IOC Report
lv961v43L3.exe

loading gif

Files

File Path
Type
Category
Malicious
lv961v43L3.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\apERZQztEJsqymITPFxguVe.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\apERZQztEJsqymITPFxguVe.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Default\SystemSettings.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\SystemSettings.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\lv961v43L3.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\0sgqdguv\0sgqdguv.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rjP0QDXGdr.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\BQDZBqHE.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\Babyelsr.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CEHhnDDC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\DBipIDSx.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ExWQYAoA.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\Gnkizmcn.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\HkLqVmri.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\HrZgPASq.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KdaYGjcg.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KzWplSMm.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\LRfgsxYe.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\MnaxWgIk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OpNfsPNf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\QaswzdXY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\SzzvMtRI.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\UQjmGZYR.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\XuBMTZHB.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\aBctEWCA.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\aJMMjFdF.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\blrDaWHv.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ciTLwWWp.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ekFuRFbl.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\erTkMTCt.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\gBplMliu.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jFctadEf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\kTLTKyNc.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\kjvJoyHh.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ksfcTiin.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\oTYKBhgS.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\pHdSnvcQ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rJPAIehM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\sVoRDbyU.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\vzGrPbhF.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\xIFQfYNI.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\yGhYBYcD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\yHDAltbA.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ysVaBXSD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zpwiWXhy.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Branding\shellbrd\apERZQztEJsqymITPFxguVe.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\System32\SecurityHealthSystray.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\assembly\GAC_32\System.Data.OracleClient\StartMenuExperienceHost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\assembly\GAC_32\System.Data.OracleClient\StartMenuExperienceHost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\bcastdvr\apERZQztEJsqymITPFxguVe.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\CSC7685716E115C40A19F7FCCC6DF33F58B.TMP
MSVC .res
dropped
C:\Recovery\7b23a8b4123990
ASCII text, with very long lines (596), with no line terminators
dropped
C:\Users\Default\9e60a5f7a3bd80
ASCII text, with very long lines (615), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\StartMenuExperienceHost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SystemSettings.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\apERZQztEJsqymITPFxguVe.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\0sgqdguv\0sgqdguv.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\0sgqdguv\0sgqdguv.out
Unicode text, UTF-8 (with BOM) text, with very long lines (346), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\10rvn1je\10rvn1je.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Temp\10rvn1je\10rvn1je.cmdline
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\10rvn1je\10rvn1je.out
Unicode text, UTF-8 (with BOM) text, with very long lines (331), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\2e3777aa9f8e813616590df35047cd9710d88b08
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\PElAqcNNWD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\RES71E1.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6d0, 10 symbols, created Fri Oct 11 00:41:55 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\RES73C6.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6e8, 10 symbols, created Fri Oct 11 00:41:55 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\TNlmI3foeW
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\b8uDE6ZpY0
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\hJL2wRYIJN
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\hzSiynbOWa
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\jmWZu0Jun8
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\lWstwPVe1A
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\osksi0eFxJ
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\pnFbDzPnWC
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\rvIb6rk5gH
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\t5d8vVvuo7
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tVxnDAeWHD
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\wSV99wd4ly
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\Desktop\459732b66deb3d
ASCII text, with very long lines (871), with no line terminators
dropped
C:\Windows\Branding\shellbrd\7b23a8b4123990
ASCII text, with very long lines (553), with no line terminators
dropped
C:\Windows\Branding\shellbrd\apERZQztEJsqymITPFxguVe.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\CSCCFFE6734440C4D2883932D483985654.TMP
MSVC .res
dropped
C:\Windows\assembly\GAC_32\System.Data.OracleClient\55b276f4edf653
ASCII text, with no line terminators
dropped
C:\Windows\bcastdvr\7b23a8b4123990
ASCII text, with very long lines (901), with no line terminators
dropped
C:\Windows\bcastdvr\apERZQztEJsqymITPFxguVe.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text
dropped
There are 77 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\lv961v43L3.exe
"C:\Users\user\Desktop\lv961v43L3.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "apERZQztEJsqymITPFxguVea" /sc MINUTE /mo 7 /tr "'C:\Windows\Branding\shellbrd\apERZQztEJsqymITPFxguVe.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "apERZQztEJsqymITPFxguVe" /sc ONLOGON /tr "'C:\Windows\Branding\shellbrd\apERZQztEJsqymITPFxguVe.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "apERZQztEJsqymITPFxguVea" /sc MINUTE /mo 7 /tr "'C:\Windows\Branding\shellbrd\apERZQztEJsqymITPFxguVe.exe'" /rl HIGHEST /f
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0sgqdguv\0sgqdguv.cmdline"
malicious
C:\Windows\Branding\shellbrd\apERZQztEJsqymITPFxguVe.exe
C:\Windows\Branding\shellbrd\apERZQztEJsqymITPFxguVe.exe
malicious
C:\Windows\Branding\shellbrd\apERZQztEJsqymITPFxguVe.exe
C:\Windows\Branding\shellbrd\apERZQztEJsqymITPFxguVe.exe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\10rvn1je\10rvn1je.cmdline"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "apERZQztEJsqymITPFxguVea" /sc MINUTE /mo 6 /tr "'C:\Recovery\apERZQztEJsqymITPFxguVe.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "apERZQztEJsqymITPFxguVe" /sc ONLOGON /tr "'C:\Recovery\apERZQztEJsqymITPFxguVe.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "apERZQztEJsqymITPFxguVea" /sc MINUTE /mo 10 /tr "'C:\Recovery\apERZQztEJsqymITPFxguVe.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "apERZQztEJsqymITPFxguVea" /sc MINUTE /mo 6 /tr "'C:\Windows\bcastdvr\apERZQztEJsqymITPFxguVe.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "apERZQztEJsqymITPFxguVe" /sc ONLOGON /tr "'C:\Windows\bcastdvr\apERZQztEJsqymITPFxguVe.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "apERZQztEJsqymITPFxguVea" /sc MINUTE /mo 10 /tr "'C:\Windows\bcastdvr\apERZQztEJsqymITPFxguVe.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Windows\assembly\GAC_32\System.Data.OracleClient\StartMenuExperienceHost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\assembly\GAC_32\System.Data.OracleClient\StartMenuExperienceHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 13 /tr "'C:\Windows\assembly\GAC_32\System.Data.OracleClient\StartMenuExperienceHost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemSettingsS" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\SystemSettings.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemSettings" /sc ONLOGON /tr "'C:\Users\Default User\SystemSettings.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemSettingsS" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\SystemSettings.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "lv961v43L3l" /sc MINUTE /mo 11 /tr "'C:\Users\user\Desktop\lv961v43L3.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "lv961v43L3" /sc ONLOGON /tr "'C:\Users\user\Desktop\lv961v43L3.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "lv961v43L3l" /sc MINUTE /mo 8 /tr "'C:\Users\user\Desktop\lv961v43L3.exe'" /rl HIGHEST /f
malicious
C:\Users\user\Desktop\lv961v43L3.exe
C:\Users\user\Desktop\lv961v43L3.exe
malicious
C:\Users\user\Desktop\lv961v43L3.exe
C:\Users\user\Desktop\lv961v43L3.exe
malicious
C:\Windows\assembly\GAC_32\System.Data.OracleClient\StartMenuExperienceHost.exe
C:\Windows\assembly\GAC_32\System.Data.OracleClient\StartMenuExperienceHost.exe
malicious
C:\Windows\assembly\GAC_32\System.Data.OracleClient\StartMenuExperienceHost.exe
C:\Windows\assembly\GAC_32\System.Data.OracleClient\StartMenuExperienceHost.exe
malicious
C:\Users\Default\SystemSettings.exe
"C:\Users\Default User\SystemSettings.exe"
malicious
C:\Users\Default\SystemSettings.exe
"C:\Users\Default User\SystemSettings.exe"
malicious
C:\Users\user\Desktop\lv961v43L3.exe
"C:\Users\user\Desktop\lv961v43L3.exe"
malicious
C:\Windows\bcastdvr\apERZQztEJsqymITPFxguVe.exe
"C:\Windows\bcastdvr\apERZQztEJsqymITPFxguVe.exe"
malicious
C:\Windows\assembly\GAC_32\System.Data.OracleClient\StartMenuExperienceHost.exe
"C:\Windows\assembly\GAC_32\System.Data.OracleClient\StartMenuExperienceHost.exe"
malicious
C:\Users\Default\SystemSettings.exe
"C:\Users\Default User\SystemSettings.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES71E1.tmp" "c:\Program Files (x86)\Microsoft\Edge\Application\CSC7685716E115C40A19F7FCCC6DF33F58B.TMP"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES73C6.tmp" "c:\Windows\System32\CSCCFFE6734440C4D2883932D483985654.TMP"
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\rjP0QDXGdr.bat"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
There are 31 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://863811cm.nyafka.top
unknown
malicious
http://863811cm.nyafka.top/video_RequestpacketUpdategeneratorPublic.php
188.114.96.3
malicious
http://863811cm.nyafka.top/
unknown
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
863811cm.nyafka.top
188.114.96.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
863811cm.nyafka.top
European Union
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
apERZQztEJsqymITPFxguVe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
StartMenuExperienceHost
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
StartMenuExperienceHost
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SystemSettings
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
lv961v43L3
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
lv961v43L3
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
apERZQztEJsqymITPFxguVe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
apERZQztEJsqymITPFxguVe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
apERZQztEJsqymITPFxguVe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASMANCS
FileDirectory
There are 22 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
42000
unkown
page readonly
malicious
3DD3000
trusted library allocation
page read and write
malicious
3B19000
trusted library allocation
page read and write
malicious
37B2000
trusted library allocation
page read and write
malicious
12641000
trusted library allocation
page read and write
malicious
35B9000
trusted library allocation
page read and write
malicious
3904000
trusted library allocation
page read and write
malicious
1B79E000
heap
page read and write
A00000
heap
page read and write
7A4000
heap
page read and write
7FF848E28000
trusted library allocation
page read and write
7FF848FF4000
trusted library allocation
page read and write
29BE000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
D5F000
stack
page read and write
790000
heap
page read and write
7FF849450000
trusted library allocation
page read and write
2640000
heap
page read and write
7FF8493D0000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
1B85E000
stack
page read and write
1F4806AC000
heap
page read and write
1EC01430000
direct allocation
page read and write
1F4806C8000
heap
page read and write
1BDA0000
heap
page read and write
1C32C000
stack
page read and write
7FF849020000
trusted library allocation
page read and write
7FF8495A0000
trusted library allocation
page read and write
1EC7E7A4000
heap
page read and write
335F000
trusted library allocation
page read and write
13525000
trusted library allocation
page read and write
1C43F000
stack
page read and write
1F480701000
heap
page read and write
1DB60000
heap
page read and write
7FF849650000
trusted library allocation
page read and write
1EC7E758000
heap
page read and write
14941000
trusted library allocation
page read and write
7FF848EB6000
trusted library allocation
page read and write
16CE000
heap
page read and write
13251000
trusted library allocation
page read and write
CEC42FC000
stack
page read and write
1B638000
heap
page read and write
7FF848FCC000
trusted library allocation
page read and write
1B7F5000
heap
page read and write
DE0000
heap
page read and write
12AC1000
trusted library allocation
page read and write
970000
heap
page read and write
1BF30000
heap
page execute and read and write
155A000
heap
page read and write
332F000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
1B75E000
stack
page read and write
7FF848E10000
trusted library allocation
page read and write
1EC01493000
direct allocation
page read and write
289A7C10000
heap
page read and write
7FF848E33000
trusted library allocation
page read and write
CD0000
heap
page read and write
1EC7E77D000
heap
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
7FF848ED6000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page read and write
ACC000
heap
page read and write
7FF8495B4000
trusted library allocation
page read and write
1EC60000
heap
page read and write
7FF848FB6000
trusted library allocation
page read and write
1EC7E940000
direct allocation
page read and write
CD5000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
17D0000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
7FF849004000
trusted library allocation
page read and write
133AD000
trusted library allocation
page read and write
D8C000
heap
page read and write
DA9000
heap
page read and write
1B2CD000
stack
page read and write
742000
stack
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
2639000
heap
page read and write
DEF000
heap
page read and write
7FF849290000
trusted library allocation
page read and write
1560000
heap
page read and write
7FF84905A000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
15AC000
heap
page read and write
1D5F0000
heap
page read and write
7FF848E38000
trusted library allocation
page read and write
2D78000
trusted library allocation
page read and write
7FF8492E0000
trusted library allocation
page execute and read and write
1EC7E910000
heap
page read and write
7FF849560000
trusted library allocation
page read and write
2D9B000
trusted library allocation
page read and write
1EC7E920000
direct allocation
page read and write
77000
unkown
page readonly
1B6FD000
stack
page read and write
1F1CE409000
heap
page read and write
1EC7E7A4000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
11BC000
heap
page read and write
1EC7E850000
direct allocation
page read and write
1F481FC3000
direct allocation
page read and write
1B1ED000
stack
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF848FCC000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
2BB0000
heap
page read and write
1BE7A000
heap
page read and write
18703320000
heap
page read and write
10D0000
heap
page read and write
13431000
trusted library allocation
page read and write
1F1CE400000
heap
page read and write
13DD5000
trusted library allocation
page read and write
1B7E4000
heap
page read and write
1BE30000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
18DC000
heap
page read and write
13181000
trusted library allocation
page read and write
1ABCB000
stack
page read and write
33F1000
trusted library allocation
page read and write
1EC7E7A4000
heap
page read and write
291C000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
33A2000
trusted library allocation
page read and write
1EC7E7A4000
heap
page read and write
13705000
trusted library allocation
page read and write
FD8000
heap
page read and write
7FF8497A0000
trusted library allocation
page read and write
1EC7E7E5000
heap
page read and write
7FF849050000
trusted library allocation
page execute and read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1B742000
heap
page read and write
7FF848FDC000
trusted library allocation
page read and write
7FF849710000
trusted library allocation
page read and write
14D75C10000
heap
page read and write
1360B000
trusted library allocation
page read and write
1EC7E7BE000
heap
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
7FF848EC0000
trusted library allocation
page execute and read and write
3ACE000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF849012000
trusted library allocation
page read and write
1B030000
unkown
page readonly
7FF84902D000
trusted library allocation
page read and write
23C5B61B000
heap
page read and write
1630000
heap
page read and write
2E6C000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1F4806B9000
heap
page read and write
7FF8492C0000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
1BA6E000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
1AF26000
heap
page read and write
1B8E0000
unkown
page readonly
3808000
trusted library allocation
page read and write
12E61000
trusted library allocation
page read and write
1630000
heap
page read and write
7FF8494AF000
trusted library allocation
page read and write
1785000
heap
page read and write
1BF9E000
stack
page read and write
2D9B000
trusted library allocation
page read and write
7FF848FA8000
trusted library allocation
page read and write
7FF849397000
trusted library allocation
page read and write
1890000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
34E0000
heap
page read and write
7FF8494F0000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
1B7D7000
heap
page read and write
7FF849112000
trusted library allocation
page read and write
1B050000
unkown
page readonly
33A9000
trusted library allocation
page read and write
1B092000
unkown
page readonly
7FF848E3D000
trusted library allocation
page execute and read and write
7FF8495A0000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page execute and read and write
12D41000
trusted library allocation
page read and write
7FF848FF4000
trusted library allocation
page read and write
A7E000
stack
page read and write
1B73D000
heap
page read and write
7FF849720000
trusted library allocation
page read and write
1B512000
unkown
page readonly
FD0000
heap
page read and write
DAC000
heap
page read and write
1758000
heap
page read and write
7FF84901E000
trusted library allocation
page read and write
1AC0000
heap
page read and write
DB0000
heap
page read and write
F80000
heap
page read and write
1940000
heap
page read and write
1B500000
heap
page execute and read and write
1B0C4000
unkown
page readonly
1C33F000
stack
page read and write
1E1C0000
trusted library section
page readonly
D6C000
heap
page read and write
7FF848FD3000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF849578000
trusted library allocation
page read and write
2DDB000
trusted library allocation
page read and write
EE2000
stack
page read and write
D81000
heap
page read and write
2500000
unkown
page readonly
7FF849620000
trusted library allocation
page read and write
260F000
stack
page read and write
1F480715000
heap
page read and write
7FF849463000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
8AB19FF000
stack
page read and write
1E60000
heap
page read and write
1B836000
heap
page read and write
12E51000
trusted library allocation
page read and write
1F4806CF000
heap
page read and write
7FF84902D000
trusted library allocation
page read and write
FA0000
heap
page read and write
3288000
trusted library allocation
page read and write
7FF848FD4000
trusted library allocation
page read and write
33BD000
trusted library allocation
page read and write
1E89000
heap
page read and write
1895000
heap
page read and write
3171000
trusted library allocation
page read and write
1586000
heap
page read and write
3359000
trusted library allocation
page read and write
1EC01450000
direct allocation
page read and write
1520000
heap
page read and write
1B50E000
stack
page read and write
7FF848FA8000
trusted library allocation
page read and write
1502000
stack
page read and write
11F1000
heap
page read and write
14943000
trusted library allocation
page read and write
1EC7E79F000
heap
page read and write
7FF848FB8000
trusted library allocation
page read and write
3296000
heap
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
1620000
heap
page read and write
1B4B0000
trusted library allocation
page read and write
13171000
trusted library allocation
page read and write
1EC7E729000
direct allocation
page read and write
7FF84961C000
trusted library allocation
page read and write
1B790000
heap
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
7FF84900D000
trusted library allocation
page read and write
7FF84903E000
trusted library allocation
page read and write
AF6000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
13AE000
stack
page read and write
1780000
heap
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF848FCC000
trusted library allocation
page read and write
1CED2000
heap
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
7FF848E03000
trusted library allocation
page execute and read and write
2502000
unkown
page readonly
7FF8492A0000
trusted library allocation
page read and write
1F482000000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF849004000
trusted library allocation
page read and write
7FF8493D0000
trusted library allocation
page read and write
7FF849660000
trusted library allocation
page read and write
3326000
trusted library allocation
page read and write
1EC7E79B000
heap
page read and write
7FF84946D000
trusted library allocation
page read and write
7FF849430000
trusted library allocation
page read and write
15C0000
heap
page read and write
7FF848FDC000
trusted library allocation
page read and write
7FF848FFD000
trusted library allocation
page read and write
2AC8000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF848E3D000
trusted library allocation
page execute and read and write
18703220000
heap
page read and write
7FF849014000
trusted library allocation
page read and write
7FF849034000
trusted library allocation
page read and write
1DC6D000
stack
page read and write
32A0000
heap
page execute and read and write
7FF848ED6000
trusted library allocation
page execute and read and write
15A8000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
7FF848F71000
trusted library allocation
page execute and read and write
13626000
trusted library allocation
page read and write
1F480718000
heap
page read and write
1B758000
heap
page read and write
2457BFE000
stack
page read and write
7FF849030000
trusted library allocation
page read and write
1BE23000
heap
page execute and read and write
1F4830A0000
direct allocation
page read and write
7FF848FC6000
trusted library allocation
page read and write
134F7000
trusted library allocation
page read and write
132F6000
trusted library allocation
page read and write
1438000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF849070000
trusted library allocation
page read and write
1B2D0000
heap
page read and write
1A87000
trusted library allocation
page read and write
23C5B655000
heap
page read and write
7FF848FCC000
trusted library allocation
page read and write
1F4806AC000
heap
page read and write
7FF84901C000
trusted library allocation
page read and write
12BA1000
trusted library allocation
page read and write
2913000
trusted library allocation
page read and write
15ED000
heap
page read and write
DB2000
heap
page read and write
329C000
trusted library allocation
page read and write
3293000
heap
page read and write
12F02000
trusted library allocation
page read and write
2EF6000
trusted library allocation
page read and write
7FF848FA7000
trusted library allocation
page read and write
1C82D000
stack
page read and write
7FF849440000
trusted library allocation
page read and write
11B6000
heap
page read and write
42000
unkown
page readonly
1405000
heap
page read and write
1C22A000
stack
page read and write
7FF848EB6000
trusted library allocation
page read and write
1F4820AB000
direct allocation
page read and write
1EC014B0000
direct allocation
page read and write
1F1CE300000
heap
page read and write
1890000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
23C5B651000
heap
page read and write
7FF848FE4000
trusted library allocation
page read and write
3CB5000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
7FF849481000
trusted library allocation
page read and write
D50000
trusted library allocation
page read and write
345A000
trusted library allocation
page read and write
1F192000
heap
page read and write
7FF849488000
trusted library allocation
page read and write
1B78C000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7C5000
heap
page read and write
1F480680000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
32F0000
heap
page execute and read and write
7FF849650000
trusted library allocation
page read and write
7FF849122000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
1337F000
trusted library allocation
page read and write
26E0000
heap
page execute and read and write
3396000
trusted library allocation
page read and write
7FF848FC6000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
12977000
trusted library allocation
page read and write
127F7000
trusted library allocation
page read and write
1B8AD000
stack
page read and write
3C452FF000
stack
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
7FF848E14000
trusted library allocation
page read and write
1B536000
heap
page read and write
7FF848FCC000
trusted library allocation
page read and write
1B99F000
stack
page read and write
7FF848DF4000
trusted library allocation
page read and write
7FF848FEC000
trusted library allocation
page read and write
7FF84902E000
trusted library allocation
page read and write
1B87B000
heap
page read and write
3ADE000
trusted library allocation
page read and write
1EC7E7E3000
heap
page read and write
31D0000
heap
page read and write
7FF848FEC000
trusted library allocation
page read and write
7FF849004000
trusted library allocation
page read and write
7FF848E4D000
trusted library allocation
page execute and read and write
7FF8495D0000
trusted library allocation
page read and write
7FF849543000
trusted library allocation
page read and write
3A66000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
7FF8493E0000
trusted library allocation
page read and write
773000
heap
page read and write
F90000
heap
page read and write
7FF849658000
trusted library allocation
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
1EC7E79F000
heap
page read and write
3290000
heap
page read and write
7FF849020000
trusted library allocation
page execute and read and write
7FF848FD0000
trusted library allocation
page execute and read and write
1600000
heap
page read and write
1B00000
heap
page read and write
7FF849680000
trusted library allocation
page execute and read and write
195F000
stack
page read and write
7FF849010000
trusted library allocation
page read and write
7FF8492B5000
trusted library allocation
page read and write
B22000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
1B3EE000
stack
page read and write
7FF849370000
trusted library allocation
page read and write
1E80000
heap
page read and write
1EC7E7D3000
heap
page read and write
1715000
heap
page read and write
1BEC0000
heap
page execute and read and write
7FF849640000
trusted library allocation
page read and write
3076000
trusted library allocation
page read and write
1F4806BC000
heap
page read and write
7FF848FC8000
trusted library allocation
page read and write
7FF848E34000
trusted library allocation
page read and write
83000
unkown
page readonly
1B0E3000
heap
page execute and read and write
7FF84927C000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page execute and read and write
7FF848F51000
trusted library allocation
page execute and read and write
7FF848FF0000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
320D000
trusted library allocation
page read and write
329E000
trusted library allocation
page read and write
1EC7E7EB000
heap
page read and write
3330000
heap
page execute and read and write
7FF848EA6000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
1540000
heap
page read and write
23C5B651000
heap
page read and write
2E9C000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
7FF848FF4000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1BF60000
heap
page execute and read and write
7FF849710000
trusted library allocation
page read and write
3316000
heap
page read and write
DC0000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
1BE2E000
stack
page read and write
2AC9000
trusted library allocation
page read and write
7FF848FB3000
trusted library allocation
page read and write
1F480701000
heap
page read and write
2B89000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1AF7D000
heap
page read and write
2DBD000
trusted library allocation
page read and write
19A0000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
1F482020000
direct allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
7FF849530000
trusted library allocation
page read and write
19B6000
heap
page read and write
9C0000
heap
page read and write
1F4806DA000
heap
page read and write
2AC5000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page execute and read and write
7FF848DF8000
trusted library allocation
page read and write
1EC7E77D000
heap
page read and write
12D51000
trusted library allocation
page read and write
1469000
heap
page read and write
129F000
stack
page read and write
7FF849010000
trusted library allocation
page read and write
187033A8000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1C16F000
stack
page read and write
18AE000
heap
page read and write
1B5D0000
unkown
page readonly
1F480697000
heap
page read and write
182E000
heap
page read and write
1EC7E700000
direct allocation
page read and write
3060000
heap
page read and write
179B000
heap
page read and write
1B7B7000
heap
page read and write
1CC5E000
stack
page read and write
1B529000
heap
page read and write
1B83D000
heap
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
7FF849630000
trusted library allocation
page read and write
7FF849024000
trusted library allocation
page read and write
2971000
trusted library allocation
page read and write
289A7BC0000
heap
page read and write
18D0000
trusted library allocation
page read and write
7FF848FD8000
trusted library allocation
page read and write
1C330000
heap
page read and write
7FF848DF2000
trusted library allocation
page read and write
14D75C30000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
136D5000
trusted library allocation
page read and write
7FF848F51000
trusted library allocation
page execute and read and write
1B785000
heap
page read and write
18F0000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
2DD8000
trusted library allocation
page read and write
1771000
heap
page read and write
2E7B000
trusted library allocation
page read and write
7FF848E0B000
trusted library allocation
page execute and read and write
3B3C000
trusted library allocation
page read and write
1B851000
heap
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
7FF848E13000
trusted library allocation
page execute and read and write
1B6DC000
heap
page read and write
7FF848E4B000
trusted library allocation
page execute and read and write
7FF848E1D000
trusted library allocation
page execute and read and write
3B5A000
trusted library allocation
page read and write
1B0C0000
heap
page read and write
1F48071A000
heap
page read and write
290C000
trusted library allocation
page read and write
1BD60000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF849400000
trusted library allocation
page read and write
1B792000
heap
page read and write
7FF849000000
trusted library allocation
page execute and read and write
23C5B651000
heap
page read and write
1B500000
unkown
page readonly
1F160000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
3240000
heap
page execute and read and write
33C1000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF8493E0000
trusted library allocation
page read and write
1B86F000
stack
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF849450000
trusted library allocation
page read and write
7FF848E08000
trusted library allocation
page read and write
36D6000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7FF849790000
trusted library allocation
page read and write
D00000
heap
page read and write
7FF849032000
trusted library allocation
page read and write
32AB000
trusted library allocation
page read and write
16D0000
heap
page read and write
1EC7E79A000
heap
page read and write
1495000
heap
page read and write
7FF84904D000
trusted library allocation
page read and write
7FF8494E0000
trusted library allocation
page read and write
3379000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
38AE000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
1C12A000
stack
page read and write
AB5000
heap
page read and write
11DD000
heap
page read and write
33BB000
trusted library allocation
page read and write
10F0000
heap
page read and write
86000
unkown
page readonly
1B48F000
stack
page read and write
127F1000
trusted library allocation
page read and write
736000
heap
page read and write
7FF849015000
trusted library allocation
page read and write
1B0D6000
heap
page read and write
1494A000
trusted library allocation
page read and write
28B6000
heap
page read and write
1B350000
trusted library allocation
page read and write
13401000
trusted library allocation
page read and write
1EC7E590000
heap
page read and write
34DA000
trusted library allocation
page read and write
19A5000
heap
page read and write
1F4830A3000
direct allocation
page read and write
1BD2F000
stack
page read and write
2809000
trusted library allocation
page read and write
2DC2000
trusted library allocation
page read and write
1B5F2000
unkown
page readonly
7FF849380000
trusted library allocation
page read and write
14D75CC9000
heap
page read and write
1B85B000
heap
page read and write
1B790000
heap
page execute and read and write
33A1000
trusted library allocation
page read and write
3066000
heap
page read and write
1F4807E9000
direct allocation
page read and write
1C347000
heap
page read and write
1F48070F000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848E28000
trusted library allocation
page read and write
7FF848F96000
trusted library allocation
page read and write
7FF849370000
trusted library allocation
page read and write
A90000
heap
page read and write
1B4EE000
stack
page read and write
33D2000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
7FF848FED000
trusted library allocation
page read and write
3468000
trusted library allocation
page read and write
1BA9F000
stack
page read and write
1B532000
unkown
page readonly
7FF848FFC000
trusted library allocation
page read and write
7FF84900C000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
263E000
stack
page read and write
1625000
heap
page read and write
7FF848FDC000
trusted library allocation
page read and write
1B72D000
heap
page read and write
1D22F000
stack
page read and write
1EC7E78C000
heap
page read and write
13AF000
stack
page read and write
1B0D2000
unkown
page readonly
FF5000
heap
page read and write
7FF8495F0000
trusted library allocation
page read and write
3443000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1878000
heap
page read and write
2D49000
trusted library allocation
page read and write
1B660000
heap
page read and write
7FF848FDC000
trusted library allocation
page read and write
7FF848DE2000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF848E33000
trusted library allocation
page read and write
2925000
trusted library allocation
page read and write
12B20000
trusted library allocation
page read and write
7FF848FC9000
trusted library allocation
page read and write
2836000
trusted library allocation
page read and write
1F4806BB000
heap
page read and write
7FF848E22000
trusted library allocation
page read and write
7FF8495E0000
trusted library allocation
page read and write
3448000
trusted library allocation
page read and write
7FF849024000
trusted library allocation
page read and write
1EC7E7D6000
heap
page read and write
C60000
heap
page read and write
C85000
heap
page read and write
1F4820A0000
direct allocation
page read and write
1B520000
trusted library allocation
page read and write
3310000
heap
page read and write
2E99000
trusted library allocation
page read and write
7FF848E28000
trusted library allocation
page read and write
135D1000
trusted library allocation
page read and write
17F0000
heap
page read and write
1580000
heap
page read and write
FC0000
heap
page read and write
1AB0000
heap
page read and write
7FF848FD7000
trusted library allocation
page read and write
1B80C000
heap
page read and write
1CB4B000
stack
page read and write
3179000
trusted library allocation
page read and write
1B0E0000
heap
page execute and read and write
7FF849002000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
7FF848EE6000
trusted library allocation
page execute and read and write
7FF848EB6000
trusted library allocation
page read and write
7FF849640000
trusted library allocation
page read and write
1EC7E7A5000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
1C23E000
stack
page read and write
7FF849486000
trusted library allocation
page read and write
1400000
heap
page read and write
720000
heap
page read and write
C80000
heap
page read and write
7FF84903D000
trusted library allocation
page read and write
13B01000
trusted library allocation
page read and write
9C5000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
1EC01495000
direct allocation
page read and write
1B5B2000
unkown
page readonly
1870000
heap
page read and write
1E349000
stack
page read and write
CA7000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
7FF848DF4000
trusted library allocation
page read and write
20A82000
trusted library allocation
page read and write
1C22E000
stack
page read and write
7FF849600000
trusted library allocation
page read and write
1F482040000
direct allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
1B502000
unkown
page readonly
15F0000
heap
page read and write
1860000
trusted library allocation
page read and write
1DA50000
heap
page read and write
1F48070A000
heap
page read and write
1F483080000
direct allocation
page read and write
7FF849010000
trusted library allocation
page read and write
1DB66000
heap
page read and write
1C02E000
stack
page read and write
1BC90000
heap
page read and write
1730000
heap
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
1E057000
stack
page read and write
2DDD000
trusted library allocation
page read and write
7FF848FDA000
trusted library allocation
page read and write
16B7000
heap
page read and write
1AF71000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF8493A0000
trusted library allocation
page read and write
305E000
stack
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
1F481FC0000
direct allocation
page read and write
7FF849030000
trusted library allocation
page read and write
566CFEB000
stack
page read and write
1B052000
unkown
page readonly
291E000
trusted library allocation
page read and write
1650000
heap
page read and write
3A29000
trusted library allocation
page read and write
1BE20000
heap
page read and write
7FF849014000
trusted library allocation
page read and write
7FF848E3C000
trusted library allocation
page execute and read and write
7C0000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
1BAEF000
stack
page read and write
920000
heap
page read and write
12EFA000
trusted library allocation
page read and write
2457B7E000
stack
page read and write
7FF848FBC000
trusted library allocation
page read and write
7FF848FC3000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page execute and read and write
7FF848FC3000
trusted library allocation
page read and write
1C06E000
stack
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
1F4806B9000
heap
page read and write
1084000
heap
page read and write
1B889000
heap
page read and write
1BC80000
heap
page execute and read and write
7FF849015000
trusted library allocation
page read and write
2457AFB000
stack
page read and write
D86000
heap
page read and write
7FF848FE3000
trusted library allocation
page read and write
11D2000
heap
page read and write
2978000
trusted library allocation
page read and write
1B0A8000
unkown
page readonly
7FF848FC8000
trusted library allocation
page read and write
7FF848E18000
trusted library allocation
page read and write
12E21000
trusted library allocation
page read and write
16B5000
heap
page read and write
9FF23F4000
stack
page read and write
7FF849030000
trusted library allocation
page execute and read and write
7FF848FF0000
trusted library allocation
page execute and read and write
1EC0000
trusted library allocation
page read and write
185E000
unkown
page read and write
1430000
heap
page read and write
3D8A000
trusted library allocation
page read and write
292B000
trusted library allocation
page read and write
1EC7E7EB000
heap
page read and write
1369F000
trusted library allocation
page read and write
1BD9F000
stack
page read and write
2630000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
7FF84959B000
trusted library allocation
page read and write
13327000
trusted library allocation
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
3B38000
trusted library allocation
page read and write
2872000
trusted library allocation
page read and write
1F4806FF000
heap
page read and write
1A5E000
stack
page read and write
7FF84901D000
trusted library allocation
page read and write
1EC7E86B000
direct allocation
page read and write
1C870000
trusted library allocation
page read and write
1B96F000
stack
page read and write
7FF849000000
trusted library allocation
page read and write
1B510000
unkown
page readonly
7FF849050000
trusted library allocation
page read and write
3208000
trusted library allocation
page read and write
18B1000
heap
page read and write
2AA1000
trusted library allocation
page read and write
D92000
stack
page read and write
11B0000
heap
page read and write
13331000
trusted library allocation
page read and write
15EB000
heap
page read and write
2E58000
trusted library allocation
page read and write
1210000
heap
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
3180000
trusted library allocation
page read and write
3376000
heap
page read and write
1BE7F000
stack
page read and write
7FF848FB6000
trusted library allocation
page read and write
1C1CE000
stack
page read and write
D00000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
1F170000
heap
page read and write
7FF849390000
trusted library allocation
page read and write
2888000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
DC41CFF000
stack
page read and write
1B93C000
stack
page read and write
7FF849660000
trusted library allocation
page read and write
1E86000
heap
page read and write
7FF848E34000
trusted library allocation
page read and write
7FF848FCC000
trusted library allocation
page read and write
1797000
heap
page read and write
1F4806AC000
heap
page read and write
1BF0D000
heap
page read and write
100C000
heap
page read and write
27EE000
stack
page read and write
11F5000
heap
page read and write
7FF849490000
trusted library allocation
page read and write
1B090000
unkown
page readonly
2530000
heap
page read and write
7D0000
heap
page read and write
D4C000
heap
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
9D0000
heap
page read and write
C40000
heap
page read and write
13361000
trusted library allocation
page read and write
347E000
stack
page read and write
13A27000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page execute and read and write
2F68000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
13BD0000
trusted library allocation
page read and write
1AFFF000
heap
page read and write
7FF849005000
trusted library allocation
page read and write
7FF84901E000
trusted library allocation
page read and write
18A0000
heap
page execute and read and write
980000
heap
page read and write
DAD000
heap
page read and write
11F0000
heap
page read and write
7FF8493B0000
trusted library allocation
page read and write
1F4806A9000
heap
page read and write
13755000
trusted library allocation
page read and write
1BF2F000
stack
page read and write
339E000
stack
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1EC7E7B6000
heap
page read and write
11A0000
heap
page execute and read and write
1B5A2000
unkown
page readonly
7FF848EF6000
trusted library allocation
page execute and read and write
1B81A000
heap
page read and write
1B4F0000
unkown
page readonly
7FF848E04000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
144F000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF84903D000
trusted library allocation
page read and write
F85000
heap
page read and write
7FF849580000
trusted library allocation
page read and write
7FF849380000
trusted library allocation
page read and write
1BBEF000
stack
page read and write
7FF849830000
trusted library allocation
page read and write
289A7AE0000
heap
page read and write
1B630000
unkown
page readonly
1B7FD000
heap
page read and write
1F480718000
heap
page read and write
7FF849610000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
1B2EF000
stack
page read and write
1BD20000
heap
page read and write
7FF848E13000
trusted library allocation
page read and write
1B6E7000
heap
page read and write
176E000
heap
page read and write
1AD7D000
stack
page read and write
3421000
trusted library allocation
page read and write
1EC7E795000
heap
page read and write
348A000
trusted library allocation
page read and write
CEC43FF000
stack
page read and write
7FF848EC6000
trusted library allocation
page read and write
7FF848F61000
trusted library allocation
page execute and read and write
D40000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848E18000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF848E12000
trusted library allocation
page read and write
2E51000
trusted library allocation
page read and write
13B2000
stack
page read and write
7FF84900E000
trusted library allocation
page read and write
7FF849620000
trusted library allocation
page read and write
2E4E000
stack
page read and write
1D824000
stack
page read and write
12C70000
trusted library allocation
page read and write
3ABB000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF849040000
trusted library allocation
page execute and read and write
7FF849060000
trusted library allocation
page read and write
3329000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
1588000
heap
page read and write
18AB000
heap
page read and write
14C5000
heap
page read and write
1F480688000
heap
page read and write
32A5000
trusted library allocation
page read and write
13B0000
heap
page read and write
7FF848FDC000
trusted library allocation
page read and write
3D9F000
trusted library allocation
page read and write
FF8000
heap
page read and write
7FF848E08000
trusted library allocation
page read and write
1DAC0000
heap
page read and write
730000
heap
page read and write
187035E0000
heap
page read and write
7FF8493F0000
trusted library allocation
page read and write
1B76B000
heap
page read and write
7FF8492C0000
trusted library allocation
page read and write
2777000
trusted library allocation
page read and write
320B000
trusted library allocation
page read and write
29A6000
trusted library allocation
page read and write
1B590000
unkown
page readonly
1C5EB000
stack
page read and write
32B0000
heap
page read and write
A98000
heap
page read and write
172A000
heap
page read and write
2DA9000
trusted library allocation
page read and write
3AA2000
trusted library allocation
page read and write
7FF849610000
trusted library allocation
page read and write
7FF8493C0000
trusted library allocation
page read and write
1F480810000
heap
page read and write
7FF849280000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
7FF849570000
trusted library allocation
page read and write
1B3D0000
trusted library allocation
page read and write
CEC44FF000
stack
page read and write
6DE000
stack
page read and write
79E000
heap
page read and write
7FF849022000
trusted library allocation
page read and write
7FF849552000
trusted library allocation
page read and write
1036000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
7FF84901D000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page execute and read and write
16F7000
heap
page read and write
16EF000
stack
page read and write
1BB58000
heap
page read and write
38DF000
trusted library allocation
page read and write
3263000
trusted library allocation
page read and write
1B80000
heap
page read and write
13177000
trusted library allocation
page read and write
1F480707000
heap
page read and write
7FF849050000
trusted library allocation
page execute and read and write
13501000
trusted library allocation
page read and write
3678000
trusted library allocation
page read and write
1B592000
unkown
page readonly
1545000
heap
page read and write
100A000
heap
page read and write
1EC01470000
direct allocation
page read and write
1BF2E000
stack
page read and write
3370000
heap
page read and write
1EC7E79C000
heap
page read and write
175C000
heap
page read and write
1EC7E77D000
heap
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
7FF848F51000
trusted library allocation
page execute and read and write
3A21000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page execute and read and write
1F480630000
heap
page read and write
1B9DF000
stack
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
7FF849000000
trusted library allocation
page read and write
1B0B2000
unkown
page readonly
2510000
unkown
page readonly
FC5000
heap
page read and write
1B96F000
stack
page read and write
1C12F000
stack
page read and write
23C5B540000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
3C453FF000
stack
page read and write
1B060000
unkown
page readonly
1F4806EC000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
1845000
heap
page read and write
1AB0000
heap
page execute and read and write
1B308000
heap
page read and write
7FF848FBA000
trusted library allocation
page read and write
7FF849350000
trusted library allocation
page read and write
1219000
heap
page read and write
12AD1000
trusted library allocation
page read and write
7FF849015000
trusted library allocation
page read and write
1A9A0000
trusted library allocation
page read and write
7FF8495F0000
trusted library allocation
page read and write
3489000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
136A0000
trusted library allocation
page read and write
3D9A000
trusted library allocation
page read and write
158C000
heap
page read and write
1EC7E7C1000
heap
page read and write
1710000
heap
page read and write
7FF8495C0000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
7FF848EC6000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
3351000
trusted library allocation
page read and write
7FF849510000
trusted library allocation
page read and write
1AE80000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
1D42D000
stack
page read and write
7FF848E03000
trusted library allocation
page read and write
7FF8494D0000
trusted library allocation
page read and write
7FF849730000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page read and write
7FF849500000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
3683000
trusted library allocation
page read and write
3438000
trusted library allocation
page read and write
3018000
trusted library allocation
page read and write
7FF848FEC000
trusted library allocation
page read and write
1F4806CF000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page execute and read and write
334E000
stack
page read and write
7FF848F50000
trusted library allocation
page execute and read and write
7FF848E34000
trusted library allocation
page read and write
242D000
stack
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1B5F0000
unkown
page readonly
1EC7E7EA000
heap
page read and write
7FF8494C8000
trusted library allocation
page read and write
294F000
stack
page read and write
3686000
trusted library allocation
page read and write
13481000
trusted library allocation
page read and write
7FF848FB7000
trusted library allocation
page read and write
1219000
heap
page read and write
1CF22000
heap
page read and write
7FF848FE7000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
1875000
heap
page read and write
7FF849014000
trusted library allocation
page read and write
7FF8493F0000
trusted library allocation
page read and write
1EC7E78A000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
2D3F000
stack
page read and write
1B733000
heap
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
13EE5000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page execute and read and write
1F4806D5000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF848E04000
trusted library allocation
page read and write
1110000
heap
page read and write
40000
unkown
page readonly
7FF848FF4000
trusted library allocation
page read and write
2670000
heap
page read and write
1AD70000
trusted library allocation
page read and write
1B717000
heap
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
7FF849030000
trusted library allocation
page read and write
1F4807C0000
direct allocation
page read and write
1600000
heap
page read and write
1F4820AD000
direct allocation
page read and write
28B0000
heap
page read and write
1460A000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
1980000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
1CEE0000
heap
page read and write
7FF848DF3000
trusted library allocation
page read and write
1B010000
heap
page execute and read and write
9FF27FF000
stack
page read and write
7FF848E96000
trusted library allocation
page read and write
1B0E4000
heap
page read and write
7FF8493C0000
trusted library allocation
page read and write
18C0000
heap
page read and write
14E2000
stack
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
3189000
trusted library allocation
page read and write
1B2F2000
heap
page read and write
1B40E000
stack
page read and write
13D0000
trusted library allocation
page read and write
24C0000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848FA6000
trusted library allocation
page read and write
1F1CE3E0000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
975000
heap
page read and write
1EC7E79F000
heap
page read and write
1738000
heap
page read and write
1670000
heap
page read and write
D6E000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF848FA8000
trusted library allocation
page read and write
7FF8495B0000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
1B8E2000
unkown
page readonly
7FF848FCA000
trusted library allocation
page read and write
1D5BE000
stack
page read and write
1B610000
heap
page read and write
1BEEC000
heap
page read and write
7FF849520000
trusted library allocation
page read and write
1B622000
heap
page read and write
1BD6C000
heap
page read and write
16CC000
heap
page read and write
1AF10000
heap
page read and write
7FF849530000
trusted library allocation
page read and write
23C5B460000
heap
page read and write
7FF848E23000
trusted library allocation
page read and write
7FF8494B8000
trusted library allocation
page read and write
1BF08000
heap
page read and write
7FF848FB3000
trusted library allocation
page read and write
1B70E000
heap
page read and write
990000
heap
page read and write
7FF849420000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
23C5B640000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
DC2000
heap
page read and write
1B632000
unkown
page readonly
1B7DD000
heap
page read and write
1BF12000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF848FFD000
trusted library allocation
page read and write
342E000
stack
page read and write
13A0A000
trusted library allocation
page read and write
3319000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
79C000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
2641000
trusted library allocation
page read and write
7FF8494F0000
trusted library allocation
page read and write
7FF848EB6000
trusted library allocation
page read and write
1A670000
trusted library allocation
page read and write
1EC7E8B0000
direct allocation
page read and write
1B032000
unkown
page readonly
24F0000
heap
page read and write
7FF8492A0000
trusted library allocation
page read and write
A50000
heap
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
1F4806A3000
heap
page read and write
12E57000
trusted library allocation
page read and write
1C19F000
stack
page read and write
176C000
heap
page read and write
7FF848FFD000
trusted library allocation
page read and write
7FF849740000
trusted library allocation
page execute and read and write
2E75000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
7FF849680000
trusted library allocation
page read and write
3321000
trusted library allocation
page read and write
1B380000
trusted library allocation
page read and write
1BF20000
heap
page execute and read and write
7FF848F40000
trusted library allocation
page execute and read and write
1B85000
heap
page read and write
12D25000
trusted library allocation
page read and write
7FF849690000
trusted library allocation
page execute and read and write
7FF849484000
trusted library allocation
page read and write
3613000
trusted library allocation
page read and write
1B004000
heap
page read and write
1BA0A000
stack
page read and write
13F0000
trusted library allocation
page read and write
2CA6000
trusted library allocation
page read and write
ACA000
heap
page read and write
3A2F000
trusted library allocation
page read and write
1F4806B7000
heap
page read and write
154C000
heap
page read and write
1C13E000
stack
page read and write
1B6CA000
heap
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1B5D2000
unkown
page readonly
7FF849042000
trusted library allocation
page read and write
1560000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF8492D0000
trusted library allocation
page read and write
1C12E000
stack
page read and write
1F4830A5000
direct allocation
page read and write
1B846000
heap
page read and write
1C09E000
stack
page read and write
172D000
heap
page read and write
13000000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
7FF849630000
trusted library allocation
page read and write
2AB0000
heap
page execute and read and write
1870000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
3AB8000
trusted library allocation
page read and write
1A9C2000
heap
page read and write
1EC0141B000
direct allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
27F9000
trusted library allocation
page read and write
129A0000
trusted library allocation
page read and write
F00000
heap
page read and write
2C30000
heap
page execute and read and write
940000
heap
page read and write
1EC7E7D3000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
146C000
heap
page read and write
1AA0000
trusted library allocation
page read and write
362A000
trusted library allocation
page read and write
7FF848FC8000
trusted library allocation
page read and write
1F4806EA000
heap
page read and write
CE2000
stack
page read and write
7FF848F41000
trusted library allocation
page execute and read and write
1BD48000
heap
page read and write
1B84C000
heap
page read and write
7FF849670000
trusted library allocation
page read and write
7FF84902E000
trusted library allocation
page read and write
2D41000
trusted library allocation
page read and write
18703380000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
13378000
trusted library allocation
page read and write
134FD000
trusted library allocation
page read and write
F60000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
7FF848FB8000
trusted library allocation
page read and write
1EC7E7D6000
heap
page read and write
288B000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page execute and read and write
1EC7E78F000
heap
page read and write
32B1000
trusted library allocation
page read and write
15E0000
heap
page read and write
7FF848E03000
trusted library allocation
page read and write
2E59000
trusted library allocation
page read and write
1830000
trusted library allocation
page read and write
1BE60000
heap
page read and write
1EC7E788000
heap
page read and write
7FF848DE0000
trusted library allocation
page read and write
1B082000
unkown
page readonly
7FF848FCA000
trusted library allocation
page read and write
34E6000
heap
page read and write
16F8000
heap
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
7FF848E9C000
trusted library allocation
page execute and read and write
133A1000
trusted library allocation
page read and write
1EC7E870000
direct allocation
page read and write
CE0000
trusted library allocation
page read and write
7FF849027000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
34E9000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF849360000
trusted library allocation
page read and write
1B7C4000
heap
page read and write
1457000
heap
page read and write
7FF848FC3000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
13E0000
heap
page read and write
19B9000
heap
page read and write
1AEFC000
stack
page read and write
1550000
heap
page read and write
3069000
heap
page read and write
2D64000
trusted library allocation
page read and write
1CEEF000
heap
page read and write
31B6000
trusted library allocation
page read and write
3453000
trusted library allocation
page read and write
12AC7000
trusted library allocation
page read and write
7FF848FB6000
trusted library allocation
page read and write
13500000
trusted library allocation
page read and write
18703300000
heap
page read and write
1F4806C6000
heap
page read and write
1F4806CB000
heap
page read and write
7A0000
heap
page read and write
7FF848DE4000
trusted library allocation
page read and write
1750000
heap
page read and write
1F480718000
heap
page read and write
7FF848E38000
trusted library allocation
page read and write
3186000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
7FF8493A0000
trusted library allocation
page read and write
13624000
trusted library allocation
page read and write
75F000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
7FF849004000
trusted library allocation
page read and write
7FF849510000
trusted library allocation
page read and write
3675000
trusted library allocation
page read and write
1895000
heap
page read and write
7FF8494D0000
trusted library allocation
page read and write
7FF849410000
trusted library allocation
page read and write
2DA7000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
2820000
heap
page read and write
1BF2A000
heap
page read and write
1EC7E77A000
heap
page read and write
1B530000
unkown
page readonly
7FF848FA4000
trusted library allocation
page read and write
7FF849032000
trusted library allocation
page read and write
7FF848E18000
trusted library allocation
page read and write
1CF1A000
heap
page read and write
D64000
heap
page read and write
566D3FF000
stack
page read and write
1B7CB000
heap
page read and write
7FF849030000
trusted library allocation
page execute and read and write
1B042000
unkown
page readonly
1F4830C0000
direct allocation
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
2AAA000
trusted library allocation
page read and write
1EC7E79F000
heap
page read and write
7FF848E44000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
1F1A4000
heap
page read and write
18C5000
heap
page read and write
1B88C000
heap
page read and write
7FF8495E0000
trusted library allocation
page read and write
128D1000
trusted library allocation
page read and write
11DA000
heap
page read and write
1AB5000
heap
page read and write
7FF8494B0000
trusted library allocation
page read and write
289A7C1A000
heap
page read and write
2512000
unkown
page readonly
1930000
heap
page read and write
176A000
heap
page read and write
7FF848FBA000
trusted library allocation
page read and write
3C44F3C000
stack
page read and write
1EC7E690000
heap
page read and write
1EC7E774000
heap
page read and write
2D86000
trusted library allocation
page read and write
316F000
stack
page read and write
1EC7E7AA000
heap
page read and write
7FF84900D000
trusted library allocation
page read and write
1B76E000
stack
page read and write
12F77000
trusted library allocation
page read and write
7FF84945A000
trusted library allocation
page read and write
7FF848FB8000
trusted library allocation
page read and write
7FF849022000
trusted library allocation
page read and write
2DA1000
trusted library allocation
page read and write
1B729000
heap
page read and write
7FF849570000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
2F50000
heap
page execute and read and write
13832000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
7FF849012000
trusted library allocation
page read and write
7FF849670000
trusted library allocation
page read and write
F50000
heap
page read and write
2539000
heap
page read and write
1DA30000
trusted library section
page read and write
3ABD000
trusted library allocation
page read and write
1E5E000
stack
page read and write
2DF6000
trusted library allocation
page read and write
7FF8493B0000
trusted library allocation
page read and write
7FF84945A000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
7FF849042000
trusted library allocation
page read and write
3B61000
trusted library allocation
page read and write
1EC7E7DC000
heap
page read and write
1B450000
heap
page execute and read and write
7FF849720000
trusted library allocation
page read and write
7FF8497B0000
trusted library allocation
page execute and read and write
1F1CE320000
heap
page read and write
900000
heap
page read and write
1BB30000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
2B80000
heap
page read and write
27F1000
trusted library allocation
page read and write
7FF849290000
trusted library allocation
page read and write
7FF8495C0000
trusted library allocation
page read and write
1A10000
heap
page read and write
1B82C000
heap
page read and write
7FF8492D0000
trusted library allocation
page execute and read and write
13D0000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
8AB15F5000
stack
page read and write
13205000
trusted library allocation
page read and write
11E1000
heap
page read and write
3260000
trusted library allocation
page read and write
75D000
heap
page read and write
7FF849455000
trusted library allocation
page read and write
23C5B651000
heap
page read and write
1698000
heap
page read and write
1EC7E857000
direct allocation
page read and write
27FF000
trusted library allocation
page read and write
7FF849014000
trusted library allocation
page read and write
199E000
stack
page read and write
7FF848FD3000
trusted library allocation
page read and write
1EC7E7D6000
heap
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
75000
unkown
page readonly
1F4820BF000
direct allocation
page read and write
1170000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
7FF848FE0000
trusted library allocation
page read and write
B60000
heap
page read and write
7FF8494E0000
trusted library allocation
page read and write
1EC7E7C9000
heap
page read and write
1EC7E7CE000
heap
page read and write
7FF849022000
trusted library allocation
page read and write
1B040000
unkown
page readonly
1235000
heap
page read and write
1B871000
heap
page read and write
7FF849035000
trusted library allocation
page read and write
7FF848FB8000
trusted library allocation
page read and write
3894000
trusted library allocation
page read and write
1EC7E7E9000
heap
page read and write
2D49000
heap
page read and write
1B7C7000
heap
page read and write
2D8F000
trusted library allocation
page read and write
15D1000
heap
page read and write
13C0000
heap
page read and write
7FF849383000
trusted library allocation
page read and write
15C2000
heap
page read and write
7FF848FD8000
trusted library allocation
page read and write
7FF848E08000
trusted library allocation
page read and write
1CED9000
heap
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
7FF848E00000
trusted library allocation
page read and write
343C000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
38E3000
trusted library allocation
page read and write
13835000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
1362000
stack
page read and write
7FF84901E000
trusted library allocation
page read and write
7FF848FB8000
trusted library allocation
page read and write
2DB4000
trusted library allocation
page read and write
7FF84902D000
trusted library allocation
page read and write
19B0000
heap
page read and write
12EF0000
trusted library allocation
page read and write
1B65F000
stack
page read and write
7FF848E23000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1EC7E7D3000
heap
page read and write
1B81F000
stack
page read and write
1955000
heap
page read and write
1B820000
heap
page read and write
1EC7E79F000
heap
page read and write
13550000
trusted library allocation
page read and write
AB8000
heap
page read and write
13C0000
heap
page read and write
31F2000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
2BC0000
heap
page read and write
1F4806F0000
heap
page read and write
7FF8495B9000
trusted library allocation
page read and write
DC41C7C000
stack
page read and write
7FF849025000
trusted library allocation
page read and write
146F000
heap
page read and write
7FF849400000
trusted library allocation
page read and write
1B6F8000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
2E63000
trusted library allocation
page read and write
1F1CE220000
heap
page read and write
1EC7E9C0000
heap
page read and write
1B510000
heap
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
7FF84946A000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
16E2000
stack
page read and write
13351000
trusted library allocation
page read and write
B7E000
stack
page read and write
7FF848E13000
trusted library allocation
page read and write
1F481FE0000
direct allocation
page read and write
1EC7E797000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
1716000
heap
page read and write
7FF849780000
trusted library allocation
page read and write
7FF849560000
trusted library allocation
page read and write
7FF849004000
trusted library allocation
page read and write
1EC7E789000
heap
page read and write
23C5B560000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
3481000
trusted library allocation
page read and write
1C0CE000
stack
page read and write
2D40000
heap
page read and write
7FF8495D0000
trusted library allocation
page read and write
1840000
heap
page read and write
1F48070A000
heap
page read and write
13A21000
trusted library allocation
page read and write
7FF84945C000
trusted library allocation
page read and write
1EC7E890000
heap
page read and write
F45000
heap
page read and write
3CF8000
trusted library allocation
page read and write
7FF84901D000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
12F00000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
40000
unkown
page readonly
7FF849010000
trusted library allocation
page read and write
1EC7E767000
heap
page read and write
1D32E000
stack
page read and write
289A7EE0000
heap
page read and write
174B000
heap
page read and write
1EC7E7A4000
heap
page read and write
1C26F000
stack
page read and write
346C000
trusted library allocation
page read and write
7FF849600000
trusted library allocation
page read and write
566D2FF000
unkown
page read and write
1EC7E8D0000
direct allocation
page read and write
1B857000
heap
page read and write
1C32E000
stack
page read and write
17F0000
heap
page read and write
1B04D000
stack
page read and write
7FF849770000
trusted library allocation
page read and write
1F480550000
heap
page read and write
7FF849024000
trusted library allocation
page read and write
12BA5000
trusted library allocation
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
F80000
heap
page read and write
1F481FC7000
direct allocation
page read and write
121B000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF8494C0000
trusted library allocation
page read and write
1EC7E670000
heap
page read and write
14414000
trusted library allocation
page read and write
1490000
heap
page read and write
7FF849590000
trusted library allocation
page read and write
2908000
trusted library allocation
page read and write
1B200000
heap
page execute and read and write
2AD3000
trusted library allocation
page read and write
7FF84944C000
trusted library allocation
page read and write
1A80000
trusted library allocation
page read and write
13321000
trusted library allocation
page read and write
1BB7D000
stack
page read and write
1850000
trusted library allocation
page read and write
1B5B0000
unkown
page readonly
7FF848F20000
trusted library allocation
page execute and read and write
1B30E000
stack
page read and write
1EC7E79D000
heap
page read and write
C90000
heap
page read and write
7FF848FC6000
trusted library allocation
page read and write
7FF849860000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
1EC0141D000
direct allocation
page read and write
1B9E0000
heap
page execute and read and write
AF8000
heap
page read and write
7FF849550000
trusted library allocation
page read and write
13481000
trusted library allocation
page read and write
1B062000
unkown
page readonly
7FF8494A5000
trusted library allocation
page read and write
13A0F000
trusted library allocation
page read and write
7FF849004000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF848FC8000
trusted library allocation
page read and write
103E000
stack
page read and write
12981000
trusted library allocation
page read and write
7FF849025000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
F50000
heap
page read and write
28B9000
heap
page read and write
19A0000
heap
page read and write
7FF848FF4000
trusted library allocation
page read and write
1C92F000
stack
page read and write
1DA25000
stack
page read and write
7FF848E18000
trusted library allocation
page read and write
771000
heap
page read and write
31E0000
heap
page read and write
18D8000
heap
page read and write
7FF849420000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
328C000
trusted library allocation
page read and write
7FF848FD6000
trusted library allocation
page read and write
13D0000
heap
page read and write
11EE000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF849740000
trusted library allocation
page execute and read and write
1EC7E7B6000
heap
page read and write
14C0000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
1B7A7000
heap
page read and write
7FF84900E000
trusted library allocation
page read and write
13320000
trusted library allocation
page read and write
33B8000
trusted library allocation
page read and write
7FF848E02000
trusted library allocation
page read and write
1BCEF000
stack
page read and write
7FF849020000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF848E0D000
trusted library allocation
page execute and read and write
14D75F90000
heap
page read and write
1B55E000
stack
page read and write
7FF848FD8000
trusted library allocation
page read and write
188F000
stack
page read and write
155C000
heap
page read and write
1362A000
trusted library allocation
page read and write
7FF848FA6000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
12D47000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
1BD73000
heap
page read and write
2931000
trusted library allocation
page read and write
2D46000
heap
page read and write
2B3F000
stack
page read and write
A55000
heap
page read and write
1F4806F7000
heap
page read and write
F40000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
1910000
heap
page read and write
1CF25000
heap
page read and write
1AAF0000
trusted library allocation
page read and write
F3E000
stack
page read and write
1B89F000
stack
page read and write
2B86000
heap
page read and write
12E2000
stack
page read and write
7FF848EA0000
trusted library allocation
page read and write
7FF848FE4000
trusted library allocation
page read and write
1D924000
stack
page read and write
7FF848F9C000
trusted library allocation
page read and write
7FF8495B0000
trusted library allocation
page read and write
3445000
trusted library allocation
page read and write
1AA0000
heap
page read and write
15E5000
heap
page read and write
23C5B640000
heap
page read and write
2D4F000
trusted library allocation
page read and write
1BC80000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
1A6F000
stack
page read and write
7FF848ED0000
trusted library allocation
page read and write
1F481FDB000
direct allocation
page read and write
7FF848FED000
trusted library allocation
page read and write
19CF000
stack
page read and write
8AB17FF000
stack
page read and write
3CF5000
trusted library allocation
page read and write
F10000
heap
page read and write
1850000
heap
page read and write
2FF1000
trusted library allocation
page read and write
13571000
trusted library allocation
page read and write
2979000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
2E5C000
trusted library allocation
page read and write
104F000
stack
page read and write
DC41D7F000
stack
page read and write
13630000
trusted library allocation
page read and write
1A820000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1D52A000
stack
page read and write
288D000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
12E75000
trusted library allocation
page read and write
2F8A000
trusted library allocation
page read and write
324F000
stack
page read and write
289A7BE0000
heap
page read and write
12A9000
heap
page read and write
1B0B0000
unkown
page readonly
1F4806C0000
heap
page read and write
1EC7E7B6000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1B4F2000
unkown
page readonly
3015000
trusted library allocation
page read and write
7FF849760000
trusted library allocation
page read and write
34A6000
trusted library allocation
page read and write
14D75B30000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
3299000
heap
page read and write
130F5000
trusted library allocation
page read and write
1710000
heap
page read and write
1F482100000
heap
page read and write
1529000
heap
page read and write
1EC01490000
direct allocation
page read and write
13357000
trusted library allocation
page read and write
134F1000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
12801000
trusted library allocation
page read and write
1B0D0000
unkown
page readonly
7FF848DF3000
trusted library allocation
page execute and read and write
7FF848FC8000
trusted library allocation
page read and write
1EC7E7BC000
heap
page read and write
3A39000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1B800000
heap
page read and write
1EC7E750000
heap
page read and write
D80000
heap
page read and write
12F31000
trusted library allocation
page read and write
1830000
heap
page read and write
138A5000
trusted library allocation
page read and write
3290000
heap
page read and write
1150000
trusted library allocation
page read and write
7FF849410000
trusted library allocation
page read and write
7FF848F61000
trusted library allocation
page execute and read and write
1038000
heap
page read and write
7FF848E03000
trusted library allocation
page read and write
7FF849520000
trusted library allocation
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF849032000
trusted library allocation
page read and write
14D75CC0000
heap
page read and write
1F4806CF000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
1AF41000
heap
page read and write
1BFCE000
stack
page read and write
3369000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
1B3DD000
stack
page read and write
2BFA000
trusted library allocation
page read and write
7FF849590000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF848FE8000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
D46000
heap
page read and write
D30000
trusted library allocation
page read and write
1755000
heap
page read and write
7FF849730000
trusted library allocation
page read and write
1F4820C0000
direct allocation
page read and write
2649000
trusted library allocation
page read and write
1F480718000
heap
page read and write
33ED000
trusted library allocation
page read and write
1EC7E853000
direct allocation
page read and write
7FF849050000
trusted library allocation
page read and write
133A7000
trusted library allocation
page read and write
3CC5000
trusted library allocation
page read and write
18703389000
heap
page read and write
1AF55000
heap
page read and write
C7E000
stack
page read and write
16F0000
heap
page read and write
133B1000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page execute and read and write
7FF8492B0000
trusted library allocation
page read and write
1830000
trusted library allocation
page read and write
1B705000
heap
page read and write
E5F000
stack
page read and write
A70000
trusted library allocation
page read and write
1F482060000
direct allocation
page read and write
1EC7E7BF000
heap
page read and write
1AA5000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
2E81000
trusted library allocation
page read and write
1CDF0000
heap
page read and write
1D723000
stack
page read and write
7FF849000000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
1548000
heap
page read and write
1F482080000
direct allocation
page read and write
1DE5D000
stack
page read and write
1B690000
heap
page read and write
16AB000
heap
page read and write
1EC7E7AA000
heap
page read and write
3B43000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
2D59000
trusted library allocation
page read and write
3ABD000
trusted library allocation
page read and write
7FF849430000
trusted library allocation
page read and write
7FF849500000
trusted library allocation
page read and write
7FF849387000
trusted library allocation
page read and write
1EC7E7E5000
heap
page read and write
1F480650000
heap
page read and write
12971000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF849580000
trusted library allocation
page read and write
1EC7E7CF000
heap
page read and write
317F000
trusted library allocation
page read and write
1CEF4000
heap
page read and write
7FF8492B0000
trusted library allocation
page read and write
1870000
heap
page read and write
1690000
heap
page read and write
9FF25FF000
stack
page read and write
7FF849070000
trusted library allocation
page execute and read and write
1F483060000
direct allocation
page read and write
7FF848FDC000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
23C5B610000
heap
page read and write
1216000
heap
page read and write
1B8DD000
stack
page read and write
13A17000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page read and write
7FF49AE30000
trusted library allocation
page execute and read and write
1BE20000
heap
page execute and read and write
7FF848FEC000
trusted library allocation
page read and write
1755000
heap
page read and write
DEB000
heap
page read and write
134D0000
trusted library allocation
page read and write
3473000
trusted library allocation
page read and write
7FF849360000
trusted library allocation
page read and write
7FF849750000
trusted library allocation
page read and write
23C5B710000
heap
page read and write
7FF848E44000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
DAF000
heap
page read and write
11E0000
heap
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
34F1000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1F480707000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
23C5B5A0000
heap
page read and write
7FF849700000
trusted library allocation
page read and write
33EB000
trusted library allocation
page read and write
1B2E0000
heap
page read and write
7FF849005000
trusted library allocation
page read and write
19D0000
heap
page execute and read and write
1BF40000
heap
page read and write
7FF848FF4000
trusted library allocation
page read and write
7FF849004000
trusted library allocation
page read and write
7FF848FAA000
trusted library allocation
page read and write
7FF84945F000
trusted library allocation
page read and write
1F4806BC000
heap
page read and write
7FF849540000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
1CEE7000
heap
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
7FF849440000
trusted library allocation
page read and write
1DA70000
trusted library section
page read and write
7FF849840000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1EC01410000
direct allocation
page read and write
289A7C18000
heap
page read and write
1230000
heap
page read and write
18703395000
heap
page read and write
7FF849750000
trusted library allocation
page read and write
13A31000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
23C5B640000
heap
page read and write
1EC7E7D6000
heap
page read and write
7FF849022000
trusted library allocation
page read and write
2960000
heap
page execute and read and write
1950000
heap
page read and write
3366000
trusted library allocation
page read and write
7FF849850000
trusted library allocation
page read and write
2E6E000
trusted library allocation
page read and write
1AFD4000
heap
page read and write
1B6AE000
heap
page read and write
153B000
heap
page read and write
1586000
heap
page read and write
2636000
heap
page read and write
2520000
heap
page execute and read and write
1EC7E7BE000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
7FF8494B6000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
1EC0142F000
direct allocation
page read and write
7FF849000000
trusted library allocation
page read and write
289A7EE5000
heap
page read and write
182F000
stack
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
7FF848F41000
trusted library allocation
page execute and read and write
7FF848E5C000
trusted library allocation
page execute and read and write
D83000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
1BB20000
heap
page execute and read and write
7FF848FBC000
trusted library allocation
page read and write
23C5B651000
heap
page read and write
7FF84949B000
trusted library allocation
page read and write
1B6C1000
heap
page read and write
127F000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
There are 1766 hidden memdumps, click here to show them.