IOC Report
d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c.exe

loading gif

Files

File Path
Type
Category
Malicious
d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\logs\JFQmuJhhcOwSgqtZoqXNEERKgQYwL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\logs\JFQmuJhhcOwSgqtZoqXNEERKgQYwL.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Recovery\JFQmuJhhcOwSgqtZoqXNEERKgQYwL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\WmiPrvSE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\WmiPrvSE.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Videos\JFQmuJhhcOwSgqtZoqXNEERKgQYwL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Videos\JFQmuJhhcOwSgqtZoqXNEERKgQYwL.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\ArFrORkS.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\DhiqiJKM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\EhviVOkL.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\FNQYcsFE.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\IUzpLFaA.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KIRpkYvx.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\PwjnMVKl.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\QyIevzpi.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\RGFoMnqm.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VWRNVcdg.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VoMNpBPa.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\WyUWCOVc.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\aceLSxeO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\bmmUfKkQ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\fTGLCVSM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\fcdLmHlJ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\gUHludjC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\hILtgrfA.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\nGlBWAAq.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\qDaBeGpk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rreJQTki.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\sBnSdgqk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\stDzyxQe.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ttRrlCpd.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\uDZAyPvf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\wjuqGuQY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ylgZbdUT.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\yuQrGMvY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Downloads\smartscreen.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\logs\79ebd4b63302a4
ASCII text, with very long lines (898), with no line terminators
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x74ad5aab, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\Recovery\24dbde2999530e
ASCII text, with very long lines (680), with no line terminators
dropped
C:\Recovery\79ebd4b63302a4
ASCII text, with very long lines (630), with no line terminators
dropped
C:\Recovery\JFQmuJhhcOwSgqtZoqXNEERKgQYwL.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Videos\79ebd4b63302a4
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\JFQmuJhhcOwSgqtZoqXNEERKgQYwL.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\WmiPrvSE.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\smartscreen.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\0L4O4hE8bk
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\2T5y90L7U1
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\3ZKW2VgUXF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\6OUT67hm4H
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\J4cfRhQZaM
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\PuOdCpi2kH
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\YtBWM7vFD0
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\ZQ41MPITjV
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_02g3h04h.sk2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0y5s0oav.fnm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_12jfnl1l.tez.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_14tfo2uk.lfq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1hqotscj.xit.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_22aojx0j.bhc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_23tgjldy.jeg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2gunwnmh.qab.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2lx4n3ii.y4v.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3n5wr15n.vbe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3v2pzawg.lix.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4qovhmoz.iv4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4t3z00dg.sky.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4u1jcqp5.f2b.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4upwjdem.y4q.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5cqc3rrt.qni.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5cz4qiv4.jva.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a2uvxrdo.k3c.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ar2wh4zy.ifa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_avzonf0z.yjm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bgvn35ed.vou.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_btbnrk0q.1an.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c3azgtbl.v2p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ceuul1pt.cbd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cflqyjzq.vok.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cpjttkbc.odb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ctoxfheo.3xt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d3zhhpkl.ca2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dfnpyubh.ebg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dkerxnmi.psd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_efily54w.y10.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_epvmq3zy.05r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_exldoegh.euy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f5lo4zwe.fyo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fk2idxlq.ud0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gldr2q1d.ptu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gswstnsj.msy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gul2sp5g.wgb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h0dzfrdi.wpk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h5cvjvys.k24.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i0s0z10u.zk4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ia44xj0y.snr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_idorrz2v.a52.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jljjwxpi.rmg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jr1ujvsh.0pc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jvya3obb.etl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jxeac3yf.xa1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_khqdoywn.nit.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kqnn253l.wer.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ktslus02.hx2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l1fxpm4h.nmg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ldlf5oxu.kgh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_miept53b.2gu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mj0jhivt.oom.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mk3l4pyr.twz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mwhkvmtz.kuj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n1z4gi1t.0dh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nhno1ncm.j1b.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nrzdlshx.dqw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nw1xmalu.wj1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o0scnvqa.em3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_omt0ynyh.vcs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p2ogmwlc.2hz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p4cyflby.xgc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pm2ncara.zli.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ppj1m2px.5n1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ppxpikzf.kul.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q1i1eh1d.sou.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q21kdwxm.rjj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rgjqnzbr.px4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rkjva5we.2bl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rqsb3iln.dnt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rwhyirva.4bb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s52gr24y.cvc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sl5rr55s.cvv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_spmaseym.h1v.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sqtie05t.j3b.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tfgp1gqa.ob5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tk5zri4w.2ke.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_trmxlbhu.444.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ts3vo4pz.lzm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_umi1pw2i.eps.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v20djp2n.cuc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vwouae5s.g53.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w1v21z03.dsa.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wh5u3psp.nle.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x4q1goqv.tif.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xilu4gnh.tpd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xpnkjtkd.sbb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xx5nq4ry.fmd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yke54s30.lyg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yuahofhl.rhq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yw5stfzo.d40.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z0bj0go2.lf1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zapvcw5o.jcd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zf3su3ut.v44.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\gpnK4per5Z
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\kAkQdyqDby
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\lIqgdRuqBB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\oCffz6mD65
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\od2jP3kdg9
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\pNXvVVQa5g
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\wZpseasiVz
SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\zuwFoSPM2u.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Downloads\2afe4ed40d5a86
ASCII text, with very long lines (521), with no line terminators
dropped
C:\Users\user\Downloads\smartscreen.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
\Device\Null
ASCII text
dropped
There are 155 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c.exe
"C:\Users\user\Desktop\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$WinREAgent/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
malicious
C:\Users\Public\Videos\JFQmuJhhcOwSgqtZoqXNEERKgQYwL.exe
"C:\Users\Public\Documents\My Videos\JFQmuJhhcOwSgqtZoqXNEERKgQYwL.exe"
malicious
C:\Users\Public\Videos\JFQmuJhhcOwSgqtZoqXNEERKgQYwL.exe
"C:\Users\Public\Documents\My Videos\JFQmuJhhcOwSgqtZoqXNEERKgQYwL.exe"
malicious
C:\Users\user\Downloads\smartscreen.exe
C:\Users\user\Downloads\smartscreen.exe
malicious
C:\Users\user\Downloads\smartscreen.exe
C:\Users\user\Downloads\smartscreen.exe
malicious
C:\Recovery\WmiPrvSE.exe
C:\Recovery\WmiPrvSE.exe
malicious
C:\Recovery\WmiPrvSE.exe
C:\Recovery\WmiPrvSE.exe
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\logs\JFQmuJhhcOwSgqtZoqXNEERKgQYwL.exe
"C:\Program Files (x86)\mozilla maintenance service\logs\JFQmuJhhcOwSgqtZoqXNEERKgQYwL.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$WinREAgent/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\zuwFoSPM2u.bat"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
There are 51 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://5.42.66.51/8/datalife/Async1/External8/trackpublic/bigloadGeoRequestVoiddb/4/universal3/AsyncDump/_PollupdateCentral.php
5.42.66.51
malicious
https://ipinfo.io/country
34.117.59.81
https://g.live.com/odclientsettings/Prod/C:
unknown
https://api.telegram.org
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://crl.mic
unknown
https://api.telegram.org/bot7829111840:AAGwC163Z3bte6z_YuN643yX5LplCCYUaLM/sendPhoto
149.154.167.220
https://g.live.com/odclientsettings/ProdV2.C:
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.v
unknown
https://github.com/Pester/Pester
unknown
https://ipinfo.io
unknown
https://ipinfo.io/ip
34.117.59.81
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220
malicious
ipinfo.io
34.117.59.81

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
5.42.66.51
unknown
Russian Federation
malicious
34.117.59.81
ipinfo.io
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\9fb246deaf0867b27b8f618cbc85f57f33ee14a3
70a3ea130acbf588f607c45059c8eac151b7f6fe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\MoIXduMakYHxuPnNIwUDgtUgiwjjGQOE
MoIXduMakYHxuPnNIwUDgtUgiwjjGQOE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JFQmuJhhcOwSgqtZoqXNEERKgQYwL_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JFQmuJhhcOwSgqtZoqXNEERKgQYwL_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JFQmuJhhcOwSgqtZoqXNEERKgQYwL_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JFQmuJhhcOwSgqtZoqXNEERKgQYwL_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JFQmuJhhcOwSgqtZoqXNEERKgQYwL_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JFQmuJhhcOwSgqtZoqXNEERKgQYwL_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JFQmuJhhcOwSgqtZoqXNEERKgQYwL_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JFQmuJhhcOwSgqtZoqXNEERKgQYwL_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JFQmuJhhcOwSgqtZoqXNEERKgQYwL_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JFQmuJhhcOwSgqtZoqXNEERKgQYwL_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JFQmuJhhcOwSgqtZoqXNEERKgQYwL_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JFQmuJhhcOwSgqtZoqXNEERKgQYwL_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JFQmuJhhcOwSgqtZoqXNEERKgQYwL_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JFQmuJhhcOwSgqtZoqXNEERKgQYwL_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
452000
unkown
page readonly
malicious
12B40000
trusted library allocation
page read and write
malicious
251BAE20000
heap
page read and write
1D3CE000
stack
page read and write
1F98509B000
trusted library allocation
page read and write
39DF4FE000
stack
page read and write
18035D40000
heap
page read and write
7FF848F42000
trusted library allocation
page read and write
232E1127000
heap
page execute and read and write
7FF848EF3000
trusted library allocation
page read and write
F2200FB000
stack
page read and write
164CC6F0000
heap
page read and write
C66000
heap
page read and write
1F983E05000
heap
page read and write
1F255266000
heap
page read and write
D33AB79000
stack
page read and write
2ACB000
trusted library allocation
page read and write
293B38E1000
trusted library allocation
page read and write
EE3867E000
stack
page read and write
7FF849420000
trusted library allocation
page read and write
164CCA80000
heap
page read and write
EE393CE000
stack
page read and write
123B000
heap
page read and write
5A093FE000
stack
page read and write
4F42F0E000
stack
page read and write
1F8D4670000
heap
page execute and read and write
1FDA22B5000
trusted library allocation
page read and write
EE39249000
stack
page read and write
293B3943000
trusted library allocation
page read and write
1B711DE0000
trusted library allocation
page read and write
1C4CB000
stack
page read and write
B60000
heap
page read and write
293B2810000
heap
page execute and read and write
CC1937E000
stack
page read and write
28A2D7C000
stack
page read and write
5A09377000
stack
page read and write
6A0DFA000
stack
page read and write
1DA54000
heap
page read and write
967F8E000
stack
page read and write
2D09000
heap
page read and write
1F610311000
heap
page read and write
1C5B1E05000
trusted library allocation
page read and write
EF0000
heap
page read and write
131AF000
trusted library allocation
page read and write
18038DF5000
trusted library allocation
page read and write
39DF277000
stack
page read and write
1F2552A9000
heap
page read and write
28A3A4C000
stack
page read and write
25FBC820000
trusted library allocation
page read and write
1F983F40000
heap
page read and write
16820CE7000
heap
page read and write
242F000
stack
page read and write
1F6120A0000
heap
page read and write
232E106F000
heap
page read and write
16E22A3D000
trusted library allocation
page read and write
39E004E000
stack
page read and write
1FDA3196000
trusted library allocation
page read and write
4F42C0E000
stack
page read and write
D33ACFE000
stack
page read and write
352E7C7000
stack
page read and write
2470133F000
trusted library allocation
page read and write
1F982021000
heap
page read and write
251BCD30000
heap
page execute and read and write
9288073000
stack
page read and write
2A1BC780000
trusted library allocation
page read and write
19354D41000
trusted library allocation
page read and write
6A09B3000
stack
page read and write
1FDA0366000
heap
page read and write
159D000
heap
page read and write
C70000
trusted library allocation
page read and write
6A10FE000
stack
page read and write
2E0F000
stack
page read and write
1C7CB000
stack
page read and write
1D838000
heap
page read and write
7FF848EAC000
trusted library allocation
page read and write
B7D6B79000
stack
page read and write
1DE9E000
stack
page read and write
CC19F4C000
stack
page read and write
B7D6FBF000
stack
page read and write
1170000
heap
page read and write
7FF849040000
trusted library allocation
page execute and read and write
1DA57000
heap
page read and write
1F612070000
heap
page readonly
496000
unkown
page readonly
7FF849380000
trusted library allocation
page read and write
4465B4C000
stack
page read and write
1E801003000
trusted library allocation
page read and write
B2641BE000
stack
page read and write
7FF849260000
trusted library allocation
page read and write
1F8D5CCA000
trusted library allocation
page read and write
1B7104CA000
heap
page read and write
16E2230E000
trusted library allocation
page read and write
1C427481000
trusted library allocation
page read and write
7FF8493F0000
trusted library allocation
page read and write
EE382FE000
stack
page read and write
CD8993F000
stack
page read and write
1FDA21B0000
heap
page execute and read and write
1E2D1140000
heap
page read and write
1B442C60000
heap
page readonly
39DF37E000
stack
page read and write
1BA20000
heap
page read and write
12F7A000
trusted library allocation
page read and write
7FF848CD0000
trusted library allocation
page read and write
2F75000
trusted library allocation
page read and write
1B40D000
stack
page read and write
293B2260000
heap
page read and write
5A0927E000
stack
page read and write
2882000
unkown
page readonly
1C4275E0000
trusted library allocation
page read and write
252D000
heap
page read and write
7FF848EA9000
trusted library allocation
page read and write
1C5B1E11000
trusted library allocation
page read and write
293B358E000
trusted library allocation
page read and write
5D9603B000
stack
page read and write
B5E000
heap
page read and write
1F612040000
trusted library allocation
page read and write
F21F7AF000
stack
page read and write
1F983AB0000
heap
page read and write
19352FF6000
heap
page read and write
32DE000
stack
page read and write
1F984B53000
trusted library allocation
page read and write
C48000
heap
page read and write
239E4860000
trusted library allocation
page read and write
293B2821000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
CD8937F000
stack
page read and write
2A1BC6D0000
trusted library allocation
page read and write
3488000
trusted library allocation
page read and write
1818006F000
trusted library allocation
page read and write
2A1BC450000
heap
page read and write
1C5B1211000
trusted library allocation
page read and write
64ED64C000
stack
page read and write
18037B40000
heap
page read and write
89C000
heap
page read and write
9669CF000
stack
page read and write
1F255360000
trusted library allocation
page read and write
16E201C0000
heap
page readonly
1D8BE000
heap
page read and write
15AC000
heap
page read and write
1F610385000
heap
page read and write
4E57D47000
stack
page read and write
24700BF6000
trusted library allocation
page read and write
16E20040000
heap
page read and write
301E000
trusted library allocation
page read and write
2FBE000
trusted library allocation
page read and write
24700086000
trusted library allocation
page read and write
EE386FB000
stack
page read and write
239E3945000
trusted library allocation
page read and write
980000
heap
page read and write
EE392CC000
stack
page read and write
F220B4D000
stack
page read and write
1B711EF7000
heap
page execute and read and write
251BDDD4000
trusted library allocation
page read and write
C10000
heap
page read and write
6A0CFF000
stack
page read and write
2AC7000
trusted library allocation
page read and write
16E21E41000
trusted library allocation
page read and write
CD89838000
stack
page read and write
D33A87F000
stack
page read and write
239E36C0000
trusted library allocation
page read and write
18035E10000
heap
page read and write
928883B000
stack
page read and write
239E419B000
trusted library allocation
page read and write
164CC77A000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
6A1076000
stack
page read and write
1C5B21AE000
trusted library allocation
page read and write
2870000
unkown
page readonly
16820BE0000
heap
page read and write
18035D90000
heap
page read and write
1FDA0110000
heap
page read and write
44649F9000
stack
page read and write
8193578000
stack
page read and write
1F2570E0000
heap
page execute and read and write
F21FCF9000
stack
page read and write
3C0EA7E000
stack
page read and write
928863E000
stack
page read and write
1FDA0329000
heap
page read and write
239E1AD2000
heap
page read and write
34D2000
trusted library allocation
page read and write
1B32E0B000
stack
page read and write
13CF000
stack
page read and write
307A000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
2890000
unkown
page readonly
164CC772000
heap
page read and write
251BDCD6000
trusted library allocation
page read and write
3C0FB4E000
stack
page read and write
7FF848F00000
trusted library allocation
page read and write
232E20D1000
trusted library allocation
page read and write
3C0EC7E000
stack
page read and write
1F981FE0000
heap
page read and write
5D95C3E000
stack
page read and write
F32000
unkown
page readonly
180379F0000
trusted library allocation
page read and write
25B6000
trusted library allocation
page read and write
16820CDD000
heap
page read and write
819434E000
stack
page read and write
24700D74000
trusted library allocation
page read and write
4464C77000
stack
page read and write
B10000
heap
page read and write
2BA0000
trusted library allocation
page read and write
6A11FE000
stack
page read and write
34CE000
trusted library allocation
page read and write
239E48C0000
trusted library allocation
page read and write
247004CE000
trusted library allocation
page read and write
B26413F000
stack
page read and write
B7D6E36000
stack
page read and write
9288478000
stack
page read and write
25FBE620000
heap
page read and write
EE3807F000
stack
page read and write
1C2CD000
stack
page read and write
28A2BFD000
stack
page read and write
6A0C7F000
unkown
page read and write
2FD4000
trusted library allocation
page read and write
6A1FCD000
stack
page read and write
239E48F0000
trusted library allocation
page read and write
232E1F41000
trusted library allocation
page read and write
CAC000
heap
page read and write
EF0000
heap
page read and write
1B710480000
heap
page read and write
239E36B0000
heap
page read and write
64EC11E000
unkown
page read and write
25FBC7A1000
heap
page read and write
1B440EE0000
heap
page read and write
18035E4E000
heap
page read and write
2555000
trusted library allocation
page read and write
293B2CEE000
trusted library allocation
page read and write
2A1BE010000
heap
page read and write
3011000
trusted library allocation
page read and write
1E480000
heap
page read and write
1F983F50000
heap
page read and write
4E567CE000
stack
page read and write
819317F000
stack
page read and write
1210000
heap
page read and write
1C427480000
trusted library allocation
page read and write
1C4274C0000
trusted library allocation
page read and write
5D959F9000
stack
page read and write
24700C08000
trusted library allocation
page read and write
6E85C7F000
stack
page read and write
2A1BC460000
heap
page read and write
2A1BE0F0000
heap
page execute and read and write
1B1D2000
heap
page read and write
1B330000
unkown
page readonly
B14000
heap
page read and write
1F255380000
heap
page read and write
B7D6F3E000
stack
page read and write
B7D6A7F000
stack
page read and write
1F984EB5000
trusted library allocation
page read and write
16E22C40000
trusted library allocation
page read and write
1C5B23E9000
trusted library allocation
page read and write
239E1AAC000
heap
page read and write
16820EB7000
heap
page execute and read and write
1F9840D0000
heap
page execute and read and write
1B300000
unkown
page readonly
12E78000
trusted library allocation
page read and write
293B2631000
heap
page read and write
1B320000
unkown
page readonly
18035D95000
heap
page read and write
2919000
heap
page read and write
C30000
heap
page read and write
966C7F000
stack
page read and write
2A1BC4D8000
heap
page read and write
14F0000
trusted library allocation
page read and write
239E3D7E000
trusted library allocation
page read and write
17F0000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
251BAC28000
heap
page read and write
1C5B1E0F000
trusted library allocation
page read and write
239E41F2000
trusted library allocation
page read and write
1F255228000
heap
page read and write
293B08FD000
heap
page read and write
2A1BC519000
heap
page read and write
352DCFC000
stack
page read and write
1578000
heap
page read and write
19352ED0000
heap
page read and write
28A0000
unkown
page readonly
CD894FE000
stack
page read and write
164CC660000
heap
page read and write
3C0FACC000
stack
page read and write
39DF2FC000
stack
page read and write
1C5B22A3000
trusted library allocation
page read and write
5D95EBE000
stack
page read and write
51BA50E000
stack
page read and write
239E4167000
trusted library allocation
page read and write
239E48BC000
trusted library allocation
page read and write
16822AA6000
heap
page read and write
1B442C70000
trusted library allocation
page read and write
1B32F0D000
stack
page read and write
7FF848CFD000
trusted library allocation
page execute and read and write
81937FB000
stack
page read and write
51B9273000
stack
page read and write
7FF848F62000
trusted library allocation
page read and write
18038AED000
trusted library allocation
page read and write
870000
heap
page read and write
6A1DCC000
stack
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
1FDA0450000
trusted library allocation
page read and write
7FF848D04000
trusted library allocation
page read and write
197F000
stack
page read and write
4E56EF7000
stack
page read and write
4F41CF9000
stack
page read and write
1F257140000
heap
page read and write
51B9679000
stack
page read and write
251BDE00000
trusted library allocation
page read and write
232DEFA7000
heap
page read and write
7FF848D18000
trusted library allocation
page read and write
16E0000
heap
page read and write
1B363000
heap
page execute and read and write
1F610510000
heap
page read and write
2A1BC4D2000
heap
page read and write
50412FF000
stack
page read and write
232DEF3D000
heap
page read and write
344F000
trusted library allocation
page read and write
1F8D2C2A000
heap
page read and write
1FDA2E28000
trusted library allocation
page read and write
EE391CE000
stack
page read and write
3C0EE7B000
stack
page read and write
1DA5C000
heap
page read and write
1B440F9E000
heap
page read and write
16820D24000
heap
page read and write
1B440F20000
heap
page read and write
D33B94E000
stack
page read and write
9D0000
heap
page read and write
251BDE9D000
trusted library allocation
page read and write
928920E000
stack
page read and write
7FF84930D000
trusted library allocation
page read and write
B7D703F000
stack
page read and write
7FF848D90000
trusted library allocation
page execute and read and write
2A1BC4EC000
heap
page read and write
F5D000
heap
page read and write
16820EA0000
trusted library allocation
page read and write
300B000
trusted library allocation
page read and write
1C5AF350000
heap
page read and write
F21F6A3000
stack
page read and write
1C5AF3EB000
heap
page read and write
24701094000
trusted library allocation
page read and write
1FDA031B000
heap
page read and write
CC190FA000
stack
page read and write
5D95A7E000
stack
page read and write
2991000
trusted library allocation
page read and write
251BC6F5000
heap
page read and write
18180001000
trusted library allocation
page read and write
2E0F000
stack
page read and write
1C9CD000
stack
page read and write
D33AA79000
stack
page read and write
1DB2BCD7000
heap
page read and write
1C4274F3000
trusted library allocation
page read and write
352D9F9000
stack
page read and write
239E48CC000
trusted library allocation
page read and write
300D000
trusted library allocation
page read and write
1F255385000
heap
page read and write
1F8D2C3C000
heap
page read and write
4464F7B000
stack
page read and write
171F000
heap
page read and write
239E1A05000
heap
page read and write
16E23019000
trusted library allocation
page read and write
EE3817A000
stack
page read and write
504127B000
stack
page read and write
1C5AF500000
trusted library allocation
page read and write
1C5AF530000
trusted library allocation
page read and write
1B440F68000
heap
page read and write
5A0957B000
stack
page read and write
CA8000
heap
page read and write
7AA000
stack
page read and write
7FF8493A0000
trusted library allocation
page read and write
2A1BC660000
heap
page read and write
302F000
trusted library allocation
page read and write
1C5AF412000
heap
page read and write
CC189FE000
stack
page read and write
B263D7E000
stack
page read and write
1E92C000
stack
page read and write
B26423D000
stack
page read and write
1810000
trusted library allocation
page read and write
232DF2F5000
heap
page read and write
232E09B0000
trusted library allocation
page read and write
CC19E4E000
stack
page read and write
232DEF66000
heap
page read and write
7FF849390000
trusted library allocation
page read and write
967D8D000
stack
page read and write
232E09F0000
trusted library allocation
page read and write
19352FB6000
heap
page read and write
1B251000
heap
page read and write
16820CE9000
heap
page read and write
CD8A70E000
stack
page read and write
1040000
heap
page read and write
51BA48C000
stack
page read and write
18037D78000
trusted library allocation
page read and write
1C5AF3D3000
heap
page read and write
19352FBA000
heap
page read and write
164CC7BB000
heap
page read and write
2CE0000
heap
page read and write
1D2CC000
stack
page read and write
1B360000
heap
page execute and read and write
3370000
heap
page execute and read and write
64EC87E000
stack
page read and write
1FDA033B000
heap
page read and write
51B97B8000
stack
page read and write
B263FB6000
stack
page read and write
2627000
trusted library allocation
page read and write
1F6102D0000
heap
page read and write
2FEF000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
28AE000
unkown
page readonly
6A117E000
stack
page read and write
25FBE4CE000
heap
page read and write
2FC0000
trusted library allocation
page read and write
3460000
trusted library allocation
page read and write
352D77F000
stack
page read and write
171D000
heap
page read and write
E20000
trusted library allocation
page read and write
28D1000
trusted library allocation
page read and write
5A0A04E000
stack
page read and write
5A094FE000
stack
page read and write
B10000
heap
page read and write
1F8D2BE8000
heap
page read and write
1B440FBC000
heap
page read and write
2AC3000
trusted library allocation
page read and write
352DB7F000
stack
page read and write
1C5AF490000
trusted library allocation
page read and write
1C5AF4C0000
heap
page readonly
D33BB4E000
stack
page read and write
164CC738000
heap
page read and write
1F983FF5000
heap
page read and write
2C643FE000
stack
page read and write
232E0940000
trusted library allocation
page read and write
D33AF7B000
stack
page read and write
1F256F85000
heap
page read and write
239E3D75000
trusted library allocation
page read and write
7FF848F59000
trusted library allocation
page read and write
1E801121000
trusted library allocation
page read and write
16E1FFF0000
heap
page read and write
1788000
heap
page read and write
1FDA2220000
heap
page read and write
7FF848CD4000
trusted library allocation
page read and write
1A900000
trusted library allocation
page read and write
1D7D8000
heap
page read and write
16E20150000
heap
page read and write
2A1BC795000
heap
page read and write
164CE792000
trusted library allocation
page read and write
1B3213E000
stack
page read and write
1B442C50000
trusted library allocation
page read and write
F50000
heap
page read and write
232E0AE5000
heap
page read and write
1B22A000
heap
page read and write
2A1BC4D6000
heap
page read and write
5A0947E000
stack
page read and write
251BAE60000
heap
page read and write
1C5B0EC5000
heap
page read and write
6A1E4E000
stack
page read and write
2948000
trusted library allocation
page read and write
25FBC870000
heap
page read and write
19352FB2000
heap
page read and write
239E3D09000
trusted library allocation
page read and write
18035E6E000
heap
page read and write
25FBC6B0000
heap
page read and write
51B937F000
stack
page read and write
1B710440000
heap
page read and write
3473000
trusted library allocation
page read and write
1FDA0327000
heap
page read and write
7FF848F72000
trusted library allocation
page read and write
966FB7000
stack
page read and write
2A1BC690000
heap
page read and write
2C6524E000
stack
page read and write
232E1255000
trusted library allocation
page read and write
12F2E000
trusted library allocation
page read and write
251BAC20000
heap
page read and write
1DB2BCD0000
heap
page read and write
1F98201D000
heap
page read and write
13B0000
heap
page read and write
7FF849368000
trusted library allocation
page read and write
12A7A000
trusted library allocation
page read and write
3022000
trusted library allocation
page read and write
1FDA02FD000
heap
page read and write
8A0000
heap
page read and write
1B710735000
heap
page read and write
251BDCE2000
trusted library allocation
page read and write
1B440FE9000
heap
page read and write
7FF848D1D000
trusted library allocation
page execute and read and write
232DEF20000
heap
page read and write
4464DFF000
stack
page read and write
1B7104C2000
heap
page read and write
1F8D2C1C000
heap
page read and write
7FF849430000
trusted library allocation
page read and write
64EC9FC000
stack
page read and write
CD898BE000
stack
page read and write
251BC670000
trusted library allocation
page read and write
3464000
trusted library allocation
page read and write
C40000
heap
page read and write
B1B000
heap
page read and write
1F610530000
heap
page read and write
8192DDE000
stack
page read and write
293B08C8000
heap
page read and write
51B98BE000
stack
page read and write
1FDA02D5000
heap
page read and write
1F2550C0000
heap
page read and write
1F610300000
heap
page read and write
39DFFCC000
stack
page read and write
7FF848D24000
trusted library allocation
page read and write
EE390CE000
stack
page read and write
6A204E000
stack
page read and write
16E21EC6000
trusted library allocation
page read and write
1F8D5544000
trusted library allocation
page read and write
4F4213C000
stack
page read and write
18037B51000
trusted library allocation
page read and write
18035DD0000
trusted library allocation
page read and write
1855000
heap
page read and write
3024000
trusted library allocation
page read and write
1F257130000
trusted library allocation
page read and write
25FBC735000
heap
page read and write
158F000
heap
page read and write
5A08C93000
stack
page read and write
251BCD41000
trusted library allocation
page read and write
18037BD5000
trusted library allocation
page read and write
16820C10000
heap
page read and write
232E1030000
heap
page read and write
164CC730000
heap
page read and write
1F256B30000
trusted library allocation
page read and write
1B71057E000
heap
page read and write
96713F000
stack
page read and write
1E8004CE000
trusted library allocation
page read and write
19352F78000
heap
page read and write
1FDA2E38000
trusted library allocation
page read and write
64EC8FF000
stack
page read and write
6A1ECB000
stack
page read and write
1D1CC000
stack
page read and write
6A137B000
stack
page read and write
F98000
unkown
page readonly
2E80000
trusted library allocation
page read and write
1FDA3235000
trusted library allocation
page read and write
1F8D5860000
trusted library allocation
page read and write
CC18E7E000
stack
page read and write
16820E90000
heap
page readonly
1B710710000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
1B440F50000
heap
page read and write
CD8A68C000
stack
page read and write
352D976000
stack
page read and write
232E1EAD000
trusted library allocation
page read and write
2FCD000
trusted library allocation
page read and write
18035E5A000
heap
page read and write
5D95BF9000
stack
page read and write
1F612090000
heap
page execute and read and write
1C427480000
trusted library allocation
page read and write
297D000
trusted library allocation
page read and write
1B711E70000
heap
page read and write
1709000
heap
page read and write
4F4223B000
stack
page read and write
1C5B1437000
trusted library allocation
page read and write
D33AEFE000
stack
page read and write
6F3000
stack
page read and write
4E57DCD000
stack
page read and write
2FAF000
trusted library allocation
page read and write
7FF848D2B000
trusted library allocation
page execute and read and write
1C5B1296000
trusted library allocation
page read and write
164CE6F0000
heap
page execute and read and write
1C5AF310000
heap
page read and write
19352FCE000
heap
page read and write
CC193FB000
stack
page read and write
1C5B16DE000
trusted library allocation
page read and write
1B31E77000
stack
page read and write
64EC093000
stack
page read and write
7FF848F90000
trusted library allocation
page execute and read and write
15AF000
heap
page read and write
D33AAFD000
stack
page read and write
D33A979000
stack
page read and write
51BA60C000
stack
page read and write
D33BACC000
stack
page read and write
291D000
heap
page read and write
B263E7D000
stack
page read and write
1B711DB0000
trusted library allocation
page read and write
1F983AB5000
heap
page read and write
1F8D2C62000
heap
page read and write
D33B9CA000
stack
page read and write
25FBE175000
heap
page read and write
1F255220000
heap
page read and write
16E200C4000
heap
page read and write
5A0A14E000
stack
page read and write
1B442DB0000
heap
page read and write
1F610500000
heap
page read and write
1F982023000
heap
page read and write
1BA10000
heap
page execute and read and write
1F6103EF000
heap
page read and write
FB4000
unkown
page readonly
EE380FF000
stack
page read and write
1F981FE8000
heap
page read and write
16E1FF10000
heap
page read and write
F21F7EE000
stack
page read and write
25FBE050000
trusted library allocation
page read and write
1FDA0250000
heap
page read and write
293B09AF000
heap
page read and write
6A0FF8000
stack
page read and write
7FF848D0D000
trusted library allocation
page execute and read and write
1E800F9C000
trusted library allocation
page read and write
232DEF5C000
heap
page read and write
2C64377000
stack
page read and write
239E48CF000
trusted library allocation
page read and write
1D899000
heap
page read and write
16E201D0000
trusted library allocation
page read and write
25FBC70E000
heap
page read and write
239E494C000
trusted library allocation
page read and write
239E3736000
heap
page read and write
1B235000
heap
page read and write
5D95FBE000
stack
page read and write
232DEF64000
heap
page read and write
12A83000
trusted library allocation
page read and write
2FBC000
trusted library allocation
page read and write
28A2A79000
stack
page read and write
3471000
trusted library allocation
page read and write
1C8CD000
stack
page read and write
1B7104C8000
heap
page read and write
1F983A00000
trusted library allocation
page read and write
64ED74E000
stack
page read and write
1FDA0290000
trusted library allocation
page read and write
B7D6BFF000
stack
page read and write
7FF848DB6000
trusted library allocation
page execute and read and write
B00000
heap
page execute and read and write
16820F20000
heap
page read and write
3C0E8F9000
stack
page read and write
131A6000
trusted library allocation
page read and write
5A095FE000
stack
page read and write
293B397E000
trusted library allocation
page read and write
1505000
heap
page read and write
232E0FE0000
heap
page read and write
B7D7B8C000
stack
page read and write
1B442CA0000
trusted library allocation
page read and write
28A384E000
stack
page read and write
C90000
trusted library allocation
page read and write
2A1BC513000
heap
page read and write
164CC6E0000
heap
page read and write
5A0A2CC000
stack
page read and write
293B0B90000
heap
page read and write
CC18EF9000
stack
page read and write
251BD947000
trusted library allocation
page read and write
1E2D0D70000
heap
page read and write
F21FD77000
stack
page read and write
1F9840F0000
heap
page execute and read and write
18037A20000
trusted library allocation
page read and write
1C427550000
trusted library allocation
page read and write
239E4180000
trusted library allocation
page read and write
6E859AC000
stack
page read and write
352D8F9000
stack
page read and write
293B08FF000
heap
page read and write
16820FB0000
heap
page read and write
1343000
stack
page read and write
81931FE000
stack
page read and write
1080000
heap
page read and write
7FF848DB0000
trusted library allocation
page read and write
3451000
trusted library allocation
page read and write
D33A8FE000
stack
page read and write
1F25527C000
heap
page read and write
1B440F45000
heap
page read and write
96703B000
stack
page read and write
1E801092000
trusted library allocation
page read and write
1F8D2DC0000
heap
page read and write
D33A9FE000
stack
page read and write
232E0FF4000
heap
page read and write
180388BC000
trusted library allocation
page read and write
16E2007F000
heap
page read and write
4465A4E000
stack
page read and write
251BCCE7000
heap
page execute and read and write
1B711D70000
trusted library allocation
page read and write
6A09FE000
stack
page read and write
7FF8492A0000
trusted library allocation
page read and write
259F000
trusted library allocation
page read and write
251BACA8000
heap
page read and write
352E6CE000
stack
page read and write
B264F0C000
stack
page read and write
239E1AD4000
heap
page read and write
1B320BC000
stack
page read and write
15D8000
heap
page read and write
1B2F0000
unkown
page readonly
18035DF0000
trusted library allocation
page read and write
2A1BC6F0000
trusted library allocation
page read and write
19354830000
heap
page readonly
1F255262000
heap
page read and write
1B7104CC000
heap
page read and write
3049000
trusted library allocation
page read and write
1DB2BCC5000
heap
page read and write
7FF849298000
trusted library allocation
page read and write
ECE000
stack
page read and write
1B440FAA000
heap
page read and write
352E8CC000
stack
page read and write
3C0E51F000
unkown
page read and write
1F981F50000
heap
page read and write
1F256C30000
heap
page read and write
239E3D82000
trusted library allocation
page read and write
39DF17F000
stack
page read and write
1F610505000
heap
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
1B2F2000
unkown
page readonly
6A1F4C000
stack
page read and write
2A1BC790000
heap
page read and write
1C427820000
remote allocation
page read and write
96694F000
unkown
page read and write
81944CE000
stack
page read and write
2C64479000
stack
page read and write
850000
heap
page read and write
232E0AE0000
heap
page read and write
39DEFF9000
stack
page read and write
1F982025000
heap
page read and write
2EE0000
trusted library allocation
page read and write
928873B000
stack
page read and write
164CC910000
trusted library allocation
page read and write
B7D6DBE000
stack
page read and write
1B440EC0000
heap
page read and write
25FBC840000
trusted library allocation
page read and write
16E22893000
trusted library allocation
page read and write
1FDA0540000
heap
page read and write
1B3237B000
stack
page read and write
F80000
unkown
page readonly
352D283000
stack
page read and write
18038C72000
trusted library allocation
page read and write
19352F60000
trusted library allocation
page read and write
3C0EB76000
stack
page read and write
1E8011D7000
trusted library allocation
page read and write
1390000
heap
page read and write
1FDA32C4000
trusted library allocation
page read and write
1B442CE0000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
1B711EF0000
heap
page execute and read and write
1B96C000
stack
page read and write
4F420BF000
stack
page read and write
51B9479000
stack
page read and write
4E571FE000
stack
page read and write
F220C4D000
stack
page read and write
1B302000
unkown
page readonly
B2639DF000
stack
page read and write
16820F25000
heap
page read and write
7FF848EFA000
trusted library allocation
page read and write
232DF2F0000
heap
page read and write
1B31DFE000
stack
page read and write
1E2D0F00000
heap
page read and write
4464CFB000
stack
page read and write
2C641FE000
stack
page read and write
232E0980000
trusted library allocation
page read and write
7FF848D20000
trusted library allocation
page read and write
25FBC6FC000
heap
page read and write
B7D7C89000
stack
page read and write
2A1BC490000
heap
page read and write
D33A523000
stack
page read and write
2FBA000
trusted library allocation
page read and write
1B25B000
heap
page read and write
1F610344000
heap
page read and write
5D96A0F000
stack
page read and write
1F981FC0000
heap
page read and write
39E01CE000
stack
page read and write
7FF849370000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
18037A60000
heap
page execute and read and write
23F80001000
trusted library allocation
page read and write
FFF000
stack
page read and write
239E48C4000
trusted library allocation
page read and write
239E1A00000
heap
page read and write
23F8001F000
trusted library allocation
page read and write
64ED4CE000
stack
page read and write
2AD5000
trusted library allocation
page read and write
AF6000
heap
page read and write
1B711F20000
heap
page read and write
28A26FF000
unkown
page read and write
293B09C0000
heap
page read and write
16822BC1000
trusted library allocation
page read and write
5A0A249000
stack
page read and write
13012000
trusted library allocation
page read and write
319F000
stack
page read and write
19352FBC000
heap
page read and write
1840000
heap
page read and write
11B0000
heap
page read and write
1D801000
heap
page read and write
7FF849450000
trusted library allocation
page execute and read and write
51B983E000
stack
page read and write
4F41EB6000
stack
page read and write
1F981F80000
heap
page read and write
251BDD70000
trusted library allocation
page read and write
28A28FF000
stack
page read and write
EE37D03000
stack
page read and write
251BAEB5000
heap
page read and write
3479000
trusted library allocation
page read and write
EE3934D000
stack
page read and write
28A2879000
stack
page read and write
1C42291A000
heap
page read and write
1D0CB000
stack
page read and write
966CF9000
stack
page read and write
1F25526A000
heap
page read and write
259C000
trusted library allocation
page read and write
81943CC000
stack
page read and write
CD89ABB000
stack
page read and write
39E014D000
stack
page read and write
16E22BB3000
trusted library allocation
page read and write
352D7F9000
stack
page read and write
876000
heap
page read and write
1B712461000
trusted library allocation
page read and write
5A08D1F000
unkown
page read and write
1A70000
trusted library allocation
page read and write
174B000
heap
page read and write
1FDA2E30000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
12FC6000
trusted library allocation
page read and write
232E1C25000
trusted library allocation
page read and write
16EC000
heap
page read and write
11D0000
heap
page read and write
34D4000
trusted library allocation
page read and write
1B332000
unkown
page readonly
2E69000
heap
page read and write
2FC3000
trusted library allocation
page read and write
4F42D0E000
stack
page read and write
164CC990000
trusted library allocation
page read and write
2FAB000
trusted library allocation
page read and write
239E1A20000
heap
page read and write
D33AE7C000
stack
page read and write
28C0000
heap
page execute and read and write
4465AC9000
stack
page read and write
4E57C4F000
stack
page read and write
12E77000
trusted library allocation
page read and write
2A1BE115000
heap
page read and write
25FBE610000
trusted library allocation
page read and write
19352FBE000
heap
page read and write
39DF07E000
stack
page read and write
1DA40000
heap
page read and write
1435000
heap
page read and write
1C5AF580000
heap
page read and write
3026000
trusted library allocation
page read and write
3466000
trusted library allocation
page read and write
446487F000
unkown
page read and write
1B7124E5000
trusted library allocation
page read and write
1B442DA0000
heap
page execute and read and write
28A394C000
stack
page read and write
25A1000
trusted library allocation
page read and write
1F8D5A8D000
trusted library allocation
page read and write
2A1BC740000
trusted library allocation
page read and write
130FD000
trusted library allocation
page read and write
943000
stack
page read and write
1F8D5BB1000
trusted library allocation
page read and write
1B442E3B000
trusted library allocation
page read and write
239E38C1000
trusted library allocation
page read and write
D33AC78000
stack
page read and write
39DEBDE000
stack
page read and write
5D96C8E000
stack
page read and write
1D8FA000
heap
page read and write
F220D4E000
stack
page read and write
2C654CE000
stack
page read and write
2E71000
trusted library allocation
page read and write
293B0944000
heap
page read and write
239E1A50000
heap
page read and write
25FBE020000
trusted library allocation
page read and write
293B0905000
heap
page read and write
1FDA02D0000
heap
page read and write
7FF848EE0000
trusted library allocation
page read and write
5D96C0C000
stack
page read and write
1FDA0363000
heap
page read and write
1C5B0DD0000
heap
page execute and read and write
9288279000
stack
page read and write
239E36F0000
trusted library allocation
page read and write
1C5B236D000
trusted library allocation
page read and write
18035E99000
heap
page read and write
39DEE7F000
unkown
page read and write
3C0E493000
stack
page read and write
149F000
stack
page read and write
2F73000
trusted library allocation
page read and write
CC18D7E000
stack
page read and write
7FF849270000
trusted library allocation
page read and write
19352EB0000
heap
page read and write
239E3D8A000
trusted library allocation
page read and write
1DB2BC40000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
1B440EB0000
heap
page read and write
1C5B0E50000
heap
page execute and read and write
EE38379000
stack
page read and write
1BA6C000
stack
page read and write
239E44C5000
trusted library allocation
page read and write
19354880000
trusted library allocation
page read and write
B264E0B000
stack
page read and write
2C6487C000
stack
page read and write
251BAC63000
heap
page read and write
1FDA21F0000
trusted library allocation
page read and write
CD8A50D000
stack
page read and write
1CFCB000
stack
page read and write
1FDA0500000
heap
page execute and read and write
174D000
heap
page read and write
1B440FA8000
heap
page read and write
1B3227E000
stack
page read and write
232E11D1000
trusted library allocation
page read and write
293B099B000
heap
page read and write
24701307000
trusted library allocation
page read and write
3407000
trusted library allocation
page read and write
39DEF7E000
stack
page read and write
1A50000
trusted library allocation
page read and write
19352FFA000
heap
page read and write
1F2551A0000
heap
page read and write
13D0000
trusted library allocation
page read and write
16820CA8000
heap
page read and write
34CC000
trusted library allocation
page read and write
1127000
heap
page read and write
CD89737000
stack
page read and write
2945000
trusted library allocation
page read and write
11FE000
heap
page read and write
1B370000
heap
page read and write
31E0000
heap
page read and write
1FDA0210000
heap
page read and write
19354840000
heap
page read and write
1F9840D7000
heap
page execute and read and write
293B07C0000
heap
page read and write
293B0901000
heap
page read and write
9672BC000
stack
page read and write
1C4274F0000
trusted library allocation
page read and write
1803892B000
trusted library allocation
page read and write
B26395F000
unkown
page read and write
B263DF7000
stack
page read and write
251BDBC8000
trusted library allocation
page read and write
3031000
trusted library allocation
page read and write
1E8012A6000
trusted library allocation
page read and write
4F4203E000
stack
page read and write
164CC950000
heap
page read and write
7FF848E70000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
1E8010BE000
trusted library allocation
page read and write
F60000
heap
page execute and read and write
8193377000
stack
page read and write
92882FF000
stack
page read and write
16E22ED3000
trusted library allocation
page read and write
1B310000
unkown
page readonly
298C000
trusted library allocation
page read and write
1E1DF000
stack
page read and write
928948E000
stack
page read and write
64ECAFB000
stack
page read and write
7FF848EC0000
trusted library allocation
page read and write
239E38B0000
heap
page execute and read and write
239E18C0000
heap
page read and write
CC18DFA000
stack
page read and write
81936FE000
stack
page read and write
6A0EF7000
stack
page read and write
7FF8493E0000
trusted library allocation
page read and write
1F8D2D40000
trusted library allocation
page read and write
293B21F0000
trusted library allocation
page read and write
1E2D0E50000
heap
page read and write
967D0C000
stack
page read and write
239E495F000
trusted library allocation
page read and write
1F983F98000
heap
page read and write
23F80085000
trusted library allocation
page read and write
1D7D0000
heap
page read and write
F21FE78000
stack
page read and write
12D58000
trusted library allocation
page read and write
5A08D9F000
stack
page read and write
CC18F7D000
stack
page read and write
7FF848F80000
trusted library allocation
page read and write
1F17D000
stack
page read and write
966D7E000
stack
page read and write
2FF1000
trusted library allocation
page read and write
1F984E7C000
trusted library allocation
page read and write
16822BB0000
heap
page execute and read and write
819454E000
stack
page read and write
1F982225000
heap
page read and write
164CC778000
heap
page read and write
1C5B0EA0000
trusted library allocation
page read and write
39DEEFF000
stack
page read and write
239E47FA000
trusted library allocation
page read and write
2FE6000
trusted library allocation
page read and write
164CCA85000
heap
page read and write
5A0A34E000
stack
page read and write
12AF3000
trusted library allocation
page read and write
2C653CC000
stack
page read and write
92881FE000
stack
page read and write
3486000
trusted library allocation
page read and write
2ED1000
trusted library allocation
page read and write
16E20190000
trusted library allocation
page read and write
CC18FF8000
stack
page read and write
16E21AF0000
heap
page read and write
1380000
heap
page read and write
1F8D5C4E000
trusted library allocation
page read and write
1B850000
heap
page read and write
1F8D5A93000
trusted library allocation
page read and write
128D1000
trusted library allocation
page read and write
16820C50000
heap
page read and write
EE385FC000
stack
page read and write
1860000
heap
page read and write
D33ADFF000
stack
page read and write
19354DC5000
trusted library allocation
page read and write
2927000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page execute and read and write
1C5B2240000
trusted library allocation
page read and write
28F0000
heap
page execute and read and write
251BAD20000
heap
page read and write
1C427820000
remote allocation
page read and write
1C5B2214000
trusted library allocation
page read and write
31DD000
heap
page read and write
293B2220000
heap
page readonly
3C0E9F7000
stack
page read and write
16E2009D000
heap
page read and write
1F379000
stack
page read and write
3040000
trusted library allocation
page read and write
2FDE000
trusted library allocation
page read and write
232E13F9000
trusted library allocation
page read and write
1F61033C000
heap
page read and write
1B712274000
heap
page read and write
1133000
stack
page read and write
239E1B31000
heap
page read and write
19354905000
heap
page read and write
239E469C000
trusted library allocation
page read and write
1B440F9C000
heap
page read and write
4E56AFF000
unkown
page read and write
B7D67EF000
unkown
page read and write
1F700227000
trusted library allocation
page read and write
251BCB30000
heap
page read and write
F22000
unkown
page readonly
18035E56000
heap
page read and write
251BCF67000
trusted library allocation
page read and write
1C5AF398000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
CC19EC7000
stack
page read and write
3C0F84E000
stack
page read and write
CC19077000
stack
page read and write
1E57C000
heap
page read and write
293B3273000
trusted library allocation
page read and write
28A277F000
stack
page read and write
11DC000
heap
page read and write
18037B20000
heap
page execute and read and write
CD8A587000
stack
page read and write
239E1A90000
heap
page read and write
A6F000
stack
page read and write
12A76000
trusted library allocation
page read and write
F21F72F000
unkown
page read and write
446594E000
stack
page read and write
1FDA2231000
trusted library allocation
page read and write
1C5AF4F0000
heap
page read and write
B33000
heap
page read and write
232E11C0000
heap
page execute and read and write
1FDA0325000
heap
page read and write
193548C0000
trusted library allocation
page read and write
CC189B3000
stack
page read and write
352D38F000
stack
page read and write
16820EC0000
heap
page read and write
EE37D8F000
unkown
page read and write
352DA7A000
stack
page read and write
B7D70BE000
stack
page read and write
13025000
trusted library allocation
page read and write
1B31C7F000
stack
page read and write
81935FE000
stack
page read and write
25FBC6F8000
heap
page read and write
1E2D0F17000
heap
page read and write
16E20083000
heap
page read and write
1B32D8C000
stack
page read and write
700000
heap
page read and write
180385A4000
trusted library allocation
page read and write
18035D10000
heap
page read and write
258D000
trusted library allocation
page read and write
1C5B1C63000
trusted library allocation
page read and write
1F61035C000
heap
page read and write
286F000
stack
page read and write
51B99BF000
stack
page read and write
1F8D2D80000
trusted library allocation
page read and write
164CC690000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
1B84F000
stack
page read and write
2C644F7000
stack
page read and write
7FF848F30000
trusted library allocation
page read and write
239E4982000
trusted library allocation
page read and write
293B38B5000
trusted library allocation
page read and write
D33BA47000
stack
page read and write
64ED54E000
stack
page read and write
1B322FE000
stack
page read and write
B7D6CFE000
stack
page read and write
251BAD1A000
heap
page read and write
251BCCE0000
heap
page execute and read and write
293B0903000
heap
page read and write
1B226000
heap
page read and write
2A1BC57F000
heap
page read and write
5D9587F000
unkown
page read and write
EE3914C000
stack
page read and write
39DFF4F000
stack
page read and write
4F41DF9000
stack
page read and write
1B440FA6000
heap
page read and write
5D95DBC000
stack
page read and write
239E3660000
trusted library allocation
page read and write
2C6477C000
stack
page read and write
34BD000
trusted library allocation
page read and write
1B71057B000
heap
page read and write
16820E80000
trusted library allocation
page read and write
7FF8493EE000
trusted library allocation
page read and write
239E1A58000
heap
page read and write
293B0948000
heap
page read and write
18035E54000
heap
page read and write
1168000
heap
page read and write
CC19DCE000
stack
page read and write
1B442C30000
trusted library allocation
page read and write
1C42291A000
heap
page read and write
28A2E7B000
stack
page read and write
1B878000
heap
page read and write
C00000
heap
page read and write
1D8EF000
heap
page read and write
15DA000
heap
page read and write
232DEF10000
heap
page read and write
3C0E5DE000
stack
page read and write
F21FEFE000
stack
page read and write
819444C000
stack
page read and write
1F8D5C13000
trusted library allocation
page read and write
4F41C7F000
stack
page read and write
9668C3000
stack
page read and write
1C5B1FC4000
trusted library allocation
page read and write
28A2B78000
stack
page read and write
7FF848CF0000
trusted library allocation
page read and write
8B2000
heap
page read and write
1E2DB000
stack
page read and write
1E09D000
stack
page read and write
239E41BC000
trusted library allocation
page read and write
1213000
heap
page read and write
B264E8C000
stack
page read and write
5A08DDE000
stack
page read and write
64EC67E000
stack
page read and write
5D95CB6000
stack
page read and write
232E1F4A000
trusted library allocation
page read and write
7FF8492D0000
trusted library allocation
page read and write
3038000
trusted library allocation
page read and write
293B2770000
heap
page execute and read and write
251BACA4000
heap
page read and write
1F984329000
trusted library allocation
page read and write
3C0ECFE000
stack
page read and write
7FF848D13000
trusted library allocation
page read and write
2C6417F000
stack
page read and write
25FBC680000
heap
page read and write
1D7DC000
heap
page read and write
6A1D4E000
stack
page read and write
5A092F9000
stack
page read and write
123D000
heap
page read and write
344D000
trusted library allocation
page read and write
1C5B0EC0000
heap
page read and write
7FF848F6E000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
B264D0E000
stack
page read and write
39DEB93000
stack
page read and write
7FF8493B1000
trusted library allocation
page read and write
1B712450000
heap
page execute and read and write
1B440F71000
heap
page read and write
5D9597E000
stack
page read and write
239E3A8A000
trusted library allocation
page read and write
CC192FC000
stack
page read and write
1F98404D000
heap
page read and write
239E3D01000
trusted library allocation
page read and write
239E3D79000
trusted library allocation
page read and write
1F67E000
stack
page read and write
293B27E0000
heap
page execute and read and write
28A29FD000
stack
page read and write
2A1BC498000
heap
page read and write
5D95B7D000
stack
page read and write
CC191FE000
stack
page read and write
1513000
stack
page read and write
293B08A0000
heap
page read and write
1C4274C4000
trusted library allocation
page read and write
4E56FF9000
stack
page read and write
51BA40E000
stack
page read and write
64EC97E000
stack
page read and write
1B31962000
stack
page read and write
1B31F78000
stack
page read and write
F220CCC000
stack
page read and write
7FF848EE0000
trusted library allocation
page read and write
1B7123F0000
heap
page execute and read and write
7FF848CD3000
trusted library allocation
page execute and read and write
293B2270000
trusted library allocation
page read and write
28A39CD000
stack
page read and write
39DF0F7000
stack
page read and write
1FDA02C0000
heap
page readonly
251BD793000
trusted library allocation
page read and write
2FB1000
trusted library allocation
page read and write
967E09000
stack
page read and write
1C427820000
remote allocation
page read and write
8E1000
heap
page read and write
247011D9000
trusted library allocation
page read and write
1F610340000
heap
page read and write
1F256B80000
trusted library allocation
page read and write
1B253000
heap
page read and write
1C4274B0000
trusted library allocation
page read and write
232E1DC9000
trusted library allocation
page read and write
1B32038000
stack
page read and write
1B440F60000
heap
page read and write
5A0A0CC000
stack
page read and write
5A091F6000
stack
page read and write
352DAFE000
stack
page read and write
7FF848F30000
trusted library allocation
page read and write
2C63DFE000
stack
page read and write
25FBC73A000
heap
page read and write
164CC81F000
heap
page read and write
4E56C79000
stack
page read and write
1D836000
heap
page read and write
B7D7B0E000
stack
page read and write
7FF848EF0000
trusted library allocation
page read and write
AF0000
heap
page read and write
18035DA0000
heap
page read and write
4464B7E000
stack
page read and write
1D6CE000
stack
page read and write
4F421BE000
stack
page read and write
16822BF9000
trusted library allocation
page read and write
7FF848CE3000
trusted library allocation
page read and write
25FBE170000
heap
page read and write
28A23CE000
stack
page read and write
1B71050A000
heap
page read and write
96723E000
stack
page read and write
1F8D2BC0000
heap
page read and write
44648FF000
stack
page read and write
13183000
trusted library allocation
page read and write
352E74E000
stack
page read and write
1B440FA2000
heap
page read and write
7FF8493C0000
trusted library allocation
page read and write
247010C0000
trusted library allocation
page read and write
1F25525C000
heap
page read and write
28A27FE000
stack
page read and write
1D5CE000
stack
page read and write
3C0F94E000
stack
page read and write
1F256BB0000
trusted library allocation
page read and write
12E71000
trusted library allocation
page read and write
DCE000
stack
page read and write
1F98202B000
heap
page read and write
7FF849290000
trusted library allocation
page read and write
81933FE000
stack
page read and write
2529000
heap
page read and write
1F983FC0000
heap
page read and write
293B2230000
trusted library allocation
page read and write
2ABD000
trusted library allocation
page read and write
18037A67000
heap
page execute and read and write
2A1BC700000
heap
page readonly
239E1A92000
heap
page read and write
7FF848CDD000
trusted library allocation
page execute and read and write
13137000
trusted library allocation
page read and write
1B711D90000
trusted library allocation
page read and write
12DE4000
trusted library allocation
page read and write
1FDA0410000
trusted library allocation
page read and write
7FF848D5C000
trusted library allocation
page execute and read and write
B26433B000
stack
page read and write
18035E18000
heap
page read and write
7FF848EB4000
trusted library allocation
page read and write
1560000
heap
page read and write
24700228000
trusted library allocation
page read and write
4E56B7F000
stack
page read and write
1B441048000
heap
page read and write
293B0BB5000
heap
page read and write
2FE4000
trusted library allocation
page read and write
10B0000
heap
page read and write
CD8A60D000
stack
page read and write
293B3825000
trusted library allocation
page read and write
990000
heap
page read and write
164CC774000
heap
page read and write
CD896BE000
stack
page read and write
B2638D3000
stack
page read and write
232DEF6A000
heap
page read and write
16822C45000
trusted library allocation
page read and write
170C000
heap
page read and write
FA0000
unkown
page readonly
1B32239000
stack
page read and write
25FBC850000
heap
page readonly
92883FE000
stack
page read and write
13D0000
heap
page read and write
164CE710000
heap
page execute and read and write
2E10000
heap
page read and write
2892000
unkown
page readonly
2C6544C000
stack
page read and write
51B993E000
stack
page read and write
16820CE3000
heap
page read and write
2C646FE000
stack
page read and write
819327A000
stack
page read and write
5D95F3C000
stack
page read and write
B85000
heap
page read and write
7FF848D86000
trusted library allocation
page read and write
1510000
heap
page execute and read and write
3C0F9CB000
stack
page read and write
1E2D0E70000
heap
page read and write
164CC78E000
heap
page read and write
293B091D000
heap
page read and write
FC0000
heap
page read and write
5D96A8E000
stack
page read and write
819367E000
stack
page read and write
D3E000
heap
page read and write
1DB2BC20000
heap
page read and write
D33A5AF000
unkown
page read and write
3311000
trusted library allocation
page read and write
1C5AF2F0000
heap
page read and write
F40000
unkown
page readonly
81941CF000
stack
page read and write
251BAC69000
heap
page read and write
12DC3000
trusted library allocation
page read and write
928940C000
stack
page read and write
251BAEA0000
trusted library allocation
page read and write
450000
unkown
page readonly
CD89A3E000
stack
page read and write
7FF848D2D000
trusted library allocation
page execute and read and write
7FF848DE6000
trusted library allocation
page execute and read and write
2FAD000
trusted library allocation
page read and write
1F983FF0000
heap
page read and write
31D0000
heap
page read and write
1FDA2C83000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
5A0A1CC000
stack
page read and write
F30000
unkown
page readonly
2E60000
heap
page read and write
1FDA2037000
heap
page read and write
6A0E7E000
stack
page read and write
1C6CD000
stack
page read and write
1D7CE000
stack
page read and write
1B44104F000
heap
page read and write
2539000
trusted library allocation
page read and write
4E56BFE000
stack
page read and write
7FF848EA0000
trusted library allocation
page read and write
18038D61000
trusted library allocation
page read and write
2A1BC4CC000
heap
page read and write
1F8D2D60000
trusted library allocation
page read and write
B64000
heap
page read and write
1C5AF4D0000
trusted library allocation
page read and write
F21FA7E000
stack
page read and write
251BAC7D000
heap
page read and write
239E3680000
heap
page execute and read and write
1F984E73000
trusted library allocation
page read and write
BF0000
heap
page read and write
3044000
trusted library allocation
page read and write
2E6D000
heap
page read and write
251BAE00000
heap
page read and write
7FF848F24000
trusted library allocation
page read and write
251BCCC0000
heap
page execute and read and write
164CE721000
trusted library allocation
page read and write
1E2D0F09000
heap
page read and write
25FBC7E0000
heap
page read and write
232DEFA2000
heap
page read and write
251BD937000
trusted library allocation
page read and write
2CDE000
stack
page read and write
1B711E20000
trusted library allocation
page read and write
7E0000
heap
page read and write
7FF8492E0000
trusted library allocation
page read and write
4E56A73000
stack
page read and write
9C5000
heap
page read and write
51BA589000
stack
page read and write
293B000
trusted library allocation
page read and write
1F610308000
heap
page read and write
1F6120B1000
trusted library allocation
page read and write
1B7104BD000
heap
page read and write
1F256B70000
heap
page execute and read and write
1307F000
trusted library allocation
page read and write
1F27A000
stack
page read and write
967C8E000
stack
page read and write
293B289A000
trusted library allocation
page read and write
12E81000
trusted library allocation
page read and write
CD897BB000
stack
page read and write
4F41FBE000
stack
page read and write
24700C00000
trusted library allocation
page read and write
1D81F000
heap
page read and write
251BAC5D000
heap
page read and write
239E495C000
trusted library allocation
page read and write
92886BE000
stack
page read and write
239E1A10000
trusted library section
page read and write
28A3ACE000
stack
page read and write
2FD1000
trusted library allocation
page read and write
64EC776000
stack
page read and write
7FF8492C0000
trusted library allocation
page read and write
164CC930000
trusted library allocation
page read and write
1AC5D000
heap
page read and write
232DF0F0000
heap
page read and write
164CC720000
trusted library allocation
page read and write
2C640FF000
unkown
page read and write
4E56D79000
stack
page read and write
25FBC7B0000
heap
page read and write
2C64578000
stack
page read and write
1CDCB000
stack
page read and write
1190000
heap
page read and write
1F70007A000
trusted library allocation
page read and write
1F981F60000
heap
page read and write
3C0EDFE000
stack
page read and write
113B000
heap
page read and write
1A80000
heap
page read and write
B2642BE000
stack
page read and write
1599000
heap
page read and write
1F8D45D0000
trusted library allocation
page read and write
2C6467E000
stack
page read and write
251BAC5F000
heap
page read and write
1F8D2AC0000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
51B93FE000
stack
page read and write
28A2000
unkown
page readonly
19354820000
trusted library allocation
page read and write
64EC19F000
stack
page read and write
1C5AF4B0000
trusted library allocation
page read and write
1B711DA0000
heap
page readonly
1F8D2BFD000
heap
page read and write
239E19A0000
heap
page read and write
39DF3FE000
stack
page read and write
1F610389000
heap
page read and write
16E20210000
heap
page read and write
504137E000
stack
page read and write
293B3597000
trusted library allocation
page read and write
1F6104D0000
heap
page read and write
B7D6C77000
stack
page read and write
1FDA02B0000
trusted library allocation
page read and write
1030000
heap
page read and write
1F982210000
trusted library allocation
page read and write
4E56DFD000
stack
page read and write
12A7000
heap
page read and write
1C5AF370000
trusted library section
page read and write
289E000
stack
page read and write
18180073000
trusted library allocation
page read and write
322D000
heap
page read and write
1C5B1F7F000
trusted library allocation
page read and write
485000
unkown
page readonly
251BC690000
trusted library allocation
page read and write
6A12FF000
stack
page read and write
1F8D4AF1000
trusted library allocation
page read and write
251BCDC6000
trusted library allocation
page read and write
F21FB7E000
stack
page read and write
18180228000
trusted library allocation
page read and write
9671B8000
stack
page read and write
2A1BE461000
trusted library allocation
page read and write
239E4950000
trusted library allocation
page read and write
1B710504000
heap
page read and write
1500000
heap
page read and write
1D821000
heap
page read and write
CC18CFF000
stack
page read and write
25FBC860000
trusted library allocation
page read and write
B7D6763000
stack
page read and write
1B31D79000
stack
page read and write
1F8D5979000
trusted library allocation
page read and write
1F612122000
trusted library allocation
page read and write
4E57ECE000
stack
page read and write
B264D8E000
stack
page read and write
E70000
heap
page read and write
1DB2BC10000
heap
page read and write
3C0E87E000
stack
page read and write
2F77000
trusted library allocation
page read and write
64EC1DE000
stack
page read and write
CD89679000
stack
page read and write
8DE000
heap
page read and write
293B2A48000
trusted library allocation
page read and write
2EC0000
heap
page execute and read and write
450000
unkown
page readonly
232E0AC0000
heap
page execute and read and write
1FDA0545000
heap
page read and write
1C5AF210000
heap
page read and write
16820CFD000
heap
page read and write
3491000
trusted library allocation
page read and write
1F8D2BE0000
heap
page read and write
1B32F8E000
stack
page read and write
1F8D47A5000
heap
page read and write
2C6534B000
stack
page read and write
34BF000
trusted library allocation
page read and write
7FF8492B0000
trusted library allocation
page read and write
7FF848EF0000
trusted library allocation
page read and write
293B3851000
trusted library allocation
page read and write
1B76E000
stack
page read and write
3046000
trusted library allocation
page read and write
239E3690000
trusted library allocation
page read and write
928817F000
stack
page read and write
B7D713C000
stack
page read and write
251BCA70000
trusted library allocation
page read and write
2C645F9000
stack
page read and write
51B96BE000
stack
page read and write
EE37DCE000
stack
page read and write
EE383F7000
stack
page read and write
39DF47B000
stack
page read and write
92884BE000
stack
page read and write
CC0000
heap
page read and write
332F000
stack
page read and write
8B0000
heap
page read and write
232E0E34000
heap
page read and write
1B321BF000
stack
page read and write
2C652CE000
stack
page read and write
16E22E44000
trusted library allocation
page read and write
239E3630000
trusted library section
page read and write
113D000
heap
page read and write
4F41BFA000
stack
page read and write
8DC000
heap
page read and write
3482000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
1C5AF3CB000
heap
page read and write
1F984101000
trusted library allocation
page read and write
6A0F7E000
stack
page read and write
1C0CB000
stack
page read and write
FA2000
unkown
page readonly
4F42D87000
stack
page read and write
1C5B2332000
trusted library allocation
page read and write
B5C000
heap
page read and write
1F98203D000
heap
page read and write
F20000
unkown
page readonly
352D87E000
stack
page read and write
25FBC875000
heap
page read and write
9670BE000
stack
page read and write
345E000
trusted library allocation
page read and write
39DF57B000
stack
page read and write
293B22E0000
heap
page read and write
A80000
trusted library allocation
page read and write
1F98402A000
heap
page read and write
1FDA01F0000
heap
page read and write
24701005000
trusted library allocation
page read and write
254B000
trusted library allocation
page read and write
352D3CE000
stack
page read and write
239E3670000
heap
page readonly
293B2210000
trusted library allocation
page read and write
1CBCD000
stack
page read and write
24700A54000
trusted library allocation
page read and write
C7E000
heap
page read and write
18038A3F000
trusted library allocation
page read and write
64EC5F7000
stack
page read and write
183F000
stack
page read and write
820000
heap
page read and write
239E1A25000
heap
page read and write
239E3D92000
trusted library allocation
page read and write
C7B000
heap
page read and write
39E00C9000
stack
page read and write
25FBC6ED000
heap
page read and write
64EC57E000
stack
page read and write
1C3CC000
stack
page read and write
51BA68E000
stack
page read and write
CC1917C000
stack
page read and write
16E21AD0000
heap
page read and write
239E485A000
trusted library allocation
page read and write
24700001000
trusted library allocation
page read and write
F82000
unkown
page readonly
1B31CFE000
stack
page read and write
7FF8492F0000
trusted library allocation
page read and write
239E1A9A000
heap
page read and write
251BAC65000
heap
page read and write
64ECA7E000
stack
page read and write
4F41B7E000
stack
page read and write
1D870000
heap
page read and write
18035C30000
heap
page read and write
1C5AF416000
heap
page read and write
19354D30000
heap
page execute and read and write
12C80000
trusted library allocation
page read and write
C81000
heap
page read and write
CC1927E000
stack
page read and write
8193479000
stack
page read and write
31D9000
heap
page read and write
164CC960000
trusted library allocation
page read and write
1F2552A4000
heap
page read and write
4F42C8E000
stack
page read and write
92880FF000
unkown
page read and write
251BCA40000
trusted library allocation
page read and write
7FF848D00000
trusted library allocation
page read and write
1CACB000
stack
page read and write
CC1A04E000
stack
page read and write
28A2673000
stack
page read and write
18035D45000
heap
page read and write
1B322000
unkown
page readonly
1F8D4750000
trusted library allocation
page read and write
EE384FF000
stack
page read and write
7FF848F60000
trusted library allocation
page execute and read and write
232E108F000
heap
page read and write
1C5AF390000
heap
page read and write
87C000
heap
page read and write
352D67E000
stack
page read and write
4465BCC000
stack
page read and write
239E3AE8000
trusted library allocation
page read and write
16820C90000
trusted library allocation
page read and write
348A000
trusted library allocation
page read and write
EE38478000
stack
page read and write
5D95D3B000
stack
page read and write
19354900000
heap
page read and write
64EC47E000
stack
page read and write
B264F8E000
stack
page read and write
239E1A30000
heap
page read and write
12CEC000
trusted library allocation
page read and write
239E4672000
trusted library allocation
page read and write
1F612060000
trusted library allocation
page read and write
2A1BE110000
heap
page read and write
1B1A0000
heap
page read and write
1FDA02E0000
heap
page read and write
5D96B07000
stack
page read and write
7FF848DF0000
trusted library allocation
page execute and read and write
1F8D2C26000
heap
page read and write
CD892FF000
unkown
page read and write
1CECB000
stack
page read and write
251BCB40000
heap
page read and write
232E1DD1000
trusted library allocation
page read and write
1C5AF380000
trusted library section
page read and write
352DBFC000
stack
page read and write
1C5CD000
stack
page read and write
B7D6D7A000
stack
page read and write
1430000
heap
page read and write
232DEF7C000
heap
page read and write
2872000
unkown
page readonly
25FBC6F2000
heap
page read and write
B263F3E000
stack
page read and write
5A0967B000
stack
page read and write
3456000
trusted library allocation
page read and write
23F80227000
trusted library allocation
page read and write
28A38CD000
stack
page read and write
232E0910000
heap
page read and write
1F700001000
trusted library allocation
page read and write
2880000
unkown
page readonly
239E4636000
trusted library allocation
page read and write
9288379000
stack
page read and write
1F612080000
trusted library allocation
page read and write
1F984034000
heap
page read and write
293B2776000
heap
page execute and read and write
B26403A000
stack
page read and write
16820D9C000
heap
page read and write
2929000
trusted library allocation
page read and write
1F982064000
heap
page read and write
CD899BC000
stack
page read and write
28D9000
trusted library allocation
page read and write
18038B54000
trusted library allocation
page read and write
1F982220000
heap
page read and write
81932FE000
stack
page read and write
4F42E0D000
stack
page read and write
1F8D4600000
trusted library allocation
page read and write
1710000
heap
page read and write
116C000
heap
page read and write
4464D7F000
stack
page read and write
1C5AF3D7000
heap
page read and write
4F41AFF000
stack
page read and write
25FBE6B5000
trusted library allocation
page read and write
1721000
heap
page read and write
16820EB0000
heap
page execute and read and write
5D96B8D000
stack
page read and write
239E48F3000
trusted library allocation
page read and write
492000
unkown
page readonly
19352F70000
heap
page read and write
51B9A3B000
stack
page read and write
1F983F96000
heap
page read and write
1DB2BCC0000
heap
page read and write
1F255200000
heap
page read and write
2C642FE000
stack
page read and write
1F982068000
heap
page read and write
2D0D000
heap
page read and write
3244000
trusted library allocation
page read and write
966F3E000
stack
page read and write
1F61033E000
heap
page read and write
239E48EC000
trusted library allocation
page read and write
5A090F9000
stack
page read and write
164CC6E5000
heap
page read and write
4E5707F000
stack
page read and write
247012A5000
trusted library allocation
page read and write
4F417F3000
stack
page read and write
16E22EFF000
trusted library allocation
page read and write
B263C7E000
stack
page read and write
25FBC5A0000
heap
page read and write
16E22A3F000
trusted library allocation
page read and write
251BDBC6000
trusted library allocation
page read and write
51B9737000
stack
page read and write
1F8D56E6000
trusted library allocation
page read and write
1F610346000
heap
page read and write
16820D9E000
heap
page read and write
1F9821F0000
trusted library allocation
page read and write
B7D6EB8000
stack
page read and write
1C427711000
heap
page read and write
1B710730000
heap
page read and write
10E0000
trusted library allocation
page read and write
4F41D7D000
stack
page read and write
232E105B000
heap
page read and write
CD895FD000
stack
page read and write
F21FBF9000
stack
page read and write
239E4980000
trusted library allocation
page read and write
24701031000
trusted library allocation
page read and write
1DF9E000
stack
page read and write
16E219C0000
trusted library allocation
page read and write
1F8D2BA0000
heap
page read and write
7FF849280000
trusted library allocation
page read and write
2A1BC4DA000
heap
page read and write
232E16A0000
trusted library allocation
page read and write
D33A5EE000
stack
page read and write
292B000
trusted library allocation
page read and write
1B31FBE000
stack
page read and write
1E801307000
trusted library allocation
page read and write
7FF848F57000
trusted library allocation
page read and write
5D95E3E000
stack
page read and write
2A1BE090000
heap
page execute and read and write
29A6000
trusted library allocation
page read and write
251BDD44000
trusted library allocation
page read and write
19352DD0000
heap
page read and write
28A2CFE000
stack
page read and write
19352F20000
heap
page read and write
7FF849400000
trusted library allocation
page read and write
28A2AF7000
stack
page read and write
1FDA0321000
heap
page read and write
3390000
trusted library allocation
page read and write
800000
heap
page read and write
819377E000
stack
page read and write
25FBC6B8000
heap
page read and write
B7D7C0E000
stack
page read and write
7FF848D2C000
trusted library allocation
page execute and read and write
1B440F55000
heap
page read and write
4E570FF000
stack
page read and write
1E31E000
stack
page read and write
966EF9000
stack
page read and write
7FF848EA0000
trusted library allocation
page read and write
4F41E3E000
stack
page read and write
16E6000
heap
page read and write
3453000
trusted library allocation
page read and write
1B66A000
stack
page read and write
25FBE5D0000
heap
page execute and read and write
164CC920000
heap
page readonly
1CCCD000
stack
page read and write
F220ACE000
stack
page read and write
967E8C000
stack
page read and write
1C5AF585000
heap
page read and write
239E1A8B000
heap
page read and write
CC19FCC000
stack
page read and write
352D30F000
unkown
page read and write
3C0F8CC000
stack
page read and write
1B440FE3000
heap
page read and write
7FF848D8C000
trusted library allocation
page execute and read and write
3C0E97F000
stack
page read and write
1850000
heap
page read and write
164CE570000
heap
page read and write
4E56CFF000
stack
page read and write
B7D6AFE000
stack
page read and write
1B23F000
heap
page read and write
24700D0A000
trusted library allocation
page read and write
1F8D2E20000
heap
page read and write
34BB000
trusted library allocation
page read and write
1F8D5B21000
trusted library allocation
page read and write
FC5000
heap
page read and write
1F984186000
trusted library allocation
page read and write
4464A7E000
stack
page read and write
1B710420000
heap
page read and write
16820F30000
trusted library allocation
page read and write
F21FC7D000
stack
page read and write
16E20010000
heap
page read and write
16E20048000
heap
page read and write
24701212000
trusted library allocation
page read and write
3C0FA49000
stack
page read and write
1E2D0F19000
heap
page read and write
239E19C0000
heap
page read and write
C30000
trusted library allocation
page read and write
9289387000
stack
page read and write
7FF848F80000
trusted library allocation
page read and write
44645B3000
stack
page read and write
4464EFF000
stack
page read and write
D33AD7E000
stack
page read and write
7FF848CED000
trusted library allocation
page execute and read and write
7FF49C700000
trusted library allocation
page execute and read and write
CD8A48E000
stack
page read and write
EE38277000
stack
page read and write
7FF848CF4000
trusted library allocation
page read and write
1160000
heap
page read and write
1FDA02E8000
heap
page read and write
7FF848CFB000
trusted library allocation
page execute and read and write
16E2007D000
heap
page read and write
1DB2BCDA000
heap
page read and write
2D00000
heap
page read and write
CC18C7F000
unkown
page read and write
16E200C8000
heap
page read and write
1D87A000
heap
page read and write
18038D28000
trusted library allocation
page read and write
18035E96000
heap
page read and write
8193072000
stack
page read and write
293B0BB0000
heap
page read and write
1550000
heap
page read and write
164CC670000
heap
page read and write
1F255340000
trusted library allocation
page read and write
1E800F92000
trusted library allocation
page read and write
1E440000
trusted library allocation
page read and write
1B7104DE000
heap
page read and write
12F24000
trusted library allocation
page read and write
23F8002F000
trusted library allocation
page read and write
16E201B0000
trusted library allocation
page read and write
446497F000
stack
page read and write
1B442DC1000
trusted library allocation
page read and write
18035D50000
heap
page read and write
1F8D5AF5000
trusted library allocation
page read and write
19354850000
trusted library allocation
page read and write
4464BFA000
stack
page read and write
F42000
unkown
page readonly
251BC680000
heap
page readonly
4E5717C000
stack
page read and write
16820D29000
heap
page read and write
2FCF000
trusted library allocation
page read and write
899000
heap
page read and write
F21FF7E000
stack
page read and write
2A1BE0D0000
trusted library allocation
page read and write
9C0000
heap
page read and write
A00000
heap
page read and write
16E219F0000
trusted library allocation
page read and write
1E570000
heap
page read and write
164CC7B6000
heap
page read and write
19352EF0000
heap
page read and write
1B32E8B000
stack
page read and write
1D4CC000
stack
page read and write
25FBE631000
trusted library allocation
page read and write
1B440F40000
heap
page read and write
5D955D3000
stack
page read and write
2C647FF000
stack
page read and write
239E3D8E000
trusted library allocation
page read and write
7FF848CE8000
trusted library allocation
page read and write
352D6F9000
stack
page read and write
1AE5B000
stack
page read and write
1B319EF000
unkown
page read and write
452000
unkown
page readonly
966DF7000
stack
page read and write
1DD9E000
stack
page read and write
5A0917E000
stack
page read and write
4E57CCE000
stack
page read and write
F220BC7000
stack
page read and write
1F8D2C22000
heap
page read and write
239E41D8000
trusted library allocation
page read and write
1E80102F000
trusted library allocation
page read and write
1E800227000
trusted library allocation
page read and write
4464AF7000
stack
page read and write
1870000
heap
page read and write
CD89479000
stack
page read and write
25FBE160000
heap
page execute and read and write
F21FAF9000
stack
page read and write
4E57E4D000
stack
page read and write
CD8957B000
stack
page read and write
1935306A000
heap
page read and write
51B92FF000
unkown
page read and write
251BC6F0000
heap
page read and write
239E1A98000
heap
page read and write
4465C4E000
stack
page read and write
6E85CFF000
stack
page read and write
F21FFFC000
stack
page read and write
253B000
trusted library allocation
page read and write
1D8AD000
heap
page read and write
CD893FF000
stack
page read and write
966E7E000
stack
page read and write
CD89273000
stack
page read and write
2558000
trusted library allocation
page read and write
2A1BC4DC000
heap
page read and write
1E801273000
trusted library allocation
page read and write
1F700272000
trusted library allocation
page read and write
251BAEB0000
heap
page read and write
64EC4F9000
stack
page read and write
24701123000
trusted library allocation
page read and write
1B312000
unkown
page readonly
3C0EBF8000
stack
page read and write
1A85000
heap
page read and write
2C64073000
stack
page read and write
239E4979000
trusted library allocation
page read and write
1F8D2E25000
heap
page read and write
2910000
heap
page read and write
6A0D7E000
stack
page read and write
2C64279000
stack
page read and write
7FF849024000
trusted library allocation
page read and write
1F256C35000
heap
page read and write
2537000
trusted library allocation
page read and write
16820CDF000
heap
page read and write
1F8D2D00000
heap
page read and write
F22007E000
stack
page read and write
3033000
trusted library allocation
page read and write
1F9821D0000
trusted library allocation
page read and write
1F8D2D70000
heap
page readonly
1540000
heap
page read and write
3229000
heap
page read and write
19352EF5000
heap
page read and write
251BCD10000
trusted library allocation
page read and write
3300000
heap
page execute and read and write
64ED6CD000
stack
page read and write
12A73000
trusted library allocation
page read and write
232E0970000
heap
page readonly
1F8D56F8000
trusted library allocation
page read and write
1595000
heap
page read and write
3C0E59F000
stack
page read and write
2A1BC710000
trusted library allocation
page read and write
300F000
trusted library allocation
page read and write
1F8D47A0000
heap
page read and write
18038B80000
trusted library allocation
page read and write
16820BF0000
heap
page read and write
64EC7F8000
stack
page read and write
16820F60000
trusted library allocation
page read and write
16E21A30000
heap
page execute and read and write
1B56D000
stack
page read and write
28A2977000
stack
page read and write
81942CE000
stack
page read and write
1FDA2F3C000
trusted library allocation
page read and write
239E4313000
trusted library allocation
page read and write
4E56E78000
stack
page read and write
81934FB000
stack
page read and write
16822BD2000
trusted library allocation
page read and write
44659CD000
stack
page read and write
1FDA2458000
trusted library allocation
page read and write
232E0FF0000
heap
page read and write
4464E7E000
stack
page read and write
1F257151000
trusted library allocation
page read and write
130EB000
trusted library allocation
page read and write
251BD20E000
trusted library allocation
page read and write
B263CF9000
stack
page read and write
3120000
heap
page read and write
EE3857F000
stack
page read and write
1750000
heap
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
16820CA0000
heap
page read and write
1E67D000
stack
page read and write
1FDA2E64000
trusted library allocation
page read and write
16820FB5000
heap
page read and write
16E20089000
heap
page read and write
1FDA2FA5000
trusted library allocation
page read and write
1F8D2C67000
heap
page read and write
16E22A47000
trusted library allocation
page read and write
1F9845CF000
trusted library allocation
page read and write
1F8D4D18000
trusted library allocation
page read and write
16E22068000
trusted library allocation
page read and write
B7D7D0C000
stack
page read and write
5D958FF000
stack
page read and write
1F8D4FBF000
trusted library allocation
page read and write
18037A70000
trusted library allocation
page read and write
EE381FF000
stack
page read and write
1B31EFE000
stack
page read and write
4F41A7E000
unkown
page read and write
7FF848EF4000
trusted library allocation
page read and write
B7D7D8E000
stack
page read and write
819424D000
stack
page read and write
232E1DD9000
trusted library allocation
page read and write
7FF848F13000
trusted library allocation
page read and write
293B0909000
heap
page read and write
B7D7E0E000
stack
page read and write
1F8D5B85000
trusted library allocation
page read and write
7FF848DC0000
trusted library allocation
page execute and read and write
16E20085000
heap
page read and write
1C1CC000
stack
page read and write
1C4275D0000
trusted library allocation
page read and write
18035E50000
heap
page read and write
81930FF000
unkown
page read and write
928930E000
stack
page read and write
1E19E000
stack
page read and write
7FF8493D0000
trusted library allocation
page read and write
1B712430000
trusted library allocation
page read and write
6A127C000
stack
page read and write
352DC7F000
stack
page read and write
251BDAAD000
trusted library allocation
page read and write
1108000
heap
page read and write
251BDE62000
trusted library allocation
page read and write
1B710488000
heap
page read and write
298F000
trusted library allocation
page read and write
7FF849440000
trusted library allocation
page read and write
18038BE3000
trusted library allocation
page read and write
4E56F7E000
stack
page read and write
CC5000
heap
page read and write
51B95FE000
stack
page read and write
293B22E5000
heap
page read and write
B263EF9000
stack
page read and write
9288537000
stack
page read and write
16E22F62000
trusted library allocation
page read and write
1890000
heap
page read and write
7FF848DB6000
trusted library allocation
page read and write
D33ABF7000
stack
page read and write
7FF849410000
trusted library allocation
page read and write
232DF110000
heap
page read and write
1F610535000
heap
page read and write
5D95AF9000
stack
page read and write
293B22A0000
trusted library allocation
page read and write
1F6102C0000
heap
page read and write
16E21AF5000
heap
page read and write
1C5B22CF000
trusted library allocation
page read and write
2A1BE4E6000
trusted library allocation
page read and write
1F982200000
heap
page readonly
51B94FF000
stack
page read and write
DF3000
stack
page read and write
1F8D4B76000
trusted library allocation
page read and write
1B711F25000
heap
page read and write
239E3640000
trusted library allocation
page read and write
28A2DFE000
stack
page read and write
B2640BE000
stack
page read and write
293B08C0000
heap
page read and write
2A09000
trusted library allocation
page read and write
1F8D2C24000
heap
page read and write
232E1FB4000
trusted library allocation
page read and write
2921000
trusted library allocation
page read and write
12A2A000
trusted library allocation
page read and write
967F0C000
stack
page read and write
1100000
heap
page read and write
1E800086000
trusted library allocation
page read and write
3220000
heap
page read and write
1F984118000
trusted library allocation
page read and write
16820CE5000
heap
page read and write
16E20215000
heap
page read and write
1B710340000
heap
page read and write
164CC76D000
heap
page read and write
64EC6F9000
stack
page read and write
3C0ED7D000
stack
page read and write
2531000
trusted library allocation
page read and write
239E4954000
trusted library allocation
page read and write
1F257162000
trusted library allocation
page read and write
232E1120000
heap
page execute and read and write
1E800001000
trusted library allocation
page read and write
F21FDF9000
stack
page read and write
92885BA000
stack
page read and write
239E3687000
heap
page execute and read and write
64ED5CD000
stack
page read and write
1F8D46A0000
heap
page execute and read and write
1E800A53000
trusted library allocation
page read and write
352E94E000
stack
page read and write
16E22E70000
trusted library allocation
page read and write
3013000
trusted library allocation
page read and write
3C0EAF9000
stack
page read and write
AA0000
trusted library allocation
page read and write
1803801F000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
1FDA03E0000
trusted library allocation
page read and write
239E4145000
trusted library allocation
page read and write
3381000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
232DEF28000
heap
page read and write
92887BE000
stack
page read and write
B31000
heap
page read and write
18035E00000
heap
page readonly
232E0960000
trusted library allocation
page read and write
4F41F38000
stack
page read and write
44645FE000
stack
page read and write
5A0907E000
stack
page read and write
1FDA26FE000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
1570000
heap
page read and write
4F42E8D000
stack
page read and write
232E10F0000
trusted library allocation
page read and write
39DF1F8000
stack
page read and write
B80000
heap
page read and write
7FF849378000
trusted library allocation
page read and write
352E84D000
stack
page read and write
1F61034A000
heap
page read and write
51B9577000
stack
page read and write
232E102E000
heap
page read and write
16820D84000
heap
page read and write
1F255370000
heap
page readonly
1060000
heap
page read and write
19352FAD000
heap
page read and write
2520000
heap
page read and write
4E5727B000
stack
page read and write
18038C0F000
trusted library allocation
page read and write
34C1000
trusted library allocation
page read and write
1F2551C0000
heap
page read and write
1B86C000
stack
page read and write
928928C000
stack
page read and write
7FF848E78000
trusted library allocation
page read and write
28A2C7E000
stack
page read and write
1FDA3261000
trusted library allocation
page read and write
There are 2008 hidden memdumps, click here to show them.