonly
5074003BC000
direct allocation
page read and write
4DC200394000
direct allocation
page read and write
193254D0000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
E66002E8000
direct allocation
page read and write
893D000
unkown
page read and write
2306A2E9000
unkown
page readonly
4DC2002CC000
direct allocation
page read and write
A402000
unkown
page read and write
378C000
unkown
page readonly
304B000
unkown
page read and write
5074003A9000
direct allocation
page read and write
19327483000
unkown
page readonly
9C41000
unkown
page read and write
1D600040C000
direct allocation
page read and write
AF7000
heap
page read and write
2306A770000
unkown
page readonly
169B5866000
unkown
page readonly
7FF745D47000
unkown
page execute read
507400874000
direct allocation
page read and write
19327BAB000
unkown
page readonly
19A37D92000
unkown
page readonly
1D60006D8000
direct allocation
page read and write
50740085C000
direct allocation
page read and write
2B0F000
trusted library allocation
page read and write
19A37CF0000
unkown
page readonly
293BE710000
heap
page read and write
7FFEC80A9000
trusted library allocation
page read and write
1D7F3000
heap
page read and write
96480FF000
stack
page read and write
CD6C0FF000
stack
page read and write
7C2E000
unkown
page read and write
1127000
unkown
page readonly
2267423A000
unkown
page readonly
19A384D7000
unkown
page readonly
7FF54BAD9000
unkown
page readonly
1D6000655000
direct allocation
page read and write
4DC20020C000
direct allocation
page read and write
A3D3000
unkown
page read and write
1D7F6000
heap
page read and write
E77E5FF000
unkown
page read and write
22673F94000
unkown
page readonly
14887FE000
stack
page read and write
22679C37000
heap
page read and write
169B514F000
unkown
page readonly
7FF52B255000
unkown
page readonly
19A384EE000
unkown
page readonly
7FF74B964000
unkown
page readonly
158F1FD000
stack
page read and write
B19000
heap
page read and write
7FF74B7C4000
unkown
page readonly
50740083C000
direct allocation
page read and write
7160000
unkown
page read and write
F8C000
unkown
page readonly
22679C20000
heap
page read and write
19A387D4000
unkown
page readonly
1CCB04FB000
heap
page read and write
19327CD6000
unkown
page readonly
4520000
unkown
page read and write
193254E0000
heap
page read and write
1D60006BA000
direct allocation
page read and write
50740085C000
direct allocation
page read and write
A9C0000
unkown
page readonly
2306A7CC000
unkown
page readonly
212DF5F0000
heap
page read and write
1D6000A0C000
direct allocation
page read and write
898B000
unkown
page read and write
169B57BD000
unkown
page readonly
2F6F000
trusted library allocation
page read and write
2306A364000
unkown
page readonly
5074003AC000
direct allocation
page read and write
1482FFE000
stack
page read and write
18726D00000
heap
page read and write
2BED000
stack
page read and write
19327781000
unkown
page readonly
7FFEC81B0000
trusted library allocation
page execute and read and write
898E000
unkown
page read and write
50740085C000
direct allocation
page read and write
2267402B000
unkown
page readonly
399D00302000
direct allocation
page read and write
7FF54B817000
unkown
page readonly
226747C4000
unkown
page readonly
226740B8000
unkown
page readonly
CF0000
unkown
page read and write
169B5790000
unkown
page readonly
7FFEC80BB000
trusted library allocation
page execute and read and write
2306A7B8000
unkown
page readonly
1D60006B8000
direct allocation
page read and write
1D60006C8000
direct allocation
page read and write
A3C6000
unkown
page read and write
3031000
unkown
page read and write
2306A1E0000
unkown
page readonly
4DC200354000
direct allocation
page read and write
401600614000
direct allocation
page read and write
232E299E000
heap
page read and write
7FF54BAD4000
unkown
page readonly
169B56F8000
unkown
page readonly
19327C76000
unkown
page readonly
19327520000
unkown
page readonly
2CEEC130000
heap
page read and write
A9F0000
unkown
page read and write
5CD1000
heap
page read and write
2267476F000
unkown
page readonly
1C52F720000
heap
page read and write
50740085C000
direct allocation
page read and write
22671EA3000
heap
page read and write
22673FF5000
unkown
page readonly
7A7FDFF000
unkown
page read and write
1D60006D0000
direct allocation
page read and write
19A38505000
unkown
page readonly
28A4000
trusted library allocation
page read and write
18B93600000
heap
page read and write
7FF54BBA3000
unkown
page readonly
169B57E6000
unkown
page readonly
169B520F000
unkown
page readonly
293BE360000
heap
page read and write
7FFEC82C0000
trusted library allocation
page read and write
19A37FC0000
unkown
page readonly
1BD08000
heap
page read and write
19A37B73000
unkown
page readonly
161A2E20000
heap
page read and write
2306A816000
unkown
page readonly
D883DFE000
stack
page read and write
19327777000
unkown
page readonly
22673BEF000
trusted library allocation
page read and write
530000
heap
page read and write
1932751B000
unkown
page readonly
507400844000
direct allocation
page read and write
7FF74CD2A000
unkown
page execute read
D8845FE000
stack
page read and write
1D8B9000
heap
page read and write
15881F8000
stack
page read and write
150B1290000
heap
page read and write
1D60006D0000
direct allocation
page read and write
EFA0000
heap
page read and write
7D78000
unkown
page read and write
1D60006D0000
direct allocation
page read and write
AF0000
heap
page read and write
B74000
heap
page read and write
446F000
unkown
page read and write
399D00102000
direct allocation
page read and write
A8FF000
stack
page read and write
7FF54BA1F000
unkown
page readonly
19A37D4A000
unkown
page readonly
4F68000
unkown
page read and write
8D0D000
stack
page read and write
2306A7ED000
unkown
page readonly
193274FD000
unkown
page readonly
193274AF000
unkown
page readonly
BBEA000
unkown
page read and write
DE2137F000
stack
page read and write
19327CDE000
unkown
page readonly
44BC000
unkown
page read and write
2306A92E000
heap
page read and write
9A0F000
stack
page read and write
5CB0000
heap
page read and write
7FF54B50B000
unkown
page readonly
720000
heap
page read and write
1D6000630000
direct allocation
page read and write
7A72000
unkown
page read and write
608EF7F000
stack
page read and write
7FF54BE65000
unkown
page readonly
8A23000
unkown
page read and write
2623000
heap
page read and write
A340000
unkown
page read and write
2267477B000
unkown
page readonly
2FCC000
trusted library allocation
page read and write
390E00488000
direct allocation
page read and write
19A38819000
unkown
page readonly
2267422E000
unkown
page readonly
7FFEC8097000
trusted library allocation
page read and write
1B190EE0000
heap
page read and write
2DF6000
trusted library allocation
page read and write
22673F1F000
unkown
page readonly
894F000
unkown
page read and write
5BB4BDC000
stack
page read and write
7FF54BB8D000
unkown
page readonly
28AF007E000
heap
page read and write
1D60006D8000
direct allocation
page read and write
19A37D6D000
unkown
page readonly
5CE3000
heap
page read and write
7232000
unkown
page read and write
A7EE3FE000
stack
page read and write
390E004AC000
direct allocation
page read and write
5074008A0000
direct allocation
page read and write
1D60006B0000
direct allocation
page read and write
7FF54BDE8000
unkown
page readonly
226746E6000
unkown
page readonly
73C9A7E000
stack
page read and write
70C7000
unkown
page read and write
507400844000
direct allocation
page read and write
448B000
unkown
page read and write
1D600062C000
direct allocation
page read and write
305A000
unkown
page read and write
BC37000
unkown
page read and write
5074003E8000
direct allocation
page read and write
23069F23000
heap
page read and write
1D60006D0000
direct allocation
page read and write
22679C7A000
heap
page read and write
169B585C000
unkown
page readonly
B50000
heap
page read and write
2306A847000
unkown
page readonly
9BA2000
unkown
page read and write
507400358000
direct allocation
page read and write
22674033000
unkown
page readonly
1932756E000
unkown
page readonly
22674743000
unkown
page readonly
1D6000870000
direct allocation
page read and write
2E10000
unkown
page readonly
A34A000
unkown
page read and write
226747B2000
unkown
page readonly
22EDBC60000
heap
page read and write
169B52EF000
unkown
page readonly
7FF54BD31000
unkown
page readonly
169B52DE000
unkown
page readonly
7DBE000
unkown
page read and write
19327594000
unkown
page readonly
19A38472000
unkown
page readonly
7104000
unkown
page read and write
150B10E0000
heap
page read and write
872D000
unkown
page read and write
BE96000
unkown
page read and write
BFBA000
unkown
page read and write
7CBA000
unkown
page read and write
20D64209000
heap
page read and write
BB6F000
unkown
page read and write
5074003A8000
direct allocation
page read and write
8A8B000
unkown
page read and write
8A88000
unkown
page read and write
5074008D8000
direct allocation
page read and write
14FBBFF000
stack
page read and write
5B208FF000
stack
page read and write
7FF54BDBD000
unkown
page readonly
3011000
unkown
page read and write
A363000
unkown
page read and write
2306A38F000
unkown
page readonly
70A4000
unkown
page read and write
E660038C000
direct allocation
page read and write
19A37F00000
unkown
page readonly
43C8000
unkown
page read and write
22826980000
heap
page read and write
193275AE000
unkown
page readonly
169B5AED000
unkown
page readonly
276055B0000
heap
page read and write
2306A19F000
unkown
page readonly
540000
heap
page read and write
87F7000
unkown
page read and write
19327C9D000
unkown
page readonly
878C000
unkown
page read and write
1D60006AE000
direct allocation
page read and write
7FFEC80EC000
trusted library allocation
page execute and read and write
7FF54BBD1000
unkown
page readonly
720C000
unkown
page read and write
19A37E2D000
unkown
page readonly
22674921000
heap
page read and write
14847FD000
stack
page read and write
19A3853D000
unkown
page readonly
7FFEC8176000
trusted library allocation
page execute and read and write
1D6000655000
direct allocation
page read and write
7B66000
unkown
page read and write
1D60003A6000
direct allocation
page read and write
1B25E000
stack
page read and write
5074003A8000
direct allocation
page read and write
19A38559000
unkown
page readonly
2306A837000
unkown
page readonly
7FF54B8D9000
unkown
page readonly
43CA000
unkown
page read and write
5074003A8000
direct allocation
page read and write
4016006C8000
direct allocation
page read and write
C0D2000
unkown
page read and write
7FF54B9B5000
unkown
page readonly
22674761000
unkown
page readonly
230682DE000
heap
page read and write
5074003D4000
direct allocation
page read and write
4492000
unkown
page read and write
19A38501000
unkown
page readonly
22674241000
unkown
page readonly
BBA000
heap
page read and write
220A3000
heap
page read and write
2760561B000
heap
page read and write
5074003A4000
direct allocation
page read and write
2267463F000
unkown
page readonly
1D42EA10000
heap
page read and write
4DC2002B0000
direct allocation
page read and write
7FF54BD49000
unkown
page readonly
7B98000
unkown
page read and write
2306A8CC000
unkown
page readonly
50740080C000
direct allocation
page read and write
7FF54BCB4000
unkown
page readonly
169B50E0000
unkown
page readonly
10044000
unkown
page read and write
8080000
unkown
page readonly
A7F73FE000
stack
page read and write
9647B7C000
stack
page read and write
720F000
unkown
page read and write
2306AEA5000
unkown
page readonly
7D91000
unkown
page read and write
286E000
trusted library allocation
page read and write
1D60006D0000
direct allocation
page read and write
3013000
unkown
page read and write
D75000
heap
page read and write
1D60006E0000
direct allocation
page read and write
A7F7BFE000
stack
page read and write
193274F8000
unkown
page readonly
50740086B000
direct allocation
page read and write
169B50B4000
unkown
page readonly
2306A891000
unkown
page readonly
1D60006D0000
direct allocation
page read and write
1D60006B8000
direct allocation
page read and write
8A67000
unkown
page read and write
5074003D0000
direct allocation
page read and write
71F7000
unkown
page read and write
1B6CB000
stack
page read and write
169B4EA5000
heap
page read and write
226746DC000
unkown
page readonly
22674094000
unkown
page readonly
5074008D8000
direct allocation
page read and write
22679CBB000
heap
page read and write
212DF780000
heap
page read and write
7116000
unkown
page read and write
E6600408000
direct allocation
page read and write
169B5094000
unkown
page readonly
1D6000A50000
direct allocation
page read and write
390E00242000
direct allocation
page read and write
2306A2A8000
unkown
page readonly
1D6000A40000
direct allocation
page read and write
8945000
unkown
page read and write
2203A000
heap
page read and write
22674939000
heap
page read and write
7FF54BC36000
unkown
page readonly
811F000
stack
page read and write
7FFEC809D000
trusted library allocation
page execute and read and write
81F0000
unkown
page read and write
262506D5000
heap
page read and write
150B12A3000
heap
page read and write
2306AECA000
unkown
page readonly
2306A82A000
unkown
page readonly
169B57F8000
unkown
page readonly
7FF54BE26000
unkown
page readonly
19A37D89000
unkown
page readonly
A444DFF000
stack
page read and write
2FE6000
trusted library allocation
page read and write
A7F23FE000
stack
page read and write
7FFEC831C000
trusted library allocation
page read and write
1C52F62B000
heap
page read and write
12931000
trusted library allocation
page read and write
1EE3DD40000
heap
page read and write
169B572D000
unkown
page readonly
19A38491000
unkown
page readonly
7FF54BB93000
unkown
page readonly
7B4D000
unkown
page read and write
2306A88D000
unkown
page readonly
169B5027000
unkown
page readonly
226746C7000
unkown
page readonly
B43000
heap
page read and write
19A38402000
unkown
page readonly
2F5D000
stack
page read and write
6D5D3EA000
stack
page read and write
19A35D40000
heap
page read and write
4550000
unkown
page read and write
A7F2BFE000
stack
page read and write
226740BD000
unkown
page readonly
22679CA7000
heap
page read and write
2CEEC430000
heap
page read and write
FAB000
stack
page read and write
7FF54BDCA000
unkown
page readonly
7FF747B47000
unkown
page execute read
15119A90000
heap
page read and write
7FF54BE40000
unkown
page readonly
1BD03000
heap
page read and write
14A3E4E0000
heap
page read and write
7FF74B720000
unkown
page readonly
19A35CF0000
heap
page readonly
28B77B00000
heap
page read and write
5074003BC000
direct allocation
page read and write
BAF0000
unkown
page readonly
1BDD89A0000
heap
page read and write
B21000
heap
page read and write
14A3E710000
heap
page read and write
B20000
trusted library allocation
page read and write
21BBD000
heap
page read and write
2F6A000
unkown
page read and write
7FF54BDE2000
unkown
page readonly
7FF54BBBF000
unkown
page readonly
169B52D9000
unkown
page readonly
2306A88A000
unkown
page readonly
226748BE000
heap
page read and write
4404000
unkown
page read and write
1D6000655000
direct allocation
page read and write
8963000
unkown
page read and write
169B502E000
unkown
page readonly
50740035C000
direct allocation
page read and write
19A38875000
unkown
page readonly
2306A18F000
unkown
page readonly
7FF74CD25000
unkown
page execute read
87E2000
unkown
page read and write
EA5000
heap
page read and write
169B5214000
unkown
page readonly
7AD0000
unkown
page read and write
7B20000
unkown
page read and write
7FF54B78E000
unkown
page readonly
193254B4000
heap
page read and write
A3D28FC000
stack
page read and write
193275C7000
unkown
page readonly
1D6000694000
direct allocation
page read and write
7650000
unkown
page readonly
4DC200404000
direct allocation
page read and write
8AB4000
unkown
page read and write
22674907000
heap
page read and write
19327D0E000
unkown
page readonly
7210000
unkown
page read and write
1D6000655000
direct allocation
page read and write
AE1F000
stack
page read and write
71B8000
unkown
page read and write
390E00342000
direct allocation
page read and write
7FFEC80A3000
trusted library allocation
page read and write
284BC74B000
heap
page read and write
1D42EA34000
heap
page read and write
5074003E8000
direct allocation
page read and write
169B5B16000
unkown
page readonly
22673D57000
unclassified section
page readonly
7FF54BC58000
unkown
page readonly
169B50B1000
unkown
page readonly
169B526C000
unkown
page readonly
169B57EE000
unkown
page readonly
2BC77618000
heap
page read and write
1D600063C000
direct allocation
page read and write
799F000
unkown
page read and write
7FFEC8330000
trusted library allocation
page execute and read and write
169B575B000
unkown
page readonly
7FFEC80AD000
trusted library allocation
page execute and read and write
22674177000
unkown
page readonly
22673DD1000
unclassified section
page readonly
2FC4000
unkown
page read and write
7FF54BD79000
unkown
page readonly
22679CA2000
heap
page read and write
79DB000
unkown
page read and write
7FF54BCB8000
unkown
page readonly
28B77CD0000
heap
page read and write
B6C000
heap
page read and write
1D6000648000
direct allocation
page read and write
4DC2003C8000
direct allocation
page read and write
1D60006EE000
direct allocation
page read and write
7FFEC8356000
trusted library allocation
page read and write
19A3849A000
unkown
page readonly
22674634000
unkown
page readonly
2306A7E5000
unkown
page readonly
79CC000
unkown
page read and write
7C97000
unkown
page read and write
19327C95000
unkown
page readonly
22673DC7000
unclassified section
page readonly
2306A7C7000
unkown
page readonly
169B5042000
unkown
page readonly
1D600062C000
direct allocation
page read and write
7DFA000
unkown
page read and write
255BCCC0000
heap
page read and write
158D1FF000
stack
page read and write
713D000
unkown
page read and write
7FF54BDBB000
unkown
page readonly
1D6000650000
direct allocation
page read and write
5074008F1000
direct allocation
page read and write
1D7EF000
heap
page read and write
2267473E000
unkown
page readonly
D8A6BFF000
stack
page read and write
2306826C000
heap
page read and write
2306B7B9000
heap
page read and write
1D60006E0000
direct allocation
page read and write
2267479B000
unkown
page readonly
2FE6000
unkown
page read and write
71A2000
unkown
page read and write
7FF54B79C000
unkown
page readonly
169B5702000
unkown
page readonly
1D60006E0000
direct allocation
page read and write
1D60006D8000
direct allocation
page read and write
23068190000
heap
page read and write
1D60003C4000
direct allocation
page read and write
169B5067000
unkown
page readonly
1D60006A8000
direct allocation
page read and write
2BC775F0000
heap
page read and write
798D000
stack
page read and write
AA0000
unkown
page read and write
1D60006D0000
direct allocation
page read and write
50740084C000
direct allocation
page read and write
169B57C8000
unkown
page readonly
22673FAA000
unkown
page readonly
14FB9FE000
unkown
page read and write
B2D000
heap
page read and write
7FF54B97E000
unkown
page readonly
19A37E33000
unkown
page readonly
418C000
unkown
page readonly
C1BF000
unkown
page read and write
169B5111000
unkown
page readonly
226748FD000
heap
page read and write
399D004D2000
direct allocation
page read and write
4497000
unkown
page read and write
1D7E4000
heap
page read and write
226741C8000
unkown
page readonly
7131000
unkown
page read and write
390E0028A000
direct allocation
page read and write
7F0E000
stack
page read and write
50740033F000
direct allocation
page read and write
7FFEC831E000
trusted library allocation
page read and write
1D779000
heap
page read and write
888F000
unkown
page read and write
5074003BC000
direct allocation
page read and write
1D6000D5C000
direct allocation
page read and write
4B8C000
unkown
page readonly
1BD11000
heap
page read and write
71CD000
unkown
page read and write
507400854000
direct allocation
page read and write
22674680000
unkown
page readonly
2306A17F000
unkown
page readonly
169B5784000
unkown
page readonly
230682DA000
heap
page read and write
AFC000
heap
page read and write
890D000
unkown
page read and write
70FA000
unkown
page read and write
1D60003A7000
direct allocation
page read and write
232E2940000
heap
page read and write
1BDD87D5000
heap
page read and write
19A37DD3000
unkown
page readonly
7B9D000
unkown
page read and write
1D6000634000
direct allocation
page read and write
BE06000
unkown
page read and write
AF0000
heap
page read and write
AF2000
heap
page read and write
28B77B20000
heap
page read and write
390E004B4000
direct allocation
page read and write
169B578C000
unkown
page readonly
4EBA000
unkown
page read and write
B52F000
stack
page read and write
7FF54B7A9000
unkown
page readonly
7C9C000
unkown
page read and write
22673F8F000
unkown
page readonly
2306A0AD000
unkown
page readonly
1FE68000
heap
page read and write
2306A72C000
unkown
page readonly
7FFEC83F0000
trusted library allocation
page read and write
2267417B000
unkown
page readonly
7FFEC8230000
trusted library allocation
page read and write
9BF5000
unkown
page read and write
BFF4000
unkown
page read and write
7FF749947000
unkown
page execute read
7FF54B7FA000
unkown
page readonly
262506D0000
heap
page read and write
226746A5000
unkown
page readonly
2306A925000
heap
page read and write
4455000
unkown
page read and write
507400824000
direct allocation
page read and write
7FF54B62C000
unkown
page readonly
22098000
heap
page read and write
22674789000
unkown
page readonly
7FF54B7F0000
unkown
page readonly
1D6000698000
direct allocation
page read and write
399D0034A000
direct allocation
page read and write
19327480000
unkown
page readonly
50740082C000
direct allocation
page read and write
15119810000
heap
page read and write
D80000
unkown
page readonly
7FFEC8093000
trusted library allocation
page execute and read and write
7BC5000
unkown
page read and write
2EAF000
trusted library allocation
page read and write
19327BE2000
unkown
page readonly
169B5192000
unkown
page readonly
19A38439000
unkown
page readonly
1D6000634000
direct allocation
page read and write
1059000
heap
page read and write
401600848000
direct allocation
page read and write
1D6000AF8000
direct allocation
page read and write
2267462F000
unkown
page readonly
1D6000660000
direct allocation
page read and write
212DF400000
heap
page read and write
761B000
unkown
page read and write
7FF54BDEE000
unkown
page readonly
169B3098000
heap
page read and write
2CEEC150000
heap
page read and write
169B30AC000
heap
page read and write
D00000
trusted library allocation
page read and write
2353D000
stack
page read and write
7FF54B7E9000
unkown
page readonly
19327B88000
unkown
page readonly
2306A870000
unkown
page readonly
7FFEC81B0000
trusted library allocation
page execute and read and write
A3D29FF000
unkown
page read and write
1D60006B8000
direct allocation
page read and write
19327190000
unkown
page readonly
9BD4000
unkown
page read and write
1D60006E0000
direct allocation
page read and write
386E6FB000
stack
page read and write
26250708000
heap
page read and write
7FF54B94A000
unkown
page readonly
9C3C000
unkown
page read and write
161A3140000
heap
page read and write
1D60006E0000
direct allocation
page read and write
6030000
heap
page read and write
19A383E1000
unkown
page readonly
85E0000
unkown
page readonly
19A35D87000
heap
page read and write
BC3B000
unkown
page read and write
507400408000
direct allocation
page read and write
1D60003E0000
direct allocation
page read and write
2306A0F1000
unkown
page readonly
22674654000
unkown
page readonly
507400850000
direct allocation
page read and write
7FFEC8300000
trusted library allocation
page read and write
7213000
unkown
page read and write
1484FF7000
stack
page read and write
5074003A8000
direct allocation
page read and write
2306A94C000
heap
page read and write
193274E5000
unkown
page readonly
1B77C000
heap
page read and write
450000
unkown
page readonly
1FE4F000
heap
page read and write
193274CF000
unkown
page readonly
35A816E000
stack
page read and write
2FE2000
unkown
page read and write
AA0000
trusted library allocation
page read and write
7FFEC8150000
trusted library allocation
page execute and read and write
507400372000
direct allocation
page read and write
9808000
stack
page read and write
19327CB8000
unkown
page readonly
7B09000
unkown
page read and write
193275B3000
unkown
page readonly
1D60006FC000
direct allocation
page read and write
22674224000
unkown
page readonly
7FF744947000
unkown
page execute read
7126000
unkown
page read and write
2306AED9000
unkown
page readonly
1C52F740000
heap
page read and write
22673FBB000
unkown
page readonly
7FF54BBA9000
unkown
page readonly
B2B000
heap
page read and write
2306A7FF000
unkown
page readonly
14FBAFF000
stack
page read and write
50740085C000
direct allocation
page read and write
169B5828000
unkown
page readonly
B4AB000
stack
page read and write
7FFEC8258000
trusted library allocation
page read and write
1C52F620000
heap
page read and write
169B5838000
unkown
page readonly
7D34000
unkown
page read and write
7FF54BD2E000
unkown
page readonly
2306A8E2000
unkown
page readonly
7FF54B989000
unkown
page readonly
169B5847000
unkown
page readonly
50740082C000
direct allocation
page read and write
7C0B000
unkown
page read and write
885D000
unkown
page read and write
7FFEC80A3000
trusted library allocation
page read and write
22673F35000
unkown
page readonly
22673F86000
unkown
page readonly
169B5020000
unkown
page readonly
6F15000
stack
page read and write
2306A8A2000
unkown
page readonly
276055C0000
heap
page read and write
169B5102000
unkown
page readonly
1D600063E000
direct allocation
page read and write
212DF5D0000
heap
page read and write
2F83000
unkown
page read and write
200D1950000
heap
page read and write
7B52000
unkown
page read and write
AF30000
unkown
page read and write
169B2FB0000
heap
page read and write
5074003E8000
direct allocation
page read and write
169B3092000
heap
page read and write
19327BB4000
unkown
page readonly
226747A5000
unkown
page readonly
7A7FFFF000
stack
page read and write
5074003A5000
direct allocation
page read and write
193275FE000
unkown
page readonly
1D6000A5C000
direct allocation
page read and write
169B4FDC000
unkown
page readonly
40160060C000
direct allocation
page read and write
19A37DBC000
unkown
page readonly
399D00402000
direct allocation
page read and write
15891FE000
stack
page read and write
5DE0000
heap
page read and write
20D64300000
heap
page read and write
7D23000
unkown
page read and write
193275CC000
unkown
page readonly
399D0045F000
direct allocation
page read and write
22674916000
heap
page read and write
50740080C000
direct allocation
page read and write
293BE350000
heap
page read and write
2E20000
unkown
page read and write
8F2000
stack
page read and write
4DC9000
stack
page read and write
19A37D13000
unkown
page readonly
169B50FB000
unkown
page readonly
620000
unkown
page readonly
1D60006E0000
direct allocation
page read and write
BB60000
unkown
page read and write
7FF54B931000
unkown
page readonly
2948000
trusted library allocation
page read and write
2306A923000
heap
page read and write
2851000
trusted library allocation
page read and write
B8C000
heap
page read and write
5074008E4000
direct allocation
page read and write
5074003A4000
direct allocation
page read and write
9BF1000
unkown
page read and write
2306A130000
unkown
page readonly
2306A1AC000
unkown
page readonly
2FBC000
unkown
page read and write
1B777000
heap
page read and write
1D60003D0000
direct allocation
page read and write
19A37CBB000
unkown
page readonly
7FF74B7AE000
unkown
page readonly
A350000
unkown
page read and write
19A387D0000
unkown
page readonly
27605800000
heap
page read and write
7FFEC83D8000
trusted library allocation
page read and write
169B3030000
heap
page read and write
E58C000
stack
page read and write
399D00370000
direct allocation
page read and write
7C83000
unkown
page read and write
7FF54B69C000
unkown
page readonly
19A38ABB000
heap
page read and write
E7D12FF000
unkown
page read and write
7FF54BDDD000
unkown
page readonly
1D60006C0000
direct allocation
page read and write
1FB79930000
heap
page read and write
2306A113000
unkown
page readonly
8A54000
unkown
page read and write
7FF54B92C000
unkown
page readonly
7FF54BDD0000
unkown
page readonly
79C7000
unkown
page read and write
19A37DE9000
unkown
page readonly
5CDF000
heap
page read and write
70B1000
unkown
page read and write
1D60006B0000
direct allocation
page read and write
452000
unkown
page readonly
1D600062C000
direct allocation
page read and write
169B5AE9000
unkown
page readonly
19A37FD6000
unkown
page readonly
7A62000
unkown
page read and write
22674258000
unkown
page readonly
76A0000
unkown
page readonly
238C000
unkown
page readonly
226746B6000
unkown
page readonly
7FF54BAA2000
unkown
page readonly
23068230000
heap
page read and write
88BA000
unkown
page read and write
5074008E4000
direct allocation
page read and write
169B5771000
unkown
page readonly
7FFEC8244000
trusted library allocation
page read and write
1D42EB10000
heap
page read and write
1D60006D0000
direct allocation
page read and write
2CEEC050000
heap
page read and write
2306A92B000
heap
page read and write
7FF54BE31000
unkown
page readonly
8AA9000
unkown
page read and write
2306B7F2000
heap
page read and write
7A7FEFE000
stack
page read and write
226746A0000
unkown
page readonly
7272000
unkown
page read and write
BC29000
unkown
page read and write
169B52E9000
unkown
page readonly
19A37E7A000
unkown
page readonly
2267408F000
unkown
page readonly
29F1000
trusted library allocation
page read and write
19A37D9D000
unkown
page readonly
1BD20000
heap
page read and write
169B500C000
unkown
page readonly
7A3F000
unkown
page read and write
608EE7E000
stack
page read and write
169B5744000
unkown
page readonly
71AB000
unkown
page read and write
255BCCB5000
heap
page read and write
1D600063C000
direct allocation
page read and write
A4667FE000
unkown
page read and write
1D42EA36000
heap
page read and write
9D7E000
unkown
page read and write
1D6000640000
direct allocation
page read and write
2FF5000
unkown
page read and write
284BC6F5000
heap
page read and write
2306A807000
unkown
page readonly
1D60006E8000
direct allocation
page read and write
390E00449000
direct allocation
page read and write
1FE89000
heap
page read and write
22673FC9000
unkown
page readonly
1D60006E0000
direct allocation
page read and write
D75000
heap
page read and write
14827FE000
stack
page read and write
50740080C000
direct allocation
page read and write
14A3E4D0000
heap
page read and write
D73000
heap
page read and write
228266F0000
heap
page read and write
390E0050E000
direct allocation
page read and write
7FFEC814C000
trusted library allocation
page execute and read and write
9B8E000
unkown
page read and write
2306A7A1000
unkown
page readonly
1D600061C000
direct allocation
page read and write
B9F000
heap
page read and write
1932758F000
unkown
page readonly
7FFEC82A0000
trusted library allocation
page read and write
7CB0000
unkown
page read and write
8AFB000
unkown
page read and write
19A37DC1000
unkown
page readonly
193274BE000
unkown
page readonly
B06000
heap
page read and write
2F60000
unkown
page read and write
70CE000
unkown
page read and write
22674102000
unkown
page readonly
2306A811000
unkown
page readonly
2306A126000
unkown
page readonly
22673D8B000
unclassified section
page readonly
BD5000
heap
page read and write
507400811000
direct allocation
page read and write
2326E000
stack
page read and write
2ED9000
stack
page read and write
5074003A4000
direct allocation
page read and write
15881ED000
stack
page read and write
19327BA6000
unkown
page readonly
7FF54BDD2000
unkown
page readonly
88D7000
unkown
page read and write
2306A0C4000
unkown
page readonly
390E00542000
direct allocation
page read and write
7FF54B801000
unkown
page readonly
1B6D0000
heap
page read and write
A4668FF000
stack
page read and write
22673FB4000
unkown
page readonly
22673B70000
unclassified section
page readonly
1D600065A000
direct allocation
page read and write
22673F44000
unkown
page readonly
C27000
heap
page read and write
1EE3DD30000
heap
page read and write
7FFEC83C0000
trusted library allocation
page read and write
2306A0D1000
unkown
page readonly
7FF54BC04000
unkown
page readonly
2FAA000
unkown
page read and write
BB4000
heap
page read and write
1B4AE000
stack
page read and write
1D42EC10000
heap
page read and write
1D600063C000
direct allocation
page read and write
22673DA6000
unclassified section
page readonly
727F000
unkown
page read and write
4479000
unkown
page read and write
BE57000
unkown
page read and write
169B52F4000
unkown
page readonly
169B510C000
unkown
page readonly
4CC000
stack
page read and write
A7E5BFD000
stack
page read and write
7A26000
unkown
page read and write
1ADDD000
stack
page read and write
40160063C000
direct allocation
page read and write
1D60006E8000
direct allocation
page read and write
7618000
unkown
page read and write
399D00402000
direct allocation
page read and write
714D000
unkown
page read and write
5074003E8000
direct allocation
page read and write
71CD000
unkown
page read and write
B1D000
heap
page read and write
50740085C000
direct allocation
page read and write
1D60003E2000
direct allocation
page read and write
7FFEC814C000
trusted library allocation
page execute and read and write
BC5B000
unkown
page read and write
79D1000
unkown
page read and write
7BA7000
unkown
page read and write
2306AEE7000
unkown
page readonly
22671EC3000
heap
page read and write
7FFEC823D000
trusted library allocation
page read and write
15881F6000
stack
page read and write
19A37B40000
unkown
page readonly
712B000
unkown
page read and write
8A6C000
unkown
page read and write
8A7A000
unkown
page read and write
85D0000
unkown
page readonly
1D60006D0000
direct allocation
page read and write
1132000
unkown
page readonly
A2229DF000
stack
page read and write
7FFEC83DF000
trusted library allocation
page read and write
1D60006E8000
direct allocation
page read and write
169B5131000
unkown
page readonly
AE5000
heap
page read and write
2306A167000
unkown
page readonly
7FF54B9A8000
unkown
page readonly
2F5B000
trusted library allocation
page read and write
4E10000
unkown
page write copy
7D41000
unkown
page read and write
7FF54B622000
unkown
page readonly
2306A35C000
unkown
page readonly
BB30000
unkown
page readonly
2306A931000
heap
page read and write
7FFEC809D000
trusted library allocation
page execute and read and write
19327C32000
unkown
page readonly
19A38549000
unkown
page readonly
193274F3000
unkown
page readonly
4DC2003C4000
direct allocation
page read and write
7A58000
unkown
page read and write
169B512B000
unkown
page readonly
7FFEC8269000
trusted library allocation
page read and write
1D600063C000
direct allocation
page read and write
23B1F000
stack
page read and write
22673C25000
heap
page read and write
20AB8000
heap
page read and write
BEE000
heap
page read and write
390E00202000
direct allocation
page read and write
390E00443000
direct allocation
page read and write
169B582C000
unkown
page readonly
2306B7C8000
heap
page read and write
20E72000
heap
page read and write
1D6000655000
direct allocation
page read and write
7A14000
unkown
page read and write
1D60006B8000
direct allocation
page read and write
232E2AF5000
heap
page read and write
2306A35F000
unkown
page readonly
4DC200408000
direct allocation
page read and write
5074003AC000
direct allocation
page read and write
399D0036E000
direct allocation
page read and write
2306A0BC000
unkown
page readonly
BE82000
unkown
page read and write
19A37DEE000
unkown
page readonly
2267403D000
unkown
page readonly
7FF54BC3E000
unkown
page readonly
BF2C52E000
stack
page read and write
19327614000
unkown
page readonly
2306A080000
unkown
page readonly
BC32000
unkown
page read and write
1D600063C000
direct allocation
page read and write
390E0043C000
direct allocation
page read and write
1D6000A6F000
direct allocation
page read and write
19327C14000
unkown
page readonly
73C97FE000
stack
page read and write
1D60006E0000
direct allocation
page read and write
20D64211000
heap
page read and write
7FF54BC73000
unkown
page readonly
19A37B85000
heap
page read and write
885F000
unkown
page read and write
22679CC1000
heap
page read and write
22674247000
unkown
page readonly
27605637000
heap
page read and write
207A0000
heap
page read and write
1D60003C0000
direct allocation
page read and write
5074003BC000
direct allocation
page read and write
2306A4CA000
unkown
page readonly
15919FE000
stack
page read and write
2306A1C2000
unkown
page readonly
19327BB9000
unkown
page readonly
7FF748547000
unkown
page execute read
151198A0000
heap
page read and write
AC1000
unkown
page readonly
A35B000
unkown
page read and write
7ADF000
unkown
page read and write
21660000
heap
page read and write
71C5000
unkown
page read and write
1BDD8730000
heap
page read and write
5074003D8000
direct allocation
page read and write
1D7D3000
heap
page read and write
7D7D000
unkown
page read and write
399D00582000
direct allocation
page read and write
7FFEC8250000
trusted library allocation
page read and write
2306AEBF000
unkown
page readonly
1EE3DE03000
heap
page read and write
19327CB2000
unkown
page readonly
7DB9000
unkown
page read and write
44D0000
unkown
page read and write
1D60006A8000
direct allocation
page read and write
87BB000
unkown
page read and write
169B4E10000
unkown
page readonly
5074003B4000
direct allocation
page read and write
169B50CC000
unkown
page readonly
3060000
unkown
page readonly
19A38465000
unkown
page readonly
880E000
unkown
page read and write
7FF54BAEC000
unkown
page readonly
1932779B000
unkown
page readonly
18726997000
heap
page read and write
1CCB06E0000
heap
page read and write
19A37FCA000
unkown
page readonly
22673B40000
heap
page read and write
70CA000
unkown
page read and write
169B56D2000
unkown
page readonly
85A0000
heap
page read and write
2306AEEA000
unkown
page readonly
22674043000
unkown
page readonly
5074003BC000
direct allocation
page read and write
399D00466000
direct allocation
page read and write
2306A8DF000
unkown
page readonly
255BCCB0000
heap
page read and write
4DC200248000
direct allocation
page read and write
19A35D00000
heap
page read and write
169B5795000
unkown
page readonly
2BC77800000
heap
page read and write
7FFEC8146000
trusted library allocation
page read and write
7FF54BBEB000
unkown
page readonly
7C7A000
unkown
page read and write
A80000
trusted library allocation
page read and write
2306A1B9000
unkown
page readonly
19327BF1000
unkown
page readonly
7FF74B07D000
unkown
page readonly
302A000
unkown
page read and write
B69000
heap
page read and write
6D64BFF000
stack
page read and write
158F9FE000
stack
page read and write
19327CE5000
unkown
page readonly
B79000
heap
page read and write
50740085C000
direct allocation
page read and write
401600620000
direct allocation
page read and write
1D6000A1C000
direct allocation
page read and write
2267492F000
heap
page read and write
2267400E000
unkown
page readonly
169B57FF000
unkown
page readonly
19A37D1D000
unkown
page readonly
2306A2F0000
unkown
page readonly
7D19000
unkown
page read and write
57F000
unkown
page readonly
73C977C000
stack
page read and write
9D19000
unkown
page read and write
70F7000
unkown
page read and write
5ECE000
stack
page read and write
193274DC000
unkown
page readonly
401600624000
direct allocation
page read and write
7FF54B9D2000
unkown
page readonly
7FFEC8093000
trusted library allocation
page execute and read and write
7CC9000
unkown
page read and write
19A37F4F000
unkown
page readonly
2306A8A7000
unkown
page readonly
19327C10000
unkown
page readonly
301A000
trusted library allocation
page read and write
169B4FD4000
unkown
page readonly
2267492A000
heap
page read and write
1D6000650000
direct allocation
page read and write
1D60003A0000
direct allocation
page read and write
2306A290000
unkown
page readonly
22671ED9000
heap
page read and write
19A384D2000
unkown
page readonly
5074003E8000
direct allocation
page read and write
1B2A0000
heap
page execute and read and write
877A000
unkown
page read and write
233148B0000
heap
page read and write
169B57AB000
unkown
page readonly
7FFEC80EC000
trusted library allocation
page execute and read and write
7C47000
unkown
page read and write
19327555000
unkown
page readonly
232E2AF0000
heap
page read and write
1D60006D0000
direct allocation
page read and write
74712FF000
stack
page read and write
9BEC000
unkown
page read and write
2306A13F000
unkown
page readonly
721F000
unkown
page read and write
2202A000
heap
page read and write
19A38ABB000
heap
page read and write
158A1FE000
stack
page read and write
169B56D7000
unkown
page readonly
19327CFD000
unkown
page readonly
25B0000
unkown
page read and write
507400854000
direct allocation
page read and write
DE2127C000
stack
page read and write
1D60006D0000
direct allocation
page read and write
7C15000
unkown
page read and write
9B0F000
stack
page read and write
169B50C8000
unkown
page readonly
6ED15FF000
unkown
page read and write
19A38477000
unkown
page readonly
7E29000
unkown
page read and write
22674172000
unkown
page readonly
198C000
unkown
page readonly
507400824000
direct allocation
page read and write
7FFEC825F000
trusted library allocation
page read and write
158C9FD000
stack
page read and write
1D600062C000
direct allocation
page read and write
7DB4000
unkown
page read and write
A3D7000
unkown
page read and write
1BDD87B0000
heap
page read and write
1D60006D8000
direct allocation
page read and write
874E000
unkown
page read and write
9D0E000
unkown
page read and write
22826680000
heap
page read and write
1D6000630000
direct allocation
page read and write
7237000
unkown
page read and write
1D6000418000
direct allocation
page read and write
7B0000
heap
page read and write
193254E9000
heap
page read and write
15889FE000
stack
page read and write
22EDBC65000
heap
page read and write
15119710000
heap
page read and write
390E00482000
direct allocation
page read and write
7DF44C8E1000
unkown
page execute read
2306AE79000
unkown
page readonly
BD85000
unkown
page read and write
7FF54B847000
unkown
page readonly
560000
unkown
page readonly
7E1D000
unkown
page read and write
7FF54B9DB000
unkown
page readonly
2306A379000
unkown
page readonly
284BC910000
heap
page read and write
2306A8F8000
unkown
page readonly
390E00370000
direct allocation
page read and write
1D6000D34000
direct allocation
page read and write
19327C43000
unkown
page readonly
19A38528000
unkown
page readonly
2FE0000
trusted library allocation
page read and write
1D600063A000
direct allocation
page read and write
19A3840F000
unkown
page readonly
1D6000A25000
direct allocation
page read and write
2DFC000
trusted library allocation
page read and write
169B5219000
unkown
page readonly
14A3E524000
heap
page read and write
1483FFB000
stack
page read and write
22674021000
unkown
page readonly
7E2C000
unkown
page read and write
26250680000
heap
page read and write
19A383B6000
unkown
page readonly
7B1B000
unkown
page read and write
19327C28000
unkown
page readonly
2306A7FA000
unkown
page readonly
19325490000
heap
page read and write
169B52BE000
unkown
page readonly
7C7E000
unkown
page read and write
7FF743EB1000
unkown
page execute read
7FB0000
unkown
page readonly
D8865FF000
stack
page read and write
169B56F3000
unkown
page readonly
E7D0FCD000
stack
page read and write
1D60003A0000
direct allocation
page read and write
A300000
unkown
page read and write
1BD3D000
heap
page read and write
19A37E39000
unkown
page readonly
169B52CF000
unkown
page readonly
8A86000
unkown
page read and write
2306A13B000
unkown
page readonly
22673F69000
unkown
page readonly
7FF54B83B000
unkown
page readonly
9BA8000
unkown
page read and write
27605634000
heap
page read and write
7FFEC8270000
trusted library allocation
page read and write
1D6000740000
direct allocation
page read and write
169B5880000
unkown
page readonly
7FFEC8090000
trusted library allocation
page read and write
7FF54BD1A000
unkown
page readonly
22674784000
unkown
page readonly
4016006C8000
direct allocation
page read and write
7FF54BB75000
unkown
page readonly
2306A7DC000
unkown
page readonly
26250700000
heap
page read and write
4DC200418000
direct allocation
page read and write
169B5752000
unkown
page readonly
1D6000648000
direct allocation
page read and write
6ED14FC000
stack
page read and write
1CCB04F0000
heap
page read and write
19A383D7000
unkown
page readonly
A7E4BF6000
stack
page read and write
19A387F4000
unkown
page readonly
226746AD000
unkown
page readonly
BBC000
heap
page read and write
7FF54BDBF000
unkown
page readonly
1D60006E0000
direct allocation
page read and write
19325450000
heap
page read and write
7B11000
unkown
page read and write
A7E4BEA000
stack
page read and write
169B57B3000
unkown
page readonly
169B5853000
unkown
page readonly
2306A765000
unkown
page readonly
71F0000
unkown
page read and write
884F000
unkown
page read and write
7FFEC8094000
trusted library allocation
page read and write
7FF743F45000
unkown
page execute read
7E18000
unkown
page read and write
EFA2000
heap
page read and write
22673BE0000
trusted library allocation
page read and write
169B575F000
unkown
page readonly
19327510000
unkown
page readonly
2306A8D1000
unkown
page readonly
7FF54BD36000
unkown
page readonly
1D600063C000
direct allocation
page read and write
390E00382000
direct allocation
page read and write
4DC20040C000
direct allocation
page read and write
7FF54BBF0000
unkown
page readonly
7FF74C575000
unkown
page write copy
A3FF000
unkown
page read and write
1AEBA000
stack
page read and write
228266A0000
heap
page read and write
A80000
unkown
page read and write
7FF54BC6D000
unkown
page readonly
29EF000
stack
page read and write
50740039C000
direct allocation
page read and write
D888DFF000
stack
page read and write
232E2860000
heap
page read and write
19A38ABB000
heap
page read and write
2162001C2000
direct allocation
page read and write
2267471E000
unkown
page readonly
19327C6F000
unkown
page readonly
2306A341000
unkown
page readonly
7FF54B91A000
unkown
page readonly
40160080C000
direct allocation
page read and write
2306A927000
heap
page read and write
22674719000
unkown
page readonly
1B7A2000
heap
page read and write
7FF54B843000
unkown
page readonly
1EE3DDEE000
heap
page read and write
B76000
heap
page read and write
5B207FE000
stack
page read and write
301B000
unkown
page read and write
507400374000
direct allocation
page read and write
22672010000
heap
page read and write
2FF9000
unkown
page read and write
390E00142000
direct allocation
page read and write
7DF44C8F1000
unkown
page execute read
5074003A0000
direct allocation
page read and write
22679C8E000
heap
page read and write
1D6000CE0000
direct allocation
page read and write
2306A7A9000
unkown
page readonly
7990000
unkown
page read and write
5074003A4000
direct allocation
page read and write
1D600065A000
direct allocation
page read and write
8A17000
unkown
page read and write
43EA000
unkown
page read and write
8AAC000
unkown
page read and write
7FF54BE24000
unkown
page readonly
8954000
unkown
page read and write
2624000
heap
page read and write
449E000
unkown
page read and write
7FF74B934000
unkown
page readonly
9647FFE000
stack
page read and write
19327D26000
unkown
page readonly
1C52F470000
heap
page read and write
22671E10000
heap
page readonly
50740081F000
direct allocation
page read and write
A7D000
stack
page read and write
1A930000
trusted library allocation
page read and write
19A37EFA000
unkown
page readonly
390E00404000
direct allocation
page read and write
390E003C2000
direct allocation
page read and write
2CE5000
stack
page read and write
150B11C0000
heap
page read and write
3048000
unkown
page read and write
2306824E000
heap
page read and write
7FF54BDF2000
unkown
page readonly
2306A1B5000
unkown
page readonly
88EC000
unkown
page read and write
4DC2002C4000
direct allocation
page read and write
BC75000
unkown
page read and write
169B4FFC000
unkown
page readonly
7541000
unkown
page read and write
19327606000
unkown
page readonly
399D004C2000
direct allocation
page read and write
A3F0000
unkown
page read and write
1D6000D48000
direct allocation
page read and write
B9CE000
stack
page read and write
5F30000
heap
page read and write
7FFEC83E0000
trusted library allocation
page execute and read and write
7FF74C55F000
unkown
page write copy
2267465E000
unkown
page readonly
50740082C000
direct allocation
page read and write
7FFEC8291000
trusted library allocation
page read and write
1D600063C000
direct allocation
page read and write
7DE9000
unkown
page read and write
7FC0000
unkown
page read and write
8990000
unkown
page read and write
1FA90000
heap
page read and write
8923000
unkown
page read and write
1D42EA1B000
heap
page read and write
401600628000
direct allocation
page read and write
19A37E1E000
unkown
page readonly
169B5229000
unkown
page readonly
2306A858000
unkown
page readonly
169B30B1000
heap
page read and write
22679CAC000
heap
page read and write
169B4E00000
unkown
page readonly
5074003A4000
direct allocation
page read and write
22674098000
unkown
page readonly
68E90FF000
stack
page read and write
22673F9E000
unkown
page readonly
193276DB000
unkown
page readonly
226748F7000
heap
page read and write
169B573A000
unkown
page readonly
9C34000
unkown
page read and write
19327CD0000
unkown
page readonly
22674765000
unkown
page readonly
FF83000
unkown
page read and write
4016006D4000
direct allocation
page read and write
CFE000
stack
page read and write
2306B7D1000
heap
page read and write
19A37DE0000
unkown
page readonly
7F09000
stack
page read and write
7AD5000
unkown
page read and write
2FD9000
trusted library allocation
page read and write
8896000
unkown
page read and write
6D5D3F8000
stack
page read and write
161A2E29000
heap
page read and write
2267460A000
unkown
page readonly
8828000
unkown
page read and write
1D60006E0000
direct allocation
page read and write
7B34000
unkown
page read and write
14807FC000
stack
page read and write
71D6000
unkown
page read and write
D10000
heap
page read and write
1932749A000
unkown
page readonly
7FF54BD83000
unkown
page readonly
1D6000640000
direct allocation
page read and write
19327C1A000
unkown
page readonly
7BCF000
unkown
page read and write
390E004C9000
direct allocation
page read and write
2BC77865000
heap
page read and write
19A37D97000
unkown
page readonly
44B2000
unkown
page read and write
A7F5BFB000
stack
page read and write
22679C7F000
heap
page read and write
6D63BFE000
stack
page read and write
88EA000
unkown
page read and write
399D00412000
direct allocation
page read and write
19A35D9C000
heap
page read and write
7FF54BCF7000
unkown
page readonly
7FF74C556000
unkown
page write copy
2F76000
unkown
page read and write
1487FFE000
stack
page read and write
BF18000
unkown
page read and write
8770000
unkown
page read and write
7FF74B7E4000
unkown
page readonly
7FF54BE09000
unkown
page readonly
507400854000
direct allocation
page read and write
920B000
stack
page read and write
22673D47000
unclassified section
page readonly
226747B7000
unkown
page readonly
2306B819000
heap
page read and write
15901FC000
stack
page read and write
8A27000
unkown
page read and write
22671E8D000
heap
page read and write
7FFEC8260000
trusted library allocation
page read and write
2FDC000
trusted library allocation
page read and write
169B56A8000
unkown
page readonly
2F6D000
trusted library allocation
page read and write
7FF74C0B7000
unkown
page readonly
7FF74AD47000
unkown
page execute read
4DC200348000
direct allocation
page read and write
169B56E1000
unkown
page readonly
233149B0000
heap
page read and write
169B2F90000
heap
page read and write
2306A159000
unkown
page readonly
19A3844E000
unkown
page readonly
2267401C000
unkown
page readonly
6D5DBFD000
stack
page read and write
A7ECBFD000
stack
page read and write
1BDD86E0000
heap
page read and write
35A80EC000
stack
page read and write
7FF747147000
unkown
page execute read
19A37D18000
unkown
page readonly
1EE3DE06000
heap
page read and write
2306A82C000
unkown
page readonly
293BE715000
heap
page read and write
5074003A4000
direct allocation
page read and write
5B2039D000
stack
page read and write
169B5AD3000
unkown
page readonly
390E00302000
direct allocation
page read and write
19A37CDE000
unkown
page readonly
28B77B50000
heap
page read and write
27605980000
heap
page read and write
507400834000
direct allocation
page read and write
19A37FB0000
unkown
page readonly
401600418000
direct allocation
page read and write
7FF54B7FC000
unkown
page readonly
4016003F8000
direct allocation
page read and write
193254B0000
heap
page read and write
9D1B000
unkown
page read and write
19A37D33000
unkown
page readonly
7BCA000
unkown
page read and write
4EE6000
unkown
page read and write
169B574B000
unkown
page readonly
2306A296000
unkown
page readonly
2267490C000
heap
page read and write
A40C87E000
stack
page read and write
169B586C000
unkown
page readonly
58A000
unkown
page read and write
7D87000
unkown
page read and write
228266FB000
heap
page read and write
193275F9000
unkown
page readonly
22673FD9000
unkown
page readonly
7FFEC8390000
trusted library allocation
page read and write
22673DF8000
unclassified section
page readonly
193274B5000
unkown
page readonly
A7F3BFE000
stack
page read and write
169B503A000
unkown
page readonly
2306A1C6000
unkown
page readonly
22673FD5000
unkown
page readonly
3EEE7FF000
stack
page read and write
1FB79950000
heap
page read and write
4DC2003D4000
direct allocation
page read and write
B3E000
heap
page read and write
7FF54BC15000
unkown
page readonly
7FF54BA28000
unkown
page readonly
19327CC0000
unkown
page readonly
255BC9F0000
heap
page read and write
7FF54B80B000
unkown
page readonly
19A3848E000
unkown
page readonly
D7C000
heap
page read and write
7FF54BC79000
unkown
page readonly
19A3880D000
unkown
page readonly
193275D1000
unkown
page readonly
1D600063C000
direct allocation
page read and write
5074003A8000
direct allocation
page read and write
1EE3DD60000
heap
page read and write
1B320000
heap
page execute and read and write
7FF54B867000
unkown
page readonly
8AD4000
unkown
page read and write
1D6000680000
direct allocation
page read and write
169B4DFE000
unkown
page readonly
169B521E000
unkown
page readonly
A4666FC000
stack
page read and write
1D600063C000
direct allocation
page read and write
390E00411000
direct allocation
page read and write
50740085C000
direct allocation
page read and write
19A38389000
unkown
page readonly
169B5064000
unkown
page readonly
399D001C2000
direct allocation
page read and write
399D0011C000
direct allocation
page read and write
1D6000A48000
direct allocation
page read and write
1D60006B0000
direct allocation
page read and write
1D6000CA0000
direct allocation
page read and write
19A35DD3000
heap
page read and write
22674066000
unkown
page readonly
D8815FE000
stack
page read and write
1B229360000
heap
page read and write
77CE000
stack
page read and write
7FFEC8360000
trusted library allocation
page read and write
1D6000660000
direct allocation
page read and write
3021000
unkown
page read and write
7FF54B9D8000
unkown
page readonly
169B5779000
unkown
page readonly
226747D3000
unkown
page readonly
293BE530000
heap
page read and write
1D600063C000
direct allocation
page read and write
7FFEC8094000
trusted library allocation
page read and write
7510000
unkown
page read and write
EDF1000
unkown
page read and write
5074008C4000
direct allocation
page read and write
226748AA000
heap
page read and write
19A37EF1000
unkown
page readonly
20B3C000
heap
page read and write
150B1585000
heap
page read and write
70EA000
unkown
page read and write
1EE3DFD0000
heap
page read and write
C117000
unkown
page read and write
711F000
unkown
page read and write
14867FE000
stack
page read and write
390E0041A000
direct allocation
page read and write
5074003BC000
direct allocation
page read and write
7FF54BCCE000
unkown
page readonly
5074003A4000
direct allocation
page read and write
A3BD000
unkown
page read and write
2FC7000
unkown
page read and write
D70000
heap
page read and write
BB84000
unkown
page read and write
1D93E000
heap
page read and write
2306A75A000
unkown
page readonly
399D00482000
direct allocation
page read and write
193274EB000
unkown
page readonly
1D6000A78000
direct allocation
page read and write
889C000
unkown
page read and write
BB6C000
unkown
page read and write
43C3000
unkown
page read and write
14817FE000
stack
page read and write
12851000
trusted library allocation
page read and write
2CEEC1D0000
heap
page read and write
1B79E000
heap
page read and write
5074003A8000
direct allocation
page read and write
18B93620000
heap
page read and write
19A38ABB000
heap
page read and write
2267469C000
unkown
page readonly
25C0000
unkown
page readonly
169B4FE9000
unkown
page readonly
226746EA000
unkown
page readonly
390E00442000
direct allocation
page read and write
7FF52B24F000
unkown
page readonly
A355000
unkown
page read and write
22674696000
unkown
page readonly
226746BE000
unkown
page readonly
BF06000
unkown
page read and write
2306AEBA000
unkown
page readonly
1D600063A000
direct allocation
page read and write
5D10000
heap
page read and write
1C52F550000
heap
page read and write
19327CCD000
unkown
page readonly
A35E000
unkown
page read and write
2306A0CC000
unkown
page readonly
19A384A4000
unkown
page readonly
44FA000
unkown
page read and write
A7ED3FE000
stack
page read and write
2306A8E7000
unkown
page readonly
7FFEC8320000
trusted library allocation
page read and write
22679C93000
heap
page read and write
5BB4EFF000
stack
page read and write
50740031C000
direct allocation
page read and write
5F7E000
heap
page read and write
19A384E4000
unkown
page readonly
7FF54BA25000
unkown
page readonly
A7F0BFE000
stack
page read and write
BD40000
unkown
page read and write
399D00458000
direct allocation
page read and write
390E004BF000
direct allocation
page read and write
2B6D000
stack
page read and write
5074003A4000
direct allocation
page read and write
2FA6000
unkown
page read and write
4DC200201000
direct allocation
page read and write
150B11E0000
heap
page read and write
19327C00000
unkown
page readonly
22673F48000
unkown
page readonly
169B3087000
heap
page read and write
819B000
stack
page read and write
A7E53FD000
stack
page read and write
2306A76A000
unkown
page readonly
2306A775000
unkown
page readonly
2306A842000
unkown
page readonly
22673F99000
unkown
page readonly
8A09000
unkown
page read and write
7C3F000
unkown
page read and write
2AEF000
stack
page read and write
7FFEC8090000
trusted library allocation
page read and write
19A38441000
unkown
page readonly
19327BEB000
unkown
page readonly
22679C89000
heap
page read and write
7FF54BD54000
unkown
page readonly
1D60006D8000
direct allocation
page read and write
1D60006E0000
direct allocation
page read and write
19A37CA1000
unkown
page readonly
18726950000
heap
page read and write
1D60006E8000
direct allocation
page read and write
4DC200320000
direct allocation
page read and write
1D60003E0000
direct allocation
page read and write
1FB79959000
heap
page read and write
1D6000A78000
direct allocation
page read and write
1D60007B4000
direct allocation
page read and write
1FB79C45000
heap
page read and write
57F000
unkown
page readonly
5CD7000
heap
page read and write
6DA000
stack
page read and write
CA7E8FF000
stack
page read and write
B729000
stack
page read and write
B420000
unkown
page read and write
2306A0C0000
unkown
page readonly
2306A7C2000
unkown
page readonly
7D28000
unkown
page read and write
1D42E990000
heap
page read and write
401600624000
direct allocation
page read and write
B55000
heap
page read and write
7FF54B981000
unkown
page readonly
7D14000
unkown
page read and write
1BD16000
heap
page read and write
1D600062C000
direct allocation
page read and write
4485000
unkown
page read and write
7B2F000
unkown
page read and write
5074003A0000
direct allocation
page read and write
226748DD000
heap
page read and write
7FF54B4D8000
unkown
page readonly
9BE7000
unkown
page read and write
1D60007EC000
direct allocation
page read and write
1D6000694000
direct allocation
page read and write
7FF54B96E000
unkown
page readonly
19A37DCA000
unkown
page readonly
1932760F000
unkown
page readonly
22672050000
heap
page read and write
10052000
unkown
page read and write
23069F20000
heap
page read and write
226748E1000
heap
page read and write
226746CB000
unkown
page readonly
1D90F000
heap
page read and write
212DF340000
heap
page read and write
1D954000
heap
page read and write
8807000
unkown
page read and write
19A37D4E000
unkown
page readonly
19327C2D000
unkown
page readonly
29EF000
stack
page read and write
399D000C2000
direct allocation
page read and write
7FFEC8255000
trusted library allocation
page read and write
7A7FCFC000
stack
page read and write
9BEF000
unkown
page read and write
7FFEC82E0000
trusted library allocation
page read and write
2306A086000
unkown
page readonly
43FD000
unkown
page read and write
BE40000
unkown
page read and write
301D000
unkown
page read and write
15899FE000
stack
page read and write
447D000
unkown
page read and write
8868000
unkown
page read and write
22674690000
unkown
page readonly
19A387FB000
unkown
page readonly
19A37FDB000
unkown
page readonly
14FB8FC000
stack
page read and write
71C3000
unkown
page read and write
14A3E50B000
heap
page read and write
A3DB000
unkown
page read and write
2306B7CC000
heap
page read and write
19325440000
heap
page readonly
22673DAE000
unclassified section
page readonly
2FD3000
unkown
page read and write
1D6000A27000
direct allocation
page read and write
7B57000
unkown
page read and write
2267417F000
unkown
page readonly
724F000
unkown
page read and write
7FFEC8140000
trusted library allocation
page read and write
390E00342000
direct allocation
page read and write
22673FEF000
unkown
page readonly
22679C28000
heap
page read and write
50740082C000
direct allocation
page read and write
35A81EF000
stack
page read and write
774E000
stack
page read and write
A7F13FC000
stack
page read and write
8D8F000
stack
page read and write
6D633FF000
stack
page read and write
169B30A1000
heap
page read and write
2550000
unkown
page read and write
7FFEC8176000
trusted library allocation
page execute and read and write
2306A8DB000
unkown
page readonly
284BC6C0000
heap
page read and write
2BC777E0000
heap
page read and write
7FF54BAC6000
unkown
page readonly
228267F0000
heap
page read and write
7990000
heap
page read and write
169B57B8000
unkown
page readonly
7FF54BA2F000
unkown
page readonly
7B2A000
unkown
page read and write
EE36000
unkown
page read and write
7120000
unkown
page read and write
7FF4E1C00000
trusted library allocation
page execute and read and write
507400370000
direct allocation
page read and write
22673D09000
heap
page read and write
27605610000
heap
page read and write
169B5831000
unkown
page readonly
2306A8B0000
unkown
page readonly
C69000
stack
page read and write
1D6000A51000
direct allocation
page read and write
19A37D41000
unkown
page readonly
390E0031A000
direct allocation
page read and write
965D000
stack
page read and write
7640000
unkown
page read and write
9C1A000
unkown
page read and write
15909FC000
stack
page read and write
169B513B000
unkown
page readonly
399D00459000
direct allocation
page read and write
1FBF9000
heap
page read and write
A3C9000
unkown
page read and write
7FFEC82B0000
trusted library allocation
page read and write
7D1E000
unkown
page read and write
1D42E8B0000
heap
page read and write
E7D14FF000
stack
page read and write
7FF74CD29000
unkown
page readonly
2306A14F000
unkown
page readonly
B28000
heap
page read and write
22674074000
unkown
page readonly
7FF54BBFA000
unkown
page readonly
8861000
unkown
page read and write
169B5078000
unkown
page readonly
19A38530000
unkown
page readonly
BECE000
unkown
page read and write
2306A36D000
unkown
page readonly
2267418A000
unkown
page readonly
B46000
heap
page read and write
507400824000
direct allocation
page read and write
169B5154000
unkown
page readonly
19A37D72000
unkown
page readonly
193276C8000
unkown
page readonly
7CF4000
unkown
page read and write
15881E8000
stack
page read and write
75B0000
unkown
page readonly
1932756A000
unkown
page readonly
7FF54BBB2000
unkown
page readonly
B66000
heap
page read and write
5074003E8000
direct allocation
page read and write
A342000
unkown
page read and write
7FF743EB0000
unkown
page readonly
8A5F000
unkown
page read and write
8731000
unkown
page read and write
7FF74B096000
unkown
page readonly
B7F000
heap
page read and write
40160086A000
direct allocation
page read and write
BDE000
heap
page read and write
A7E63FD000
stack
page read and write
D880DF7000
stack
page read and write
626E000
stack
page read and write
D885DFD000
stack
page read and write
22673D08000
heap
page read and write
19A37D29000
unkown
page readonly
BF2C4AC000
stack
page read and write
284BC6F0000
heap
page read and write
19327C6B000
unkown
page readonly
22673FA6000
unkown
page readonly
284B9FE000
stack
page read and write
2306A19A000
unkown
page readonly
1D6000750000
direct allocation
page read and write
2267406B000
unkown
page readonly
1932759F000
unkown
page readonly
6D5E3FE000
stack
page read and write
2F6C000
unkown
page read and write
22674663000
unkown
page readonly
7F80000
unkown
page readonly
6D613FE000
stack
page read and write
226748CF000
heap
page read and write
169B5007000
unkown
page readonly
7FF54BC54000
unkown
page readonly
2306A7AE000
unkown
page readonly
BC41000
unkown
page read and write
507400374000
direct allocation
page read and write
158A9FE000
stack
page read and write
2306AE9C000
unkown
page readonly
1D6000655000
direct allocation
page read and write
F8D000
stack
page read and write
710000
unkown
page readonly
1FE49000
heap
page read and write
19A37E02000
unkown
page readonly
4418000
unkown
page read and write
22093000
heap
page read and write
1B5CB000
stack
page read and write
5074003A9000
direct allocation
page read and write
1C52F880000
heap
page read and write
19327D22000
unkown
page readonly
7278000
unkown
page read and write
723C000
unkown
page read and write
1481FFD000
stack
page read and write
19A38808000
unkown
page readonly
A7F03FB000
stack
page read and write
BC57000
unkown
page read and write
FF04000
unkown
page read and write
18B935D0000
heap
page read and write
1D60006B0000
direct allocation
page read and write
28B77CF0000
heap
page read and write
19A37CAF000
unkown
page readonly
50740082C000
direct allocation
page read and write
169B506D000
unkown
page readonly
1FE7B000
heap
page read and write
87D3000
unkown
page read and write
762000
stack
page read and write
401600817000
direct allocation
page read and write
998F000
stack
page read and write
22673FC3000
unkown
page readonly
158B9FD000
stack
page read and write
E77E4FD000
stack
page read and write
444E000
unkown
page read and write
19A384C1000
unkown
page readonly
C3B8DFF000
unkown
page read and write
19A37E28000
unkown
page readonly
169B5724000
unkown
page readonly
BC4B000
unkown
page read and write
AF3B2FF000
stack
page read and write
22673F42000
unkown
page readonly
23068237000
heap
page read and write
390E004BB000
direct allocation
page read and write
507400854000
direct allocation
page read and write
2306A85F000
unkown
page readonly
1D7D8000
heap
page read and write
19A387F9000
unkown
page readonly
7C1A000
unkown
page read and write
19A37E75000
unkown
page readonly
7A6E000
unkown
page read and write
226746EE000
unkown
page readonly
1D6000694000
direct allocation
page read and write
507400824000
direct allocation
page read and write
169B50A7000
unkown
page readonly
401600654000
direct allocation
page read and write
AF3B27E000
stack
page read and write
19327D0A000
unkown
page readonly
724A000
unkown
page read and write
4462000
unkown
page read and write
1D60006B0000
direct allocation
page read and write
5074003E8000
direct allocation
page read and write
7ABC000
unkown
page read and write
19A37DA9000
unkown
page readonly
58A000
unkown
page read and write
22673D51000
unclassified section
page readonly
19A37B80000
heap
page read and write
724F000
unkown
page read and write
28B77B5B000
heap
page read and write
D10000
unkown
page readonly
169B5AF7000
unkown
page readonly
A3D2AFF000
stack
page read and write
AA0000
unkown
page read and write
22674931000
heap
page read and write
7FF54BA83000
unkown
page readonly
E0E000
stack
page read and write
7C60000
heap
page read and write
7FF74B086000
unkown
page readonly
19A383DC000
unkown
page readonly
7261000
unkown
page read and write
7FFEC8269000
trusted library allocation
page read and write
88CD000
unkown
page read and write
19A38ABB000
heap
page read and write
2306A8C6000
unkown
page readonly
7FF74C1E8000
unkown
page readonly
FF59000
unkown
page read and write
1D60006E0000
direct allocation
page read and write
1D60006D0000
direct allocation
page read and write
726E000
unkown
page read and write
5074003A8000
direct allocation
page read and write
7112000
unkown
page read and write
7FF54BA01000
unkown
page readonly
1B7CE000
heap
page read and write
22070000
heap
page read and write
390E00422000
direct allocation
page read and write
B18000
heap
page read and write
4DC200220000
direct allocation
page read and write
5BB4E7E000
stack
page read and write
D60000
heap
page execute and read and write
B16000
heap
page read and write
71C9000
unkown
page read and write
169B57AF000
unkown
page readonly
7D3C000
unkown
page read and write
1D6000648000
direct allocation
page read and write
22673E00000
heap
page read and write
7BA2000
unkown
page read and write
2306A162000
unkown
page readonly
19A35DD5000
heap
page read and write
169B580B000
unkown
page readonly
19A38495000
unkown
page readonly
193275EA000
unkown
page readonly
22826985000
heap
page read and write
BEA9000
unkown
page read and write
20F8C000
heap
page read and write
28B77A20000
heap
page read and write
399D00082000
direct allocation
page read and write
E66002FC000
direct allocation
page read and write
8710000
unkown
page read and write
50740085C000
direct allocation
page read and write
19A35D80000
heap
page read and write
169B57E0000
unkown
page readonly
8A3C000
unkown
page read and write
9BF9000
unkown
page read and write
50740085C000
direct allocation
page read and write
1B2292C0000
heap
page read and write
1B74F000
heap
page read and write
9647EFF000
unkown
page read and write
7611000
unkown
page read and write
2AEB000
stack
page read and write
169B56CD000
unkown
page readonly
1D6000650000
direct allocation
page read and write
6D62BFE000
stack
page read and write
AF0000
heap
page read and write
7B25000
unkown
page read and write
2306A910000
heap
page read and write
7FFEC8230000
trusted library allocation
page read and write
1B191040000
heap
page read and write
22674018000
unkown
page readonly
B5B000
heap
page read and write
19327CED000
unkown
page readonly
507400345000
direct allocation
page read and write
7FFEC828A000
trusted library allocation
page read and write
2306A154000
unkown
page readonly
1BDD87D7000
heap
page read and write
18726990000
heap
page read and write
2306A179000
unkown
page readonly
2267478D000
unkown
page readonly
2306A8AB000
unkown
page readonly
22679C84000
heap
page read and write
390E00302000
direct allocation
page read and write
1D6000650000
direct allocation
page read and write
507400824000
direct allocation
page read and write
1D60006D8000
direct allocation
page read and write
158E9FD000
stack
page read and write
399D00042000
direct allocation
page read and write
88AD000
unkown
page read and write
7FFEC82A0000
trusted library allocation
page read and write
169B5AFF000
unkown
page readonly
10058000
unkown
page read and write
1D76B000
heap
page read and write
608EEFE000
stack
page read and write
D8875FB000
stack
page read and write
193274D5000
unkown
page readonly
7FFEC83A0000
trusted library allocation
page read and write
EFAA000
heap
page read and write
4DC200230000
direct allocation
page read and write
7FF54BD24000
unkown
page readonly
1111000
unkown
page readonly
2306A0F4000
unkown
page readonly
2306AED0000
unkown
page readonly
B628000
stack
page read and write
169B579A000
unkown
page readonly
7400000
unkown
page read and write
7FF54BBB6000
unkown
page readonly
FF4B000
unkown
page read and write
4460000
unkown
page read and write
7FF74C24E000
unkown
page readonly
19327C48000
unkown
page readonly
C0B3000
unkown
page read and write
22673C20000
heap
page read and write
4551000
unkown
page read and write
1D6000408000
direct allocation
page read and write
1FD16000
heap
page read and write
1D60006D0000
direct allocation
page read and write
7D0F000
unkown
page read and write
19327CF3000
unkown
page readonly
390E00407000
direct allocation
page read and write
7FF74B7D9000
unkown
page readonly
1D6000720000
direct allocation
page read and write
220A7000
heap
page read and write
9A8E000
stack
page read and write
2FDD000
unkown
page read and write
226746E1000
unkown
page readonly
7FF54BC0F000
unkown
page readonly
19A37D52000
unkown
page readonly
7CBF000
unkown
page read and write
1CCB0450000
heap
page read and write
8C0F000
unkown
page read and write
169B505F000
unkown
page readonly
7DAF000
stack
page read and write
AF3AFFE000
stack
page read and write
9B80000
unkown
page read and write
2306A0E2000
unkown
page readonly
2FAF000
unkown
page read and write
19A38535000
unkown
page readonly
390E00482000
direct allocation
page read and write
FCB11FF000
unkown
page read and write
4C7000
stack
page read and write
507400824000
direct allocation
page read and write
BE0B000
unkown
page read and write
7570000
unkown
page read and write
4472000
unkown
page read and write
226747D7000
unkown
page readonly
2267424C000
unkown
page readonly
28AF0260000
heap
page read and write
7FF54B80D000
unkown
page readonly
83E0000
unkown
page read and write
390E003C2000
direct allocation
page read and write
AA9B000
stack
page read and write
C104000
unkown
page read and write
AF7000
heap
page read and write
1D600065A000
direct allocation
page read and write
7FF54BDB9000
unkown
page readonly
1D6000694000
direct allocation
page read and write
19A37E12000
unkown
page readonly
22673CFF000
heap
page read and write
BC35000
unkown
page read and write
19A383BE000
unkown
page readonly
7CA6000
unkown
page read and write
390E00516000
direct allocation
page read and write
19325539000
heap
page read and write
9D27000
unkown
page read and write
558C000
unkown
page readonly
50740082C000
direct allocation
page read and write
5074003A0000
direct allocation
page read and write
19A35DDD000
heap
page read and write
390E004C2000
direct allocation
page read and write
20D64200000
heap
page read and write
23068180000
heap
page readonly
19327D2C000
unkown
page readonly
21BF5000
heap
page read and write
7205000
unkown
page read and write
A40C8FE000
stack
page read and write
19327500000
unkown
page readonly
A3B8000
unkown
page read and write
4DC2002E4000
direct allocation
page read and write
7F30000
unkown
page read and write
169B52C8000
unkown
page readonly
4DC200260000
direct allocation
page read and write
19A3846D000
unkown
page readonly
7FFEC82B0000
trusted library allocation
page read and write
B30000
heap
page read and write
582000
unkown
page readonly
1D6000648000
direct allocation
page read and write
7E13000
unkown
page read and write
2306A83C000
unkown
page readonly
7216000
unkown
page read and write
22679C21000
heap
page read and write
2267426D000
unkown
page readonly
193275E3000
unkown
page readonly
1D60006D0000
direct allocation
page read and write
7FF54B8BE000
unkown
page readonly
2CAB000
trusted library allocation
page read and write
7DF0000
unkown
page read and write
2FD6000
trusted library allocation
page read and write
19A37FD1000
unkown
page readonly
19327C0A000
unkown
page readonly
7FF54BE01000
unkown
page readonly
7FFEC8280000
trusted library allocation
page read and write
819D000
stack
page read and write
7FF54BDB1000
unkown
page readonly
2306A34A000
unkown
page readonly
226747E0000
heap
page read and write
19A37E84000
unkown
page readonly
9D04000
unkown
page read and write
1B4C3000
heap
page read and write
2306A875000
unkown
page readonly
2306AEC8000
unkown
page readonly
2306A7F2000
unkown
page readonly
22EDBA69000
heap
page read and write
70E1000
unkown
page read and write
7FF54BA2D000
unkown
page readonly
19327C62000
unkown
page readonly
1EE3DDE7000
heap
page read and write
7A1C000
unkown
page read and write
169B5803000
unkown
page readonly
1B190EC0000
heap
page read and write
284B5EB000
stack
page read and write
7FFEC80BB000
trusted library allocation
page execute and read and write
7FF54BC42000
unkown
page readonly
1B21E000
stack
page read and write
A40C5EC000
stack
page read and write
1055000
heap
page read and write
9C43000
unkown
page read and write
169B309F000
heap
page read and write
BE46000
unkown
page read and write
8947000
unkown
page read and write
7C4C000
unkown
page read and write
7C0000
heap
page read and write
14837FE000
stack
page read and write
193277A5000
unkown
page readonly
50740080C000
direct allocation
page read and write
7FF54B8B4000
unkown
page readonly
169B5304000
unkown
page readonly
169B5163000
unkown
page readonly
22671E00000
heap
page read and write
50740080C000
direct allocation
page read and write
390E00433000
direct allocation
page read and write
1294C000
trusted library allocation
page read and write
2306A803000
unkown
page readonly
A3D6000
unkown
page read and write
1B229380000
heap
page read and write
1D6000648000
direct allocation
page read and write
A7EEBFD000
stack
page read and write
BB10000
unkown
page readonly
AD0000
heap
page execute and read and write
23314A60000
heap
page read and write
2306A0B7000
unkown
page readonly
1A960000
trusted library allocation
page read and write
7B93000
unkown
page read and write
19A383C3000
unkown
page readonly
7FF54BE37000
unkown
page readonly
1BD6C000
heap
page read and write
158B1FE000
stack
page read and write
2306A900000
heap
page read and write
4DC2002A0000
direct allocation
page read and write
1932777C000
unkown
page readonly
390E00437000
direct allocation
page read and write
28AF0370000
heap
page read and write
5B206FF000
unkown
page read and write
2306AE7B000
unkown
page readonly
1D6000A7C000
direct allocation
page read and write
7FF74B87E000
unkown
page readonly
71DE000
unkown
page read and write
169B5052000
unkown
page readonly
1D60006D8000
direct allocation
page read and write
D8885FF000
stack
page read and write
1D91F000
heap
page read and write
1B190DC0000
heap
page read and write
4016003E0000
direct allocation
page read and write
2306A1D7000
unkown
page readonly
19327772000
unkown
page readonly
5FB6000
heap
page read and write
BBB2000
unkown
page read and write
22674725000
unkown
page readonly
1D42EB30000
heap
page read and write
6D5EBFE000
stack
page read and write
22674659000
unkown
page readonly
A9D0000
unkown
page read and write
169B52E3000
unkown
page readonly
1D600063A000
direct allocation
page read and write
22674777000
unkown
page readonly
19327CA3000
unkown
page readonly
1B2291C6000
heap
page read and write
7FF743F47000
unkown
page execute read
A44499D000
stack
page read and write
7B3E000
unkown
page read and write
22673CFA000
heap
page read and write
B59000
heap
page read and write
169B515E000
unkown
page readonly
1D6000640000
direct allocation
page read and write
1D6000650000
direct allocation
page read and write
7FF54B974000
unkown
page readonly
169B56E6000
unkown
page readonly
193275F4000
unkown
page readonly
1B765000
heap
page read and write
169B5197000
unkown
page readonly
1FB79900000
heap
page read and write
7FFEC8350000
trusted library allocation
page read and write
1D6000655000
direct allocation
page read and write
7FF54BC47000
unkown
page readonly
AF3AF7C000
stack
page read and write
4DC200361000
direct allocation
page read and write
226740F4000
unkown
page readonly
390E0049D000
direct allocation
page read and write
E6600300000
direct allocation
page read and write
401600A4C000
direct allocation
page read and write
50740035C000
direct allocation
page read and write
2267475D000
unkown
page readonly
BE90000
unkown
page read and write
19327B8D000
unkown
page readonly
5FA2000
heap
page read and write
710C000
unkown
page read and write
2267477F000
unkown
page readonly
2D8C000
unkown
page readonly
AFF000
heap
page read and write
1D60006D8000
direct allocation
page read and write
7BB6000
unkown
page read and write
230681D0000
heap
page read and write
7FFEC8340000
trusted library allocation
page read and write
1D6000638000
direct allocation
page read and write
19A3841E000
unkown
page readonly
9F0000
heap
page read and write
2920000
heap
page read and write
6D643FE000
stack
page read and write
7C10000
unkown
page read and write
1D932000
heap
page read and write
7FFEC83D0000
trusted library allocation
page read and write
19A383B1000
unkown
page readonly
1D7F9000
heap
page read and write
19327507000
unkown
page readonly
5074003EE000
direct allocation
page read and write
22673DFD000
unclassified section
page readonly
7FF54B9BE000
unkown
page readonly
507400844000
direct allocation
page read and write
169B581C000
unkown
page readonly
4016003E4000
direct allocation
page read and write
D8825FE000
stack
page read and write
50740031C000
direct allocation
page read and write
728D000
unkown
page read and write
1B9C1000
stack
page read and write
2306A80B000
unkown
page readonly
7FFEC8150000
trusted library allocation
page execute and read and write
1932758B000
unkown
page readonly
829E000
stack
page read and write
BF2C5AF000
stack
page read and write
2FCD000
unkown
page read and write
22674070000
unkown
page readonly
2306A755000
unkown
page readonly
2306A0E8000
unkown
page readonly
5D5E000
stack
page read and write
2CEEC1D8000
heap
page read and write
8C8A000
stack
page read and write
7D00000
unkown
page read and write
22074000
heap
page read and write
19A37DC6000
unkown
page readonly
22673FA1000
unkown
page readonly
226747DB000
unkown
page readonly
1D600063C000
direct allocation
page read and write
8A07000
unkown
page read and write
1D60006E8000
direct allocation
page read and write
7FF54BDA1000
unkown
page readonly
50740080C000
direct allocation
page read and write
2306A935000
heap
page read and write
19A38555000
unkown
page readonly
5D00000
heap
page read and write
1B190DC9000
heap
page read and write
7FF54B811000
unkown
page readonly
BED5000
unkown
page read and write
169B52C3000
unkown
page readonly
255BCAD0000
heap
page read and write
22674253000
unkown
page readonly
22673F64000
unkown
page readonly
5074003E8000
direct allocation
page read and write
7FFEC80AB000
trusted library allocation
page read and write
7FF54BCA9000
unkown
page readonly
401600408000
direct allocation
page read and write
230682E1000
heap
page read and write
226747CD000
unkown
page readonly
19327C5D000
unkown
page readonly
19A38423000
unkown
page readonly
5074003AC000
direct allocation
page read and write
169B30A8000
heap
page read and write
68E8D5C000
stack
page read and write
79E5000
unkown
page read and write
FF42000
unkown
page read and write
3B0000
unkown
page readonly
7B89000
unkown
page read and write
A7E73FE000
stack
page read and write
4DC200330000
direct allocation
page read and write
5CE3000
heap
page read and write
70D4000
unkown
page read and write
5F70000
heap
page read and write
2306A934000
heap
page read and write
390E0049F000
direct allocation
page read and write
169B5090000
unkown
page readonly
2306A92A000
heap
page read and write
7ADA000
unkown
page read and write
19A383D1000
unkown
page readonly
5074003A4000
direct allocation
page read and write
E80000
heap
page read and write
226740C2000
unkown
page readonly
2306A880000
unkown
page readonly
1D60006D0000
direct allocation
page read and write
722F000
unkown
page read and write
390E00282000
direct allocation
page read and write
21B86000
heap
page read and write
9D10000
unkown
page read and write
BC78000
unkown
page read and write
7FF54B68E000
unkown
page readonly
50740080C000
direct allocation
page read and write
7FFEC8280000
trusted library allocation
page read and write
BE8B000
unkown
page read and write
169B5768000
unkown
page readonly
1B7B6000
heap
page read and write
70CC000
unkown
page read and write
20D64355000
heap
page read and write
1D60006B0000
direct allocation
page read and write
1D60006BE000
direct allocation
page read and write
2306A0D9000
unkown
page readonly
169B5073000
unkown
page readonly
7C1F000
unkown
page read and write
1D6000648000
direct allocation
page read and write
19A3850A000
unkown
page readonly
7B4E000
stack
page read and write
50740035C000
direct allocation
page read and write
5074003A8000
direct allocation
page read and write
19A37A30000
unkown
page readonly
7FF54B86C000
unkown
page readonly
2306A760000
unkown
page readonly
158E1FE000
stack
page read and write
7FF54BC88000
unkown
page readonly
19A37E0E000
unkown
page readonly
2F66000
unkown
page read and write
390E00502000
direct allocation
page read and write
8AC2000
unkown
page read and write
6D623FE000
stack
page read and write
1932760B000
unkown
page readonly
7D82000
unkown
page read and write
232E2960000
heap
page read and write
12860000
trusted library allocation
page read and write
4DC200314000
direct allocation
page read and write
2306A18A000
unkown
page readonly
2306A218000
unkown
page readonly
193274BA000
unkown
page readonly
19327CBC000
unkown
page readonly
19A37DAD000
unkown
page readonly
7FF54BC5B000
unkown
page readonly
71E9000
unkown
page read and write
12951000
trusted library allocation
page read and write
2267493E000
heap
page read and write
5074003A8000
direct allocation
page read and write
7D96000
unkown
page read and write
226747C8000
unkown
page readonly
7FFEC82F0000
trusted library allocation
page read and write
19A37DE4000
unkown
page readonly
1D925000
heap
page read and write
19A37D45000
unkown
page readonly
7AAD000
unkown
page read and write
A7F8000
stack
page read and write
7639000
unkown
page read and write
169B530E000
unkown
page readonly
19A384CA000
unkown
page readonly
E66002E8000
direct allocation
page read and write
22673FAF000
unkown
page readonly
169B2FA0000
heap
page readonly
390E0034A000
direct allocation
page read and write
4DC2002F4000
direct allocation
page read and write
899C000
unkown
page read and write
1D6000668000
direct allocation
page read and write
5074008E4000
direct allocation
page read and write
8857000
unkown
page read and write
22674639000
unkown
page readonly
169B5842000
unkown
page readonly
507400398000
direct allocation
page read and write
2306A867000
unkown
page readonly
727B000
unkown
page read and write
390E002C2000
direct allocation
page read and write
599B000
stack
page read and write
7E0000
heap
page read and write
7E04000
unkown
page read and write
2306A14A000
unkown
page readonly
7A94000
unkown
page read and write
1B190DD3000
heap
page read and write
D8A6B7E000
stack
page read and write
2931000
trusted library allocation
page read and write
22674603000
unkown
page readonly
877C000
unkown
page read and write
2306A0DD000
unkown
page readonly
5074003D4000
direct allocation
page read and write
8010000
unkown
page read and write
19A387F0000
unkown
page readonly
169B511B000
unkown
page readonly
2306A383000
unkown
page readonly
A3B8000
unkown
page read and write
19A3854F000
unkown
page readonly
A7E8BFE000
stack
page read and write
169B5AEB000
unkown
page readonly
3016000
unkown
page read and write
19327CE9000
unkown
page readonly
169B4EA0000
heap
page read and write
19327CF9000
unkown
page readonly
1FB79C40000
heap
page read and write
507400824000
direct allocation
page read and write
5CDF000
heap
page read and write
1D60006D0000
direct allocation
page read and write
22673FCF000
unkown
page readonly
226746F9000
unkown
page readonly
7FF54B913000
unkown
page readonly
7FF54B84C000
unkown
page readonly
722A000
unkown
page read and write
399D00382000
direct allocation
page read and write
7108000
unkown
page read and write
19327BB0000
unkown
page readonly
2306A147000
unkown
page readonly
158C1FE000
stack
page read and write
14857FE000
stack
page read and write
50740064C000
direct allocation
page read and write
3EEE5FE000
unkown
page read and write
169B4FD1000
unkown
page readonly
FCB12FE000
stack
page read and write
161A2D80000
heap
page read and write
7FF54B634000
unkown
page readonly
7C88000
unkown
page read and write
284BC930000
heap
page read and write
169B3084000
heap
page read and write
9D1D000
unkown
page read and write
19327565000
unkown
page readonly
7CFB000
unkown
page read and write
19A38433000
unkown
page readonly
711C000
unkown
page read and write
2306A1BD000
unkown
page readonly
212DF425000
heap
page read and write
7C33000
unkown
page read and write
22679CB1000
heap
page read and write
FCB10FC000
stack
page read and write
19A37D2E000
unkown
page readonly
226747A0000
unkown
page readonly
1932755A000
unkown
page readonly
C12A000
unkown
page read and write
B87000
heap
page read and write
50740082C000
direct allocation
page read and write
1D6000640000
direct allocation
page read and write
19A37CB8000
unkown
page readonly
22674748000
unkown
page readonly
19A37D04000
unkown
page readonly
E6600394000
direct allocation
page read and write
7FF54BDFB000
unkown
page readonly
B8B000
heap
page read and write
284BC690000
heap
page read and write
BCBC000
unkown
page read and write
1D600062E000
direct allocation
page read and write
A7EF3FF000
stack
page read and write
232E2990000
heap
page read and write
19A38539000
unkown
page readonly
2306A94C000
heap
page read and write
226748E1000
heap
page read and write
22674644000
unkown
page readonly
5074003A0000
direct allocation
page read and write
4016006A8000
direct allocation
page read and write
19327350000
heap
page read and write
2306A7D4000
unkown
page readonly
200D1C00000
heap
page read and write
15119AB0000
heap
page read and write
BE7000
heap
page read and write
255BCB4B000
heap
page read and write
7A35000
unkown
page read and write
884B000
unkown
page read and write
B58000
heap
page read and write
22673D66000
unclassified section
page readonly
79EA000
unkown
page read and write
1D760000
heap
page read and write
293BE369000
heap
page read and write
169B5AAA000
unkown
page readonly
2306A175000
unkown
page readonly
1000E000
unkown
page read and write
2306A77A000
unkown
page readonly
19327360000
unkown
page readonly
169B574F000
unkown
page readonly
7FFEC83B0000
trusted library allocation
page read and write
19327B83000
unkown
page readonly
169B4E04000
unkown
page readonly
CA7E3CD000
stack
page read and write
169B5818000
unkown
page readonly
169B3092000
heap
page read and write
401600820000
direct allocation
page read and write
19A37EF5000
unkown
page readonly
193275EF000
unkown
page readonly
2620000
heap
page read and write
7FF54B827000
unkown
page readonly
22674668000
unkown
page readonly
28FE000
stack
page read and write
151197F0000
heap
page read and write
7FF54BCAD000
unkown
page readonly
19327CC5000
unkown
page readonly
7FD0000
heap
page read and write
151198AB000
heap
page read and write
2306828B000
heap
page read and write
7FF74B961000
unkown
page readonly
7FF54B864000
unkown
page readonly
19A35CE0000
heap
page read and write
22EDB970000
heap
page read and write
26250800000
heap
page read and write
28AF0240000
heap
page read and write
A7F53FD000
stack
page read and write
19327C24000
unkown
page readonly
896B000
unkown
page read and write
40160063C000
direct allocation
page read and write
2306A87C000
unkown
page readonly
71BE000
unkown
page read and write
2306A92E000
heap
page read and write
871C000
unkown
page read and write
1B3AF000
stack
page read and write
3EEE6FF000
stack
page read and write
2306AEBC000
unkown
page readonly
88A5000
unkown
page read and write
1D6000D0C000
direct allocation
page read and write
2306A94C000
heap
page read and write
23314A00000
heap
page read and write
2E40000
unkown
page read and write
75E0000
unkown
page readonly
978D000
stack
page read and write
1D8D5000
heap
page read and write
70BF000
unkown
page read and write
1EE3E120000
heap
page read and write
14877FF000
stack
page read and write
8AF3000
unkown
page read and write
1D60006D8000
direct allocation
page read and write
1D6000A40000
direct allocation
page read and write
193276BE000
unkown
page readonly
18B935E0000
heap
page read and write
7E09000
unkown
page read and write
28AF0093000
heap
page read and write
390E004CB000
direct allocation
page read and write
885B000
unkown
page read and write
2306A0A2000
unkown
page readonly
2306A8FE000
unkown
page readonly
226746D0000
unkown
page readonly
E66002F4000
direct allocation
page read and write
608EBEC000
stack
page read and write
12938000
trusted library allocation
page read and write
169B587A000
unkown
page readonly
1D60006D0000
direct allocation
page read and write
2306A750000
unkown
page readonly
2CEEC435000
heap
page read and write
262506A0000
heap
page read and write
5074003A8000
direct allocation
page read and write
5074003AC000
direct allocation
page read and write
71FF000
unkown
page read and write
9BA6000
unkown
page read and write
BACE000
stack
page read and write
A7EA3FC000
stack
page read and write
74710FE000
unkown
page read and write
CAE000
stack
page read and write
58A000
unkown
page write copy
19A384DE000
unkown
page readonly
96DC000
stack
page read and write
507400824000
direct allocation
page read and write
169B56AB000
unkown
page readonly
1D60006B0000
direct allocation
page read and write
BC1C000
unkown
page read and write
7FF54B882000
unkown
page readonly
88A9000
unkown
page read and write
7FF54B68B000
unkown
page readonly
19327D13000
unkown
page readonly
28AF0050000
heap
page read and write
1135000
unkown
page readonly
1D6000650000
direct allocation
page read and write
19A37F9F000
unkown
page readonly
399D00342000
direct allocation
page read and write
7FF54BB86000
unkown
page readonly
7FF54BC7C000
unkown
page readonly
1D600063C000
direct allocation
page read and write
22826810000
heap
page read and write
B40000
trusted library allocation
page read and write
A30000
heap
page read and write
B50000
heap
page read and write
1D60006B8000
direct allocation
page read and write
230682E7000
heap
page read and write
7DF44C901000
unkown
page execute read
1D60006E8000
direct allocation
page read and write
755A000
unkown
page read and write
169B50F2000
unkown
page readonly
1B229350000
heap
page read and write
9354000
unkown
page read and write
169B4FC0000
unkown
page readonly
6F20000
unkown
page read and write
151198C4000
heap
page read and write
2306A8F1000
unkown
page readonly
2306A195000
unkown
page readonly
BB50000
unkown
page read and write
1D8B7000
heap
page read and write
1D600063A000
direct allocation
page read and write
1D6000750000
direct allocation
page read and write
7BBB000
unkown
page read and write
7D37000
unkown
page read and write
5D9E000
stack
page read and write
169B5047000
unkown
page readonly
2267468B000
unkown
page readonly
40160081C000
direct allocation
page read and write
A3CF000
unkown
page read and write
1D60007DC000
direct allocation
page read and write
169B2FF0000
heap
page read and write
1BD8C000
heap
page read and write
1111000
unkown
page readonly
9C3F000
unkown
page read and write
E82000
stack
page read and write
FFC6000
unkown
page read and write
7C8D000
unkown
page read and write
7FF54B8C4000
unkown
page readonly
70BB000
unkown
page read and write
1FE30000
heap
page read and write
4016006B8000
direct allocation
page read and write
226746A9000
unkown
page readonly
5074003A4000
direct allocation
page read and write
169B57C3000
unkown
page readonly
1C52F644000
heap
page read and write
1D6000A0C000
direct allocation
page read and write
276055E0000
heap
page read and write
7FF54B690000
unkown
page readonly
2306A92F000
heap
page read and write
7FF746747000
unkown
page execute read
5074003A4000
direct allocation
page read and write
230680A0000
heap
page read and write
1D6000A0C000
direct allocation
page read and write
BE9E000
unkown
page read and write
7FF54BA14000
unkown
page readonly
7FF54B8C0000
unkown
page readonly
21C06000
heap
page read and write
169B5870000
unkown
page readonly
D881DFE000
stack
page read and write
7BFF000
unkown
page read and write
1932750C000
unkown
page readonly
7520000
unkown
page read and write
446C000
unkown
page read and write
8718000
unkown
page read and write
28A6000
trusted library allocation
page read and write
DE212FE000
stack
page read and write
7147000
unkown
page read and write
4016006DE000
direct allocation
page read and write
1D6000A48000
direct allocation
page read and write
2306A89A000
unkown
page readonly
50740082C000
direct allocation
page read and write
50740082C000
direct allocation
page read and write
19A37DF8000
unkown
page readonly
2306A170000
unkown
page readonly
1D600063A000
direct allocation
page read and write
2306A1DC000
unkown
page readonly
FFCB000
unkown
page read and write
21BC3000
heap
page read and write
105C000
heap
page read and write
169B3080000
heap
page read and write
22673BFF000
trusted library allocation
page read and write
4016006D4000
direct allocation
page read and write
22673FEB000
unkown
page readonly
2267408A000
unkown
page readonly
7CA1000
unkown
page read and write
1BD35000
heap
page read and write
22674934000
heap
page read and write
7D73000
unkown
page read and write
7FF54BCFF000
unkown
page readonly
150B1299000
heap
page read and write
1D60006D0000
direct allocation
page read and write
BEC2000
unkown
page read and write
50740082C000
direct allocation
page read and write
1D42E9B0000
heap
page read and write
1050000
heap
page read and write
1D6000632000
direct allocation
page read and write
228265A0000
heap
page read and write
7FF74A347000
unkown
page execute read
7FF54B695000
unkown
page readonly
1C52F647000
heap
page read and write
22EDBA60000
heap
page read and write
401600811000
direct allocation
page read and write
BE7F000
unkown
page read and write
20D64350000
heap
page read and write
4DC2003A8000
direct allocation
page read and write
20DD7000
heap
page read and write
616F000
stack
page read and write
22674220000
unkown
page readonly
7A55000
unkown
page read and write
200D1A50000
heap
page read and write
2306A92F000
heap
page read and write
7FF54B7D1000
unkown
page readonly
2306A2A1000
unkown
page readonly
1D60006D8000
direct allocation
page read and write
22674911000
heap
page read and write
AF8000
heap
page read and write
169B5136000
unkown
page readonly
7FFEC80B0000
trusted library allocation
page read and write
390E00426000
direct allocation
page read and write
22679D2F000
heap
page read and write
4DC200270000
direct allocation
page read and write
7D05000
unkown
page read and write
7D0A000
unkown
page read and write
169B3037000
heap
page read and write
7B0C000
unkown
page read and write
169B5140000
unkown
page readonly
169B5735000
unkown
page readonly
7FF54B9CC000
unkown
page readonly
B7D000
heap
page read and write
1932753A000
unkown
page readonly
7FFEC8277000
trusted library allocation
page read and write
284BC740000
heap
page read and write
7DA0000
unkown
page read and write
200D1A70000
heap
page read and write
1D6000650000
direct allocation
page read and write
A3DB000
unkown
page read and write
BE94000
unkown
page read and write
2F99000
unkown
page read and write
AA10000
unkown
page readonly
A7B000
stack
page read and write
7C92000
unkown
page read and write
1CCB0480000
heap
page read and write
50740035E000
direct allocation
page read and write
19A37E41000
unkown
page readonly
22674008000
unkown
page readonly
2306A08F000
unkown
page readonly
6D5FBFE000
stack
page read and write
2EAD000
trusted library allocation
page read and write
284F000
stack
page read and write
1B72C000
heap
page read and write
4DC2003A4000
direct allocation
page read and write
2FE4000
unkown
page read and write
720A000
unkown
page read and write
7C42000
unkown
page read and write
BA8000
heap
page read and write
7FF54BE46000
unkown
page readonly
2F53000
stack
page read and write
6D5F3FE000
stack
page read and write
4769F8C000
stack
page read and write
19327C92000
unkown
page readonly
1D60003B8000
direct allocation
page read and write
169B57EB000
unkown
page readonly
2306AEA2000
unkown
page readonly
7A30000
unkown
page read and write
19327CA6000
unkown
page readonly
7BAC000
unkown
page read and write
2306A77F000
unkown
page readonly
293BE371000
heap
page read and write
169B584F000
unkown
page readonly
1D6000660000
direct allocation
page read and write
19A38446000
unkown
page readonly
7267000
unkown
page read and write
2FEA000
unkown
page read and write
7FF748F47000
unkown
page execute read
BE3000
heap
page read and write
4DC20033C000
direct allocation
page read and write
2306A92E000
heap
page read and write
19327516000
unkown
page readonly
7FF54B82D000
unkown
page readonly
4DC20035D000
direct allocation
page read and write
401600680000
direct allocation
page read and write
CA7E6FE000
unkown
page read and write
19A38449000
unkown
page readonly
A7F6BFF000
stack
page read and write
19A37D01000
unkown
page readonly
7FF54BE1F000
unkown
page readonly
19A387A8000
unkown
page readonly
7618000
unkown
page read and write
19A38469000
unkown
page readonly
68E907E000
stack
page read and write
887F000
unkown
page read and write
7FF54BC69000
unkown
page readonly
401600730000
direct allocation
page read and write
7C29000
unkown
page read and write
169B5731000
unkown
page readonly
7FF54BD99000
unkown
page readonly
1B2291A7000
heap
page read and write
1D60007DC000
direct allocation
page read and write
150B1580000
heap
page read and write
7FF54B90A000
unkown
page readonly
9CF5000
unkown
page read and write
50740084C000
direct allocation
page read and write
1B2291C4000
heap
page read and write
7FF54BB55000
unkown
page readonly
507400824000
direct allocation
page read and write
2306A0A8000
unkown
page readonly
7FF54BB7C000
unkown
page readonly
2306A06C000
unkown
page readonly
A97D000
stack
page read and write
6D6000
stack
page read and write
401600614000
direct allocation
page read and write
1D6000720000
direct allocation
page read and write
1BDD87BA000
heap
page read and write
22671E40000
heap
page read and write
50740039C000
direct allocation
page read and write
4016006E0000
direct allocation
page read and write
7FF54BD71000
unkown
page readonly
200D1974000
heap
page read and write
2306AEE4000
unkown
page readonly
19327B9C000
unkown
page readonly
5F7A000
heap
page read and write
7FF54BE69000
unkown
page readonly
7FF54B7A6000
unkown
page readonly
169B50FD000
unkown
page readonly
2306A7F6000
unkown
page readonly
19327C38000
unkown
page readonly
28B77CC5000
heap
page read and write
19A3845B000
unkown
page readonly
3B0000
unkown
page readonly
7F50000
unkown
page read and write
19A37D25000
unkown
page readonly
B9D000
heap
page read and write
1D60006B8000
direct allocation
page read and write
C19B000
unkown
page read and write
19A3851F000
unkown
page readonly
3041000
unkown
page read and write
5074003D4000
direct allocation
page read and write
22674792000
unkown
page readonly
BC3F000
unkown
page read and write
19327C1F000
unkown
page readonly
19A383C8000
unkown
page readonly
87B8000
unkown
page read and write
84AF000
stack
page read and write
23A1E000
stack
page read and write
4DC200234000
direct allocation
page read and write
21C0B000
heap
page read and write
169B5874000
unkown
page readonly
7FF54B81E000
unkown
page readonly
28B77CC0000
heap
page read and write
79AE000
unkown
page read and write
1B4B0000
heap
page read and write
7988000
stack
page read and write
399D00442000
direct allocation
page read and write
5CB8000
heap
page read and write
19A3842E000
unkown
page readonly
EA0000
heap
page read and write
19A38453000
unkown
page readonly
70D2000
unkown
page read and write
2306A09D000
unkown
page readonly
23314990000
heap
page read and write
83F0000
unkown
page read and write
292B000
heap
page read and write
22674739000
unkown
page readonly
8713000
unkown
page read and write
7228000
unkown
page read and write
169B50E8000
unkown
page readonly
636F000
stack
page read and write
1B2292A0000
heap
page read and write
2306A29C000
unkown
page readonly
70DB000
unkown
page read and write
14887FC000
stack
page read and write
79C2000
unkown
page read and write
7FF54BC17000
unkown
page readonly
7D8C000
unkown
page read and write
22674049000
unkown
page readonly
A7F83FF000
stack
page read and write
2C6E000
stack
page read and write
22674721000
unkown
page readonly
1CCB06C0000
heap
page read and write
19A38545000
unkown
page readonly
CA7E7FE000
stack
page read and write
169B505A000
unkown
page readonly
7E0E000
unkown
page read and write
22061000
heap
page read and write
BC9000
heap
page read and write
390E00485000
direct allocation
page read and write
1D60006E0000
direct allocation
page read and write
5074003A4000
direct allocation
page read and write
2267474C000
unkown
page readonly
8B89000
stack
page read and write
1D60003C0000
direct allocation
page read and write
4476000
unkown
page read and write
169B50D0000
unkown
page readonly
19327B97000
unkown
page readonly
169B5AF3000
unkown
page readonly
7106000
unkown
page read and write
A3C2000
unkown
page read and write
1D6000720000
direct allocation
page read and write
5074003A4000
direct allocation
page read and write
AD0000
heap
page read and write
88A1000
unkown
page read and write
19327C99000
unkown
page readonly
1486FFE000
stack
page read and write
2267422B000
unkown
page readonly
7FF54B8B9000
unkown
page readonly
22674714000
unkown
page readonly
22674751000
unkown
page readonly
5074003A8000
direct allocation
page read and write
19A384F9000
unkown
page readonly
284B8FE000
unkown
page read and write
169B50C0000
unkown
page readonly
1D60006B8000
direct allocation
page read and write
7FF54BAF8000
unkown
page readonly
AF18000
stack
page read and write
169B576C000
unkown
page readonly
7FFEC80B4000
trusted library allocation
page read and write
19A387EE000
unkown
page readonly
50740082C000
direct allocation
page read and write
1CCB0875000
heap
page read and write
200D195B000
heap
page read and write
19A37D56000
unkown
page readonly
40160061C000
direct allocation
page read and write
7FF74B7CE000
unkown
page readonly
1932748A000
unkown
page readonly
1B2290B0000
heap
page read and write
7237000
unkown
page read and write
87FA000
unkown
page read and write
7FF54BD6D000
unkown
page readonly
2306A933000
heap
page read and write
BE65000
unkown
page read and write
8AAF000
unkown
page read and write
169B50F6000
unkown
page readonly
7FF74C233000
unkown
page readonly
1D60006B0000
direct allocation
page read and write
19A3880A000
unkown
page readonly
7FF54BD94000
unkown
page readonly
AC2000
unkown
page readonly
169B5757000
unkown
page readonly
1EE3DFB0000
heap
page read and write
8526000
unkown
page read and write
8913000
unkown
page read and write
BDC000
heap
page read and write
2306A935000
heap
page read and write
169B5858000
unkown
page readonly
899F000
unkown
page read and write
390E00402000
direct allocation
page read and write
15119A80000
heap
page read and write
19327792000
unkown
page readonly
226747C0000
unkown
page readonly
1D60006C0000
direct allocation
page read and write
1D6000CE8000
direct allocation
page read and write
6D61BFD000
stack
page read and write
390E004A6000
direct allocation
page read and write
1D60003B4000
direct allocation
page read and write
1B48F000
stack
page read and write
19327BE7000
unkown
page readonly
2306A12B000
unkown
page readonly
2871000
trusted library allocation
page read and write
23068225000
heap
page read and write
2F7F000
unkown
page read and write
9BC5000
unkown
page read and write
22673F7E000
unkown
page readonly
226746C2000
unkown
page readonly
15911FE000
stack
page read and write
5074003A4000
direct allocation
page read and write
BC51000
unkown
page read and write
7FFEC8092000
trusted library allocation
page read and write
22673D6D000
unclassified section
page readonly
19A38801000
unkown
page readonly
390E004B8000
direct allocation
page read and write
2306A926000
heap
page read and write
507400350000
direct allocation
page read and write
226747AA000
unkown
page readonly
2306820C000
trusted library section
page readonly
2FD8000
unkown
page read and write
161A2D70000
heap
page read and write
1D60006E0000
direct allocation
page read and write
7FF54BDAB000
unkown
page readonly
799B000
unkown
page read and write
7FF54BA1A000
unkown
page readonly
There are 3595 hidden memdumps, click here to show them.