IOC Report
O5OjRoFGIW.exe

loading gif

Files

File Path
Type
Category
Malicious
O5OjRoFGIW.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Program Files\Google\SystemSettings.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Recovery\WmiPrvSE.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Recovery\conhost.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Temp\zh7ztWDiYf.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\BrowserperfMonitorcommon\qaZuUyhTvy3Ow0sR3yWsCVR.vbe
data
dropped
malicious
C:\Users\user\AppData\Roaming\BrowserperfMonitorcommon\servernet.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Roaming\Floppy.scr
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\chrome.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\chrome_proxy.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\AlGpCalM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\JOOemUAt.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\JxHMXyHr.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\LAuuthLm.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\NKQvtzqn.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\RsXUWNQa.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\WfpSyKfO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\aWfJGGgI.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\cYRsbpkD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\iZejiEQx.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jEyZpjlp.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\nMwiLBfl.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\tnSpZLqX.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\wvPyvekT.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\en-GB\XxjbrMQQJwIwk.exe
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Program Files (x86)\jDownloader\config\9e8d7a4ca61bd9
ASCII text, with very long lines (386), with no line terminators
dropped
C:\Program Files\Google\9e60a5f7a3bd80
ASCII text, with very long lines (369), with no line terminators
dropped
C:\Recovery\088424020bedd6
ASCII text, with very long lines (387), with no line terminators
dropped
C:\Recovery\24dbde2999530e
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XxjbrMQQJwIwk.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\servernet.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\VN2HXX5oOb
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\BrowserperfMonitorcommon\nbrdiKRtfK6.bat
ASCII text, with CRLF line terminators
dropped
C:\Windows\en-GB\9edda0bcc19ef6
ASCII text, with very long lines (996), with no line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 26 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\O5OjRoFGIW.exe
"C:\Users\user\Desktop\O5OjRoFGIW.exe"
malicious
C:\Users\user\AppData\Roaming\Floppy.scr
"C:\Users\user\AppData\Roaming\Floppy.scr" /S
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\BrowserperfMonitorcommon\qaZuUyhTvy3Ow0sR3yWsCVR.vbe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\AppData\Roaming\BrowserperfMonitorcommon\servernet.exe
"C:\Users\user\AppData\Roaming\BrowserperfMonitorcommon/servernet.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Recovery\conhost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\conhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Recovery\conhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Recovery\WmiPrvSE.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\WmiPrvSE.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Recovery\WmiPrvSE.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemSettingsS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Google\SystemSettings.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemSettings" /sc ONLOGON /tr "'C:\Program Files\Google\SystemSettings.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SystemSettingsS" /sc MINUTE /mo 12 /tr "'C:\Program Files\Google\SystemSettings.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "XxjbrMQQJwIwkX" /sc MINUTE /mo 14 /tr "'C:\Windows\en-GB\XxjbrMQQJwIwk.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "XxjbrMQQJwIwk" /sc ONLOGON /tr "'C:\Windows\en-GB\XxjbrMQQJwIwk.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "XxjbrMQQJwIwkX" /sc MINUTE /mo 10 /tr "'C:\Windows\en-GB\XxjbrMQQJwIwk.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\zh7ztWDiYf.bat"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Windows\en-GB\XxjbrMQQJwIwk.exe
C:\Windows\en-GB\XxjbrMQQJwIwk.exe
malicious
C:\Windows\en-GB\XxjbrMQQJwIwk.exe
C:\Windows\en-GB\XxjbrMQQJwIwk.exe
malicious
C:\Program Files\Google\SystemSettings.exe
"C:\Program Files\Google\SystemSettings.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\BrowserperfMonitorcommon\nbrdiKRtfK6.bat" "
C:\Windows\System32\chcp.com
chcp 65001
There are 18 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://crashpad.chromium.org/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new
unknown
https://crashpad.chromium.org/bug/new
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\049a3d20f72b6586daef88425fb7fea6daad9796
835808e2777d2a7ec24a272e8c6c1dfec96e4f1e
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany

Memdumps

Base Address
Regiontype
Protect
Malicious
12517000
trusted library allocation
page read and write
malicious
1AC00000
trusted library section
page read and write
malicious
9E4000
heap
page read and write
1BC1F000
stack
page read and write
7FF848FF3000
trusted library allocation
page read and write
7FF849670000
trusted library allocation
page execute and read and write
753E000
stack
page read and write
558D000
heap
page read and write
34DB000
heap
page read and write
2B7C000
trusted library allocation
page read and write
2A9E000
heap
page read and write
2A5D000
trusted library allocation
page read and write
12FF4000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
1B4CF000
stack
page read and write
12B59000
trusted library allocation
page read and write
7FF849550000
trusted library allocation
page read and write
30C0000
stack
page read and write
3236000
stack
page read and write
12FF2000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
57F0000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
313D000
trusted library allocation
page read and write
1B781000
heap
page read and write
23574AE8000
heap
page read and write
1BDC3000
heap
page read and write
3310000
heap
page read and write
2A61000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
338E000
heap
page read and write
7FF849505000
trusted library allocation
page read and write
7FF8493DB000
trusted library allocation
page read and write
2B5C000
trusted library allocation
page read and write
12FD3000
trusted library allocation
page read and write
3247000
trusted library allocation
page read and write
790000
trusted library allocation
page read and write
1B140000
trusted library allocation
page read and write
2A61000
heap
page read and write
7FF84906D000
trusted library allocation
page read and write
2A56000
heap
page read and write
7FF8493E0000
trusted library allocation
page read and write
130D0000
trusted library allocation
page read and write
8F3000
unkown
page readonly
8FE000
unkown
page read and write
130C3000
trusted library allocation
page read and write
3410000
heap
page read and write
3389000
heap
page read and write
1B548000
unkown
page readonly
1340000
heap
page read and write
12FCA000
trusted library allocation
page read and write
5C8E000
stack
page read and write
8AE000
stack
page read and write
1B6E2000
heap
page read and write
2AC2000
heap
page read and write
5311000
trusted library allocation
page read and write
1BBDA000
heap
page read and write
39E4000
heap
page read and write
F88000
heap
page read and write
2AC2000
heap
page read and write
3223000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1369F000
trusted library allocation
page read and write
1C23E000
stack
page read and write
13713000
trusted library allocation
page read and write
3389000
heap
page read and write
3A0B000
heap
page read and write
2A6F000
heap
page read and write
1B3BD000
stack
page read and write
338D000
heap
page read and write
1B6B0000
heap
page read and write
34E6000
heap
page read and write
7FF848FB6000
trusted library allocation
page read and write
2B18000
trusted library allocation
page read and write
7FF8493C0000
trusted library allocation
page read and write
7FF848FF5000
trusted library allocation
page read and write
5850000
heap
page read and write
24108EA0000
heap
page read and write
5480000
heap
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
24108EFB000
heap
page read and write
1349B000
trusted library allocation
page read and write
341B000
heap
page read and write
1B552000
unkown
page readonly
80000
unkown
page readonly
2A66000
heap
page read and write
2A58000
trusted library allocation
page read and write
12F77000
trusted library allocation
page read and write
2A63000
heap
page read and write
10B0000
heap
page read and write
7FF848F27000
trusted library allocation
page execute and read and write
29C0000
heap
page read and write
12B4C000
trusted library allocation
page read and write
1367B000
trusted library allocation
page read and write
7FF848F3C000
trusted library allocation
page execute and read and write
2331000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
2A71000
heap
page read and write
3284000
trusted library allocation
page read and write
24108F25000
heap
page read and write
33B6000
heap
page read and write
31AE000
stack
page read and write
1B805000
heap
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
5476000
heap
page read and write
F60000
trusted library allocation
page read and write
9AE000
stack
page read and write
12BD9000
trusted library allocation
page read and write
1B5DE000
unkown
page readonly
33CE000
heap
page read and write
1C59E000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
BE0000
heap
page read and write
136B1000
trusted library allocation
page read and write
2CC5000
trusted library allocation
page read and write
174F000
stack
page read and write
132D8000
trusted library allocation
page read and write
1B0C3000
heap
page execute and read and write
1B713000
heap
page read and write
8C1000
unkown
page execute read
129FF000
trusted library allocation
page read and write
1AA000
stack
page read and write
1B836000
heap
page read and write
8AE000
stack
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF848E4C000
trusted library allocation
page execute and read and write
7FF848EA6000
trusted library allocation
page read and write
7FF848E1B000
trusted library allocation
page execute and read and write
24108F35000
heap
page read and write
1326D000
trusted library allocation
page read and write
549E000
stack
page read and write
7FF8496F0000
trusted library allocation
page read and write
2BF4000
trusted library allocation
page read and write
7FF849570000
trusted library allocation
page read and write
BB5000
unkown
page write copy
137DB000
trusted library allocation
page read and write
3292000
trusted library allocation
page read and write
2C91000
trusted library allocation
page read and write
2C9B000
trusted library allocation
page read and write
7FF849400000
trusted library allocation
page read and write
FE5000
heap
page read and write
12FA8000
trusted library allocation
page read and write
BBB000
unkown
page read and write
2C3B000
trusted library allocation
page read and write
34C8000
heap
page read and write
86000
unkown
page readonly
7FF848E22000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
12F9F000
trusted library allocation
page read and write
4BDF000
stack
page read and write
12FAF000
trusted library allocation
page read and write
33C7000
heap
page read and write
5460000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
5C4E000
stack
page read and write
2A5C000
heap
page read and write
33CA000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF848E00000
trusted library allocation
page read and write
1B787000
heap
page read and write
13786000
trusted library allocation
page read and write
7FF848F1C000
trusted library allocation
page execute and read and write
1B508000
unkown
page readonly
3386000
heap
page read and write
7FF8495F0000
trusted library allocation
page read and write
7FF848FAC000
trusted library allocation
page read and write
24108F36000
heap
page read and write
7FF402760000
trusted library allocation
page execute and read and write
7FF848FD6000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
1B4F0000
unkown
page readonly
1B769000
heap
page read and write
24108F35000
heap
page read and write
2B6F000
trusted library allocation
page read and write
2A5E000
heap
page read and write
2A73000
heap
page read and write
4F1E000
stack
page read and write
1307F000
trusted library allocation
page read and write
1B652000
unkown
page readonly
8FE000
unkown
page write copy
F80000
heap
page read and write
137D000
heap
page read and write
1370E000
trusted library allocation
page read and write
1BE8F000
stack
page read and write
2A18000
heap
page read and write
2C95000
trusted library allocation
page read and write
2A87000
heap
page read and write
12A9D000
trusted library allocation
page read and write
DE7000
heap
page read and write
2FBF000
trusted library allocation
page read and write
7FF8493A0000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page execute and read and write
2A41000
heap
page read and write
1B532000
unkown
page readonly
2A4F000
heap
page read and write
1C43E000
stack
page read and write
BEB000
unkown
page readonly
12BDB000
trusted library allocation
page read and write
7FF849580000
trusted library allocation
page read and write
8EE000
stack
page read and write
7FF848FFD000
trusted library allocation
page read and write
1305F000
trusted library allocation
page read and write
533B000
stack
page read and write
34A0000
heap
page read and write
30F5000
trusted library allocation
page read and write
3529000
heap
page read and write
7FF848F76000
trusted library allocation
page execute and read and write
7FF848FE0000
trusted library allocation
page read and write
31EA000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
2C77000
trusted library allocation
page read and write
311B000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
24108F35000
heap
page read and write
34D9000
heap
page read and write
2C5F000
trusted library allocation
page read and write
BAA000
unkown
page readonly
8F3000
unkown
page readonly
505E000
stack
page read and write
1B0C0000
heap
page execute and read and write
1C33E000
stack
page read and write
400000
heap
page read and write
340F000
heap
page read and write
2C75000
trusted library allocation
page read and write
7FF848FDA000
trusted library allocation
page read and write
2A78000
heap
page read and write
34E2000
heap
page read and write
1C24E000
stack
page read and write
7FF848E20000
trusted library allocation
page read and write
232C000
heap
page read and write
13695000
trusted library allocation
page read and write
1B4D0000
unkown
page readonly
5C0E000
stack
page read and write
2A49000
trusted library allocation
page read and write
7FF849520000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
2A85000
heap
page read and write
7FF848F56000
trusted library allocation
page execute and read and write
382E000
stack
page read and write
13692000
trusted library allocation
page read and write
5CCC000
stack
page read and write
1B0AC000
heap
page read and write
F60000
heap
page read and write
D61000
heap
page read and write
160F000
stack
page read and write
30E7000
trusted library allocation
page read and write
1B7AD000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
2A64000
heap
page read and write
7FF84901A000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
7FF849480000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
7FF848FF3000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
2D30000
heap
page read and write
593C000
stack
page read and write
330C000
stack
page read and write
34DB000
heap
page read and write
1BADD000
stack
page read and write
12F2000
stack
page read and write
2B29000
trusted library allocation
page read and write
13221000
trusted library allocation
page read and write
2A54000
heap
page read and write
34E2000
heap
page read and write
136BE000
trusted library allocation
page read and write
1B829000
heap
page read and write
539E000
stack
page read and write
3412000
heap
page read and write
7FF8493B0000
trusted library allocation
page read and write
5E1F000
stack
page read and write
52FF000
stack
page read and write
7FF848FB4000
trusted library allocation
page read and write
1B4D2000
unkown
page readonly
470000
heap
page read and write
17B0000
heap
page execute and read and write
BA0000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
7FF8495A0000
trusted library allocation
page read and write
33A0000
heap
page read and write
3508000
trusted library allocation
page read and write
7FF849086000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
34DC000
heap
page read and write
33CA000
heap
page read and write
7FF8495E0000
trusted library allocation
page read and write
1290000
heap
page read and write
3377000
heap
page read and write
1303D000
trusted library allocation
page read and write
2A5E000
heap
page read and write
2C6D000
trusted library allocation
page read and write
21B0000
heap
page read and write
2A6F000
heap
page read and write
28E0000
heap
page execute and read and write
7FF848EC6000
trusted library allocation
page read and write
34D8000
heap
page read and write
2A5D000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
3000000
heap
page read and write
30E4000
trusted library allocation
page read and write
24108DC0000
heap
page read and write
3014000
trusted library allocation
page read and write
24108FF0000
heap
page read and write
D5C000
heap
page read and write
4DD000
heap
page read and write
4E3000
heap
page read and write
12F7E000
trusted library allocation
page read and write
7FF849065000
trusted library allocation
page read and write
136D0000
trusted library allocation
page read and write
2FA1000
trusted library allocation
page read and write
33B6000
heap
page read and write
7FF849420000
trusted library allocation
page read and write
3529000
heap
page read and write
12F74000
trusted library allocation
page read and write
7FF849500000
trusted library allocation
page read and write
7FF849502000
trusted library allocation
page read and write
7FF848E34000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
12F95000
trusted library allocation
page read and write
130D4000
trusted library allocation
page read and write
30E5000
stack
page read and write
2A0F000
trusted library allocation
page read and write
1B7DD000
heap
page read and write
3272000
trusted library allocation
page read and write
34CF000
heap
page read and write
3720000
heap
page read and write
C45000
heap
page read and write
2C55000
trusted library allocation
page read and write
1C48B000
stack
page read and write
B40000
heap
page read and write
51FE000
stack
page read and write
7FF849093000
trusted library allocation
page read and write
2DE6000
stack
page read and write
12FB1000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
7FF848E02000
trusted library allocation
page read and write
7FF848F4A000
trusted library allocation
page execute and read and write
BAA000
unkown
page readonly
7FF848EA6000
trusted library allocation
page read and write
33CA000
heap
page read and write
3113000
trusted library allocation
page read and write
1BBB0000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
1B2CF000
stack
page read and write
280E000
stack
page read and write
7FF848FC0000
trusted library allocation
page read and write
465E000
stack
page read and write
21E0000
unkown
page readonly
7FF848EB0000
trusted library allocation
page execute and read and write
124E000
stack
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1B550000
unkown
page readonly
BD4000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
13795000
trusted library allocation
page read and write
1BB0D000
stack
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1250F000
trusted library allocation
page read and write
7FF849057000
trusted library allocation
page read and write
5B0D000
stack
page read and write
26E0000
heap
page read and write
BD0000
heap
page read and write
1C08E000
stack
page read and write
34CB000
heap
page read and write
130A0000
trusted library allocation
page read and write
3490000
heap
page readonly
34A7000
heap
page read and write
29F1000
trusted library allocation
page read and write
13018000
trusted library allocation
page read and write
2A5C000
heap
page read and write
130C5000
trusted library allocation
page read and write
5580000
heap
page read and write
49C000
heap
page read and write
332D000
stack
page read and write
7FF849620000
trusted library allocation
page read and write
813EBFF000
stack
page read and write
12FAF000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
1BF30000
heap
page execute and read and write
1B7D0000
heap
page read and write
7FF849041000
trusted library allocation
page read and write
3FB000
stack
page read and write
136C7000
trusted library allocation
page read and write
7FF849093000
trusted library allocation
page read and write
310A000
trusted library allocation
page read and write
2B72000
trusted library allocation
page read and write
30E9000
stack
page read and write
132FA000
trusted library allocation
page read and write
CF6000
heap
page read and write
7FF848E22000
trusted library allocation
page read and write
3389000
heap
page read and write
2C43000
trusted library allocation
page read and write
3220000
heap
page read and write
1AF7D000
stack
page read and write
328F000
trusted library allocation
page read and write
1326B000
trusted library allocation
page read and write
136F2000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
2B14000
trusted library allocation
page read and write
136AC000
trusted library allocation
page read and write
1C14D000
stack
page read and write
7FF849510000
trusted library allocation
page read and write
1AFD0000
heap
page read and write
1A360000
trusted library allocation
page read and write
372E000
stack
page read and write
7FF849625000
trusted library allocation
page read and write
770000
trusted library allocation
page read and write
5F1F000
stack
page read and write
7FF849013000
trusted library allocation
page read and write
7FF848FC8000
trusted library allocation
page read and write
2C37000
trusted library allocation
page read and write
FAF000
heap
page read and write
80000
unkown
page readonly
7FF848ED6000
trusted library allocation
page execute and read and write
7FF848FC0000
trusted library allocation
page read and write
3507000
heap
page read and write
3410000
heap
page read and write
2B27000
trusted library allocation
page read and write
587E000
stack
page read and write
2C8B000
trusted library allocation
page read and write
2A6E000
heap
page read and write
1B3CF000
stack
page read and write
1B9AA000
stack
page read and write
7FF849430000
trusted library allocation
page read and write
325A000
trusted library allocation
page read and write
7FF848F42000
trusted library allocation
page execute and read and write
1B800000
heap
page read and write
129F8000
trusted library allocation
page read and write
2A5D000
heap
page read and write
C50000
heap
page read and write
136C000
heap
page read and write
1BA1E000
stack
page read and write
773F000
stack
page read and write
7FF849610000
trusted library allocation
page read and write
2B49000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page execute and read and write
34F8000
heap
page read and write
23574AEA000
heap
page read and write
2A6F000
heap
page read and write
300C000
heap
page read and write
12BE4000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
310E000
stack
page read and write
7FF848FDD000
trusted library allocation
page read and write
33CC000
heap
page read and write
3249000
trusted library allocation
page read and write
2B2F000
trusted library allocation
page read and write
2A7A000
heap
page read and write
2B6D000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
33B6000
heap
page read and write
10B5000
heap
page read and write
6C40000
trusted library allocation
page read and write
2CA9000
trusted library allocation
page read and write
1BC90000
heap
page read and write
1B4F2000
unkown
page readonly
3029000
trusted library allocation
page read and write
1B07A000
heap
page read and write
7FF849025000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
2FB5000
trusted library allocation
page read and write
1270000
heap
page read and write
1312A000
trusted library allocation
page read and write
12DA3000
trusted library allocation
page read and write
12B0D000
trusted library allocation
page read and write
B81000
unkown
page execute read
1AA20000
trusted library allocation
page read and write
30C9000
stack
page read and write
7FF848F47000
trusted library allocation
page execute and read and write
3000000
trusted library allocation
page read and write
1BB1F000
stack
page read and write
3358000
heap
page read and write
2C61000
trusted library allocation
page read and write
7FF849600000
trusted library allocation
page read and write
2A14000
trusted library allocation
page read and write
2B4D000
trusted library allocation
page read and write
1B4E2000
unkown
page readonly
2C45000
trusted library allocation
page read and write
136AE000
trusted library allocation
page read and write
1C13E000
stack
page read and write
3226000
heap
page read and write
1B730000
heap
page read and write
1BF40000
heap
page read and write
7FF849590000
trusted library allocation
page read and write
922000
unkown
page read and write
2A52000
heap
page read and write
1B530000
unkown
page readonly
12B05000
trusted library allocation
page read and write
5830000
heap
page read and write
BEA000
unkown
page read and write
13E5000
heap
page read and write
2A88000
heap
page read and write
169F000
stack
page read and write
1B7B6000
heap
page read and write
923000
unkown
page readonly
1AFB0000
heap
page read and write
7FF849660000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
410000
heap
page read and write
24108F23000
heap
page read and write
3258000
trusted library allocation
page read and write
33CC000
heap
page read and write
84000
unkown
page readonly
34CB000
heap
page read and write
34D1000
heap
page read and write
B12000
stack
page read and write
7FF84905E000
trusted library allocation
page read and write
137B000
heap
page read and write
17C0000
heap
page read and write
2644000
trusted library allocation
page read and write
B81000
unkown
page execute read
12B5B000
trusted library allocation
page read and write
24108F23000
heap
page read and write
4B1000
heap
page read and write
F00000
heap
page read and write
337D000
heap
page read and write
3412000
heap
page read and write
21F0000
heap
page execute and read and write
2F90000
heap
page execute and read and write
12F5A000
trusted library allocation
page read and write
8C1000
unkown
page execute read
2A05000
trusted library allocation
page read and write
31DF000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
12FAA000
trusted library allocation
page read and write
2A9E000
heap
page read and write
23574AD0000
heap
page read and write
33F1000
heap
page read and write
333D000
stack
page read and write
450000
heap
page read and write
2A5B000
trusted library allocation
page read and write
1B5D2000
unkown
page readonly
1B510000
unkown
page readonly
13771000
trusted library allocation
page read and write
13A7000
heap
page read and write
517E000
stack
page read and write
132F0000
trusted library allocation
page read and write
1BAF0000
heap
page read and write
7FF848E34000
trusted library allocation
page read and write
30CF000
trusted library allocation
page read and write
7FF849073000
trusted library allocation
page read and write
2DD0000
heap
page read and write
1645000
heap
page read and write
12FA2000
trusted library allocation
page read and write
324F000
trusted library allocation
page read and write
4DB000
heap
page read and write
136CB000
trusted library allocation
page read and write
12BCE000
trusted library allocation
page read and write
137E6000
trusted library allocation
page read and write
3115000
trusted library allocation
page read and write
3009000
heap
page read and write
7FF84907B000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page execute and read and write
7FF848E28000
trusted library allocation
page read and write
1B6F0000
heap
page read and write
2300000
heap
page execute and read and write
24108F34000
heap
page read and write
1B5D0000
unkown
page readonly
3412000
heap
page read and write
2B62000
trusted library allocation
page read and write
3410000
heap
page read and write
2A40000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
341B000
heap
page read and write
4E1E000
stack
page read and write
326B000
trusted library allocation
page read and write
7FF848FFA000
trusted library allocation
page read and write
1B420000
heap
page execute and read and write
7FF848F22000
trusted library allocation
page execute and read and write
2D0F000
stack
page read and write
7FF849080000
trusted library allocation
page read and write
12F8D000
trusted library allocation
page read and write
7FF849014000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
2DDC000
heap
page read and write
924000
unkown
page readonly
324D000
trusted library allocation
page read and write
3505000
heap
page read and write
2A70000
heap
page read and write
7FF848E08000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
3412000
heap
page read and write
34AC000
trusted library allocation
page read and write
12C4B000
trusted library allocation
page read and write
2C81000
trusted library allocation
page read and write
2C9F000
trusted library allocation
page read and write
7FF849164000
trusted library allocation
page read and write
35DE000
stack
page read and write
2320000
heap
page read and write
34EE000
heap
page read and write
13111000
trusted library allocation
page read and write
5583000
heap
page read and write
1B745000
heap
page read and write
7FF849440000
trusted library allocation
page read and write
1B812000
heap
page read and write
341B000
heap
page read and write
13A5000
heap
page read and write
33CC000
heap
page read and write
12B4E000
trusted library allocation
page read and write
13332000
trusted library allocation
page read and write
1BB90000
heap
page read and write
7FF849025000
trusted library allocation
page read and write
34DB000
heap
page read and write
24109114000
heap
page read and write
2A67000
heap
page read and write
C70000
heap
page read and write
3313000
stack
page read and write
13154000
trusted library allocation
page read and write
33CA000
heap
page read and write
1B5F2000
unkown
page readonly
3160000
heap
page readonly
2A78000
heap
page read and write
7FF84942D000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
33C9000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
2A6D000
heap
page read and write
7FF849230000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
2A52000
heap
page read and write
2C08000
trusted library allocation
page read and write
7FF849630000
trusted library allocation
page read and write
341B000
heap
page read and write
13716000
trusted library allocation
page read and write
12331000
trusted library allocation
page read and write
56B1000
trusted library allocation
page read and write
1BDB0000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
2D3E000
stack
page read and write
13052000
trusted library allocation
page read and write
1B0B2000
unkown
page readonly
1B70A000
heap
page read and write
7FF84905B000
trusted library allocation
page read and write
7FF8495B0000
trusted library allocation
page read and write
8C0000
unkown
page readonly
923000
unkown
page write copy
783D000
stack
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
601C000
stack
page read and write
2B4F000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
12AD1000
trusted library allocation
page read and write
1B41D000
stack
page read and write
1AFAD000
stack
page read and write
132CB000
trusted library allocation
page read and write
1BDFC000
heap
page read and write
30F1000
trusted library allocation
page read and write
1B724000
heap
page read and write
1369A000
trusted library allocation
page read and write
136C0000
trusted library allocation
page read and write
2FAF000
trusted library allocation
page read and write
3102000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page execute and read and write
58FE000
stack
page read and write
6FB000
stack
page read and write
7FF84909B000
trusted library allocation
page read and write
2CB1000
trusted library allocation
page read and write
1B5C2000
unkown
page readonly
763E000
stack
page read and write
7FF849650000
trusted library allocation
page read and write
312A000
trusted library allocation
page read and write
350F000
heap
page read and write
D1D000
heap
page read and write
1300000
trusted library allocation
page read and write
7FF849021000
trusted library allocation
page read and write
430000
heap
page read and write
2D91000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
7FF848E10000
trusted library allocation
page read and write
7FF848FC3000
trusted library allocation
page read and write
56AF000
heap
page read and write
1B0B0000
unkown
page readonly
1B7B8000
heap
page read and write
1B69D000
stack
page read and write
129F1000
trusted library allocation
page read and write
12F90000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
D22000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
2A31000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
1C18E000
stack
page read and write
840000
heap
page read and write
36DD000
stack
page read and write
4B3000
heap
page read and write
3321000
stack
page read and write
2AD6000
heap
page read and write
324B000
trusted library allocation
page read and write
1B0D0000
heap
page read and write
30F2000
stack
page read and write
350F000
heap
page read and write
1B5B2000
unkown
page readonly
2B4B000
trusted library allocation
page read and write
320E000
stack
page read and write
2709000
heap
page read and write
56CA000
trusted library allocation
page read and write
2A9E000
heap
page read and write
1AFD0000
trusted library allocation
page read and write
3373000
heap
page read and write
24108F24000
heap
page read and write
12FA1000
trusted library allocation
page read and write
2A94000
trusted library allocation
page read and write
1A8BB000
stack
page read and write
1344000
heap
page read and write
33CC000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
1750000
heap
page read and write
131F2000
trusted library allocation
page read and write
9E9000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
D07674B000
stack
page read and write
2AE3000
trusted library allocation
page read and write
354E000
stack
page read and write
47D000
heap
page read and write
1B542000
unkown
page readonly
3728000
heap
page read and write
2A62000
heap
page read and write
2FB1000
trusted library allocation
page read and write
136C3000
trusted library allocation
page read and write
12F2A000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
9E0000
heap
page read and write
39E0000
heap
page read and write
7FF848FD8000
trusted library allocation
page read and write
7FF848E02000
trusted library allocation
page read and write
7FF849079000
trusted library allocation
page read and write
1327A000
trusted library allocation
page read and write
D30000
heap
page read and write
1B6F9000
heap
page read and write
4F5E000
stack
page read and write
3350000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
7FF848FBA000
trusted library allocation
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
FAA000
heap
page read and write
5588000
heap
page read and write
24108EC0000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
D076BFE000
stack
page read and write
333A000
stack
page read and write
2C2F000
trusted library allocation
page read and write
24108F24000
heap
page read and write
532A000
trusted library allocation
page read and write
3412000
heap
page read and write
24108F24000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
34DB000
heap
page read and write
2B3C000
trusted library allocation
page read and write
3480000
heap
page read and write
3119000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
860000
heap
page read and write
46A0000
heap
page read and write
5470000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
7FF8495C0000
trusted library allocation
page read and write
34D2000
heap
page read and write
73E000
stack
page read and write
6C49000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
2B5E000
trusted library allocation
page read and write
31F6000
trusted library allocation
page read and write
300F000
trusted library allocation
page read and write
7FF849470000
trusted library allocation
page read and write
23574AE0000
heap
page read and write
7FF848F2A000
trusted library allocation
page execute and read and write
7FF848E3D000
trusted library allocation
page execute and read and write
3012000
trusted library allocation
page read and write
1B726000
heap
page read and write
1BB92000
heap
page read and write
12B43000
trusted library allocation
page read and write
58BE000
stack
page read and write
2DD9000
heap
page read and write
1B71F000
heap
page read and write
2CA7000
trusted library allocation
page read and write
866000
heap
page read and write
132FC000
trusted library allocation
page read and write
13749000
trusted library allocation
page read and write
7FF849085000
trusted library allocation
page read and write
23574930000
heap
page read and write
7FF8495D0000
trusted library allocation
page read and write
4CDF000
stack
page read and write
23574A10000
heap
page read and write
1A6BB000
heap
page read and write
1B6CB000
heap
page read and write
2AC2000
heap
page read and write
7FF848E3B000
trusted library allocation
page execute and read and write
136C9000
trusted library allocation
page read and write
341B000
heap
page read and write
1400000
heap
page read and write
7FF84907E000
trusted library allocation
page read and write
1B524000
unkown
page readonly
12C22000
trusted library allocation
page read and write
2C69000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
372B000
heap
page read and write
1301A000
trusted library allocation
page read and write
5860000
heap
page read and write
7A0000
heap
page read and write
2CB9000
trusted library allocation
page read and write
3A00000
heap
page read and write
13342000
trusted library allocation
page read and write
34EF000
heap
page read and write
1367000
heap
page read and write
1B79A000
heap
page read and write
3A07000
heap
page read and write
30FA000
stack
page read and write
1B512000
unkown
page readonly
130CE000
trusted library allocation
page read and write
2D3A000
heap
page read and write
1BAAA000
stack
page read and write
760000
heap
page read and write
D5A000
heap
page read and write
C40000
heap
page read and write
2A61000
heap
page read and write
2AD5000
heap
page read and write
F70000
heap
page read and write
13068000
trusted library allocation
page read and write
BEB000
unkown
page write copy
13258000
trusted library allocation
page read and write
D076AFF000
unkown
page read and write
7FF849030000
trusted library allocation
page read and write
309A000
trusted library allocation
page read and write
7FF8494F8000
trusted library allocation
page read and write
1B6DC000
heap
page read and write
24108F35000
heap
page read and write
13118000
trusted library allocation
page read and write
135B8000
trusted library allocation
page read and write
D32000
heap
page read and write
341B000
heap
page read and write
3104000
trusted library allocation
page read and write
1B460000
heap
page read and write
1B775000
heap
page read and write
327C000
trusted library allocation
page read and write
137E4000
trusted library allocation
page read and write
12FA8000
trusted library allocation
page read and write
3269000
trusted library allocation
page read and write
3300000
stack
page read and write
22FF000
stack
page read and write
341B000
heap
page read and write
326D000
trusted library allocation
page read and write
30F9000
trusted library allocation
page read and write
7FF849059000
trusted library allocation
page read and write
3282000
trusted library allocation
page read and write
328D000
trusted library allocation
page read and write
7FF849059000
trusted library allocation
page read and write
7FF849062000
trusted library allocation
page read and write
3122000
trusted library allocation
page read and write
325E000
trusted library allocation
page read and write
1BF8E000
stack
page read and write
24109110000
heap
page read and write
1B650000
unkown
page readonly
1640000
heap
page read and write
59C0000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF849045000
trusted library allocation
page read and write
1365A000
trusted library allocation
page read and write
55A0000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
3389000
heap
page read and write
C20000
heap
page read and write
2B3A000
trusted library allocation
page read and write
12AD3000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
3126000
trusted library allocation
page read and write
BEC000
unkown
page readonly
1B5F0000
unkown
page readonly
7FF84909E000
trusted library allocation
page read and write
24108F34000
heap
page read and write
461E000
stack
page read and write
23574AD4000
heap
page read and write
13236000
trusted library allocation
page read and write
1B08D000
heap
page read and write
13276000
trusted library allocation
page read and write
7FF8493D8000
trusted library allocation
page read and write
7FF848E08000
trusted library allocation
page read and write
528000
heap
page read and write
905000
unkown
page read and write
30D8000
stack
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
30CB000
trusted library allocation
page read and write
1B0AE000
heap
page read and write
31B0000
heap
page read and write
7FF848E28000
trusted library allocation
page read and write
30F7000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
BB5000
unkown
page read and write
12BB5000
trusted library allocation
page read and write
1B095000
heap
page read and write
7FF849034000
trusted library allocation
page read and write
2700000
heap
page read and write
7FF84907E000
trusted library allocation
page read and write
1311F000
trusted library allocation
page read and write
1B7F6000
heap
page read and write
3417000
heap
page read and write
CC0000
trusted library allocation
page read and write
7FF849530000
trusted library allocation
page read and write
7FF848FF9000
trusted library allocation
page read and write
1B5B0000
unkown
page readonly
82000
unkown
page readonly
EEF000
stack
page read and write
12B17000
trusted library allocation
page read and write
B80000
unkown
page readonly
7FF848EF6000
trusted library allocation
page execute and read and write
12FA5000
trusted library allocation
page read and write
137A2000
trusted library allocation
page read and write
131FB000
trusted library allocation
page read and write
12F87000
trusted library allocation
page read and write
2C1F000
trusted library allocation
page read and write
7FF8493F0000
trusted library allocation
page read and write
7FF849045000
trusted library allocation
page read and write
1BB80000
heap
page execute and read and write
7FF849000000
trusted library allocation
page execute and read and write
7FF8490D0000
trusted library allocation
page read and write
24108EF0000
heap
page read and write
2C2D000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
7FF849015000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
137EF000
trusted library allocation
page read and write
2A4E000
heap
page read and write
2A59000
heap
page read and write
7FF849460000
trusted library allocation
page read and write
337A000
heap
page read and write
136C8000
trusted library allocation
page read and write
3117000
trusted library allocation
page read and write
29EF000
stack
page read and write
2C4F000
trusted library allocation
page read and write
131DC000
trusted library allocation
page read and write
1377A000
trusted library allocation
page read and write
B80000
unkown
page readonly
2B2B000
trusted library allocation
page read and write
7FF849073000
trusted library allocation
page read and write
813EAFC000
stack
page read and write
1340000
heap
page read and write
1B5C0000
unkown
page readonly
7FF849640000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
7FF8490A6000
trusted library allocation
page read and write
12F5D000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
34DC000
heap
page read and write
34CF000
heap
page read and write
7A4000
heap
page read and write
12338000
trusted library allocation
page read and write
7FF84949D000
trusted library allocation
page read and write
1336B000
trusted library allocation
page read and write
3412000
heap
page read and write
2C59000
trusted library allocation
page read and write
3485000
heap
page read and write
2AC2000
heap
page read and write
2B64000
trusted library allocation
page read and write
24108F1F000
heap
page read and write
24108F35000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
7FF848EAC000
trusted library allocation
page execute and read and write
7FF848EF6000
trusted library allocation
page execute and read and write
1B06C000
heap
page read and write
7FF84906C000
trusted library allocation
page read and write
7FF849450000
trusted library allocation
page read and write
1B820000
heap
page read and write
2A52000
heap
page read and write
328B000
trusted library allocation
page read and write
3418000
heap
page read and write
137F2000
trusted library allocation
page read and write
350C000
heap
page read and write
5200000
heap
page read and write
2A70000
heap
page read and write
34E3000
heap
page read and write
2CB3000
trusted library allocation
page read and write
337C000
heap
page read and write
FB0000
heap
page read and write
CF0000
heap
page read and write
2FCB000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
23574A30000
heap
page read and write
FBF000
heap
page read and write
1BDF0000
heap
page read and write
21E2000
unkown
page readonly
7FF8493D0000
trusted library allocation
page read and write
13187000
trusted library allocation
page read and write
3221000
trusted library allocation
page read and write
3124000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1360B000
trusted library allocation
page read and write
F90000
heap
page read and write
1B740000
heap
page read and write
7FF849410000
trusted library allocation
page execute and read and write
2A30000
heap
page read and write
3280000
trusted library allocation
page read and write
3314000
heap
page read and write
12FBD000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page execute and read and write
9C0000
heap
page read and write
2A66000
heap
page read and write
34DB000
heap
page read and write
2A10000
heap
page read and write
2B41000
trusted library allocation
page read and write
543C000
stack
page read and write
3150000
heap
page read and write
B90000
heap
page read and write
2A60000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
CFC000
heap
page read and write
FBD000
heap
page read and write
2A53000
heap
page read and write
2A74000
heap
page read and write
31D9000
trusted library allocation
page read and write
7FF84907B000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF848FE0000
trusted library allocation
page read and write
30CE000
stack
page read and write
2A72000
trusted library allocation
page read and write
1348000
heap
page read and write
2C0E000
stack
page read and write
2C87000
trusted library allocation
page read and write
1B736000
heap
page read and write
1B082000
heap
page read and write
24108F34000
heap
page read and write
36E0000
heap
page read and write
1B4E0000
unkown
page readonly
2A9E000
heap
page read and write
12514000
trusted library allocation
page read and write
7FF848FE3000
trusted library allocation
page read and write
3111000
trusted library allocation
page read and write
2D10000
heap
page read and write
1B540000
unkown
page readonly
136D0000
trusted library allocation
page read and write
17C5000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
2DEA000
trusted library allocation
page read and write
1BDD7000
heap
page read and write
7FF848FB8000
trusted library allocation
page read and write
13015000
trusted library allocation
page read and write
7FF849540000
trusted library allocation
page read and write
33CC000
heap
page read and write
EF3000
stack
page read and write
813EB7E000
stack
page read and write
8C0000
unkown
page readonly
7FF849070000
trusted library allocation
page read and write
3503000
heap
page read and write
1233D000
trusted library allocation
page read and write
12F7B000
trusted library allocation
page read and write
270C000
heap
page read and write
7FF848FA9000
trusted library allocation
page read and write
7FF84908D000
trusted library allocation
page read and write
1B717000
heap
page read and write
1B720000
heap
page read and write
12FD9000
trusted library allocation
page read and write
1B756000
heap
page read and write
1369D000
trusted library allocation
page read and write
12EEB000
trusted library allocation
page read and write
There are 1046 hidden memdumps, click here to show them.