IOC Report
SecuriteInfo.com.FileRepMalware.20494.7181.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.FileRepMalware.20494.7181.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\Microsoft Edge.exe
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\Runtime Broker.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\python311.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe (copy)
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42562\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42562\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI42562\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
There are 47 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20494.7181.exe
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20494.7181.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20494.7181.exe
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20494.7181.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe""
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://www.python.org/download/releases/2.3/mro/.
unknown
https://xmrig.com/wizard%s
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://xmrig.com/docs/algorithms
unknown
https://xmrig.com/benchmark/%s
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://xmrig.com/wizard
unknown
https://enigmaprotector.com/taggant/spv.crl0
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
https://enigmaprotector.com/taggant/user.crl0
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://peps.python.org/pep-0263/
unknown
https://www.python.org/psf/license/
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
donate.ssl.xmrig.com
178.128.242.134
malicious
donate.v2.xmrig.com
178.128.242.134
malicious
pool-nyc.supportxmr.com
104.243.33.118
pool.supportxmr.com
unknown

IPs

IP
Domain
Country
Malicious
104.243.43.115
unknown
United States
malicious
178.128.242.134
donate.ssl.xmrig.com
Netherlands
malicious
199.247.27.41
unknown
European Union
malicious
104.243.33.118
pool-nyc.supportxmr.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
24D4EB4D000
heap
page read and write
malicious
21D2E371000
heap
page read and write
malicious
21D2DA25000
heap
page read and write
malicious
145BBDCD000
heap
page read and write
malicious
145BB7F5000
heap
page read and write
malicious
21D2E34D000
heap
page read and write
malicious
1859C368000
heap
page read and write
malicious
24D4CA75000
heap
page read and write
malicious
1859BEA5000
heap
page read and write
malicious
7FF612933000
unkown
page readonly
malicious
145BBDF0000
heap
page read and write
malicious
24D4EB6F000
heap
page read and write
malicious
1859C0AD000
heap
page read and write
malicious
1859C0D0000
heap
page read and write
malicious
21D2E333000
heap
page read and write
24D4E6A3000
heap
page read and write
224C9AB8000
heap
page read and write
7FF612331000
unkown
page execute read
29C2D2D0000
heap
page read and write
143F97A0000
heap
page read and write
7FF747212000
unkown
page execute and write copy
224C9917000
heap
page read and write
1859A3C0000
heap
page read and write
22134510000
heap
page read and write
224C9AB8000
heap
page read and write
224C8EFC000
heap
page read and write
17AE57E000
stack
page read and write
1859C220000
heap
page read and write
4F193FD000
stack
page read and write
224C7131000
heap
page read and write
24D4E650000
heap
page read and write
4F17FFF000
stack
page read and write
29C2B520000
heap
page read and write
D9BEDFC000
stack
page read and write
22135732000
trusted library allocation
page read and write
24D54425000
heap
page read and write
1859C18B000
heap
page read and write
7FF794E24000
unkown
page execute and write copy
D95A5FD000
stack
page read and write
224C8DC3000
heap
page read and write
7FFD942E0000
unkown
page read and write
7FF612331000
unkown
page execute and write copy
7FF66DCE7000
unkown
page execute and read and write
224C8EA3000
heap
page read and write
143F98DD000
heap
page read and write
7FF612330000
unkown
page readonly
7FFD94252000
unkown
page read and write
21D2D910000
heap
page read and write
7FF66DB8D000
unkown
page execute and read and write
29C2D3E3000
heap
page read and write
224C9AD8000
heap
page read and write
143414D0000
heap
page read and write
224C8EF3000
heap
page read and write
202B979B000
heap
page read and write
7FF66E380000
unkown
page execute and read and write
7FF79427A000
unkown
page readonly
7F917BC000
stack
page read and write
224C8E14000
heap
page read and write
7FF612E5E000
unkown
page execute and write copy
221350F0000
heap
page execute and read and write
7FF74770E000
unkown
page execute and write copy
1862ED28000
heap
page read and write
1859C152000
heap
page read and write
1862ED15000
heap
page read and write
D78A1FF000
stack
page read and write
224C99F5000
heap
page read and write
24D4EBC9000
heap
page read and write
224C9A9B000
heap
page read and write
1859C139000
heap
page read and write
22134C20000
heap
page read and write
29C2B490000
heap
page read and write
4F19BFC000
stack
page read and write
224C9A86000
heap
page read and write
224C8BA0000
heap
page read and write
C7FFB9E000
stack
page read and write
7FFD33C60000
trusted library allocation
page read and write
202BB223000
heap
page read and write
1859C301000
heap
page read and write
7FF613241000
unkown
page execute and read and write
7FFD33C40000
trusted library allocation
page read and write
29C2D0D0000
trusted library allocation
page read and write
224C9A3F000
heap
page read and write
D95C5FC000
stack
page read and write
7FF79428D000
unkown
page execute and write copy
224C8F21000
heap
page read and write
202BB634000
unkown
page read and write
224C7020000
heap
page readonly
1859C15B000
heap
page read and write
22134AF0000
trusted library allocation
page read and write
145BBC43000
heap
page read and write
202BD5D0000
unkown
page read and write
1862ED24000
heap
page read and write
224C8EF7000
heap
page read and write
21D2BE00000
heap
page read and write
29C3DD73000
trusted library allocation
page read and write
D9581FE000
stack
page read and write
4F183FF000
stack
page read and write
1859C1A0000
heap
page read and write
3E1F0FB000
unkown
page read and write
7FF613A19000
unkown
page execute and read and write
224C9AEC000
heap
page read and write
202BB1B0000
unkown
page readonly
D78B9FE000
stack
page read and write
1D49F780000
heap
page read and write
22134663000
heap
page read and write
29C2D0E0000
heap
page read and write
7FF612E5E000
unkown
page execute and write copy
224C9DF8000
direct allocation
page read and write
224C8EA7000
heap
page read and write
7FF66D802000
unkown
page execute and write copy
7FF66D808000
unkown
page execute and write copy
24D4CAE0000
heap
page read and write
224C96E0000
direct allocation
page read and write
7FF66D806000
unkown
page execute and write copy
224C9A9B000
heap
page read and write
202BB197000
unkown
page read and write
7FF7942B4000
unkown
page execute and read and write
7FF66D806000
unkown
page execute and write copy
224C9AEF000
heap
page read and write
224C98E1000
heap
page read and write
224C98ED000
heap
page read and write
1862ED1D000
heap
page read and write
224C98F0000
heap
page read and write
224C99F8000
heap
page read and write
29C2D110000
heap
page read and write
24D4EBD9000
heap
page read and write
143436CD000
unkown
page read and write
24D52625000
heap
page read and write
29C2D020000
heap
page read and write
7FF612330000
unkown
page readonly
D78A5FD000
stack
page read and write
224C9979000
heap
page read and write
143F96E0000
heap
page read and write
3E1EBBE000
unkown
page read and write
7FFD9425C000
unkown
page write copy
24D4CA70000
heap
page read and write
22132A50000
heap
page read and write
221349E6000
heap
page read and write
29C2E392000
trusted library allocation
page read and write
7FF74774E000
unkown
page execute and write copy
224C7120000
heap
page read and write
224C8F1A000
heap
page read and write
21D2DB70000
direct allocation
page execute read
145BBC90000
heap
page read and write
29C2D1D0000
heap
page read and write
224C8F25000
heap
page read and write
29C2E3A2000
trusted library allocation
page read and write
224C9A6D000
heap
page read and write
7FFD94287000
unkown
page read and write
1859C17B000
heap
page read and write
224C98EB000
heap
page read and write
143435B4000
unkown
page read and write
7FF612E1E000
unkown
page execute and write copy
1859A3D3000
heap
page read and write
24D4EA04000
heap
page read and write
7FFD94094000
unkown
page readonly
7FF66E0BD000
unkown
page execute and read and write
7FFDA3784000
unkown
page read and write
224C9979000
heap
page read and write
7FF66D800000
unkown
page readonly
29C2CFE0000
unclassified section
page read and write
7FF66E380000
unkown
page execute and write copy
23ED480A000
unkown
page read and write
A00D3F9000
stack
page read and write
7FF613213000
unkown
page execute and read and write
7FFD33C3D000
trusted library allocation
page execute and read and write
7FF66DB8D000
unkown
page execute and read and write
224C70E0000
heap
page read and write
1859A250000
heap
page read and write
BCB9CFC000
stack
page read and write
7FFD94313000
unkown
page read and write
224C9AAE000
heap
page read and write
7FF66E383000
unkown
page execute and write copy
7FFD94312000
unkown
page write copy
145BBBB0000
heap
page read and write
7FF794629000
unkown
page execute and read and write
23ED2D61000
unkown
page readonly
1859C010000
direct allocation
page execute and read and write
145BBBE1000
heap
page read and write
224C991E000
heap
page read and write
1859C152000
heap
page read and write
22135721000
trusted library allocation
page read and write
224C99F9000
heap
page read and write
1862ED26000
heap
page read and write
224C91D0000
heap
page read and write
224C99DC000
heap
page read and write
202BB7D2000
unkown
page read and write
29C2E37F000
trusted library allocation
page read and write
1862ED2B000
heap
page read and write
7FF794251000
unkown
page execute read
24D53A25000
heap
page read and write
7FF612331000
unkown
page execute and write copy
24D4FE25000
heap
page read and write
7FF66D800000
unkown
page readonly
29C2D455000
heap
page read and write
7FFD9401A000
unkown
page readonly
29C2DD60000
heap
page read and write
22135724000
trusted library allocation
page read and write
21D31A33000
heap
page read and write
224C9993000
heap
page read and write
4F197FC000
stack
page read and write
224C99EF000
heap
page read and write
143439C0000
unkown
page readonly
3E1EF7E000
unkown
page readonly
7FFDA4161000
unkown
page execute read
224C9946000
heap
page read and write
21D31033000
heap
page read and write
224C8F0C000
heap
page read and write
7FFD94293000
unkown
page read and write
1C878FE000
unkown
page readonly
224C9994000
heap
page read and write
7FF794B62000
unkown
page execute and read and write
29C2E38E000
trusted library allocation
page read and write
29C2D2D3000
heap
page read and write
1859C0B3000
heap
page read and write
202BBB70000
unkown
page readonly
24D4EBC9000
heap
page read and write
224C9992000
heap
page read and write
29C2D3BE000
heap
page read and write
D9595FF000
stack
page read and write
224C9987000
heap
page read and write
224C8F21000
heap
page read and write
7FF613203000
unkown
page execute and read and write
27563FE000
stack
page read and write
224C9AB8000
heap
page read and write
7FF612933000
unkown
page execute and write copy
1859C080000
heap
page read and write
22134AA0000
trusted library allocation
page read and write
1C87BFE000
unkown
page readonly
224C8E91000
heap
page read and write
23ED2970000
unkown
page read and write
7FF4ACB20000
direct allocation
page execute and read and write
202B97FE000
heap
page read and write
29C2E391000
trusted library allocation
page read and write
224C9A20000
heap
page read and write
224C8B90000
heap
page read and write
143414C0000
unkown
page readonly
224C8F22000
heap
page read and write
14343684000
unkown
page read and write
7FFD33C32000
trusted library allocation
page read and write
22134C60000
heap
page read and write
24D4EB84000
heap
page read and write
7FF612E1E000
unkown
page execute and write copy
224C9A21000
heap
page read and write
224C9946000
heap
page read and write
22134820000
heap
page read and write
22132B46000
heap
page read and write
29C2DB80000
heap
page read and write
29C2D0C0000
trusted library allocation
page read and write
24D4EBF2000
heap
page read and write
224C8D61000
heap
page read and write
1C777B72000
heap
page read and write
224C9979000
heap
page read and write
D9C09FE000
stack
page read and write
7FFDA4341000
unkown
page readonly
7FFD33C42000
trusted library allocation
page read and write
7FF61336D000
unkown
page execute and read and write
24D4EA45000
heap
page read and write
1C879FE000
unkown
page readonly
7FFD33C50000
trusted library allocation
page read and write
29C2E394000
trusted library allocation
page read and write
224C9979000
heap
page read and write
D78A9FC000
stack
page read and write
7FF7942A1000
unkown
page readonly
7FF612AC1000
unkown
page readonly
24D4CA80000
heap
page read and write
202BB898000
unkown
page read and write
1859BE70000
heap
page read and write
224C998F000
heap
page read and write
143435C0000
unkown
page read and write
1859C190000
heap
page read and write
7FFD9426C000
unkown
page read and write
224C9AB8000
heap
page read and write
7FF794E21000
unkown
page execute and write copy
14342F40000
unkown
page readonly
D7889FF000
stack
page read and write
23ED461E000
unkown
page read and write
224C9979000
heap
page read and write
143F98E0000
heap
page read and write
224C8EA7000
heap
page read and write
23ED4530000
unkown
page read and write
143433AE000
unkown
page read and write
1D49F660000
heap
page read and write
1862ED28000
heap
page read and write
7FFD33C4D000
trusted library allocation
page execute and read and write
24D4E930000
heap
page read and write
24D4EA10000
heap
page read and write
1862ED1E000
heap
page read and write
145BC2A5000
heap
page read and write
1859C442000
direct allocation
page execute and read and write
1D49F590000
heap
page read and write
143415D5000
heap
page read and write
224C8D70000
heap
page read and write
224C9984000
heap
page read and write
224C8D30000
heap
page read and write
202BB0A0000
unkown
page read and write
D7895FE000
stack
page read and write
224C9AB8000
heap
page read and write
1859C16B000
heap
page read and write
224C8E85000
heap
page read and write
22134AD3000
trusted library allocation
page read and write
143435BA000
unkown
page read and write
7FF66DBBB000
unkown
page execute and read and write
224C9DD8000
direct allocation
page read and write
145BBA30000
heap
page read and write
143F9670000
heap
page read and write
17AD9BE000
stack
page read and write
7FF66DBE4000
unkown
page execute and read and write
14342F70000
heap
page read and write
202BB5D2000
unkown
page read and write
224C9919000
heap
page read and write
224C9E64000
direct allocation
page read and write
3E1F07E000
unkown
page readonly
145B9D60000
heap
page read and write
23ED29B0000
unkown
page read and write
7FF747223000
unkown
page execute and write copy
224C9AAE000
heap
page read and write
7FF612933000
unkown
page execute and write copy
224C8CC0000
heap
page read and write
7FF79463D000
unkown
page execute and read and write
143415D0000
heap
page read and write
224C8EA5000
heap
page read and write
7FFD94272000
unkown
page write copy
29C2D2E0000
heap
page read and write
224C8CA0000
heap
page read and write
7FFD9425D000
unkown
page read and write
224C8E89000
heap
page read and write
145B9D00000
heap
page read and write
221348A0000
heap
page read and write
145B9D68000
heap
page read and write
224C99D4000
heap
page read and write
24D4E7B0000
direct allocation
page execute read
224C8EB7000
heap
page read and write
14341601000
unkown
page readonly
7FF612922000
unkown
page execute and write copy
7FFDA4171000
unkown
page read and write
1862ED19000
heap
page read and write
1859BFB0000
direct allocation
page execute read
224C9E58000
direct allocation
page read and write
21D2D9E0000
heap
page read and write
202BDED0000
unkown
page read and write
224C9D2C000
direct allocation
page read and write
24D4CA20000
heap
page read and write
1859D6EB000
heap
page read and write
224C998E000
heap
page read and write
7FFDB24B0000
direct allocation
page execute and read and write
224C99D4000
heap
page read and write
224C8ED6000
heap
page read and write
145BBDD3000
heap
page read and write
7FF79428D000
unkown
page read and write
202BB220000
heap
page read and write
17AD5D3000
stack
page read and write
1862ED19000
heap
page read and write
1D49F681000
heap
page read and write
7FFDA4347000
unkown
page readonly
1859C8E5000
heap
page read and write
1859FEEB000
heap
page read and write
7FF612E55000
unkown
page execute and write copy
224C9941000
heap
page read and write
224C9916000
heap
page read and write
224C9A9B000
heap
page read and write
7FF613A16000
unkown
page execute and write copy
7FF7942B3000
unkown
page execute and write copy
224C8C60000
heap
page read and write
224C9A9B000
heap
page read and write
D9C01FF000
stack
page read and write
22132D40000
heap
page read and write
7FF794E21000
unkown
page execute and write copy
7F91BFF000
stack
page read and write
7FFD9428F000
unkown
page read and write
23ED4756000
unkown
page read and write
21D2E350000
heap
page read and write
7FF612922000
unkown
page execute and write copy
224C9D60000
direct allocation
page read and write
1C777AD0000
heap
page read and write
7FF794250000
unkown
page readonly
1862ED2B000
heap
page read and write
224C8E7E000
heap
page read and write
7FFD9429C000
unkown
page read and write
7FF794639000
unkown
page execute and read and write
1862ED24000
heap
page read and write
C7FF3D4000
stack
page read and write
224C9AC8000
heap
page read and write
7FFD9430E000
unkown
page read and write
224C9E10000
direct allocation
page read and write
224C9A8F000
heap
page read and write
145BBDC2000
heap
page read and write
24D4EAB5000
heap
page read and write
1862ED1D000
heap
page read and write
7FF794251000
unkown
page execute read
224C8E8C000
heap
page read and write
23ED2791000
unkown
page readonly
224C99A0000
heap
page read and write
224C99D4000
heap
page read and write
7FF66D802000
unkown
page execute and write copy
A00FFFF000
stack
page read and write
14343530000
unkown
page read and write
22135724000
trusted library allocation
page read and write
21D30633000
heap
page read and write
2214D6D0000
heap
page execute and read and write
7FF612AC1000
unkown
page execute and write copy
224C991C000
heap
page read and write
224C98EC000
heap
page read and write
224C9A8F000
heap
page read and write
224C8E98000
heap
page read and write
A00EBFE000
stack
page read and write
224C98F0000
heap
page read and write
1862ED1F000
heap
page read and write
4F1A7FF000
stack
page read and write
1C8767F000
stack
page read and write
1862ED1F000
heap
page read and write
29C2E286000
trusted library allocation
page read and write
224C8E92000
heap
page read and write
29C2CFB0000
heap
page read and write
221347D0000
heap
page read and write
7FF61326A000
unkown
page execute and read and write
1859C335000
heap
page read and write
29C2E39C000
trusted library allocation
page read and write
7FFDB24B0000
direct allocation
page execute and read and write
224C8E97000
heap
page read and write
21D2DED0000
heap
page read and write
7FFD94269000
unkown
page read and write
23ED491B000
unkown
page read and write
29C2DD71000
trusted library allocation
page read and write
7FFD33C52000
trusted library allocation
page read and write
7FF7942B2000
unkown
page execute and write copy
145BBAB0000
heap
page read and write
22145101000
trusted library allocation
page read and write
224C9A9B000
heap
page read and write
21D2DE84000
heap
page read and write
224C9A1D000
heap
page read and write
21D2DBD3000
heap
page read and write
3E1ED73000
unkown
page read and write
224C6F40000
heap
page read and write
224C9A27000
heap
page read and write
7FFDB24B0000
direct allocation
page execute and read and write
224C9A8F000
heap
page read and write
1D49F66A000
heap
page read and write
1859A3C8000
heap
page read and write
14341620000
unkown
page read and write
7FF79427A000
unkown
page execute and write copy
29C2DA6C000
heap
page read and write
7FFDA3785000
unkown
page readonly
66208FE000
unkown
page read and write
1862ED15000
heap
page read and write
3E1F17E000
unkown
page readonly
143F96A0000
heap
page read and write
224C8CB0000
heap
page read and write
29C2D100000
heap
page read and write
7FF612E1F000
unkown
page read and write
23ED4170000
unkown
page read and write
7FFD93FD7000
unkown
page readonly
145BB873000
heap
page read and write
7FF613A16000
unkown
page execute and write copy
224C9CE0000
direct allocation
page read and write
224C999E000
heap
page read and write
A00E7FF000
stack
page read and write
224C9DA0000
direct allocation
page read and write
24D4E8C0000
heap
page read and write
143F96D5000
heap
page read and write
7FF794250000
unkown
page readonly
1862ED19000
heap
page read and write
224C993A000
heap
page read and write
224C9919000
heap
page read and write
23ED4692000
unkown
page read and write
7FFD33C44000
trusted library allocation
page read and write
224C8C9D000
heap
page read and write
224C98E5000
heap
page read and write
21D2E430000
heap
page read and write
A00DFFE000
stack
page read and write
202B9795000
heap
page read and write
1859C131000
heap
page read and write
21D2E386000
heap
page read and write
224C8B73000
heap
page read and write
24D4E6B0000
heap
page read and write
7FFD9431C000
unkown
page read and write
202B9770000
unkown
page read and write
1859C2F4000
heap
page read and write
6620758000
unkown
page read and write
224C8EC2000
heap
page read and write
143433B7000
unkown
page read and write
1859EAEB000
heap
page read and write
143F9933000
heap
page read and write
202BB696000
unkown
page read and write
224C98ED000
heap
page read and write
224C9AB8000
heap
page read and write
224C9A8F000
heap
page read and write
7FFD94279000
unkown
page read and write
1859C0E0000
heap
page read and write
22134A1F000
heap
page read and write
23ED4830000
unkown
page read and write
145B9D40000
heap
page read and write
7FF612331000
unkown
page execute and write copy
7FFD947C1000
unkown
page execute read
7FF748309000
unkown
page execute and write copy
224C9A8F000
heap
page read and write
22134AD0000
trusted library allocation
page read and write
7FF794793000
unkown
page execute and read and write
22134AC0000
trusted library allocation
page read and write
A010BFE000
stack
page read and write
224C9D88000
direct allocation
page read and write
224C9A89000
heap
page read and write
29C2D3EF000
heap
page read and write
7FF66DCE7000
unkown
page execute and read and write
7FF613A16000
unkown
page execute and write copy
D78B5FF000
stack
page read and write
23ED27A0000
heap
page read and write
7FFD33CF0000
trusted library allocation
page read and write
224C9DE8000
direct allocation
page read and write
1859C251000
heap
page read and write
224C9979000
heap
page read and write
29C45DA0000
trusted library allocation
page read and write
22145103000
trusted library allocation
page read and write
202B9680000
unkown
page readonly
21D34C33000
heap
page read and write
29C2CFF0000
trusted library allocation
page read and write
22135720000
trusted library allocation
page read and write
145BBCC5000
heap
page read and write
7FF66D800000
unkown
page readonly
224C9A9B000
heap
page read and write
4F1AFFE000
stack
page read and write
143436EC000
unkown
page read and write
224C8E9B000
heap
page read and write
143436AB000
unkown
page read and write
2214D130000
trusted library allocation
page read and write
7FFD942EA000
unkown
page readonly
27573FE000
stack
page read and write
21D2DBD0000
heap
page read and write
224C9911000
heap
page read and write
224C8F2A000
heap
page read and write
224C9AB8000
heap
page read and write
7FFD94336000
unkown
page read and write
224C9E44000
direct allocation
page read and write
7FF612B0F000
unkown
page read and write
7FFD9423B000
unkown
page write copy
14341640000
heap
page read and write
224C8E7B000
heap
page read and write
7FFD94082000
unkown
page readonly
7FFD94282000
unkown
page write copy
29C2D0B3000
trusted library allocation
page read and write
224C9DB4000
direct allocation
page read and write
1859C8EF000
heap
page read and write
7FFD94298000
unkown
page write copy
7FF612330000
unkown
page readonly
14342F60000
unkown
page readonly
7FF612E8E000
unkown
page execute and read and write
21D2DDF0000
heap
page read and write
224C991B000
heap
page read and write
1859C473000
direct allocation
page execute and read and write
7FFD33D50000
trusted library allocation
page execute and read and write
1C777D00000
heap
page read and write
224C8F08000
heap
page read and write
224C8B95000
heap
page read and write
224C9A83000
heap
page read and write
224C9A14000
heap
page read and write
7FF612922000
unkown
page execute and write copy
22145107000
trusted library allocation
page read and write
1862ED1E000
heap
page read and write
224C99C4000
heap
page read and write
21D2E3CC000
heap
page read and write
24D4EB53000
heap
page read and write
1859C030000
heap
page read and write
143F7C70000
heap
page read and write
224C998A000
heap
page read and write
7FF66D802000
unkown
page execute read
7FF79427A000
unkown
page execute and write copy
1862ED1A000
heap
page read and write
224C8F07000
heap
page read and write
1862ED15000
heap
page read and write
224C8EC4000
heap
page read and write
224C8E9A000
heap
page read and write
1859A360000
heap
page read and write
29C2B528000
heap
page read and write
4F19FFC000
stack
page read and write
23ED29A0000
heap
page read and write
22135724000
trusted library allocation
page read and write
22135713000
trusted library allocation
page read and write
22145109000
trusted library allocation
page read and write
7FFD33C5D000
trusted library allocation
page execute and read and write
224C8E04000
heap
page read and write
22132B40000
heap
page read and write
1862ED12000
heap
page read and write
1862ED15000
heap
page read and write
224C99C1000
heap
page read and write
7FFD33DE0000
trusted library allocation
page read and write
D9BE5F6000
stack
page read and write
1C8787C000
unkown
page read and write
224C8E83000
heap
page read and write
7FFDA416D000
unkown
page readonly
1D49F570000
heap
page read and write
24D4EB7F000
heap
page read and write
1859C000000
direct allocation
page execute and read and write
7FFD94239000
unkown
page read and write
23ED46F4000
unkown
page read and write
1859C139000
heap
page read and write
1862ED2A000
heap
page read and write
221349B7000
heap
page read and write
7FF794667000
unkown
page execute and read and write
29C2DB85000
heap
page read and write
7FF79428D000
unkown
page read and write
24D4EBF2000
heap
page read and write
3E1EFFC000
unkown
page read and write
1859A330000
heap
page read and write
4F18BFE000
stack
page read and write
24D4CA30000
heap
page read and write
3E1EEFE000
unkown
page read and write
1C777B62000
heap
page read and write
24D55825000
heap
page read and write
224C998D000
heap
page read and write
24D4E550000
heap
page read and write
21D2DF05000
heap
page read and write
21D2DBE0000
direct allocation
page execute and read and write
224C9AB9000
heap
page read and write
7FF79429C000
unkown
page read and write
224C99C2000
heap
page read and write
7FFDB24B0000
direct allocation
page execute and read and write
7FF66D808000
unkown
page execute and read and write
D9BFDFE000
stack
page read and write
7FF612AFD000
unkown
page read and write
1C777D20000
heap
page read and write
6620A7E000
unkown
page readonly
221347F0000
unclassified section
page read and write
1862ED26000
heap
page read and write
7FFD940FB000
unkown
page readonly
7FF66E383000
unkown
page execute and read and write
7FF66D808000
unkown
page execute and read and write
4F1A3FC000
stack
page read and write
7FFD33D16000
trusted library allocation
page execute and read and write
29C2E39A000
trusted library allocation
page read and write
202BB1D0000
unkown
page read and write
24D54E25000
heap
page read and write
23ED41E0000
heap
page read and write
202BB770000
unkown
page read and write
23ED2770000
unkown
page readonly
23ED48F4000
unkown
page read and write
21D2BE50000
heap
page read and write
22134B90000
heap
page read and write
7FFDA3778000
unkown
page readonly
202BB6E0000
unkown
page read and write
1862ED28000
heap
page read and write
22134B50000
trusted library allocation
page read and write
D9BF5FE000
stack
page read and write
27577FF000
stack
page read and write
1859C152000
heap
page read and write
7FF66DB91000
unkown
page execute and read and write
21D2FC33000
heap
page read and write
A00D7FE000
stack
page read and write
224C9942000
heap
page read and write
7FF66DB7D000
unkown
page execute and read and write
24D4F425000
heap
page read and write
224C7030000
heap
page read and write
7FF794667000
unkown
page execute and read and write
145BB880000
direct allocation
page execute read
22135729000
trusted library allocation
page read and write
1859BD60000
heap
page read and write
7FF7473B1000
unkown
page execute and write copy
1C87588000
unkown
page read and write
145BB7F0000
heap
page read and write
2213497D000
heap
page read and write
7FF612922000
unkown
page read and write
224C8EA1000
heap
page read and write
23ED2780000
heap
page read and write
29C2E395000
trusted library allocation
page read and write
202BB200000
unkown
page readonly
7FF612D9C000
unkown
page read and write
21D34233000
heap
page read and write
7FF612E5E000
unkown
page execute and write copy
3E1EABE000
stack
page read and write
7FF613A19000
unkown
page execute and write copy
7FF794251000
unkown
page execute and write copy
7FF425B20000
direct allocation
page execute and read and write
224C9922000
heap
page read and write
21D2DD60000
heap
page read and write
224C9AAE000
heap
page read and write
24D51C25000
heap
page read and write
7FFD33C42000
trusted library allocation
page read and write
7FFD94237000
unkown
page write copy
224C8EDD000
heap
page read and write
7FF794290000
unkown
page read and write
24D4E6A0000
heap
page read and write
1859C421000
direct allocation
page execute and read and write
D9579F6000
stack
page read and write
7FF66D800000
unkown
page readonly
224C8E7D000
heap
page read and write
24D4E961000
heap
page read and write
224C8F0D000
heap
page read and write
224C8E88000
heap
page read and write
224C8EFD000
heap
page read and write
7FF66D806000
unkown
page execute and write copy
7FFD94296000
unkown
page read and write
224C9AAE000
heap
page read and write
A0103FF000
stack
page read and write
22134AE0000
trusted library allocation
page read and write
1862ED19000
heap
page read and write
224C9A21000
heap
page read and write
D7885F9000
stack
page read and write
1859C183000
heap
page read and write
22134515000
heap
page read and write
2755FF9000
stack
page read and write
7FFD33D60000
trusted library allocation
page execute and read and write
22134660000
heap
page read and write
7FFD33C33000
trusted library allocation
page execute and read and write
1862ED1D000
heap
page read and write
4F16FF9000
stack
page read and write
1862ED2A000
heap
page read and write
24D53025000
heap
page read and write
202B97F0000
heap
page read and write
7FF612E1E000
unkown
page execute and write copy
224C8E86000
heap
page read and write
22134540000
heap
page read and write
202B97C1000
unkown
page readonly
1859CCEB000
heap
page read and write
224C98EF000
heap
page read and write
A00DBFE000
stack
page read and write
2213493C000
heap
page read and write
224C8E9C000
heap
page read and write
C7803FE000
stack
page read and write
7FF66E383000
unkown
page execute and read and write
22135720000
trusted library allocation
page read and write
24D4E8A0000
heap
page read and write
24D50825000
heap
page read and write
1859C0A2000
heap
page read and write
22135101000
trusted library allocation
page read and write
224C9E6C000
direct allocation
page read and write
202BB89C000
unkown
page read and write
7FFD9425E000
unkown
page write copy
D9C11FD000
stack
page read and write
143F9984000
heap
page read and write
14342EF0000
unkown
page readonly
21D35633000
heap
page read and write
224C9987000
heap
page read and write
202BB896000
unkown
page read and write
224C9938000
heap
page read and write
24D4F02E000
heap
page read and write
224C8F21000
heap
page read and write
143F9BE0000
heap
page read and write
7FF746C21000
unkown
page execute and write copy
143436C3000
unkown
page read and write
7FF794B62000
unkown
page execute and read and write
29C2D37C000
heap
page read and write
24D4E610000
heap
page read and write
2214D482000
heap
page read and write
21D2F233000
heap
page read and write
1859C2B3000
heap
page read and write
1C777B40000
heap
page read and write
143F7B50000
heap
page read and write
22134600000
heap
page read and write
21D2E342000
heap
page read and write
221348D1000
heap
page read and write
29C2D320000
heap
page read and write
7FFD33C34000
trusted library allocation
page read and write
3E1ED71000
unkown
page read and write
1862ED15000
heap
page read and write
1D49F760000
heap
page read and write
66209FC000
unkown
page read and write
23ED4892000
unkown
page read and write
7FFD9429F000
unkown
page read and write
29C2D418000
heap
page read and write
7FF4ACA70000
trusted library allocation
page execute and read and write
14341648000
heap
page read and write
7FF61374E000
unkown
page execute and read and write
224C8EA6000
heap
page read and write
7FFD9426F000
unkown
page write copy
24D4EB37000
heap
page read and write
7FFDB24B0000
direct allocation
page execute and read and write
7FFD94284000
unkown
page write copy
7FFD94295000
unkown
page write copy
224C99B6000
heap
page read and write
C7FF7BE000
stack
page read and write
224C8D6D000
heap
page read and write
24D51225000
heap
page read and write
143F9810000
heap
page read and write
29C2E392000
trusted library allocation
page read and write
224C9E08000
direct allocation
page read and write
202BB18E000
unkown
page read and write
7FF613A19000
unkown
page execute and write copy
1C777B4B000
heap
page read and write
2213571F000
trusted library allocation
page read and write
7FFD33CF0000
trusted library allocation
page execute and read and write
7FF66D806000
unkown
page execute and write copy
145BB870000
heap
page read and write
224C9A85000
heap
page read and write
224C8E96000
heap
page read and write
221349A1000
heap
page read and write
143F9673000
heap
page read and write
22134800000
unclassified section
page read and write
202BB85B000
unkown
page read and write
224C99FC000
heap
page read and write
145BBA20000
heap
page read and write
7FFD33D00000
trusted library allocation
page execute and read and write
224C9E0C000
direct allocation
page read and write
7FFD33CE0000
trusted library allocation
page read and write
224C8ED3000
heap
page read and write
1862ED1B000
heap
page read and write
7FF66DB7D000
unkown
page execute and read and write
D9C31FC000
stack
page read and write
1862ED26000
heap
page read and write
7FFD33C6D000
trusted library allocation
page execute and read and write
224C8ECF000
heap
page read and write
224C90A8000
direct allocation
page read and write
1C777AF0000
heap
page read and write
29C2E385000
trusted library allocation
page read and write
1D49F5D0000
heap
page read and write
1D49F5D5000
heap
page read and write
24D4EB84000
heap
page read and write
224C9A8F000
heap
page read and write
29C462E0000
heap
page execute and read and write
2213572A000
trusted library allocation
page read and write
7FFDA4331000
unkown
page execute read
224C9A04000
heap
page read and write
17ADD9F000
stack
page read and write
7FFD33C8C000
trusted library allocation
page execute and read and write
7FF7942B4000
unkown
page execute and read and write
7FF612AC1000
unkown
page execute and write copy
7FF79463D000
unkown
page execute and read and write
21D2DC80000
heap
page read and write
D956E8F000
stack
page read and write
202BD6D0000
unkown
page read and write
7FF7942A1000
unkown
page readonly
143436A6000
unkown
page read and write
29C2D0F0000
trusted library allocation
page read and write
7FF613A19000
unkown
page execute and write copy
7FFD94274000
unkown
page read and write
224C8EB6000
heap
page read and write
224C98E9000
heap
page read and write
D9BDAEE000
stack
page read and write
D9591FE000
stack
page read and write
143F98A0000
heap
page read and write
7FF794E24000
unkown
page execute and read and write
2213571D000
trusted library allocation
page read and write
7FF794639000
unkown
page execute and read and write
224C9AAE000
heap
page read and write
1C87582000
unkown
page read and write
1C777CF0000
heap
page read and write
2213570D000
trusted library allocation
page read and write
1D49F692000
heap
page read and write
224C8F07000
heap
page read and write
224C99FF000
heap
page read and write
7FF748306000
unkown
page execute and write copy
1862ED1D000
heap
page read and write
224C9DE4000
direct allocation
page read and write
29C2E32B000
trusted library allocation
page read and write
7DF433E10000
direct allocation
page execute and read and write
143F96D0000
heap
page read and write
24D4EB99000
heap
page read and write
224C8EA3000
heap
page read and write
1859C0B0000
heap
page read and write
224C99E4000
heap
page read and write
7FF747745000
unkown
page execute and write copy
29C2D0A0000
trusted library allocation
page read and write
1C87B7E000
unkown
page read and write
1862ED1E000
heap
page read and write
29C2D010000
heap
page read and write
1862ED15000
heap
page read and write
1862ED26000
heap
page read and write
1862ED26000
heap
page read and write
7FFD94259000
unkown
page write copy
7FFD94291000
unkown
page write copy
7FFD94280000
unkown
page write copy
1859C0EA000
heap
page read and write
D788DFF000
stack
page read and write
1859C129000
heap
page read and write
7FF794690000
unkown
page execute and read and write
224C8AD0000
direct allocation
page read and write
7FF79429C000
unkown
page read and write
22134670000
heap
page read and write
143436E8000
unkown
page read and write
7FFDA3761000
unkown
page execute read
29C2D690000
heap
page read and write
7FFDA4346000
unkown
page read and write
23ED4916000
unkown
page read and write
221349B5000
heap
page read and write
1C7779F0000
heap
page read and write
224C9940000
heap
page read and write
14343622000
unkown
page read and write
1859F4EB000
heap
page read and write
1C87AFE000
unkown
page readonly
7FF7942A1000
unkown
page execute and write copy
224C9A9B000
heap
page read and write
224C99A3000
heap
page read and write
14343664000
unkown
page read and write
202BB814000
unkown
page read and write
14343484000
unkown
page read and write
224C9A24000
heap
page read and write
224C998E000
heap
page read and write
7FF794E24000
unkown
page execute and write copy
224C8EBD000
heap
page read and write
22132B4C000
heap
page read and write
145BB920000
heap
page read and write
143F7CB0000
heap
page read and write
7FFD948A9000
unkown
page read and write
14342F10000
unkown
page read and write
7FF794E24000
unkown
page execute and read and write
224C99E7000
heap
page read and write
224C9A4A000
heap
page read and write
224C9DF0000
direct allocation
page read and write
202BD5C0000
unkown
page readonly
29C2E39C000
trusted library allocation
page read and write
7FFD9431B000
unkown
page write copy
224C9E4C000
direct allocation
page read and write
29C2B460000
heap
page read and write
7FFD34590000
direct allocation
page execute and read and write
21D2DEC4000
heap
page read and write
21D33833000
heap
page read and write
1C777CF5000
heap
page read and write
24D4EBD9000
heap
page read and write
C7FFF7F000
stack
page read and write
224C997A000
heap
page read and write
7FF612AC1000
unkown
page execute and write copy
7FFD33C5D000
trusted library allocation
page execute and read and write
1859C431000
direct allocation
page execute and read and write
224C998E000
heap
page read and write
22134810000
heap
page read and write
224C99F5000
heap
page read and write
29C2CFD0000
unclassified section
page read and write
224C9A6C000
heap
page read and write
221349A9000
heap
page read and write
1859BEA0000
heap
page read and write
7FFD948AC000
unkown
page readonly
7FFD94281000
unkown
page read and write
21D2DD70000
heap
page read and write
24D4CAE9000
heap
page read and write
224C9AAE000
heap
page read and write
1D49F490000
heap
page read and write
4F173FE000
stack
page read and write
224C9A8F000
heap
page read and write
143F7C30000
heap
page readonly
1C87A7B000
unkown
page read and write
7FFD9427D000
unkown
page read and write
224C8F0F000
heap
page read and write
29C2D105000
heap
page read and write
224C7060000
heap
page read and write
202BB856000
unkown
page read and write
D7891FF000
stack
page read and write
7FFD33DD0000
trusted library allocation
page read and write
22134790000
heap
page read and write
7FF66D802000
unkown
page execute read
224C99C1000
heap
page read and write
1862ED2E000
heap
page read and write
224C8F06000
heap
page read and write
1859C463000
direct allocation
page execute and read and write
A00F7FC000
stack
page read and write
17AE17F000
stack
page read and write
2213570B000
trusted library allocation
page read and write
224C9AAE000
heap
page read and write
21D2DF39000
heap
page read and write
224C9A86000
heap
page read and write
7FFDA4172000
unkown
page readonly
202BB74A000
unkown
page read and write
7FFDA4330000
unkown
page readonly
7FF66DBE4000
unkown
page execute and read and write
D9BDB2E000
stack
page read and write
202BB764000
unkown
page read and write
202BB834000
unkown
page read and write
22134AF0000
trusted library allocation
page read and write
7FF425A70000
trusted library allocation
page execute and read and write
23ED4630000
unkown
page read and write
1862ED1E000
heap
page read and write
224C9A48000
heap
page read and write
224C8ECA000
heap
page read and write
1859C040000
direct allocation
page execute and read and write
224C99D5000
heap
page read and write
7FFDA3760000
unkown
page readonly
29C3DD79000
trusted library allocation
page read and write
21D2E331000
heap
page read and write
24D4F020000
heap
page read and write
224C8F26000
heap
page read and write
143F9974000
heap
page read and write
224C8F01000
heap
page read and write
29C2D2B0000
heap
page execute and read and write
1862ED19000
heap
page read and write
224C9E48000
direct allocation
page read and write
1859C1B0000
heap
page read and write
7FFD33C4D000
trusted library allocation
page execute and read and write
24D4EBF2000
heap
page read and write
29C2E3A2000
trusted library allocation
page read and write
29C2D311000
heap
page read and write
1859C129000
heap
page read and write
224C997F000
heap
page read and write
1C8797E000
unkown
page read and write
7FFD33C43000
trusted library allocation
page execute and read and write
7FF612330000
unkown
page readonly
224C98EB000
heap
page read and write
224C8F1D000
heap
page read and write
24D4E7F0000
direct allocation
page execute and read and write
224C99A2000
heap
page read and write
22134830000
heap
page read and write
143F9820000
heap
page read and write
1859C8E0000
heap
page read and write
224C9DE0000
direct allocation
page read and write
2756FFE000
stack
page read and write
14343422000
unkown
page read and write
21D2DA20000
heap
page read and write
224C9A21000
heap
page read and write
7F91AFF000
unkown
page read and write
7FF66DBBB000
unkown
page execute and read and write
224C99B1000
heap
page read and write
29C2D0B0000
trusted library allocation
page read and write
7FF612E55000
unkown
page execute and write copy
1862ED19000
heap
page read and write
A00FBFF000
stack
page read and write
7FFD93D80000
unkown
page readonly
1C87586000
unkown
page read and write
1859C0F9000
heap
page read and write
29C2D0D0000
trusted library allocation
page read and write
224C9A63000
heap
page read and write
7FFD94271000
unkown
page read and write
D956ECE000
stack
page read and write
1859C139000
heap
page read and write
221349E2000
heap
page read and write
7FF66E0BD000
unkown
page execute and read and write
21D2E833000
heap
page read and write
29C3DD77000
trusted library allocation
page read and write
224C8EC5000
heap
page read and write
224C9A7F000
heap
page read and write
7FFD947C0000
unkown
page readonly
145BBB70000
heap
page read and write
1862ED24000
heap
page read and write
24D4EBD9000
heap
page read and write
145BB830000
heap
page read and write
1859C139000
heap
page read and write
7FF66E383000
unkown
page execute and write copy
662097E000
unkown
page readonly
3E1ED6B000
unkown
page read and write
29C2B450000
heap
page read and write
7FFD94103000
unkown
page readonly
21D2BE58000
heap
page read and write
224C8ED4000
heap
page read and write
224C99E4000
heap
page read and write
7FF612933000
unkown
page execute and write copy
4F1ABFF000
stack
page read and write
4F1B3FF000
stack
page read and write
21D2D8C0000
heap
page read and write
7FFD33C50000
trusted library allocation
page read and write
7FFDA377C000
unkown
page readonly
21D2DB30000
heap
page read and write
7FFDA4160000
unkown
page readonly
D78BDFF000
stack
page read and write
29C2D41D000
heap
page read and write
A00E3FE000
stack
page read and write
2213571F000
trusted library allocation
page read and write
224C9E5C000
direct allocation
page read and write
143F7CB8000
heap
page read and write
7FFD9427C000
unkown
page write copy
224C9A8F000
heap
page read and write
29C2E394000
trusted library allocation
page read and write
7FFD33D26000
trusted library allocation
page execute and read and write
143432C0000
unkown
page read and write
1862ED1F000
heap
page read and write
D789DFE000
stack
page read and write
224C99B6000
heap
page read and write
21D2E381000
heap
page read and write
224C98F1000
heap
page read and write
7FF499F00000
direct allocation
page execute and read and write
7FFD94871000
unkown
page readonly
27567FF000
stack
page read and write
224C8E88000
heap
page read and write
7FFD94268000
unkown
page write copy
7FF66E380000
unkown
page execute and read and write
21D32E33000
heap
page read and write
29C2D3ED000
heap
page read and write
7FF7942B2000
unkown
page execute and write copy
7FFD9428C000
unkown
page write copy
D95CDFC000
stack
page read and write
224C8EBD000
heap
page read and write
143415E0000
unkown
page read and write
1434359A000
unkown
page read and write
224C99B1000
heap
page read and write
24D4EC50000
heap
page read and write
224C9AB8000
heap
page read and write
224C9979000
heap
page read and write
7FF613217000
unkown
page execute and read and write
7FF612E55000
unkown
page readonly
224C99D4000
heap
page read and write
2756BFE000
stack
page read and write
224C9E68000
direct allocation
page read and write
7FFD94337000
unkown
page readonly
7FFD94261000
unkown
page read and write
1859C163000
heap
page read and write
202B9790000
heap
page read and write
D78ADFE000
stack
page read and write
24D4E9C3000
heap
page read and write
1862ED2B000
heap
page read and write
224C9A22000
heap
page read and write
21D2E38C000
heap
page read and write
D9C39FB000
stack
page read and write
145BBDD0000
heap
page read and write
29C2B500000
heap
page read and write
7DF46E1D0000
direct allocation
page execute and read and write
224C8EC3000
heap
page read and write
7FF612E21000
unkown
page read and write
224C9922000
heap
page read and write
A0107FE000
stack
page read and write
7FF612E5E000
unkown
page execute and write copy
7FF66DB91000
unkown
page execute and read and write
7FFD940D6000
unkown
page readonly
1859C510000
heap
page read and write
145BBDB1000
heap
page read and write
224C9E34000
direct allocation
page read and write
21D2DF76000
heap
page read and write
7FF612E55000
unkown
page execute and write copy
1862ED19000
heap
page read and write
224C99C1000
heap
page read and write
7FFD94198000
unkown
page read and write
143F98D1000
heap
page read and write
143434E6000
unkown
page read and write
7FFD9426A000
unkown
page write copy
1859E0EB000
heap
page read and write
21D2BE10000
heap
page read and write
D78B1FE000
stack
page read and write
224C8F0E000
heap
page read and write
4F187FE000
stack
page read and write
7FF746C20000
unkown
page readonly
7FFD33C9C000
trusted library allocation
page execute and read and write
224C8E87000
heap
page read and write
202B97A0000
unkown
page read and write
202B9690000
heap
page read and write
224C98E0000
heap
page read and write
7FFD9427F000
unkown
page read and write
224C9989000
heap
page read and write
24D56225000
heap
page read and write
24D4EBD9000
heap
page read and write
7FFD9427E000
unkown
page write copy
A00EFFF000
stack
page read and write
2757BFE000
stack
page read and write
1C8758A000
unkown
page read and write
7FFD94283000
unkown
page read and write
D7899FE000
stack
page read and write
23ED47A0000
unkown
page read and write
224C8E88000
heap
page read and write
1862ED15000
heap
page read and write
202BB76A000
unkown
page read and write
24D4EB42000
heap
page read and write
24D4E8B0000
heap
page read and write
224C8EBD000
heap
page read and write
7FF79427A000
unkown
page readonly
224C9A22000
heap
page read and write
21D2DE21000
heap
page read and write
7FF7942B3000
unkown
page execute and write copy
202BB570000
unkown
page read and write
224C9979000
heap
page read and write
1859C452000
direct allocation
page execute and read and write
224C9020000
direct allocation
page read and write
1859C033000
heap
page read and write
23ED48D4000
unkown
page read and write
1862ED2A000
heap
page read and write
224C8F0D000
heap
page read and write
224C99EA000
heap
page read and write
7FF66D808000
unkown
page execute and write copy
24D4EB7F000
heap
page read and write
143F7C40000
heap
page read and write
224C993F000
heap
page read and write
7FF794250000
unkown
page readonly
7FF79428D000
unkown
page execute and write copy
224C8F1B000
heap
page read and write
224C8B70000
heap
page read and write
7FFD9425B000
unkown
page read and write
224C8EF8000
heap
page read and write
224C9E50000
direct allocation
page read and write
22134A15000
heap
page read and write
224C8EC1000
heap
page read and write
2213571D000
trusted library allocation
page read and write
202B97E0000
unkown
page read and write
7FF794250000
unkown
page readonly
224C99B6000
heap
page read and write
145BBC84000
heap
page read and write
A00F3FD000
stack
page read and write
21D2D920000
heap
page read and write
29C2D030000
heap
page read and write
7FF794251000
unkown
page execute and write copy
145B9D10000
heap
page read and write
224C9986000
heap
page read and write
1859C173000
heap
page read and write
22134C25000
heap
page read and write
221348E0000
heap
page read and write
1859C0E4000
heap
page read and write
145BBED0000
heap
page read and write
7FF61336B000
unkown
page execute and read and write
143415B0000
unkown
page read and write
224C9AAE000
heap
page read and write
22134520000
heap
page read and write
21D32433000
heap
page read and write
202B97F8000
heap
page read and write
224C98F0000
heap
page read and write
23ED27A8000
heap
page read and write
7FF794690000
unkown
page execute and read and write
224C8E86000
heap
page read and write
7FF794793000
unkown
page execute and read and write
224C991A000
heap
page read and write
143F7CC2000
heap
page read and write
1C8777E000
unkown
page read and write
7FF794629000
unkown
page execute and read and write
14342F73000
heap
page read and write
7FF7942A1000
unkown
page execute and write copy
D959DFE000
stack
page read and write
7FF66E380000
unkown
page execute and write copy
143433C0000
unkown
page read and write
224C9D54000
direct allocation
page read and write
224C9A9B000
heap
page read and write
7FFD94278000
unkown
page write copy
7FFD93D81000
unkown
page execute read
1859BE20000
heap
page read and write
29C3DD71000
trusted library allocation
page read and write
There are 1193 hidden memdumps, click here to show them.