IOC Report
MdeeRbWvqe.exe

loading gif

Files

File Path
Type
Category
Malicious
MdeeRbWvqe.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Google\Chrome\updater.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\A5B6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\C12E.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\D3CC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\filename.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\VirtualStore\_README.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\uthsueb
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\uthsueb:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\DTBZGIOOSO\ONBQCLYSPU.pdf
data
dropped
malicious
C:\Users\user\Desktop\DVWHKMNFNN.xlsx
data
dropped
malicious
C:\Users\user\Desktop\XZXHAVGRAG\XZXHAVGRAG.docx
data
dropped
malicious
C:\Users\user\_README.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x096168f4, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_c21224191a167f50d0fc77956927dc29a8d71181_f78a65ed_29869464-f511-4786-8777-e0d387137afc\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1112.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1151.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER115F.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER11AE.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCCB.tmp.dmp
Mini DuMP crash report, 17 streams, CheckSum 0x00000004, Tue Apr 16 23:37:55 2024, 0x1205a4 type
dropped
C:\SystemID\PersonalID.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\.curlrc
data
dropped
C:\Users\user\.curlrc.uajs (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old.uajs (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old.uajs (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LocalPrefs.json
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LocalPrefs.json.uajs (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log.uajs (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old.uajs (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\shared_proto_db\000003.log.uajs (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\shared_proto_db\LOG.old
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\shared_proto_db\LOG.old.uajs (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\shared_proto_db\metadata\000003.log.uajs (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\shared_proto_db\metadata\LOG.old
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\shared_proto_db\metadata\LOG.old.uajs (copy)
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002d.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x000000000000002e.db
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\Windows[4].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\geo[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\get[1].htm
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\8079.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\E978.bat
ASCII text, with no line terminators
modified
C:\Users\user\AppData\Local\Temp\TmpCED8.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpCEF8.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_11rwciso.x3a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hvjgk4sy.abn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lbbivgfp.jdi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rnncvrve.zvy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y1re1kmh.lnw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ygts1sqp.ocx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\bowsakkdestx.txt
JSON data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Users\user\Desktop\CURQNKVOIX.png
data
dropped
C:\Users\user\Desktop\CURQNKVOIX.png.uajs (copy)
data
dropped
C:\Users\user\Desktop\DTBZGIOOSO.docx
data
dropped
C:\Users\user\Desktop\DTBZGIOOSO.docx.uajs (copy)
data
dropped
C:\Users\user\Desktop\DTBZGIOOSO\DTBZGIOOSO.docx
data
dropped
C:\Users\user\Desktop\DTBZGIOOSO\DTBZGIOOSO.docx.uajs (copy)
data
dropped
C:\Users\user\Desktop\DTBZGIOOSO\KATAXZVCPS.mp3
data
dropped
C:\Users\user\Desktop\DTBZGIOOSO\KATAXZVCPS.mp3.uajs (copy)
data
dropped
C:\Users\user\Desktop\DTBZGIOOSO\ONBQCLYSPU.pdf.uajs (copy)
data
dropped
C:\Users\user\Desktop\DTBZGIOOSO\UMMBDNEQBN.png
data
dropped
C:\Users\user\Desktop\DTBZGIOOSO\UMMBDNEQBN.png.uajs (copy)
data
dropped
C:\Users\user\Desktop\DTBZGIOOSO\VLZDGUKUTZ.jpg
data
dropped
C:\Users\user\Desktop\DTBZGIOOSO\VLZDGUKUTZ.jpg.uajs (copy)
data
dropped
C:\Users\user\Desktop\DTBZGIOOSO\XZXHAVGRAG.xlsx
data
dropped
C:\Users\user\Desktop\DTBZGIOOSO\XZXHAVGRAG.xlsx.uajs (copy)
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN.jpg
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN.jpg.uajs (copy)
data
dropped
C:\Users\user\Desktop\DVWHKMNFNN.xlsx.uajs (copy)
data
dropped
C:\Users\user\Desktop\KATAXZVCPS.mp3
data
dropped
C:\Users\user\Desktop\KATAXZVCPS.mp3.uajs (copy)
data
dropped
C:\Users\user\Desktop\KATAXZVCPS.pdf
data
dropped
C:\Users\user\Desktop\KATAXZVCPS.pdf.uajs (copy)
data
dropped
C:\Users\user\Desktop\KATAXZVCPS.xlsx
data
dropped
C:\Users\user\Desktop\KATAXZVCPS.xlsx.uajs (copy)
data
dropped
C:\Users\user\Desktop\LTKMYBSEYZ.pdf
data
dropped
C:\Users\user\Desktop\LTKMYBSEYZ.pdf.uajs (copy)
data
dropped
C:\Users\user\Desktop\NIKHQAIQAU.jpg
data
dropped
C:\Users\user\Desktop\NIKHQAIQAU.jpg.uajs (copy)
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB.png
data
dropped
C:\Users\user\Desktop\NWTVCDUMOB.png.uajs (copy)
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU.docx
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU.docx.uajs (copy)
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU.pdf
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU.pdf.uajs (copy)
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU\KATAXZVCPS.xlsx
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU\KATAXZVCPS.xlsx.uajs (copy)
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU\LTKMYBSEYZ.pdf
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU\LTKMYBSEYZ.pdf.uajs (copy)
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU\ONBQCLYSPU.docx
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU\ONBQCLYSPU.docx.uajs (copy)
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU\RAYHIWGKDI.mp3
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU\RAYHIWGKDI.mp3.uajs (copy)
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU\YPSIACHYXW.jpg
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU\YPSIACHYXW.jpg.uajs (copy)
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU\ZBEDCJPBEY.png
data
dropped
C:\Users\user\Desktop\ONBQCLYSPU\ZBEDCJPBEY.png.uajs (copy)
data
dropped
C:\Users\user\Desktop\RAYHIWGKDI.mp3
data
dropped
C:\Users\user\Desktop\RAYHIWGKDI.mp3.uajs (copy)
data
dropped
C:\Users\user\Desktop\SQRKHNBNYN.mp3
data
dropped
C:\Users\user\Desktop\SQRKHNBNYN.mp3.uajs (copy)
data
dropped
C:\Users\user\Desktop\UMMBDNEQBN.png
data
dropped
C:\Users\user\Desktop\UMMBDNEQBN.png.uajs (copy)
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ.docx
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ.docx.uajs (copy)
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ.jpg
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ.jpg.uajs (copy)
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ.xlsx
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ.xlsx.uajs (copy)
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ\CURQNKVOIX.png
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ\CURQNKVOIX.png.uajs (copy)
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ\DVWHKMNFNN.xlsx
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ\DVWHKMNFNN.xlsx.uajs (copy)
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ\NIKHQAIQAU.jpg
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ\NIKHQAIQAU.jpg.uajs (copy)
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ\SQRKHNBNYN.mp3
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ\SQRKHNBNYN.mp3.uajs (copy)
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ\VLZDGUKUTZ.docx
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ\VLZDGUKUTZ.docx.uajs (copy)
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ\YPSIACHYXW.pdf
data
dropped
C:\Users\user\Desktop\VLZDGUKUTZ\YPSIACHYXW.pdf.uajs (copy)
data
dropped
C:\Users\user\Desktop\XZXHAVGRAG.docx
data
dropped
C:\Users\user\Desktop\XZXHAVGRAG.docx.uajs (copy)
data
dropped
C:\Users\user\Desktop\XZXHAVGRAG.xlsx
data
dropped
C:\Users\user\Desktop\XZXHAVGRAG.xlsx.uajs (copy)
data
dropped
C:\Users\user\Desktop\XZXHAVGRAG\DVWHKMNFNN.jpg
data
dropped
C:\Users\user\Desktop\XZXHAVGRAG\DVWHKMNFNN.jpg.uajs (copy)
data
dropped
C:\Users\user\Desktop\XZXHAVGRAG\KATAXZVCPS.pdf
data
dropped
C:\Users\user\Desktop\XZXHAVGRAG\KATAXZVCPS.pdf.uajs (copy)
data
dropped
C:\Users\user\Desktop\XZXHAVGRAG\NWTVCDUMOB.png
data
dropped
C:\Users\user\Desktop\XZXHAVGRAG\NWTVCDUMOB.png.uajs (copy)
data
dropped
C:\Users\user\Desktop\XZXHAVGRAG\VLZDGUKUTZ.xlsx
data
dropped
C:\Users\user\Desktop\XZXHAVGRAG\VLZDGUKUTZ.xlsx.uajs (copy)
data
dropped
C:\Users\user\Desktop\XZXHAVGRAG\XZXHAVGRAG.docx.uajs (copy)
data
dropped
C:\Users\user\Desktop\XZXHAVGRAG\YPSIACHYXW.mp3
data
dropped
C:\Users\user\Desktop\XZXHAVGRAG\YPSIACHYXW.mp3.uajs (copy)
data
dropped
C:\Users\user\Desktop\YPSIACHYXW.jpg
data
dropped
C:\Users\user\Desktop\YPSIACHYXW.jpg.uajs (copy)
data
dropped
C:\Users\user\Desktop\YPSIACHYXW.mp3
data
dropped
C:\Users\user\Desktop\YPSIACHYXW.mp3.uajs (copy)
data
dropped
C:\Users\user\Desktop\YPSIACHYXW.pdf
data
dropped
C:\Users\user\Desktop\YPSIACHYXW.pdf.uajs (copy)
data
dropped
C:\Users\user\Desktop\ZBEDCJPBEY.png
data
dropped
C:\Users\user\Desktop\ZBEDCJPBEY.png.uajs (copy)
data
dropped
C:\Users\user\Documents\CURQNKVOIX.png
data
dropped
C:\Users\user\Documents\CURQNKVOIX.png.uajs (copy)
data
dropped
C:\Users\user\Documents\DTBZGIOOSO.docx
data
dropped
C:\Users\user\Documents\DTBZGIOOSO.docx.uajs (copy)
data
dropped
C:\Users\user\Documents\DTBZGIOOSO\DTBZGIOOSO.docx
data
dropped
C:\Users\user\Documents\DTBZGIOOSO\DTBZGIOOSO.docx.uajs (copy)
data
dropped
C:\Users\user\Documents\DTBZGIOOSO\KATAXZVCPS.mp3
data
dropped
C:\Users\user\Documents\DTBZGIOOSO\KATAXZVCPS.mp3.uajs (copy)
data
dropped
C:\Users\user\Documents\DTBZGIOOSO\ONBQCLYSPU.pdf
data
dropped
C:\Users\user\Documents\DTBZGIOOSO\ONBQCLYSPU.pdf.uajs (copy)
data
dropped
C:\Users\user\Documents\DTBZGIOOSO\UMMBDNEQBN.png
data
dropped
C:\Users\user\Documents\DTBZGIOOSO\UMMBDNEQBN.png.uajs (copy)
data
dropped
C:\Users\user\Documents\DTBZGIOOSO\VLZDGUKUTZ.jpg
data
dropped
C:\Users\user\Documents\DTBZGIOOSO\VLZDGUKUTZ.jpg.uajs (copy)
data
dropped
C:\Users\user\Documents\DTBZGIOOSO\XZXHAVGRAG.xlsx
data
dropped
C:\Users\user\Documents\DTBZGIOOSO\XZXHAVGRAG.xlsx.uajs (copy)
data
dropped
C:\Users\user\Documents\DVWHKMNFNN.jpg
data
dropped
C:\Users\user\Documents\DVWHKMNFNN.jpg.uajs (copy)
data
dropped
C:\Users\user\Documents\DVWHKMNFNN.xlsx
data
dropped
C:\Users\user\Documents\DVWHKMNFNN.xlsx.uajs (copy)
data
dropped
C:\Users\user\Documents\KATAXZVCPS.mp3
data
dropped
C:\Users\user\Documents\KATAXZVCPS.mp3.uajs (copy)
data
dropped
C:\Users\user\Documents\KATAXZVCPS.pdf
data
dropped
C:\Users\user\Documents\KATAXZVCPS.pdf.uajs (copy)
data
dropped
C:\Users\user\Documents\KATAXZVCPS.xlsx
data
dropped
C:\Users\user\Documents\KATAXZVCPS.xlsx.uajs (copy)
data
dropped
C:\Users\user\Documents\LTKMYBSEYZ.pdf
data
dropped
C:\Users\user\Documents\LTKMYBSEYZ.pdf.uajs (copy)
data
dropped
C:\Users\user\Documents\NIKHQAIQAU.jpg
data
dropped
C:\Users\user\Documents\NIKHQAIQAU.jpg.uajs (copy)
data
dropped
C:\Users\user\Documents\NWTVCDUMOB.png
data
dropped
C:\Users\user\Documents\NWTVCDUMOB.png.uajs (copy)
data
dropped
C:\Users\user\Documents\ONBQCLYSPU.docx
data
dropped
C:\Users\user\Documents\ONBQCLYSPU.docx.uajs (copy)
data
dropped
C:\Users\user\Documents\ONBQCLYSPU.pdf
data
dropped
C:\Users\user\Documents\ONBQCLYSPU.pdf.uajs (copy)
data
dropped
C:\Users\user\Documents\ONBQCLYSPU\KATAXZVCPS.xlsx
data
dropped
C:\Users\user\Documents\ONBQCLYSPU\KATAXZVCPS.xlsx.uajs (copy)
data
dropped
C:\Users\user\Documents\ONBQCLYSPU\LTKMYBSEYZ.pdf
data
dropped
C:\Users\user\Documents\ONBQCLYSPU\LTKMYBSEYZ.pdf.uajs (copy)
data
dropped
C:\Users\user\Documents\ONBQCLYSPU\ONBQCLYSPU.docx
data
dropped
C:\Users\user\Documents\ONBQCLYSPU\ONBQCLYSPU.docx.uajs (copy)
data
dropped
C:\Users\user\Documents\ONBQCLYSPU\RAYHIWGKDI.mp3
data
dropped
C:\Users\user\Documents\ONBQCLYSPU\RAYHIWGKDI.mp3.uajs (copy)
data
dropped
C:\Users\user\Documents\ONBQCLYSPU\YPSIACHYXW.jpg
data
dropped
C:\Users\user\Documents\ONBQCLYSPU\YPSIACHYXW.jpg.uajs (copy)
data
dropped
C:\Users\user\Documents\ONBQCLYSPU\ZBEDCJPBEY.png
data
dropped
C:\Users\user\Documents\ONBQCLYSPU\ZBEDCJPBEY.png.uajs (copy)
data
dropped
C:\Users\user\Documents\RAYHIWGKDI.mp3
data
dropped
C:\Users\user\Documents\RAYHIWGKDI.mp3.uajs (copy)
data
dropped
C:\Users\user\Documents\SQRKHNBNYN.mp3
data
dropped
C:\Users\user\Documents\SQRKHNBNYN.mp3.uajs (copy)
data
dropped
C:\Users\user\Documents\UMMBDNEQBN.png
data
dropped
C:\Users\user\Documents\UMMBDNEQBN.png.uajs (copy)
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ.docx
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ.docx.uajs (copy)
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ.jpg
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ.jpg.uajs (copy)
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ.xlsx
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ.xlsx.uajs (copy)
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ\CURQNKVOIX.png
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ\CURQNKVOIX.png.uajs (copy)
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ\DVWHKMNFNN.xlsx
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ\DVWHKMNFNN.xlsx.uajs (copy)
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ\NIKHQAIQAU.jpg
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ\NIKHQAIQAU.jpg.uajs (copy)
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ\SQRKHNBNYN.mp3
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ\SQRKHNBNYN.mp3.uajs (copy)
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ\VLZDGUKUTZ.docx
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ\VLZDGUKUTZ.docx.uajs (copy)
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ\YPSIACHYXW.pdf
data
dropped
C:\Users\user\Documents\VLZDGUKUTZ\YPSIACHYXW.pdf.uajs (copy)
data
dropped
C:\Users\user\Documents\XZXHAVGRAG.docx
data
dropped
C:\Users\user\Documents\XZXHAVGRAG.docx.uajs (copy)
data
dropped
C:\Users\user\Documents\XZXHAVGRAG.xlsx
data
dropped
C:\Users\user\Documents\XZXHAVGRAG.xlsx.uajs (copy)
data
dropped
C:\Users\user\Documents\XZXHAVGRAG\DVWHKMNFNN.jpg
data
dropped
C:\Users\user\Documents\XZXHAVGRAG\DVWHKMNFNN.jpg.uajs (copy)
data
dropped
C:\Users\user\Documents\XZXHAVGRAG\KATAXZVCPS.pdf
data
dropped
C:\Users\user\Documents\XZXHAVGRAG\KATAXZVCPS.pdf.uajs (copy)
data
dropped
C:\Users\user\Documents\XZXHAVGRAG\NWTVCDUMOB.png
data
dropped
C:\Users\user\Documents\XZXHAVGRAG\NWTVCDUMOB.png.uajs (copy)
data
dropped
C:\Users\user\Documents\XZXHAVGRAG\VLZDGUKUTZ.xlsx
data
dropped
C:\Users\user\Documents\XZXHAVGRAG\VLZDGUKUTZ.xlsx.uajs (copy)
data
dropped
C:\Users\user\Documents\XZXHAVGRAG\XZXHAVGRAG.docx
data
dropped
C:\Users\user\Documents\XZXHAVGRAG\XZXHAVGRAG.docx.uajs (copy)
data
dropped
C:\Users\user\Documents\XZXHAVGRAG\YPSIACHYXW.mp3
data
dropped
C:\Users\user\Documents\XZXHAVGRAG\YPSIACHYXW.mp3.uajs (copy)
data
dropped
C:\Users\user\Documents\YPSIACHYXW.jpg
data
dropped
C:\Users\user\Documents\YPSIACHYXW.jpg.uajs (copy)
data
dropped
C:\Users\user\Documents\YPSIACHYXW.mp3
data
dropped
C:\Users\user\Documents\YPSIACHYXW.mp3.uajs (copy)
data
dropped
C:\Users\user\Documents\YPSIACHYXW.pdf
data
dropped
C:\Users\user\Documents\YPSIACHYXW.pdf.uajs (copy)
data
dropped
C:\Users\user\Documents\ZBEDCJPBEY.png
data
dropped
C:\Users\user\Documents\ZBEDCJPBEY.png.uajs (copy)
data
dropped
C:\Users\user\Downloads\CURQNKVOIX.png
data
dropped
C:\Users\user\Downloads\CURQNKVOIX.png.uajs (copy)
data
dropped
C:\Users\user\Downloads\DTBZGIOOSO.docx
data
dropped
C:\Users\user\Downloads\DTBZGIOOSO.docx.uajs (copy)
data
dropped
C:\Users\user\Downloads\DVWHKMNFNN.jpg
data
dropped
C:\Users\user\Downloads\DVWHKMNFNN.jpg.uajs (copy)
data
dropped
C:\Users\user\Downloads\DVWHKMNFNN.xlsx
data
dropped
C:\Users\user\Downloads\DVWHKMNFNN.xlsx.uajs (copy)
data
dropped
C:\Users\user\Downloads\KATAXZVCPS.mp3
data
dropped
C:\Users\user\Downloads\KATAXZVCPS.mp3.uajs (copy)
data
dropped
C:\Users\user\Downloads\KATAXZVCPS.pdf
data
dropped
C:\Users\user\Downloads\KATAXZVCPS.pdf.uajs (copy)
data
dropped
C:\Users\user\Downloads\KATAXZVCPS.xlsx
data
dropped
C:\Users\user\Downloads\KATAXZVCPS.xlsx.uajs (copy)
data
dropped
C:\Users\user\Downloads\LTKMYBSEYZ.pdf
data
dropped
C:\Users\user\Downloads\LTKMYBSEYZ.pdf.uajs (copy)
data
dropped
C:\Users\user\Downloads\NIKHQAIQAU.jpg
data
dropped
C:\Users\user\Downloads\NIKHQAIQAU.jpg.uajs (copy)
data
dropped
C:\Users\user\Downloads\NWTVCDUMOB.png
data
dropped
C:\Users\user\Downloads\NWTVCDUMOB.png.uajs (copy)
data
dropped
C:\Users\user\Downloads\ONBQCLYSPU.docx
data
dropped
C:\Users\user\Downloads\ONBQCLYSPU.docx.uajs (copy)
data
dropped
C:\Users\user\Downloads\ONBQCLYSPU.pdf
data
dropped
C:\Users\user\Downloads\ONBQCLYSPU.pdf.uajs (copy)
data
dropped
C:\Users\user\Downloads\RAYHIWGKDI.mp3
data
dropped
C:\Users\user\Downloads\RAYHIWGKDI.mp3.uajs (copy)
data
dropped
C:\Users\user\Downloads\SQRKHNBNYN.mp3
data
dropped
C:\Users\user\Downloads\SQRKHNBNYN.mp3.uajs (copy)
data
dropped
C:\Users\user\Downloads\UMMBDNEQBN.png
data
dropped
C:\Users\user\Downloads\UMMBDNEQBN.png.uajs (copy)
data
dropped
C:\Users\user\Downloads\VLZDGUKUTZ.docx
data
dropped
C:\Users\user\Downloads\VLZDGUKUTZ.docx.uajs (copy)
data
dropped
C:\Users\user\Downloads\VLZDGUKUTZ.jpg
data
dropped
C:\Users\user\Downloads\VLZDGUKUTZ.jpg.uajs (copy)
data
dropped
C:\Users\user\Downloads\VLZDGUKUTZ.xlsx
data
dropped
C:\Users\user\Downloads\VLZDGUKUTZ.xlsx.uajs (copy)
data
dropped
C:\Users\user\Downloads\XZXHAVGRAG.docx
data
dropped
C:\Users\user\Downloads\XZXHAVGRAG.docx.uajs (copy)
data
dropped
C:\Users\user\Downloads\XZXHAVGRAG.xlsx
data
dropped
C:\Users\user\Downloads\XZXHAVGRAG.xlsx.uajs (copy)
data
dropped
C:\Users\user\Downloads\YPSIACHYXW.jpg
data
dropped
C:\Users\user\Downloads\YPSIACHYXW.jpg.uajs (copy)
data
dropped
C:\Users\user\Downloads\YPSIACHYXW.mp3
data
dropped
C:\Users\user\Downloads\YPSIACHYXW.mp3.uajs (copy)
data
dropped
C:\Users\user\Downloads\YPSIACHYXW.pdf
data
dropped
C:\Users\user\Downloads\YPSIACHYXW.pdf.uajs (copy)
data
dropped
C:\Users\user\Downloads\ZBEDCJPBEY.png
data
dropped
C:\Users\user\Downloads\ZBEDCJPBEY.png.uajs (copy)
data
dropped
C:\Users\user\Favorites\Amazon.url
data
dropped
C:\Users\user\Favorites\Amazon.url.uajs (copy)
data
dropped
C:\Users\user\Favorites\Bing.url
data
dropped
C:\Users\user\Favorites\Bing.url.uajs (copy)
data
dropped
C:\Users\user\Favorites\Facebook.url
data
dropped
C:\Users\user\Favorites\Facebook.url.uajs (copy)
data
dropped
C:\Users\user\Favorites\Google.url
data
dropped
C:\Users\user\Favorites\Google.url.uajs (copy)
data
dropped
C:\Users\user\Favorites\Live.url
data
dropped
C:\Users\user\Favorites\Live.url.uajs (copy)
data
dropped
C:\Users\user\Favorites\NYTimes.url
data
dropped
C:\Users\user\Favorites\NYTimes.url.uajs (copy)
data
dropped
C:\Users\user\Favorites\Reddit.url
data
dropped
C:\Users\user\Favorites\Reddit.url.uajs (copy)
data
dropped
C:\Users\user\Favorites\Twitter.url
data
dropped
C:\Users\user\Favorites\Twitter.url.uajs (copy)
data
dropped
C:\Users\user\Favorites\Wikipedia.url
data
dropped
C:\Users\user\Favorites\Wikipedia.url.uajs (copy)
data
dropped
C:\Users\user\Favorites\Youtube.url
data
dropped
C:\Users\user\Favorites\Youtube.url.uajs (copy)
data
dropped
C:\Users\user\Searches\winrt--{S-1-5-21-2246122658-3693405117-2476756634-1002}-.searchconnector-ms
data
dropped
C:\Users\user\Searches\winrt--{S-1-5-21-2246122658-3693405117-2476756634-1002}-.searchconnector-ms.uajs (copy)
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 316 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MdeeRbWvqe.exe
"C:\Users\user\Desktop\MdeeRbWvqe.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\uthsueb
C:\Users\user\AppData\Roaming\uthsueb
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\8079.bat" "
malicious
C:\Windows\System32\reg.exe
reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
malicious
C:\Users\user\AppData\Local\Temp\A5B6.exe
C:\Users\user\AppData\Local\Temp\A5B6.exe
malicious
C:\Users\user\AppData\Local\Temp\A5B6.exe
C:\Users\user\AppData\Local\Temp\A5B6.exe
malicious
C:\Users\user\AppData\Local\Temp\A5B6.exe
"C:\Users\user\AppData\Local\Temp\A5B6.exe" --Admin IsNotAutoStart IsNotTask
malicious
C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe
C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe --Task
malicious
C:\Users\user\AppData\Local\Temp\A5B6.exe
"C:\Users\user\AppData\Local\Temp\A5B6.exe" --Admin IsNotAutoStart IsNotTask
malicious
C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe
C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe --Task
malicious
C:\Users\user\AppData\Local\Temp\C12E.exe
C:\Users\user\AppData\Local\Temp\C12E.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Local\Temp\D3CC.exe
C:\Users\user\AppData\Local\Temp\D3CC.exe
malicious
C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe
"C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe" --AutoStart
malicious
C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe
"C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe" --AutoStart
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\E978.bat" "
malicious
C:\Windows\System32\reg.exe
reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
malicious
C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe
"C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe" --AutoStart
malicious
C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe
"C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f\A5B6.exe" --AutoStart
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Users\user\AppData\Local\Temp\filename.exe
"C:\Users\user\AppData\Local\Temp\filename.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Start-Process "C:\Users\user\AppData\Local\Temp\filename.exe" -Verb runAs
malicious
C:\Users\user\AppData\Local\Temp\filename.exe
"C:\Users\user\AppData\Local\Temp\filename.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\user\AppData\Local\bc3a8265-4518-4f21-9fbc-86900b03148f" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 460 -p 2580 -ip 2580
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2580 -s 8792
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
There are 27 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://trade-inmyus.com/index.php
malicious
http://sajdfue.com/test1/get.php
malicious
https://rachmatmusa.com/ef.exe
103.247.10.118
malicious
http://sajdfue.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637
190.195.60.212
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://aka.ms/odirmr
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
http://tempuri.org/Entity/Id12Response
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13D4or-dark
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
https://api.2ip.ua/geo.json(
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
https://api.2ip.ua/geo.json$
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
https://greetclassifytalk.shop/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
https://greetclassifytalk.shop/api:
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.reddit.com/
unknown
https://greetclassifytalk.shop:443/api
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://wns.windows.com/L
unknown
https://api.ip.sb/ip
unknown
https://api.2ip.ua/geo.jsonX
unknown
https://aka.ms/Vh5j3kv
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
https://api.2ip.ua/geo.jsonQ
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://api.2ip.ua/geo.jsonR
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.ver)
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://rachmatmusa.com
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
https://api.2ip.ua/geo.jsonk
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
https://api.2ip.ua/=e
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
https://api.2ip.ua/geo.jsonc
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
https://api.2ip.ua/geo.jsonb
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
https://api.2ip.ua/geo.json8
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://greetclassifytalk.shop/apif
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
https://api.2ip.ua/geo.json4
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
https://api.2ip.ua/geo.jsonL
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
https://outlook.com_
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
https://excel.office.comj
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://www.amazon.com/
unknown
http://schemas.micro
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sdfjhuz.com
181.128.130.193
malicious
sajdfue.com
190.195.60.212
malicious
nessotechbd.com
192.185.16.114
malicious
greetclassifytalk.shop
172.67.177.98
malicious
rachmatmusa.com
103.247.10.118
malicious
roundcube.custommarinesvcs.com
198.57.242.153
malicious
trad-einmyus.com
193.106.175.76
malicious
cdn.discordapp.com
162.159.134.233
api.2ip.ua
172.67.139.220
drive.google.com
142.250.9.138
api.msn.com
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
193.106.175.76
trad-einmyus.com
Russian Federation
malicious
190.195.60.212
sajdfue.com
Argentina
malicious
103.247.10.118
rachmatmusa.com
Indonesia
malicious
172.67.177.98
greetclassifytalk.shop
United States
malicious
181.128.130.193
sdfjhuz.com
Colombia
malicious
192.185.16.114
nessotechbd.com
United States
malicious
5.42.65.50
unknown
Russian Federation
malicious
198.57.242.153
roundcube.custommarinesvcs.com
United States
malicious
142.250.9.138
drive.google.com
United States
172.67.139.220
api.2ip.ua
United States
127.0.0.1
unknown
unknown
162.159.134.233
cdn.discordapp.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000C0080
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000030432
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ybpny\op3n8265-4518-4s21-9sop-86900o03148s\N5O6.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000140068
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ybpny\op3n8265-4518-4s21-9sop-86900o03148s\N5O6.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\clicker\key
primary
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SysHelper
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion
SysHelper
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\2580
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\2580
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\2580
CreationTime
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsStore_8wekyb3d8bbwe\ApplicationFrame\Microsoft.WindowsStore_8wekyb3d8bbwe!App
PreferredMinSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}
DriveNumber
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
TotalBytes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
FreeBytes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Blank Disc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Can Close
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Media Type
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Imapi Media State
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
IsImapiDataBurnSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
IsImapiEraseSupported
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Live FS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Disc Label
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\Drives\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\Current Media
Set
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\BackupReminder
BackupReminderToastCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\DiskSpaceChecking
LastInstallTimeLowStorageNotify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\StorageSense\Parameters\BackupReminder
LastTimeBackupReminderNotify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}
Generation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
TraySearchBoxVisible
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidthOld
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
SearchboxWidth
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010400
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203F4
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203A8
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203AE
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203A6
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203A4
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000203A2
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000030396
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000010380
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000004037E
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000003037C
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000001032A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
InstalledWin32AppsRevision
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{852FB1F8-5CC6-4567-9C0E-7C330F8807C2}.check.100
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2ts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wdp\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
PastIconsStream
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify
IconStreams
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
DontOfferThroughWUAU
There are 230 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
4A70000
direct allocation
page execute and read and write
malicious
3045000
trusted library allocation
page read and write
malicious
49B0000
direct allocation
page execute and read and write
malicious
48B000
unkown
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2EF1000
unclassified section
page read and write
malicious
4990000
direct allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2E70000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
49B0000
direct allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2FD1000
unclassified section
page read and write
malicious
49B0000
direct allocation
page execute and read and write
malicious
8B1000
heap
page read and write
malicious
2C90000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
CAE3000
heap
page read and write
E631000
unkown
page read and write
E9FD000
stack
page read and write
9070000
unkown
page read and write
8820000
unkown
page read and write
9070000
unkown
page read and write
7E70000
unkown
page read and write
94CC000
heap
page read and write
7FF6E8EC4000
unkown
page readonly
41F000
unkown
page readonly
7FF5ED205000
unkown
page readonly
287F000
stack
page read and write
289F000
stack
page read and write
7B9A000
heap
page read and write
3450000
unkown
page read and write
CC89000
heap
page read and write
C6D8000
unkown
page read and write
9070000
unkown
page read and write
976D000
heap
page read and write
30DC000
trusted library allocation
page read and write
7FF5ED8C6000
unkown
page readonly
690000
heap
page read and write
FA94000
unkown
page read and write
9603000
heap
page read and write
7DF496661000
trusted library allocation
page execute read
935B000
heap
page read and write
53FB000
trusted library allocation
page read and write
CCD3000
heap
page read and write
CCEA000
heap
page read and write
3570000
direct allocation
page read and write
20890BB0000
direct allocation
page read and write
2C95000
unkown
page readonly
1BCEEE94000
heap
page read and write
1838000
heap
page read and write
1390000
unkown
page read and write
7FF5ED93E000
unkown
page readonly
3FF6000
trusted library allocation
page read and write
C78D000
heap
page read and write
CA6B000
heap
page read and write
400000
unkown
page readonly
9734000
heap
page read and write
7CDB000
heap
page read and write
91C8000
heap
page read and write
1BCEFD20000
trusted library allocation
page read and write
6410000
trusted library allocation
page execute and read and write
9877000
unkown
page read and write
30BC000
heap
page read and write
610000
heap
page read and write
1867000
heap
page read and write
7DF4F3031000
unkown
page execute read
8740000
unkown
page read and write
1131F000
unkown
page read and write
7FF6E9915000
unkown
page execute read
978D000
heap
page read and write
B4D0000
unkown
page read and write
8D10000
unkown
page read and write
7FF5ED4B4000
unkown
page readonly
2FB0000
remote allocation
page read and write
8A6E000
stack
page read and write
7BAD000
heap
page read and write
7E70000
unkown
page read and write
9429000
heap
page read and write
3506000
trusted library allocation
page read and write
186C000
heap
page read and write
96EA000
heap
page read and write
7FF5ED8B4000
unkown
page readonly
3EC7000
trusted library allocation
page read and write
3450000
unkown
page read and write
95F6000
heap
page read and write
41F000
unkown
page readonly
BC3D000
stack
page read and write
20890BB0000
direct allocation
page read and write
4C18000
unkown
page read and write
7BB0000
heap
page read and write
BD10000
trusted library allocation
page read and write
D87F000
stack
page read and write
9070000
unkown
page read and write
B19C000
heap
page read and write
50FB000
heap
page read and write
9365000
heap
page read and write
2F5F000
stack
page read and write
7730000
trusted library allocation
page read and write
88A000
heap
page read and write
7F50000
unkown
page read and write
95E8000
heap
page read and write
CCB6000
heap
page read and write
13B0000
unkown
page read and write
7B81000
heap
page read and write
922A000
heap
page read and write
2CEB000
heap
page read and write
8D10000
unkown
page read and write
193000
stack
page read and write
918000
heap
page read and write
946A000
heap
page read and write
430B000
trusted library allocation
page read and write
1BCEF700000
heap
page read and write
54E0000
trusted library allocation
page execute and read and write
CAAC000
heap
page read and write
2D2E000
stack
page read and write
E877000
unkown
page read and write
279E000
stack
page read and write
3EA9000
trusted library allocation
page read and write
CC20000
heap
page read and write
274F000
stack
page read and write
7FF6E8EB1000
unkown
page execute read
410E000
trusted library allocation
page read and write
933E000
heap
page read and write
4B2000
unkown
page write copy
2CAF000
stack
page read and write
9070000
unkown
page read and write
5002000
heap
page read and write
3E97000
trusted library allocation
page read and write
7DF4F3051000
unkown
page execute read
7FF6E8EC8000
unkown
page read and write
1BD2D650000
unkown
page read and write
598000
heap
page read and write
8F30000
unkown
page read and write
7FF6E93CE000
unkown
page readonly
7CA5000
heap
page read and write
E894000
unkown
page read and write
37B0000
unkown
page read and write
17DB000
heap
page read and write
935B000
heap
page read and write
7FF5ED40D000
unkown
page readonly
3570000
direct allocation
page read and write
2FB0000
heap
page read and write
CC54000
heap
page read and write
96DF000
unkown
page read and write
3EA2000
trusted library allocation
page read and write
95FC000
heap
page read and write
2E83000
heap
page read and write
933E000
heap
page read and write
1864000
heap
page read and write
C69B000
heap
page read and write
92E3000
heap
page read and write
3450000
unkown
page read and write
1BD2BB40000
direct allocation
page read and write
9080000
unkown
page read and write
33C0000
unkown
page read and write
7D07000
heap
page read and write
8F30000
unkown
page read and write
95EB000
heap
page read and write
2D9B000
stack
page read and write
4BF000
unkown
page read and write
DAFD000
stack
page read and write
8740000
unkown
page read and write
92C000
heap
page read and write
210E67B0000
heap
page read and write
2E2A000
heap
page read and write
EF9C000
stack
page read and write
90F000
heap
page read and write
8F30000
unkown
page read and write
56D9000
unkown
page read and write
8C67000
stack
page read and write
375F000
stack
page read and write
933E000
heap
page read and write
7B87000
heap
page read and write
C940000
heap
page read and write
9622000
heap
page read and write
2CEE000
stack
page read and write
7F50000
unkown
page read and write
5866000
heap
page read and write
53F4000
trusted library allocation
page read and write
9567000
heap
page read and write
A310000
unkown
page read and write
7E70000
unkown
page read and write
2C1E000
stack
page read and write
446000
remote allocation
page execute and read and write
2F0E000
stack
page read and write
919000
heap
page read and write
19B000
stack
page read and write
9070000
unkown
page read and write
3EA9000
trusted library allocation
page read and write
5751000
trusted library allocation
page read and write
3570000
direct allocation
page read and write
B8CE000
stack
page read and write
3E91000
trusted library allocation
page read and write
5828000
heap
page read and write
97AC000
heap
page read and write
C90A000
heap
page read and write
5715000
trusted library allocation
page read and write
8800000
unkown
page read and write
1BCEF602000
heap
page read and write
C989000
heap
page read and write
7C7F000
heap
page read and write
2CFE000
stack
page read and write
9070000
unkown
page read and write
C968000
heap
page read and write
7FF5ED800000
unkown
page readonly
49AF000
stack
page read and write
CAEF000
heap
page read and write
7E70000
unkown
page read and write
FA5B000
unkown
page read and write
2FB0000
remote allocation
page read and write
95F8000
heap
page read and write
3400000
remote allocation
page read and write
73F7000
heap
page read and write
AADB000
unkown
page read and write
CCB2000
heap
page read and write
2F5E000
heap
page read and write
CCE4000
heap
page read and write
933E000
heap
page read and write
8C70000
unkown
page read and write
CCB6000
heap
page read and write
772E000
stack
page read and write
1320000
heap
page read and write
2D10000
heap
page read and write
13B0000
unkown
page read and write
1836000
heap
page read and write
7F50000
unkown
page read and write
7FF6E8EC4000
unkown
page readonly
97A9000
unkown
page read and write
9581000
heap
page read and write
95F3000
heap
page read and write
8C70000
unkown
page read and write
2FB1000
heap
page read and write
CCA6000
heap
page read and write
2C95000
unkown
page readonly
CA04000
heap
page read and write
80E000
stack
page read and write
9B60000
unkown
page readonly
6FF0000
trusted library allocation
page execute and read and write
D2414FD000
stack
page read and write
978D000
heap
page read and write
9070000
unkown
page read and write
1390000
unkown
page read and write
C9DC000
heap
page read and write
1BCF4456000
trusted library allocation
page read and write
128B000
heap
page read and write
12B4000
heap
page read and write
FB16000
unkown
page read and write
7CE2000
heap
page read and write
7DBD000
stack
page read and write
2F90000
trusted library allocation
page read and write
7FF5ED697000
unkown
page readonly
3E9F000
trusted library allocation
page read and write
9747000
heap
page read and write
934E000
heap
page read and write
8BB0000
unkown
page readonly
32E0000
heap
page read and write
7BA5000
heap
page read and write
CCDC000
heap
page read and write
8800000
unkown
page read and write
7FF5ED8C1000
unkown
page readonly
3570000
direct allocation
page read and write
4D20000
heap
page read and write
12A0000
heap
page read and write
934C000
heap
page read and write
1872000
heap
page read and write
7FF6E8EB0000
unkown
page readonly
210E6D02000
heap
page read and write
1877000
heap
page read and write
268F000
stack
page read and write
210E6D13000
heap
page read and write
9070000
unkown
page read and write
BDA0000
unkown
page readonly
7660000
trusted library allocation
page read and write
6460000
heap
page execute and read and write
2A10000
heap
page read and write
7E70000
unkown
page read and write
C704000
heap
page read and write
1865000
heap
page read and write
CB42000
heap
page read and write
437000
remote allocation
page execute and read and write
3E91000
trusted library allocation
page read and write
7E60000
unkown
page read and write
8820000
unkown
page read and write
7BBB000
heap
page read and write
876000
heap
page read and write
CCA6000
heap
page read and write
94A3000
heap
page read and write
9070000
unkown
page read and write
4977E7D000
stack
page read and write
620000
heap
page read and write
2271FFF000
stack
page read and write
CCDE000
heap
page read and write
9977000
unkown
page read and write
8210000
unkown
page read and write
193000
stack
page read and write
C95B000
heap
page read and write
9285000
heap
page read and write
20890BB0000
direct allocation
page read and write
197000
stack
page read and write
7FF6E9915000
unkown
page execute read
BA4E000
stack
page read and write
7857000
unkown
page read and write
FB94000
unkown
page read and write
4E00000
trusted library section
page readonly
400000
unkown
page readonly
FE71000
unkown
page read and write
9070000
unkown
page read and write
B228000
heap
page read and write
787C000
unkown
page read and write
C6F7000
heap
page read and write
24E6CDD0000
heap
page read and write
7FF5EDA0D000
unkown
page readonly
2D80000
heap
page read and write
3570000
direct allocation
page read and write
934E000
heap
page read and write
13B0000
unkown
page read and write
7CD9000
heap
page read and write
C944000
heap
page read and write
3ECF000
trusted library allocation
page read and write
A4AE000
unkown
page read and write
7FF5ED942000
unkown
page readonly
4977A7B000
stack
page read and write
400000
unkown
page readonly
D5FE000
stack
page read and write
7FF5ED1CF000
unkown
page readonly
95C8000
heap
page read and write
C7C5000
unkown
page read and write
28F15D30000
heap
page read and write
C94E000
heap
page read and write
C962000
unkown
page read and write
1BD2D650000
unkown
page read and write
5858000
heap
page read and write
7D1D000
heap
page read and write
3420000
heap
page read and write
C9CE000
heap
page read and write
9070000
unkown
page read and write
7D16000
heap
page read and write
CCDA000
heap
page read and write
20890B80000
heap
page read and write
C9DC000
heap
page read and write
B7C8000
stack
page read and write
BB99000
stack
page read and write
CAD1000
heap
page read and write
7FF5D1CD4000
unkown
page readonly
3800000
unkown
page readonly
7DF496681000
trusted library allocation
page execute read
5832000
heap
page read and write
5730000
heap
page read and write
647000
heap
page read and write
96EA000
heap
page read and write
17C6000
heap
page read and write
96DD000
heap
page read and write
7FF5ED5F7000
unkown
page readonly
2BC0000
heap
page read and write
9581000
heap
page read and write
CAED000
heap
page read and write
9359000
heap
page read and write
9342000
heap
page read and write
37BD000
unkown
page read and write
2FCE000
stack
page read and write
B224000
heap
page read and write
185E000
heap
page read and write
1BCEF615000
heap
page read and write
3EC3000
trusted library allocation
page read and write
973B000
heap
page read and write
960A000
heap
page read and write
1BCF4303000
heap
page read and write
D2416FF000
stack
page read and write
7D40000
unkown
page read and write
92E3000
heap
page read and write
7E70000
unkown
page read and write
90B000
heap
page read and write
7FF6E9C15000
unkown
page readonly
CCEE000
heap
page read and write
2C11000
unkown
page readonly
7E70000
unkown
page read and write
1BCEEC20000
heap
page read and write
AAF9000
unkown
page read and write
582F000
heap
page read and write
401000
unkown
page execute read
9666000
heap
page read and write
2B1D000
stack
page read and write
2C95000
unkown
page readonly
3570000
direct allocation
page read and write
7FF5ED97A000
unkown
page readonly
C8E000
stack
page read and write
3570000
direct allocation
page read and write
B1CA000
heap
page read and write
3140000
heap
page read and write
5718000
trusted library allocation
page read and write
C939000
heap
page read and write
7FF5EDA47000
unkown
page readonly
1872000
heap
page read and write
912000
heap
page read and write
CABE000
heap
page read and write
CAC5000
heap
page read and write
7FF5ED586000
unkown
page readonly
7FF6E8EB1000
unkown
page execute read
179BB6C0000
heap
page read and write
3EE0000
trusted library allocation
page read and write
7FF5ED50A000
unkown
page readonly
3416000
trusted library allocation
page read and write
10F87000
heap
page read and write
1856000
heap
page read and write
9070000
unkown
page read and write
2CF0000
heap
page read and write
3088000
trusted library allocation
page read and write
C751000
heap
page read and write
2F88000
heap
page read and write
7F50000
unkown
page read and write
7867000
unkown
page read and write
8C70000
unkown
page read and write
20890BB0000
direct allocation
page read and write
2C95000
unkown
page readonly
C968000
heap
page read and write
CCE0000
heap
page read and write
960A000
heap
page read and write
3110000
unkown
page read and write
C805000
heap
page read and write
8F30000
unkown
page read and write
74C5000
heap
page read and write
B210000
heap
page read and write
9B000
stack
page read and write
3209000
stack
page read and write
3230000
unkown
page read and write
9DF000
stack
page read and write
1BCF44F4000
trusted library allocation
page read and write
CCDA000
heap
page read and write
B1F3000
heap
page read and write
9070000
unkown
page read and write
9581000
heap
page read and write
9690000
heap
page read and write
E7FD000
stack
page read and write
1856000
heap
page read and write
3514000
trusted library allocation
page read and write
40EF000
stack
page read and write
C01D000
stack
page read and write
3EC9000
trusted library allocation
page read and write
FA14000
unkown
page read and write
9070000
unkown
page read and write
7670000
trusted library allocation
page read and write
CA00000
heap
page read and write
171E000
stack
page read and write
3EC7000
trusted library allocation
page read and write
2CB0000
heap
page read and write
9707000
heap
page read and write
956E000
heap
page read and write
C8CB000
heap
page read and write
C8AB000
heap
page read and write
1390000
unkown
page read and write
976D000
heap
page read and write
5720000
trusted library allocation
page read and write
E894000
unkown
page read and write
CB34000
heap
page read and write
30E4000
heap
page read and write
D090000
trusted library allocation
page read and write
B22E000
heap
page read and write
1861000
heap
page read and write
8740000
unkown
page read and write
430000
unkown
page read and write
121D000
trusted library allocation
page execute and read and write
1BCEFB40000
trusted library allocation
page read and write
B22F000
heap
page read and write
2FB0000
heap
page read and write
C8B6000
heap
page read and write
9070000
unkown
page read and write
9070000
unkown
page read and write
7490000
heap
page read and write
B5E000
stack
page read and write
20890C2C000
heap
page read and write
80B8000
stack
page read and write
7FF5EDA38000
unkown
page readonly
59EE000
stack
page read and write
CB1B000
heap
page read and write
AAD1000
unkown
page read and write
3230000
unkown
page read and write
9570000
heap
page read and write
7FF6E9C15000
unkown
page readonly
DA50000
trusted library allocation
page read and write
3570000
direct allocation
page read and write
8D10000
unkown
page read and write
9B000
stack
page read and write
C7D1000
heap
page read and write
7D10000
heap
page read and write
3048000
heap
page read and write
850000
heap
page read and write
1BCEF71A000
heap
page read and write
7FF5ED4C6000
unkown
page readonly
6430000
trusted library allocation
page read and write
3110000
unkown
page read and write
CCDC000
heap
page read and write
1BCF422C000
heap
page read and write
957A000
heap
page read and write
197000
stack
page read and write
EAFD000
stack
page read and write
705000
heap
page read and write
C90A000
heap
page read and write
8C70000
unkown
page read and write
CCDA000
heap
page read and write
CCE2000
heap
page read and write
9286000
heap
page read and write
3EC8000
trusted library allocation
page read and write
1867000
heap
page read and write
5152000
heap
page read and write
19E000
stack
page read and write
9581000
heap
page read and write
9263000
heap
page read and write
1872000
heap
page read and write
3110000
unkown
page read and write
976D000
heap
page read and write
7AFE000
stack
page read and write
A6CE000
stack
page read and write
966E000
heap
page read and write
9666000
heap
page read and write
4A6F000
stack
page read and write
74D5000
heap
page read and write
1BCF4472000
trusted library allocation
page read and write
3336000
trusted library allocation
page read and write
7FF5ED39B000
unkown
page readonly
95E8000
heap
page read and write
1510000
unkown
page readonly
30F0000
direct allocation
page read and write
359C000
stack
page read and write
1BCF42C6000
heap
page read and write
9070000
unkown
page read and write
C9D5000
heap
page read and write
20890BB0000
direct allocation
page read and write
CCAC000
heap
page read and write
B07B97D000
stack
page read and write
9070000
unkown
page read and write
186C000
heap
page read and write
8D10000
unkown
page read and write
7FF5ED3A7000
unkown
page readonly
94AB000
heap
page read and write
3570000
direct allocation
page read and write
3570000
direct allocation
page read and write
C806000
heap
page read and write
8D10000
unkown
page read and write
B4D0000
unkown
page read and write
7F50000
unkown
page read and write
9070000
unkown
page read and write
CCE0000
heap
page read and write
924F000
heap
page read and write
9070000
unkown
page read and write
5422000
trusted library allocation
page read and write
8780000
unkown
page read and write
2FB0000
remote allocation
page read and write
8108000
stack
page read and write
95E8000
heap
page read and write
976D000
heap
page read and write
1F0000
heap
page read and write
1BCF42E2000
heap
page read and write
942D000
heap
page read and write
B1A4000
heap
page read and write
DA50000
trusted library allocation
page read and write
95F6000
heap
page read and write
C90A000
heap
page read and write
3570000
direct allocation
page read and write
CCEE000
heap
page read and write
3400000
remote allocation
page read and write
9070000
unkown
page read and write
A530000
remote allocation
page read and write
513B000
heap
page read and write
40C000
unkown
page readonly
C779000
heap
page read and write
7CDB000
heap
page read and write
7BA3000
heap
page read and write
3F9F000
trusted library allocation
page read and write
E8FE000
stack
page read and write
37AC000
unkown
page read and write
2EEE000
stack
page read and write
8820000
unkown
page read and write
C7FB000
heap
page read and write
9070000
unkown
page read and write
3230000
unkown
page read and write
B640000
unkown
page read and write
9707000
heap
page read and write
401000
unkown
page execute read
7D57000
heap
page read and write
933E000
heap
page read and write
7FF6E974B000
unkown
page execute and read and write
2FB0000
remote allocation
page read and write
32E1000
heap
page read and write
2F50000
heap
page read and write
9286000
heap
page read and write
7ECE000
stack
page read and write
CCD3000
heap
page read and write
129B000
stack
page read and write
4B78000
unkown
page read and write
CCD6000
heap
page read and write
CB1B000
heap
page read and write
7FF6E8EC8000
unkown
page write copy
9365000
heap
page read and write
470000
unkown
page readonly
2E9E000
stack
page read and write
8C70000
unkown
page read and write
5086000
heap
page read and write
9070000
unkown
page read and write
B950000
unkown
page readonly
963C000
heap
page read and write
7D4B000
heap
page read and write
400000
unkown
page readonly
8D10000
unkown
page read and write
1838000
heap
page read and write
90BF000
stack
page read and write
347C000
trusted library allocation
page read and write
19B000
stack
page read and write
2D50000
direct allocation
page execute and read and write
3230000
unkown
page read and write
CCE4000
heap
page read and write
CAFD000
heap
page read and write
CCEA000
heap
page read and write
305B000
heap
page read and write
89E0000
unkown
page read and write
2E5E000
stack
page read and write
3570000
direct allocation
page read and write
400000
remote allocation
page execute and read and write
3590000
unkown
page read and write
9070000
unkown
page read and write
7D10000
heap
page read and write
CAE2000
heap
page read and write
9070000
unkown
page read and write
7D22000
heap
page read and write
49AF000
stack
page read and write
9581000
heap
page read and write
CCDE000
heap
page read and write
3F15000
trusted library allocation
page read and write
95FC000
heap
page read and write
93E3000
heap
page read and write
941D000
heap
page read and write
7B97000
heap
page read and write
CA79000
heap
page read and write
202BE2B0000
heap
page read and write
DA4D000
stack
page read and write
3EE6000
trusted library allocation
page read and write
CCCB000
heap
page read and write
8780000
unkown
page read and write
7BF9000
heap
page read and write
925F000
heap
page read and write
956D000
heap
page read and write
833E000
stack
page read and write
193000
stack
page read and write
640000
heap
page read and write
93FE000
heap
page read and write
CAED000
heap
page read and write
13B0000
unkown
page read and write
1BCEEE00000
heap
page read and write
17DB000
heap
page read and write
9622000
heap
page read and write
CCE0000
heap
page read and write
B218000
heap
page read and write
CC92000
heap
page read and write
927E000
heap
page read and write
9070000
unkown
page read and write
977A000
unkown
page read and write
497857E000
unkown
page readonly
13B0000
unkown
page read and write
27CE000
stack
page read and write
925D000
heap
page read and write
3450000
trusted library allocation
page read and write
94A3000
heap
page read and write
7F50000
unkown
page read and write
C548000
heap
page read and write
CCA8000
heap
page read and write
2DD0000
trusted library allocation
page read and write
CCEE000
heap
page read and write
934E000
heap
page read and write
CB2C000
heap
page read and write
1BCF44F0000
trusted library allocation
page read and write
2F5F000
stack
page read and write
8F30000
unkown
page read and write
1734000
heap
page read and write
184A000
heap
page read and write
3570000
direct allocation
page read and write
8740000
unkown
page read and write
C7E1000
heap
page read and write
9070000
unkown
page read and write
49771DE000
stack
page read and write
CCB0000
heap
page read and write
2FB0000
heap
page read and write
35D0000
unkown
page read and write
8F1000
heap
page read and write
5053000
heap
page read and write
3360000
trusted library allocation
page read and write
953E000
heap
page read and write
7E70000
unkown
page read and write
14A7000
heap
page read and write
4978B7E000
unkown
page readonly
CCC9000
heap
page read and write
28FE000
stack
page read and write
13B0000
unkown
page read and write
3450000
unkown
page read and write
7FF5ED9CA000
unkown
page readonly
3230000
unkown
page read and write
3570000
direct allocation
page read and write
3567BFF000
stack
page read and write
8780000
unkown
page read and write
7FF5ED8AC000
unkown
page readonly
52B000
remote allocation
page execute and read and write
40C000
unkown
page readonly
CCD8000
heap
page read and write
953E000
heap
page read and write
96DD000
heap
page read and write
3200000
heap
page read and write
C799000
heap
page read and write
735000
heap
page read and write
7FF5EDA08000
unkown
page readonly
797D000
unkown
page read and write
B650000
unkown
page read and write
514E000
heap
page read and write
3EB1000
trusted library allocation
page read and write
8F30000
unkown
page read and write
7953000
unkown
page read and write
C21D000
stack
page read and write
B64B000
stack
page read and write
959E000
heap
page read and write
41F3000
trusted library allocation
page read and write
953E000
heap
page read and write
CCD6000
heap
page read and write
7E70000
unkown
page read and write
B1C9000
heap
page read and write
10D0000
heap
page read and write
7459000
heap
page read and write
9070000
unkown
page read and write
B228000
heap
page read and write
C9CB000
heap
page read and write
C560000
heap
page read and write
C350000
unkown
page read and write
7695000
stack
page read and write
2A6D000
stack
page read and write
C785000
heap
page read and write
7FF5ED750000
unkown
page readonly
7FF6E93CA000
unkown
page readonly
93AE000
heap
page read and write
120D000
unkown
page readonly
9070000
unkown
page read and write
960A000
heap
page read and write
C8B8000
heap
page read and write
7C01000
heap
page read and write
9DED000
stack
page read and write
7FF6E96CE000
unkown
page execute and read and write
7FF5ED71E000
unkown
page readonly
7E70000
unkown
page read and write
CB8D000
heap
page read and write
966E000
heap
page read and write
3570000
direct allocation
page read and write
A375000
unkown
page read and write
8D10000
unkown
page read and write
33C0000
unkown
page read and write
913F000
stack
page read and write
7BB4000
heap
page read and write
7FF5ED74A000
unkown
page readonly
2E6F000
stack
page read and write
7FF5ED9A6000
unkown
page readonly
95C8000
heap
page read and write
7CE000
stack
page read and write
7C7F000
heap
page read and write
40C000
unkown
page readonly
2E2E000
heap
page read and write
956E000
heap
page read and write
7D16000
heap
page read and write
8C70000
unkown
page read and write
C57F000
unkown
page read and write
336C000
trusted library allocation
page read and write
C7D1000
heap
page read and write
9893000
unkown
page read and write
1BCEEE64000
heap
page read and write
876000
heap
page read and write
BD60000
trusted library allocation
page read and write
2F21000
heap
page execute and read and write
9070000
unkown
page read and write
1734000
heap
page read and write
197000
stack
page read and write
52B000
remote allocation
page execute and read and write
9070000
unkown
page read and write
9365000
heap
page read and write
7E70000
unkown
page read and write
7FF6E96A2000
unkown
page execute and read and write
C7E8000
heap
page read and write
97AC000
heap
page read and write
8780000
unkown
page read and write
4648000
trusted library allocation
page read and write
3450000
unkown
page read and write
95E4000
heap
page read and write
7E70000
unkown
page read and write
13B0000
unkown
page read and write
CB00000
heap
page read and write
9535000
heap
page read and write
7FF5ED73D000
unkown
page readonly
9070000
unkown
page read and write
6051000
heap
page read and write
95E9000
heap
page read and write
13B0000
unkown
page read and write
8F30000
unkown
page read and write
9208000
heap
page read and write
CCD2000
heap
page read and write
2A6E000
stack
page read and write
9070000
unkown
page read and write
64B000
heap
page read and write
4C1E000
unkown
page read and write
57E1000
heap
page read and write
CC92000
heap
page read and write
96EA000
heap
page read and write
B728000
stack
page read and write
8F9000
heap
page read and write
73CB000
trusted library allocation
page read and write
BDC0000
unkown
page readonly
186C000
heap
page read and write
9070000
unkown
page read and write
90A0000
unkown
page read and write
7DF496690000
trusted library allocation
page readonly
934E000
heap
page read and write
3570000
direct allocation
page read and write
34AE000
trusted library allocation
page read and write
20890BB0000
direct allocation
page read and write
CA6B000
heap
page read and write
95C8000
heap
page read and write
13B0000
unkown
page read and write
1867000
heap
page read and write
97AC000
heap
page read and write
CCCB000
heap
page read and write
7FF5ED433000
unkown
page readonly
519A000
heap
page read and write
7FF6E96D0000
unkown
page execute and read and write
4B4000
unkown
page read and write
C614000
heap
page read and write
CC9A000
heap
page read and write
5854000
heap
page read and write
4B50000
unkown
page read and write
7FF6E8EB0000
unkown
page readonly
34E3000
trusted library allocation
page read and write
3D3F000
stack
page read and write
9070000
unkown
page read and write
8D10000
unkown
page read and write
646000
heap
page read and write
3230000
unkown
page read and write
A0BD000
stack
page read and write
1870000
heap
page read and write
9070000
unkown
page read and write
1121D000
unkown
page read and write
3FA5000
trusted library allocation
page read and write
7FF5ED451000
unkown
page readonly
1203000
trusted library allocation
page execute and read and write
210E6813000
unkown
page read and write
3210000
heap
page read and write
7FF5ED337000
unkown
page readonly
924C000
heap
page read and write
A21E000
stack
page read and write
D4A000
heap
page read and write
3570000
direct allocation
page read and write
6440000
trusted library allocation
page read and write
C94A000
heap
page read and write
40C000
unkown
page readonly
C9DC000
heap
page read and write
3570000
direct allocation
page read and write
3570000
direct allocation
page read and write
7E70000
unkown
page read and write
9070000
unkown
page read and write
2C95000
unkown
page readonly
49F0000
heap
page read and write
7CC0000
unkown
page readonly
7FF5ED1D6000
unkown
page readonly
401000
unkown
page execute read
7FF5ED915000
unkown
page readonly
32CE000
stack
page read and write
934E000
heap
page read and write
978D000
heap
page read and write
11F0000
trusted library allocation
page read and write
9660000
unkown
page read and write
8780000
unkown
page read and write
3570000
direct allocation
page read and write
7FF5ED9C6000
unkown
page readonly
CCEA000
heap
page read and write
1226000
trusted library allocation
page execute and read and write
68E000
stack
page read and write
3570000
direct allocation
page read and write
7FF5ED714000
unkown
page readonly
8CF0000
unkown
page read and write
186C000
heap
page read and write
7E70000
unkown
page read and write
51B4000
heap
page read and write
41F000
unkown
page readonly
5590000
unkown
page write copy
51AE000
heap
page read and write
4BE1000
unkown
page read and write
7E70000
unkown
page read and write
9070000
unkown
page read and write
30B0000
remote allocation
page read and write
91B9000
stack
page read and write
16D0000
heap
page read and write
1BCEF71A000
heap
page read and write
9070000
unkown
page read and write
3570000
direct allocation
page read and write
1BCF4430000
trusted library allocation
page read and write
AA90000
unkown
page read and write
3570000
direct allocation
page read and write
95C8000
heap
page read and write
1BCF4305000
heap
page read and write
CAC6000
unkown
page read and write
7FF5ED9D6000
unkown
page readonly
2E60000
heap
page read and write
B200000
heap
page read and write
607000
heap
page read and write
1BCF446F000
trusted library allocation
page read and write
8740000
unkown
page read and write
96EA000
heap
page read and write
7DF496660000
trusted library allocation
page readonly
975E000
heap
page read and write
7740000
trusted library allocation
page read and write
9070000
unkown
page read and write
406E000
trusted library allocation
page read and write
9550000
unkown
page readonly
9B000
stack
page read and write
5045000
heap
page read and write
CCA8000
heap
page read and write
3570000
direct allocation
page read and write
13B0000
unkown
page read and write
4BC9000
unkown
page read and write
683F000
stack
page read and write
7F50000
unkown
page read and write
210E6800000
unkown
page read and write
7DF496660000
trusted library allocation
page readonly
95E9000
heap
page read and write
5230000
trusted library allocation
page read and write
28F15AEA000
heap
page read and write
82BE000
stack
page read and write
987D000
unkown
page read and write
8780000
unkown
page read and write
1BCF4440000
trusted library allocation
page read and write
E771000
unkown
page read and write
13B0000
unkown
page read and write
3570000
direct allocation
page read and write
8F30000
unkown
page read and write
3570000
direct allocation
page read and write
187D000
heap
page read and write
508B000
heap
page read and write
3570000
direct allocation
page read and write
3EC5000
trusted library allocation
page read and write
7FF5ED9D2000
unkown
page readonly
3230000
unkown
page read and write
1BCF42FF000
heap
page read and write
9286000
heap
page read and write
CAC2000
heap
page read and write
7FF5ED519000
unkown
page readonly
CAB9000
heap
page read and write
903F000
stack
page read and write
3570000
direct allocation
page read and write
3758000
unkown
page read and write
36F127D000
stack
page read and write
935B000
heap
page read and write
8D10000
unkown
page read and write
9421000
heap
page read and write
9070000
unkown
page read and write
934C000
heap
page read and write
3567A7F000
stack
page read and write
9697000
heap
page read and write
7BF9000
heap
page read and write
2CEE000
stack
page read and write
95DB000
stack
page read and write
7F2E000
stack
page read and write
2F71000
heap
page read and write
7E70000
unkown
page read and write
4B2000
unkown
page write copy
96C6000
heap
page read and write
3EE8000
trusted library allocation
page read and write
CCE2000
heap
page read and write
7FF5ED7DB000
unkown
page readonly
655000
heap
page read and write
C8DF000
heap
page read and write
13B0000
unkown
page read and write
1BCF44D0000
trusted library allocation
page read and write
BCF0000
trusted library allocation
page read and write
6450000
trusted library allocation
page execute and read and write
53F0000
trusted library allocation
page read and write
3450000
unkown
page read and write
2C95000
unkown
page readonly
3040000
heap
page read and write
73C9000
trusted library allocation
page read and write
CC89000
heap
page read and write
953E000
heap
page read and write
93AE000
heap
page read and write
C6F8000
unkown
page read and write
7FF5ED449000
unkown
page readonly
40C000
unkown
page readonly
50E7000
heap
page read and write
7B9C000
heap
page read and write
7FF6E96A9000
unkown
page execute and read and write
FEAE000
unkown
page read and write
5B69000
stack
page read and write
966E000
heap
page read and write
9070000
unkown
page read and write
77AE000
stack
page read and write
33C9000
stack
page read and write
143B000
stack
page read and write
1862000
heap
page read and write
3570000
direct allocation
page read and write
F17B000
stack
page read and write
A33E000
unkown
page read and write
97B8000
heap
page read and write
28CF000
stack
page read and write
9695000
heap
page read and write
3EC7000
trusted library allocation
page read and write
2F30000
heap
page read and write
3F10000
trusted library allocation
page read and write
7E70000
unkown
page read and write
3570000
direct allocation
page read and write
1080000
heap
page read and write
3EF5000
trusted library allocation
page read and write
C6EA000
heap
page read and write
7E70000
unkown
page read and write
978D000
heap
page read and write
1875000
heap
page read and write
B8AB000
stack
page read and write
93AE000
heap
page read and write
9567000
heap
page read and write
9707000
heap
page read and write
C758000
heap
page read and write
8780000
unkown
page read and write
4BDC000
unkown
page read and write
20890BB0000
direct allocation
page read and write
4B2000
unkown
page write copy
979A000
heap
page read and write
4CE0000
unkown
page read and write
935B000
heap
page read and write
CAD7000
heap
page read and write
2F7E000
stack
page read and write
32E1000
heap
page read and write
41F000
unkown
page readonly
1390000
unkown
page read and write
B1CC000
heap
page read and write
CCE2000
heap
page read and write
7FF5ED68F000
unkown
page readonly
9365000
heap
page read and write
979C000
unkown
page read and write
CCB2000
heap
page read and write
1BCF4400000
trusted library allocation
page read and write
95E9000
heap
page read and write
E1FD000
stack
page read and write
7CBB000
stack
page read and write
3EA9000
trusted library allocation
page read and write
9283000
heap
page read and write
C806000
heap
page read and write
CA79000
heap
page read and write
3C3E000
stack
page read and write
B08D000
stack
page read and write
40D3000
trusted library allocation
page read and write
74DC000
heap
page read and write
1BCEEE5B000
heap
page read and write
3EE9000
trusted library allocation
page read and write
1870000
heap
page read and write
977D000
heap
page read and write
C5A0000
unkown
page read and write
7FF6E96A4000
unkown
page execute and read and write
8D10000
unkown
page read and write
CA3C000
heap
page read and write
92E3000
heap
page read and write
7FF5ED814000
unkown
page readonly
11201000
unkown
page read and write
C73A000
heap
page read and write
C893000
unkown
page read and write
1370000
heap
page read and write
3F3D000
trusted library allocation
page read and write
7FF5ED928000
unkown
page readonly
B22B000
heap
page read and write
529000
remote allocation
page execute and read and write
CCE4000
heap
page read and write
8940000
heap
page read and write
8780000
unkown
page read and write
5EA000
heap
page read and write
95AD000
heap
page read and write
3E7E000
stack
page read and write
CC90000
heap
page read and write
7FF5ED342000
unkown
page readonly
9365000
heap
page read and write
9729000
heap
page read and write
202BE342000
heap
page read and write
B60000
heap
page read and write
9763000
heap
page read and write
9070000
unkown
page read and write
95F8000
heap
page read and write
7F50000
unkown
page read and write
30F2000
heap
page read and write
7E70000
unkown
page read and write
3110000
unkown
page read and write
7E70000
unkown
page read and write
3E94000
trusted library allocation
page read and write
1BCF4491000
trusted library allocation
page read and write
3440000
unkown
page read and write
2E60000
remote allocation
page read and write
401000
unkown
page execute read
1BCF4408000
trusted library allocation
page read and write
7FF5ED849000
unkown
page readonly
202BE4D0000
heap
page read and write
5F7000
heap
page read and write
497817E000
unkown
page readonly
17E4000
heap
page read and write
CCD6000
heap
page read and write
7630000
trusted library allocation
page read and write
A75E000
stack
page read and write
202BE510000
heap
page read and write
3570000
direct allocation
page read and write
CB00000
heap
page read and write
2E5E000
stack
page read and write
18A0000
unkown
page readonly
3E91000
trusted library allocation
page read and write
7FF6E9C15000
unkown
page readonly
A494000
unkown
page read and write
13B0000
unkown
page read and write
3FD1000
trusted library allocation
page read and write
57D7000
heap
page read and write
2B6E000
stack
page read and write
60F000
heap
page read and write
49798FE000
stack
page read and write
7F50000
unkown
page read and write
1500000
heap
page read and write
3230000
unkown
page read and write
9437000
heap
page read and write
3100000
heap
page read and write
8EC6000
unkown
page read and write
1BD2BB40000
direct allocation
page read and write
5098000
heap
page read and write
9070000
unkown
page read and write
1BCF42D0000
heap
page read and write
336F000
trusted library allocation
page read and write
5A35000
trusted library allocation
page read and write
8C70000
unkown
page read and write
41F000
unkown
page readonly
7D10000
heap
page read and write
751B000
heap
page read and write
7BC1000
heap
page read and write
7F50000
unkown
page read and write
7CB5000
heap
page read and write
9567000
heap
page read and write
76EE000
stack
page read and write
76A0000
unkown
page read and write
8F3000
heap
page read and write
CCDC000
heap
page read and write
BC9B000
stack
page read and write
B4D0000
unkown
page read and write
978D000
heap
page read and write
1F0000
heap
page read and write
3570000
direct allocation
page read and write
977D000
heap
page read and write
3700000
unkown
page read and write
7FF5ED4F3000
unkown
page readonly
1BCEEEFF000
heap
page read and write
3570000
direct allocation
page read and write
8F30000
unkown
page read and write
57EF000
heap
page read and write
9070000
unkown
page read and write
20890E05000
heap
page read and write
74F0000
heap
page read and write
CB0A000
heap
page read and write
79FB000
unkown
page read and write
1858000
heap
page read and write
7852000
unkown
page read and write
CCCB000
heap
page read and write
2A10000
heap
page read and write
925F000
heap
page read and write
93AE000
heap
page read and write
B1EE000
heap
page read and write
8F30000
unkown
page read and write
550000
heap
page read and write
1734000
heap
page read and write
8D10000
unkown
page read and write
7D1D000
heap
page read and write
95FA000
heap
page read and write
2BAE000
stack
page read and write
401000
unkown
page execute read
953E000
heap
page read and write
CD16000
heap
page read and write
29FF000
stack
page read and write
D2417FF000
stack
page read and write
1BCF42F6000
heap
page read and write
40C000
unkown
page readonly
1BCF42EE000
heap
page read and write
7FF5ED77E000
unkown
page readonly
3F15000
trusted library allocation
page read and write
7E70000
unkown
page read and write
1BCEEF02000
heap
page read and write
7C01000
heap
page read and write
EDFD000
stack
page read and write
1BD2D640000
direct allocation
page read and write
7E70000
unkown
page read and write
C0ABCFC000
stack
page read and write
1445000
heap
page read and write
8F30000
unkown
page read and write
8ABE9FC000
stack
page read and write
97D4000
unkown
page read and write
9758000
heap
page read and write
CC9A000
heap
page read and write
7FF6E93CE000
unkown
page readonly
9070000
unkown
page read and write
A433000
unkown
page read and write
F0FE000
stack
page read and write
3052000
heap
page read and write
13D3000
heap
page read and write
13B0000
unkown
page read and write
CB9D000
unkown
page read and write
3000000
heap
page read and write
13B0000
unkown
page read and write
8D10000
unkown
page read and write
C99000
unkown
page execute read
3440000
unkown
page read and write
7DE0000
trusted library allocation
page read and write
953E000
heap
page read and write
CAC3000
heap
page read and write
12C1000
heap
page read and write
97C3000
unkown
page read and write
7DF496641000
trusted library allocation
page execute read
9070000
unkown
page read and write
401000
unkown
page execute read
2F43000
heap
page execute and read and write
8D10000
unkown
page read and write
9707000
heap
page read and write
324C000
trusted library allocation
page read and write
FAD3000
unkown
page read and write
697F000
stack
page read and write
CA3C000
heap
page read and write
2CE1000
heap
page read and write
7FF5ED850000
unkown
page readonly
9070000
unkown
page read and write
874B000
stack
page read and write
AFD000
stack
page read and write
CC9A000
heap
page read and write
EF7D000
stack
page read and write
A3F000
stack
page read and write
CA74000
heap
page read and write
13B0000
unkown
page read and write
7FF5ED8E2000
unkown
page readonly
B1EA000
heap
page read and write
10F85000
heap
page read and write
91C5000
heap
page read and write
95FA000
heap
page read and write
7F50000
unkown
page read and write
8C70000
unkown
page read and write
7FF6E8EB1000
unkown
page execute read
C6C1000
unkown
page read and write
A379000
unkown
page read and write
C8CB000
heap
page read and write
7FF5ED755000
unkown
page readonly
3450000
unkown
page read and write
9359000
heap
page read and write
A0E000
stack
page read and write
24E6CF75000
heap
page read and write
4AC0000
heap
page read and write
B22C000
heap
page read and write
8820000
unkown
page read and write
8740000
unkown
page read and write
8D10000
unkown
page read and write
CCB0000
heap
page read and write
3755000
stack
page read and write
49770DB000
stack
page read and write
D4FD000
stack
page read and write
9B000
stack
page read and write
3EC9000
trusted library allocation
page read and write
290E000
stack
page read and write
785B000
unkown
page read and write
8ED000
heap
page read and write
2FB0000
remote allocation
page read and write
28F15B11000
heap
page read and write
7FF6E9C15000
unkown
page readonly
202BE6C0000
heap
page read and write
2D8B000
heap
page read and write
7E70000
unkown
page read and write
5770000
heap
page read and write
1240000
heap
page read and write
CC92000
heap
page read and write
1869000
heap
page read and write
B1F3000
heap
page read and write
9070000
unkown
page read and write
A01C000
stack
page read and write
7FF6E93C7000
unkown
page readonly
9070000
unkown
page read and write
94C5000
heap
page read and write
7978000
unkown
page read and write
1BD2D660000
unkown
page read and write
BDD0000
unkown
page readonly
30B1000
heap
page read and write
FEA5000
unkown
page read and write
3EFE000
trusted library allocation
page read and write
935B000
heap
page read and write
3EDE000
trusted library allocation
page read and write
2BAE000
stack
page read and write
9070000
unkown
page read and write
9070000
unkown
page read and write
13B0000
unkown
page read and write
1BCF4401000
trusted library allocation
page read and write
9070000
unkown
page read and write
CCAC000
heap
page read and write
3230000
unkown
page read and write
1390000
unkown
page read and write
7FF5ED9FF000
unkown
page readonly
7CCA000
heap
page read and write
210E6D13000
heap
page read and write
4B4000
unkown
page read and write
9070000
unkown
page read and write
C6CF000
unkown
page read and write
7610000
trusted library allocation
page read and write
7FF5ED286000
unkown
page readonly
B4D0000
unkown
page read and write
1BCF448E000
trusted library allocation
page read and write
8F30000
unkown
page read and write
7BB0000
heap
page read and write
8D10000
unkown
page read and write
9070000
unkown
page read and write
95F6000
heap
page read and write
9359000
heap
page read and write
9E6C000
stack
page read and write
C751000
heap
page read and write
3570000
direct allocation
page read and write
95C8000
heap
page read and write
9070000
unkown
page read and write
3EB7000
trusted library allocation
page read and write
8F3C000
stack
page read and write
CCDC000
heap
page read and write
2CDE000
heap
page read and write
1877000
heap
page read and write
401000
unkown
page execute read
3ED6000
trusted library allocation
page read and write
4D70000
heap
page read and write
36F137F000
stack
page read and write
C6F3000
heap
page read and write
7479000
heap
page read and write
3EB7000
trusted library allocation
page read and write
B1B8000
heap
page read and write
9F1E000
stack
page read and write
4978F7E000
unkown
page readonly
30F4000
trusted library allocation
page read and write
1867000
heap
page read and write
2EF8000
trusted library allocation
page read and write
1BD2B910000
heap
page read and write
13B0000
unkown
page read and write
96C6000
heap
page read and write
E6FD000
stack
page read and write
E631000
unkown
page read and write
3570000
direct allocation
page read and write
361D000
stack
page read and write
EF10000
heap
page read and write
8D10000
unkown
page read and write
187B000
heap
page read and write
4B00000
heap
page read and write
D2414ED000
stack
page read and write
8C70000
unkown
page read and write
C738000
heap
page read and write
4B2000
unkown
page write copy
B22E000
heap
page read and write
934C000
heap
page read and write
956D000
heap
page read and write
C396000
stack
page read and write
95E4000
heap
page read and write
2B6E000
stack
page read and write
9792000
unkown
page read and write
5710000
trusted library allocation
page read and write
C6F9000
heap
page read and write
7DF4F3061000
unkown
page execute read
9070000
unkown
page read and write
7FF5ED4EF000
unkown
page readonly
9070000
unkown
page read and write
934E000
heap
page read and write
C989000
heap
page read and write
978D000
heap
page read and write
5A2A000
trusted library allocation
page read and write
DA70000
heap
page read and write
348A000
trusted library allocation
page read and write
32F0000
heap
page read and write
9581000
heap
page read and write
1861000
heap
page read and write
1BCEED20000
heap
page read and write
7E70000
unkown
page read and write
4F30000
trusted library allocation
page read and write
30CF000
stack
page read and write
95E4000
heap
page read and write
963C000
heap
page read and write
9603000
heap
page read and write
C758000
heap
page read and write
4F30000
trusted library allocation
page read and write
484000
unkown
page readonly
A502000
unkown
page read and write
CCE4000
heap
page read and write
9603000
heap
page read and write
30B0000
heap
page read and write
7DF4F3041000
unkown
page execute read
CAF9000
heap
page read and write
8D10000
unkown
page read and write
1BCF44A0000
trusted library allocation
page read and write
13B0000
unkown
page read and write
83E000
heap
page read and write
2F2B000
heap
page execute and read and write
8F30000
unkown
page read and write
D02F000
stack
page read and write
3570000
direct allocation
page read and write
CCB2000
heap
page read and write
934C000
heap
page read and write
3570000
direct allocation
page read and write
C97A000
heap
page read and write
60F000
heap
page read and write
7863000
unkown
page read and write
CCD6000
heap
page read and write
7FF6E93CC000
unkown
page read and write
7435000
heap
page read and write
89A0000
unkown
page read and write
1BCF4860000
trusted library allocation
page read and write
CAD7000
heap
page read and write
7FF5EDA31000
unkown
page readonly
202BE341000
heap
page read and write
88E000
heap
page read and write
EE7D000
stack
page read and write
BD00000
heap
page readonly
430000
unkown
page read and write
934E000
heap
page read and write
3230000
unkown
page read and write
8740000
unkown
page read and write
95F3000
heap
page read and write
CCEE000
heap
page read and write
CCD6000
heap
page read and write
7FF5ED9ED000
unkown
page readonly
3570000
direct allocation
page read and write
C7F5000
heap
page read and write
9070000
unkown
page read and write
4978E7E000
stack
page read and write
784A000
unkown
page read and write
8D10000
unkown
page read and write
CA6B000
heap
page read and write
921B000
heap
page read and write
925B000
heap
page read and write
5740000
trusted library allocation
page read and write
7CE0000
unkown
page read and write
3450000
unkown
page read and write
95EB000
heap
page read and write
33B9000
stack
page read and write
3570000
direct allocation
page read and write
3570000
direct allocation
page read and write
2FB0000
remote allocation
page read and write
C8A4000
heap
page read and write
924F000
heap
page read and write
3FD6000
trusted library allocation
page read and write
978D000
heap
page read and write
4F40000
trusted library allocation
page read and write
1BCF47D0000
trusted library allocation
page read and write
7DF4F3071000
unkown
page execute read
7FF6E93CE000
unkown
page readonly
4977B7E000
unkown
page readonly
B94D000
stack
page read and write
C77D000
heap
page read and write
5E2000
heap
page read and write
51BE000
heap
page read and write
DCFD000
stack
page read and write
C6BF000
unkown
page read and write
41D7000
trusted library allocation
page read and write
D8B0000
trusted library allocation
page read and write
30ED000
heap
page read and write
1BCF42C4000
heap
page read and write
8D1A000
stack
page read and write
C8BD000
heap
page read and write
484000
unkown
page readonly
265E000
stack
page read and write
96C6000
heap
page read and write
2FA0000
heap
page execute and read and write
4BC0000
direct allocation
page read and write
9342000
heap
page read and write
D40000
heap
page read and write
7E70000
unkown
page read and write
7CDB000
heap
page read and write
8BF0000
unkown
page readonly
BD13000
trusted library allocation
page read and write
9070000
unkown
page read and write
3F11000
trusted library allocation
page read and write
13B0000
unkown
page read and write
507E000
heap
page read and write
1BCEEE41000
heap
page read and write
C19D000
stack
page read and write
7FF6E96CE000
unkown
page execute and read and write
8C70000
unkown
page read and write
E47A000
stack
page read and write
95FC000
heap
page read and write
13B0000
unkown
page read and write
9070000
unkown
page read and write
92E3000
heap
page read and write
935B000
heap
page read and write
7CD7000
heap
page read and write
15AB000
stack
page read and write
24E6CD80000
heap
page read and write
210E6902000
trusted library allocation
page read and write
9070000
unkown
page read and write
3738000
unkown
page read and write
CA6B000
heap
page read and write
7C68000
heap
page read and write
CB29000
heap
page read and write
8F4000
heap
page read and write
7B90000
heap
page read and write
7620000
trusted library allocation
page execute and read and write
9070000
unkown
page read and write
1BCF44E5000
trusted library allocation
page read and write
1F0000
heap
page read and write
7FF5ED7CF000
unkown
page readonly
B210000
heap
page read and write
95EB000
heap
page read and write
8CF0000
unkown
page read and write
9070000
unkown
page read and write
B4D0000
unkown
page read and write
1BCF4440000
trusted library allocation
page read and write
9070000
unkown
page read and write
17C0000
heap
page read and write
7DF4966A1000
trusted library allocation
page execute read
3E91000
trusted library allocation
page read and write
431B000
trusted library allocation
page read and write
1BCF440E000
trusted library allocation
page read and write
13B0000
unkown
page read and write
8DA000
heap
page read and write
C89A000
unkown
page read and write
96B6000
heap
page read and write
7E0000
heap
page read and write
7F50000
unkown
page read and write
C773000
heap
page read and write
CCD8000
heap
page read and write
1BCF444D000
trusted library allocation
page read and write
7FF6E9915000
unkown
page execute read
CCD3000
heap
page read and write
13B0000
unkown
page read and write
3230000
unkown
page read and write
1872000
heap
page read and write
A29E000
stack
page read and write
9070000
unkown
page read and write
3450000
unkown
page read and write
179BB8B0000
heap
page read and write
1BCEF704000
heap
page read and write
979A000
heap
page read and write
9689000
heap
page read and write
3110000
unkown
page read and write
20890A80000
heap
page read and write
7FF6E93C7000
unkown
page readonly
2DA0000
heap
page read and write
8740000
unkown
page read and write
8C70000
unkown
page read and write
7869000
unkown
page read and write
7D27000
heap
page read and write
93AE000
heap
page read and write
2CF0000
heap
page read and write
7FF5EDA69000
unkown
page readonly
DA63000
trusted library allocation
page read and write
3161000
unkown
page read and write
7D16000
heap
page read and write
CCE2000
heap
page read and write
343B000
trusted library allocation
page read and write
3E96000
trusted library allocation
page read and write
571A000
trusted library allocation
page read and write
7FF5ED844000
unkown
page readonly
9070000
unkown
page read and write
7B90000
heap
page read and write
CCE4000
heap
page read and write
7FF5ED6DB000
unkown
page readonly
3439000
stack
page read and write
50C0000
heap
page read and write
1095000
stack
page read and write
7FF5ED937000
unkown
page readonly
7680000
trusted library allocation
page read and write
C8AC000
heap
page read and write
9070000
unkown
page read and write
C563000
unkown
page read and write
30EF000
stack
page read and write
CCE2000
heap
page read and write
95F8000
heap
page read and write
95F8000
heap
page read and write
F300000
trusted library allocation
page read and write
CB0A000
heap
page read and write
97AC000
heap
page read and write
2D3E000
stack
page read and write
94BB000
heap
page read and write
97B7000
heap
page read and write
B1F2000
heap
page read and write
33C0000
unkown
page read and write
33C0000
unkown
page read and write
7FF6E96A0000
unkown
page execute and read and write
C8AB000
heap
page read and write
8FB9000
stack
page read and write
9070000
unkown
page read and write
CCC9000
heap
page read and write
7CC7000
heap
page read and write
963C000
heap
page read and write
95EB000
heap
page read and write
1734000
heap
page read and write
9070000
unkown
page read and write
3570000
direct allocation
page read and write
3450000
unkown
page read and write
179E000
heap
page read and write
95F3000
heap
page read and write
330E000
stack
page read and write
920000
unkown
page readonly
9581000
heap
page read and write
C538000
heap
page read and write
7FF5ED6A5000
unkown
page readonly
D94D000
stack
page read and write
7FF5ED602000
unkown
page readonly
C985000
heap
page read and write
9512000
heap
page read and write
13B0000
unkown
page read and write
7450000
heap
page read and write
3E91000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
3570000
direct allocation
page read and write
13B0000
unkown
page read and write
CCDA000
heap
page read and write
1875000
heap
page read and write
8CF0000
unkown
page read and write
AAF6000
unkown
page read and write
A361000
unkown
page read and write
9070000
unkown
page read and write
8780000
unkown
page read and write
7E70000
unkown
page read and write
13B0000
unkown
page read and write
966E000
heap
page read and write
7DDB000
stack
page read and write
202BE342000
heap
page read and write
7FF5ED961000
unkown
page readonly
8F30000
unkown
page read and write
7E70000
unkown
page read and write
5A80000
trusted library allocation
page read and write
30B0000
heap
page read and write
7FF5ED2A9000
unkown
page readonly
4A70000
heap
page read and write
3659000
stack
page read and write
923F000
heap
page read and write
2CBF000
stack
page read and write
3230000
unkown
page read and write
7E70000
unkown
page read and write
9798000
heap
page read and write
96C9000
heap
page read and write
CB22000
heap
page read and write
9070000
unkown
page read and write
8740000
unkown
page read and write
D47D000
stack
page read and write
965C000
stack
page read and write
17DE000
heap
page read and write
CCE4000
heap
page read and write
40C000
unkown
page readonly
7FF5ED71B000
unkown
page readonly
9658000
heap
page read and write
9666000
heap
page read and write
CCA6000
heap
page read and write
7D1D000
heap
page read and write
3110000
unkown
page read and write
CCAC000
heap
page read and write
4961000
heap
page read and write
57E000
stack
page read and write
C710000
heap
page read and write
529000
remote allocation
page execute and read and write
3570000
direct allocation
page read and write
9070000
unkown
page read and write
541D000
trusted library allocation
page read and write
2FB1000
trusted library allocation
page read and write
9AF000
stack
page read and write
924B000
heap
page read and write
1BCF5000000
heap
page read and write
3ED8000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
95F8000
heap
page read and write
8F30000
unkown
page read and write
C9D2000
heap
page read and write
3E9B000
trusted library allocation
page read and write
4960000
heap
page read and write
13F0000
heap
page read and write
673E000
stack
page read and write
400000
unkown
page readonly
2E60000
remote allocation
page read and write
CCEA000
heap
page read and write
3E98000
trusted library allocation
page read and write
13B0000
unkown
page read and write
7C67000
heap
page read and write
CAA5000
heap
page read and write
9622000
heap
page read and write
95F3000
heap
page read and write
13B0000
unkown
page read and write
1F0000
heap
page read and write
7DF4F3050000
unkown
page readonly
13B0000
unkown
page read and write
3443000
trusted library allocation
page read and write
7D07000
heap
page read and write
29FF000
stack
page read and write
B4D0000
unkown
page read and write
1BCEED50000
trusted library allocation
page read and write
7FF5ED43A000
unkown
page readonly
9070000
unkown
page read and write
5FF000
heap
page read and write
CCB0000
heap
page read and write
20890BB0000
direct allocation
page read and write
35BC000
stack
page read and write
40C000
unkown
page readonly
7D20000
unkown
page readonly
95F8000
heap
page read and write
C69C000
heap
page read and write
7F50000
unkown
page read and write
30D4000
trusted library allocation
page read and write
97AC000
heap
page read and write
C75F000
heap
page read and write
30B0000
heap
page read and write
CAED000
heap
page read and write
8D10000
unkown
page read and write
7CD7000
heap
page read and write
C8B8000
heap
page read and write
13B0000
unkown
page read and write
1BCF4550000
trusted library allocation
page read and write
3567DF9000
stack
page read and write
7A34000
unkown
page read and write
7FF6E93CE000
unkown
page readonly
1734000
heap
page read and write
C857000
unkown
page read and write
5416000
trusted library allocation
page read and write
CA2C000
heap
page read and write
B1D7000
heap
page read and write
64B000
heap
page read and write
912000
heap
page read and write
CCE2000
heap
page read and write
1BCF42A2000
heap
page read and write
1BCEEEFF000
heap
page read and write
9070000
unkown
page read and write
7E70000
unkown
page read and write
186C000
heap
page read and write
9359000
heap
page read and write
32E1000
heap
page read and write
37A0000
unkown
page read and write
A323000
unkown
page read and write
1BCEEE6C000
heap
page read and write
7BB2000
heap
page read and write
3570000
direct allocation
page read and write
9070000
unkown
page read and write
975E000
heap
page read and write
CCD3000
heap
page read and write
1870000
heap
page read and write
2E40000
heap
page read and write
CCA8000
heap
page read and write
7FF5ED3DA000
unkown
page readonly
8780000
unkown
page read and write
64B000
heap
page read and write
1864000
heap
page read and write
3570000
direct allocation
page read and write
934C000
heap
page read and write
4B2000
unkown
page write copy
3570000
direct allocation
page read and write
CA68000
heap
page read and write
7FF5ED76D000
unkown
page readonly
CCD1000
heap
page read and write
3EC4000
trusted library allocation
page read and write
C970000
heap
page read and write
DBFD000
stack
page read and write
7744000
trusted library allocation
page read and write
401000
unkown
page execute read
4977D7E000
unkown
page readonly
9707000
heap
page read and write
9552000
heap
page read and write
1F0000
heap
page read and write
9070000
unkown
page read and write
7FF5ED534000
unkown
page readonly
3487000
trusted library allocation
page read and write
2F5A000
heap
page read and write
36D3000
stack
page read and write
CA0000
heap
page read and write
7E70000
unkown
page read and write
3580000
unkown
page readonly
1BCF42EC000
heap
page read and write
7E70000
unkown
page read and write
2A10000
heap
page read and write
D67D000
stack
page read and write
934E000
heap
page read and write
1734000
heap
page read and write
C797000
heap
page read and write
C75F000
heap
page read and write
94BB000
heap
page read and write
C4AA000
stack
page read and write
1237000
trusted library allocation
page execute and read and write
3424000
trusted library allocation
page read and write
2CEE000
stack
page read and write
7FF5EDA53000
unkown
page readonly
9881000
unkown
page read and write
9753000
heap
page read and write
88A000
heap
page read and write
7FF5ED853000
unkown
page readonly
7FF6E93C7000
unkown
page readonly
9070000
unkown
page read and write
7D6B000
heap
page read and write
C968000
heap
page read and write
13B0000
unkown
page read and write
2A6E000
stack
page read and write
C11D000
stack
page read and write
9666000
heap
page read and write
B22C000
heap
page read and write
C9D8000
heap
page read and write
8C70000
unkown
page read and write
3450000
unkown
page read and write
7FF5D1CCD000
unkown
page readonly
CCD3000
heap
page read and write
7FF5ED42B000
unkown
page readonly
CC17000
heap
page read and write
4F40000
trusted library allocation
page read and write
CCB0000
heap
page read and write
7FF6E96A0000
unkown
page execute and read and write
7750000
trusted library allocation
page execute and read and write
2C80000
direct allocation
page execute and read and write
1BCEEF17000
heap
page read and write
2D80000
heap
page read and write
9070000
unkown
page read and write
263E000
stack
page read and write
1BCF4200000
heap
page read and write
9070000
unkown
page read and write
946A000
heap
page read and write
40B000
unkown
page execute read
7FF6E8EB0000
unkown
page readonly
C758000
heap
page read and write
179BB9B0000
heap
page read and write
8740000
unkown
page read and write
B1EB000
heap
page read and write
95E4000
heap
page read and write
1BCF4550000
trusted library allocation
page read and write
3230000
unkown
page read and write
13B0000
unkown
page read and write
3570000
direct allocation
page read and write
C8D4000
heap
page read and write
B228000
heap
page read and write
179BB6B0000
heap
page read and write
1861000
heap
page read and write
9603000
heap
page read and write
95E4000
heap
page read and write
C894000
heap
page read and write
333A000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page execute and read and write
266E000
stack
page read and write
3570000
direct allocation
page read and write
C810000
heap
page read and write
B1F000
stack
page read and write
8D10000
unkown
page read and write
CCDC000
heap
page read and write
9070000
unkown
page read and write
924E000
heap
page read and write
186D000
heap
page read and write
7E70000
unkown
page read and write
DDFE000
stack
page read and write
9C000
stack
page read and write
F4AE000
stack
page read and write
9A5B000
unkown
page read and write
95FA000
heap
page read and write
7DF496671000
trusted library allocation
page execute read
4329000
trusted library allocation
page read and write
3450000
unkown
page read and write
5760000
heap
page execute and read and write
D2415FF000
stack
page read and write
C737000
heap
page read and write
3EC6000
trusted library allocation
page read and write
1861000
heap
page read and write
CACE000
heap
page read and write
9359000
heap
page read and write
7F50000
unkown
page read and write
590000
heap
page read and write
9766000
heap
page read and write
C877000
heap
page read and write
261F000
stack
page read and write
471000
unkown
page execute read
933E000
heap
page read and write
351D000
stack
page read and write
9697000
heap
page read and write
8EF000
heap
page read and write
48AE000
stack
page read and write
9342000
heap
page read and write
7DC0000
trusted library allocation
page execute and read and write
9359000
heap
page read and write
57B2000
heap
page read and write
3210000
unkown
page read and write
3FBE000
trusted library allocation
page read and write
9070000
unkown
page read and write
CCDE000
heap
page read and write
2D5C000
heap
page read and write
1230000
unkown
page read and write
9A38000
stack
page read and write
7FF5EDA70000
unkown
page readonly
645000
heap
page read and write
C968000
heap
page read and write
4BA6000
unkown
page read and write
7FF5ED4A1000
unkown
page readonly
803B000
stack
page read and write
497797E000
unkown
page readonly
4978A7E000
stack
page read and write
185C000
heap
page read and write
9622000
heap
page read and write
338E000
trusted library allocation
page read and write
48F1000
heap
page read and write
9070000
unkown
page read and write
401000
unkown
page execute read
57B8000
heap
page read and write
97AC000
heap
page read and write
3EAD000
trusted library allocation
page read and write
7C74000
heap
page read and write
4B2000
unkown
page write copy
960A000
heap
page read and write
2EEE000
stack
page read and write
4076000
trusted library allocation
page read and write
9070000
unkown
page read and write
978E000
unkown
page read and write
92E3000
heap
page read and write
9070000
unkown
page read and write
1BD2BB40000
direct allocation
page read and write
8730000
unkown
page read and write
977D000
heap
page read and write
C872000
heap
page read and write
BD13000
trusted library allocation
page read and write
7FF5ED692000
unkown
page readonly
40C000
unkown
page readonly
20890BB0000
direct allocation
page read and write
9070000
unkown
page read and write
CB26000
unkown
page read and write
3567CFE000
stack
page read and write
8800000
unkown
page read and write
C812000
heap
page read and write
7FF5ED1CB000
unkown
page readonly
CCA6000
heap
page read and write
3748000
unkown
page read and write
95F6000
heap
page read and write
4F40000
trusted library allocation
page read and write
B1D3000
heap
page read and write
9666000
heap
page read and write
97B8000
heap
page read and write
28F15B11000
heap
page read and write
10C0000
unkown
page readonly
E80F000
unkown
page read and write
13B0000
unkown
page read and write
1734000
heap
page read and write
3230000
unkown
page read and write
7D53000
unkown
page read and write
32E1000
heap
page read and write
497927B000
stack
page read and write
95FA000
heap
page read and write
A37D000
unkown
page read and write
1845000
heap
page read and write
C90A000
heap
page read and write
1842000
heap
page read and write
9070000
unkown
page read and write
9070000
unkown
page read and write
C8D7000
heap
page read and write
DE7E000
stack
page read and write
B5AE000
stack
page read and write
9070000
unkown
page read and write
CCA6000
heap
page read and write
8ED000
heap
page read and write
60D000
heap
page read and write
6FC0000
heap
page read and write
7FF5ED9CC000
unkown
page readonly
7F50000
unkown
page read and write
7FF6E93CA000
unkown
page readonly
2C95000
unkown
page readonly
7FF5ED806000
unkown
page readonly
BD30000
trusted library allocation
page read and write
9758000
heap
page read and write
91E3000
heap
page read and write
8C70000
unkown
page read and write
9070000
unkown
page read and write
D57E000
stack
page read and write
95FC000
heap
page read and write
5A70000
trusted library allocation
page read and write
41F000
unkown
page readonly
2EA0000
heap
page read and write
935B000
heap
page read and write
9070000
unkown
page read and write
7D51000
heap
page read and write
7FF6E8EC8000
unkown
page write copy
7DF496671000
trusted library allocation
page execute read
13B0000
unkown
page read and write
3110000
unkown
page read and write
A327000
unkown
page read and write
1BCEF800000
trusted library allocation
page read and write
187C000
heap
page read and write
C415000
stack
page read and write
3570000
direct allocation
page read and write
7FF5ED503000
unkown
page readonly
28F15B11000
heap
page read and write
B19E000
heap
page read and write
1856000
heap
page read and write
185A000
heap
page read and write
187B000
heap
page read and write
CB40000
heap
page read and write
8820000
unkown
page read and write
CA42000
unkown
page read and write
1BCF44FF000
trusted library allocation
page read and write
9A10000
unkown
page read and write
28AF000
stack
page read and write
1861000
heap
page read and write
30B0000
remote allocation
page read and write
C512000
unkown
page read and write
4977F7E000
unkown
page readonly
8740000
unkown
page read and write
2EFD000
stack
page read and write
CC9A000
heap
page read and write
7FF5ED426000
unkown
page readonly
288F000
stack
page read and write
E37D000
stack
page read and write
9763000
heap
page read and write
186B000
heap
page read and write
E5A6000
unkown
page read and write
497937E000
unkown
page readonly
B5CE000
stack
page read and write
73CF000
trusted library allocation
page read and write
C8A1000
heap
page read and write
1390000
unkown
page read and write
C50A000
unkown
page read and write
3230000
unkown
page read and write
9570000
heap
page read and write
A19F000
stack
page read and write
92E3000
heap
page read and write
7FF5ED55F000
unkown
page readonly
9423000
heap
page read and write
7D07000
heap
page read and write
884C000
stack
page read and write
9342000
heap
page read and write
9070000
unkown
page read and write
978D000
heap
page read and write
7FF5ED996000
unkown
page readonly
7D10000
heap
page read and write
95EB000
heap
page read and write
7FF5ED5C9000
unkown
page readonly
7E70000
unkown
page read and write
5A1E000
trusted library allocation
page read and write
640000
heap
page read and write
CCEA000
heap
page read and write
92E3000
heap
page read and write
C758000
heap
page read and write
3570000
direct allocation
page read and write
934C000
heap
page read and write
C350000
unkown
page read and write
7E70000
unkown
page read and write
CA51000
heap
page read and write
3450000
unkown
page read and write
1BCF44BA000
trusted library allocation
page read and write
28F15CB0000
heap
page read and write
1BD2BA10000
heap
page read and write
9070000
unkown
page read and write
94A3000
heap
page read and write
30DA000
trusted library allocation
page read and write
337F000
trusted library allocation
page read and write
3E96000
trusted library allocation
page read and write
7FF5ED695000
unkown
page readonly
93AE000
heap
page read and write
34FB000
trusted library allocation
page read and write
1030000
heap
page read and write
1864000
heap
page read and write
7FF5ED743000
unkown
page readonly
2D10000
heap
page read and write
7407000
heap
page read and write
CB03000
heap
page read and write
986F000
unkown
page read and write
72BE000
stack
page read and write
4333000
trusted library allocation
page read and write
C82A000
heap
page read and write
7E70000
unkown
page read and write
C88B000
unkown
page read and write
C970000
heap
page read and write
9707000
heap
page read and write
9070000
unkown
page read and write
AF0C000
stack
page read and write
9795000
unkown
page read and write
3570000
direct allocation
page read and write
1BCF45A0000
remote allocation
page read and write
814A000
stack
page read and write
273F000
stack
page read and write
2E5E000
stack
page read and write
9070000
unkown
page read and write
7CB0000
heap
page read and write
3791000
unkown
page read and write
749A000
heap
page read and write
8AE000
stack
page read and write
7FF5ED847000
unkown
page readonly
CCC9000
heap
page read and write
C9D2000
heap
page read and write
966E000
heap
page read and write
C812000
heap
page read and write
933E000
heap
page read and write
7CD7000
heap
page read and write
13B0000
unkown
page read and write
C775000
heap
page read and write
7DF496640000
trusted library allocation
page readonly
CC92000
heap
page read and write
840000
heap
page read and write
3EB4000
trusted library allocation
page read and write
2E0E000
stack
page read and write
4950000
heap
page read and write
65B0000
trusted library allocation
page execute and read and write
1BCF428B000
heap
page read and write
3110000
unkown
page read and write
713C000
stack
page read and write
3230000
trusted library allocation
page read and write
7C68000
heap
page read and write
7FF5ED62F000
unkown
page readonly
3450000
unkown
page read and write
7FF5ED3D6000
unkown
page readonly
B1D3000
heap
page read and write
3EC7000
trusted library allocation
page read and write
3E97000
trusted library allocation
page read and write
CA36000
heap
page read and write
D8B3000
trusted library allocation
page read and write
4DF9000
stack
page read and write
13B0000
unkown
page read and write
9070000
unkown
page read and write
9359000
heap
page read and write
540000
heap
page read and write
7FF5ED5A8000
unkown
page readonly
3F2D000
trusted library allocation
page read and write
746D000
heap
page read and write
529000
remote allocation
page execute and read and write
8DF000
stack
page read and write
9359000
heap
page read and write
CCD8000
heap
page read and write
177E000
stack
page read and write
F32A000
heap
page read and write
CCD8000
heap
page read and write
4351000
trusted library allocation
page read and write
1847000
heap
page read and write
1BCF4402000
trusted library allocation
page read and write
C9C7000
heap
page read and write
CB1B000
heap
page read and write
7C01000
heap
page read and write
7FF6E8EC4000
unkown
page readonly
8BE000
heap
page read and write
1861000
heap
page read and write
4B5F000
trusted library allocation
page read and write
F322000
heap
page read and write
470000
unkown
page readonly
92E3000
heap
page read and write
92E3000
heap
page read and write
2BAE000
stack
page read and write
92E3000
heap
page read and write
7865000
unkown
page read and write
41F000
unkown
page readonly
2FB0000
remote allocation
page read and write
11EE000
stack
page read and write
DEFD000
stack
page read and write
2D60000
heap
page read and write
4B70000
heap
page read and write
B6A0000
heap
page read and write
8D10000
unkown
page read and write
8DA000
heap
page read and write
202BE342000
heap
page read and write
D35B000
stack
page read and write
7FF5ED975000
unkown
page readonly
54C0000
trusted library allocation
page read and write
95F6000
heap
page read and write
3EE1000
trusted library allocation
page read and write
19E000
stack
page read and write
5A12000
trusted library allocation
page read and write
1875000
heap
page read and write
95E4000
heap
page read and write
E27D000
stack
page read and write
13B0000
unkown
page read and write
8780000
unkown
page read and write
3570000
direct allocation
page read and write
E17E000
stack
page read and write
210E6870000
heap
page read and write
9070000
unkown
page read and write
3450000
unkown
page read and write
FB1B000
unkown
page read and write
CAD7000
heap
page read and write
95A2000
heap
page read and write
7FF5ED9BE000
unkown
page readonly
2D40000
heap
page read and write
ED7D000
stack
page read and write
C75E000
heap
page read and write
933E000
heap
page read and write
9359000
heap
page read and write
40C000
unkown
page readonly
262F000
stack
page read and write
13B0000
heap
page read and write
8F30000
unkown
page read and write
86F000
stack
page read and write
CCDA000
heap
page read and write
3570000
direct allocation
page read and write
3450000
unkown
page read and write
1BD2BB40000
direct allocation
page read and write
9223000
heap
page read and write
B1B8000
heap
page read and write
7FF5ED990000
unkown
page readonly
79D3000
unkown
page read and write
184E000
heap
page read and write
32E1000
heap
page read and write
7FF5ED779000
unkown
page readonly
1BCEEE22000
heap
page read and write
95FA000
heap
page read and write
7FF5ED885000
unkown
page readonly
497787E000
stack
page read and write
8D10000
unkown
page read and write
8EB9000
stack
page read and write
9273000
heap
page read and write
4CE000
unkown
page read and write
54B0000
heap
page read and write
B210000
heap
page read and write
2CAF000
stack
page read and write
3F2E000
trusted library allocation
page read and write
CCA8000
heap
page read and write
9239000
heap
page read and write
CCF4000
heap
page read and write
8B60000
unkown
page readonly
95F3000
heap
page read and write
7FF5ED6B9000
unkown
page readonly
401000
unkown
page execute read
5A06000
trusted library allocation
page read and write
56C3000
unkown
page read and write
9070000
unkown
page read and write
986B000
unkown
page read and write
7D45000
heap
page read and write
7BA5000
heap
page read and write
7FF5ED1BC000
unkown
page readonly
C7A4000
heap
page read and write
5FD000
heap
page read and write
8CF0000
unkown
page read and write
C95B000
heap
page read and write
7FF5ED821000
unkown
page readonly
C8CE000
heap
page read and write
42E000
unkown
page read and write
CA20000
unkown
page read and write
34A1000
trusted library allocation
page read and write
9070000
unkown
page read and write
89C0000
unkown
page read and write
1BCF4540000
trusted library allocation
page read and write
897000
heap
page read and write
1BCF4415000
trusted library allocation
page read and write
3EC7000
trusted library allocation
page read and write
7FF5ED867000
unkown
page readonly
4BE3000
unkown
page read and write
F330000
heap
page read and write
3348000
stack
page read and write
13B0000
unkown
page read and write
C846000
unkown
page read and write
8F30000
unkown
page read and write
9070000
unkown
page read and write
3F05000
trusted library allocation
page read and write
1BD2DE52000
unkown
page read and write
4B4000
unkown
page read and write
976D000
heap
page read and write
54C2000
trusted library allocation
page read and write
2F5E000
stack
page read and write
3E91000
trusted library allocation
page read and write
3570000
direct allocation
page read and write
843A000
stack
page read and write
210E6924000
heap
page read and write
13B0000
unkown
page read and write
CCA6000
heap
page read and write
CB1B000
heap
page read and write
9070000
unkown
page read and write
C730000
heap
page read and write
941D000
heap
page read and write
400000
unkown
page readonly
94BB000
heap
page read and write
3FEE000
stack
page read and write
3570000
direct allocation
page read and write
B4D0000
unkown
page read and write
982D000
unkown
page read and write
1867000
heap
page read and write
9431000
heap
page read and write
1872000
heap
page read and write
CC54000
heap
page read and write
584B000
heap
page read and write
1220000
trusted library allocation
page read and write
B8B0000
unkown
page read and write
2C95000
unkown
page readonly
9342000
heap
page read and write
A4B8000
unkown
page read and write
9753000
heap
page read and write
A4FC000
unkown
page read and write
B7AE000
stack
page read and write
30D1000
heap
page read and write
94CA000
heap
page read and write
9070000
unkown
page read and write
C9D8000
heap
page read and write
7DF496651000
trusted library allocation
page execute read
3ED8000
trusted library allocation
page read and write
C8C5000
heap
page read and write
C8B9000
heap
page read and write
ECFD000
stack
page read and write
CA79000
heap
page read and write
DFFD000
stack
page read and write
13B0000
unkown
page read and write
4B8B000
unkown
page read and write
95EB000
heap
page read and write
7E70000
unkown
page read and write
4BF0000
heap
page read and write
9070000
unkown
page read and write
976D000
heap
page read and write
C74B000
heap
page read and write
3EAF000
trusted library allocation
page read and write
13B0000
unkown
page read and write
95FC000
heap
page read and write
B9E8000
stack
page read and write
953E000
heap
page read and write
BD70000
heap
page read and write
1222000
trusted library allocation
page read and write
CCDE000
heap
page read and write
7884000
unkown
page read and write
C76B000
heap
page read and write
4C34000
unkown
page read and write
7CA0000
unkown
page read and write
9070000
unkown
page read and write
78A0000
unkown
page read and write
599000
heap
page read and write
8C70000
unkown
page read and write
4B4000
unkown
page read and write
A50B000
unkown
page read and write
8F30000
unkown
page read and write
7FF6E96F1000
unkown
page execute and read and write
978D000
heap
page read and write
88B000
heap
page read and write
11E0000
unkown
page readonly
4130000
heap
page read and write
1BD2BB50000
heap
page read and write
9080000
unkown
page read and write
B210000
heap
page read and write
60F000
heap
page read and write
13B0000
unkown
page read and write
3570000
direct allocation
page read and write
1BCEF600000
heap
page read and write
3230000
heap
page read and write
187F000
heap
page read and write
9730000
heap
page read and write
400000
unkown
page readonly
1734000
heap
page read and write
1734000
heap
page read and write
7DF496641000
trusted library allocation
page execute read
202BE510000
heap
page read and write
8D10000
unkown
page read and write
9070000
unkown
page read and write
7F40000
unkown
page readonly
7F50000
unkown
page read and write
9070000
unkown
page read and write
7FF5ED7E0000
unkown
page readonly
925B000
heap
page read and write
3450000
unkown
page read and write
C731000
heap
page read and write
8740000
unkown
page read and write
30E0000
heap
page read and write
7FF5ED404000
unkown
page readonly
C507000
unkown
page read and write
3EA2000
trusted library allocation
page read and write
645000
heap
page read and write
CCA8000
heap
page read and write
35A0000
trusted library allocation
page read and write
7FF5ED956000
unkown
page readonly
3110000
unkown
page read and write
9253000
heap
page read and write
1854000
heap
page read and write
E07D000
stack
page read and write
5470000
trusted library allocation
page read and write
976C000
heap
page read and write
CCD6000
heap
page read and write
95F6000
heap
page read and write
519E000
heap
page read and write
13B0000
unkown
page read and write
13B0000
unkown
page read and write
7FF5ED77C000
unkown
page readonly
1232000
trusted library allocation
page read and write
1734000
heap
page read and write
CCD8000
heap
page read and write
B218000
heap
page read and write
2CC0000
heap
page read and write
95F6000
heap
page read and write
1BCEEC40000
heap
page read and write
8CF0000
unkown
page read and write
9342000
heap
page read and write
7E3E000
stack
page read and write
BDFD000
stack
page read and write
42E000
unkown
page read and write
7FF5ED418000
unkown
page readonly
750F000
heap
page read and write
C31D000
stack
page read and write
2CD0000
heap
page read and write
8800000
unkown
page read and write
7BB4000
heap
page read and write
30BF000
stack
page read and write
CCE4000
heap
page read and write
9766000
heap
page read and write
898E000
stack
page read and write
36F0000
unkown
page readonly
CCD8000
heap
page read and write
40C000
unkown
page readonly
C89C000
unkown
page read and write
7FF5ED4FD000
unkown
page readonly
7FF5ED65C000
unkown
page readonly
3220000
unkown
page readonly
95A2000
heap
page read and write
508D000
heap
page read and write
9070000
unkown
page read and write
9815000
unkown
page read and write
210E6C00000
heap
page read and write
976D000
heap
page read and write
C7FB000
heap
page read and write
1BCF44F0000
trusted library allocation
page read and write
1250000
heap
page read and write
1BCEEF29000
heap
page read and write
CB0A000
heap
page read and write
7E70000
unkown
page read and write
2E10000
heap
page read and write
8F30000
unkown
page read and write
2DFD000
stack
page read and write
9070000
unkown
page read and write
7FF5ED495000
unkown
page readonly
407E000
trusted library allocation
page read and write
54D0000
heap
page read and write
7B80000
heap
page read and write
95EB000
heap
page read and write
7FF5ED674000
unkown
page readonly
4B56000
unkown
page read and write
3110000
unkown
page read and write
185C000
heap
page read and write
CCB6000
heap
page read and write
6400000
trusted library allocation
page execute and read and write
7CDC000
heap
page read and write
E771000
unkown
page read and write
7FF5ED810000
unkown
page readonly
9622000
heap
page read and write
9070000
unkown
page read and write
9070000
unkown
page read and write
1087000
heap
page read and write
7FF5ED64F000
unkown
page readonly
8946000
heap
page read and write
1BCEEDE1000
trusted library allocation
page read and write
7DF496671000
trusted library allocation
page execute read
1BD2BB40000
direct allocation
page read and write
1872000
heap
page read and write
7DF4966A0000
trusted library allocation
page readonly
24FE000
stack
page read and write
401000
unkown
page execute read
CCB2000
heap
page read and write
7FF5ED476000
unkown
page readonly
2A6E000
stack
page read and write
31EF000
stack
page read and write
8D90000
unkown
page readonly
7CC7000
heap
page read and write
78F000
stack
page read and write
95FA000
heap
page read and write
BA9B000
stack
page read and write
95AD000
heap
page read and write
3570000
direct allocation
page read and write
3440000
unkown
page read and write
8C70000
unkown
page read and write
5A01000
trusted library allocation
page read and write
76E000
stack
page read and write
32C6000
trusted library allocation
page read and write
33C0000
unkown
page read and write
8740000
unkown
page read and write
7DF496640000
trusted library allocation
page readonly
E5A5000
unkown
page read and write
4D9000
unkown
page readonly
737000
heap
page read and write
CB0A000
heap
page read and write
7E11000
unkown
page read and write
1451000
unkown
page readonly
7B80000
heap
page read and write
3EEE000
trusted library allocation
page read and write
9342000
heap
page read and write
C84D000
unkown
page read and write
7F50000
unkown
page read and write
8F30000
unkown
page read and write
95F6000
heap
page read and write
37F2000
unkown
page read and write
9070000
unkown
page read and write
1BCF4530000
trusted library allocation
page read and write
1440000
unkown
page read and write
3570000
direct allocation
page read and write
20890BB0000
direct allocation
page read and write
92E3000
heap
page read and write
41F000
unkown
page readonly
EBFD000
stack
page read and write
764A000
trusted library allocation
page read and write
8820000
unkown
page read and write
C811000
unkown
page read and write
A5BD000
stack
page read and write
3EAF000
trusted library allocation
page read and write
CCDA000
heap
page read and write
13B0000
unkown
page read and write
A1E000
stack
page read and write
7E70000
unkown
page read and write
3EE1000
trusted library allocation
page read and write
CAF9000
heap
page read and write
CAF9000
heap
page read and write
400000
unkown
page execute and read and write
8740000
unkown
page read and write
3EFD000
trusted library allocation
page read and write
8D10000
unkown
page read and write
960A000
heap
page read and write
8BE0000
unkown
page readonly
9693000
heap
page read and write
349C000
stack
page read and write
50AE000
heap
page read and write
7E70000
unkown
page read and write
339B000
trusted library allocation
page read and write
976B000
heap
page read and write
3570000
direct allocation
page read and write
973B000
heap
page read and write
9666000
heap
page read and write
2CFE000
stack
page read and write
A4AB000
unkown
page read and write
9342000
heap
page read and write
B228000
heap
page read and write
EC7D000
stack
page read and write
8F30000
unkown
page read and write
7FF5ED9E1000
unkown
page readonly
2F5F000
stack
page read and write
700000
heap
page read and write
C08A000
stack
page read and write
876000
heap
page read and write
756B000
heap
page read and write
497807B000
stack
page read and write
7461000
heap
page read and write
8F9000
heap
page read and write
7FF5ED4DF000
unkown
page readonly
8C70000
unkown
page read and write
7F50000
unkown
page read and write
7C00000
heap
page read and write
3659000
stack
page read and write
B1E9000
heap
page read and write
1A8F000
stack
page read and write
401000
unkown
page execute read
7CD7000
heap
page read and write
4C4B000
unkown
page read and write
3EEC000
trusted library allocation
page read and write
8820000
unkown
page read and write
D9CE000
stack
page read and write
1BCEEE6E000
heap
page read and write
529000
remote allocation
page execute and read and write
1BCEF5D0000
trusted library allocation
page read and write
3EDD000
trusted library allocation
page read and write
9365000
heap
page read and write
34E1000
trusted library allocation
page read and write
328D000
stack
page read and write
7BC1000
heap
page read and write
74B6000
heap
page read and write
C8B9000
heap
page read and write
1BCEF5E0000
trusted library allocation
page read and write
7E8000
heap
page read and write
13B0000
unkown
page read and write
C6F2000
unkown
page read and write
9879000
unkown
page read and write
308A000
stack
page read and write
956E000
heap
page read and write
2FB0000
remote allocation
page read and write
9622000
heap
page read and write
9885000
unkown
page read and write
4AD0000
direct allocation
page read and write
1F0000
heap
page read and write
1858000
heap
page read and write
7D1D000
heap
page read and write
9342000
heap
page read and write
7D10000
heap
page read and write
9070000
unkown
page read and write
2C90000
direct allocation
page read and write
C79D000
heap
page read and write
9070000
unkown
page read and write
9070000
unkown
page read and write
34E9000
stack
page read and write
48F0000
heap
page read and write
2DFE000
stack
page read and write
7FF5EDA2A000
unkown
page readonly
77BD000
trusted library allocation
page read and write
B1D3000
heap
page read and write
20890E00000
heap
page read and write
30B1000
heap
page read and write
3570000
direct allocation
page read and write
EA7D000
stack
page read and write
9070000
unkown
page read and write
987B000
unkown
page read and write
8ABECFF000
unkown
page read and write
785F000
unkown
page read and write
B1EF000
heap
page read and write
7FF5ED93B000
unkown
page readonly
2D50000
heap
page read and write
202BE30B000
heap
page read and write
5445000
trusted library allocation
page read and write
9567000
heap
page read and write
CC9A000
heap
page read and write
8780000
unkown
page read and write
7FF5ED97E000
unkown
page readonly
B82A000
stack
page read and write
9070000
unkown
page read and write
95FC000
heap
page read and write
4046000
trusted library allocation
page read and write
C725000
heap
page read and write
CCA8000
heap
page read and write
3230000
unkown
page read and write
7BCF000
heap
page read and write
CCC9000
heap
page read and write
41F000
unkown
page readonly
D093000
trusted library allocation
page read and write
7DF496661000
trusted library allocation
page execute read
935000
heap
page read and write
508F000
heap
page read and write
42E000
unkown
page write copy
A7DA000
stack
page read and write
2271B5D000
stack
page read and write
4D8000
unkown
page read and write
CB34000
heap
page read and write
923E000
stack
page read and write
8D10000
unkown
page read and write
529000
remote allocation
page execute and read and write
8740000
unkown
page read and write
9070000
unkown
page read and write
5185000
heap
page read and write
CCB2000
heap
page read and write
C7E1000
heap
page read and write
B191000
heap
page read and write
7FF5ED5EB000
unkown
page readonly
2FB0000
heap
page read and write
7D16000
heap
page read and write
8F30000
unkown
page read and write
2A10000
heap
page read and write
C783000
heap
page read and write
7FF5ED7FD000
unkown
page readonly
8740000
unkown
page read and write
41F000
unkown
page readonly
1BCF44A3000
trusted library allocation
page read and write
CC17000
heap
page read and write
31CF000
stack
page read and write
96EA000
heap
page read and write
7C18000
heap
page read and write
7DF4966B1000
trusted library allocation
page execute read
9070000
unkown
page read and write
7FF5ED5CE000
unkown
page readonly
33C0000
unkown
page read and write
13B0000
unkown
page read and write
D22C000
stack
page read and write
50BA000
heap
page read and write
717E000
stack
page read and write
40C000
unkown
page readonly
3450000
unkown
page read and write
12A4000
heap
page read and write
202BE2D0000
heap
page read and write
7FF5ED85F000
unkown
page readonly
C78F000
heap
page read and write
9070000
unkown
page read and write
434C000
trusted library allocation
page read and write
C96A000
heap
page read and write
5440000
trusted library allocation
page read and write
1BCF4258000
heap
page read and write
C40000
heap
page read and write
13B0000
unkown
page read and write
8F30000
unkown
page read and write
4F40000
trusted library allocation
page read and write
13B0000
unkown
page read and write
8F30000
unkown
page read and write
1BD2BB40000
direct allocation
page read and write
935B000
heap
page read and write
C8B9000
heap
page read and write
CCD3000
heap
page read and write
3E91000
trusted library allocation
page read and write
365E000
stack
page read and write
96C9000
heap
page read and write
9427000
heap
page read and write
400000
unkown
page readonly
CCD3000
heap
page read and write
8C70000
unkown
page read and write
B200000
heap
page read and write
CAED000
heap
page read and write
C8B6000
heap
page read and write
580000
heap
page read and write
4C60000
unkown
page read and write
9070000
unkown
page read and write
1867000
heap
page read and write
C4A0000
unkown
page read and write
C6DE000
heap
page read and write
C5A3000
unkown
page read and write
C881000
heap
page read and write
88F000
heap
page read and write
9070000
unkown
page read and write
79B1000
unkown
page read and write
7FF6E93CC000
unkown
page write copy
7FF5ED52F000
unkown
page readonly
9070000
unkown
page read and write
497757E000
unkown
page readonly
37A8000
unkown
page read and write
33C0000
unkown
page read and write
8D10000
unkown
page read and write
13B0000
unkown
page read and write
707000
heap
page read and write
4CD0000
unkown
page read and write
7FF5ED9D9000
unkown
page readonly
9365000
heap
page read and write
3570000
direct allocation
page read and write
A11F000
stack
page read and write
7FF5ED505000
unkown
page readonly
2C95000
unkown
page readonly
9070000
unkown
page read and write
98F000
unkown
page read and write
3334000
trusted library allocation
page read and write
8740000
unkown
page read and write
B200000
heap
page read and write
BD90000
trusted library allocation
page read and write
8F30000
unkown
page read and write
7F50000
unkown
page read and write
CA79000
heap
page read and write
DF78000
stack
page read and write
9070000
unkown
page read and write
20890C26000
heap
page read and write
97AD000
unkown
page read and write
2FFF000
stack
page read and write
7FF5EDA11000
unkown
page readonly
FE40000
unkown
page read and write
1869000
heap
page read and write
3570000
direct allocation
page read and write
7484000
heap
page read and write
42BF000
trusted library allocation
page read and write
210E6D02000
heap
page read and write
7E70000
unkown
page read and write
2CAE000
stack
page read and write
B210000
heap
page read and write
C87C000
heap
page read and write
7C90000
unkown
page read and write
8D10000
unkown
page read and write
C895000
heap
page read and write
7FF5ED26E000
unkown
page readonly
FA69000
unkown
page read and write
7FF5ED5C1000
unkown
page readonly
3EBF000
trusted library allocation
page read and write
CCF4000
heap
page read and write
9070000
unkown
page read and write
3570000
direct allocation
page read and write
1BCF01A0000
trusted library allocation
page read and write
2E20000
heap
page read and write
94A8000
heap
page read and write
4BC0000
trusted library allocation
page read and write
83D000
heap
page read and write
7FF6E93CC000
unkown
page read and write
8D10000
unkown
page read and write
3450000
unkown
page read and write
9871000
unkown
page read and write
7FF5ECED2000
unkown
page readonly
B224000
heap
page read and write
30C0000
heap
page read and write
C6C9000
unkown
page read and write
953E000
heap
page read and write
7BDE000
heap
page read and write
3570000
direct allocation
page read and write
764F000
trusted library allocation
page read and write
13B0000
unkown
page read and write
7F50000
unkown
page read and write
BD10000
trusted library allocation
page read and write
7FF6E974B000
unkown
page execute and read and write
3430000
trusted library allocation
page read and write
1F0000
heap
page read and write
9070000
unkown
page read and write
7FF5ED9AE000
unkown
page readonly
7F50000
unkown
page read and write
7D07000
heap
page read and write
13B0000
unkown
page read and write
32D0000
heap
page read and write
CCDE000
heap
page read and write
B150000
unkown
page read and write
8F30000
unkown
page read and write
B4D0000
unkown
page read and write
E87E000
stack
page read and write
8740000
unkown
page read and write
1F0000
heap
page read and write
7D7C000
heap
page read and write
185E000
heap
page read and write
935B000
heap
page read and write
3570000
direct allocation
page read and write
3570000
direct allocation
page read and write
41F000
unkown
page readonly
1398000
stack
page read and write
8780000
unkown
page read and write
CC89000
heap
page read and write
5172000
heap
page read and write
30E8000
heap
page read and write
E3FD000
stack
page read and write
934C000
heap
page read and write
29FF000
stack
page read and write
7FF5ED9C8000
unkown
page readonly
CCB6000
heap
page read and write
7DF5000
stack
page read and write
3EBF000
trusted library allocation
page read and write
7FF5ED39E000
unkown
page readonly
91DD000
heap
page read and write
13B0000
unkown
page read and write
CCAC000
heap
page read and write
9535000
heap
page read and write
7D00000
unkown
page readonly
9070000
unkown
page read and write
5A50000
trusted library allocation
page read and write
9070000
unkown
page read and write
C97E000
heap
page read and write
A63D000
stack
page read and write
7BBB000
heap
page read and write
2CEE000
stack
page read and write
CCDE000
heap
page read and write
8208000
stack
page read and write
13B0000
unkown
page read and write
3240000
unkown
page read and write
3570000
direct allocation
page read and write
9070000
unkown
page read and write
9707000
heap
page read and write
7FF5ED1FF000
unkown
page readonly
40C000
unkown
page readonly
63F0000
trusted library allocation
page read and write
32CE000
stack
page read and write
C49E000
stack
page read and write
8C70000
unkown
page read and write
B19F000
heap
page read and write
C82A000
heap
page read and write
7FF5ED8F9000
unkown
page readonly
7C6F000
heap
page read and write
3EDF000
trusted library allocation
page read and write
97B8000
heap
page read and write
CA48000
heap
page read and write
8780000
unkown
page read and write
A491000
unkown
page read and write
8D10000
unkown
page read and write
2DE0000
heap
page read and write
6FE000
stack
page read and write
CCB2000
heap
page read and write
2C11000
unkown
page readonly
C9FC000
heap
page read and write
906E000
stack
page read and write
558000
heap
page read and write
2B6D000
stack
page read and write
765A000
trusted library allocation
page read and write
924B000
heap
page read and write
7D10000
heap
page read and write
8740000
unkown
page read and write
90A0000
unkown
page read and write
C894000
heap
page read and write
78AD000
unkown
page read and write
CC89000
heap
page read and write
9746000
heap
page read and write
7FF5ED86B000
unkown
page readonly
356787D000
stack
page read and write
5430000
trusted library allocation
page read and write
88F000
heap
page read and write
3570000
direct allocation
page read and write
37F9000
unkown
page read and write
7E70000
unkown
page read and write
5EA000
heap
page read and write
7E70000
unkown
page read and write
1867000
heap
page read and write
2C6E000
stack
page read and write
D6FD000
stack
page read and write
49774FE000
stack
page read and write
217F000
stack
page read and write
C5AA000
unkown
page read and write
2FB1000
heap
page read and write
3230000
unkown
page read and write
2E0E000
stack
page read and write
604000
heap
page read and write
BCF0000
trusted library allocation
page read and write
B1D0000
heap
page read and write
210E6824000
unkown
page read and write
30C0000
heap
page read and write
CCA6000
heap
page read and write
540E000
trusted library allocation
page read and write
9603000
heap
page read and write
924F000
heap
page read and write
7FF5ED265000
unkown
page readonly
C7FB000
heap
page read and write
C51E000
unkown
page read and write
1734000
heap
page read and write
28F15AE0000
heap
page read and write
1121D000
unkown
page read and write
13B0000
unkown
page read and write
4BF0000
heap
page read and write
B224000
heap
page read and write
3410000
heap
page read and write
7570000
heap
page read and write
1BCF430A000
heap
page read and write
DE0000
unkown
page readonly
20890C3E000
heap
page read and write
4D70000
heap
page read and write
CC89000
heap
page read and write
1870000
heap
page read and write
11201000
unkown
page read and write
966E000
heap
page read and write
96EA000
heap
page read and write
CAE3000
heap
page read and write
A85B000
stack
page read and write
FB54000
unkown
page read and write
C78B000
heap
page read and write
9C000
stack
page read and write
4978D7E000
unkown
page readonly
2F57000
heap
page execute and read and write
13B0000
unkown
page read and write
C520000
heap
page read and write
19B000
stack
page read and write
30E2000
heap
page read and write
3EAF000
trusted library allocation
page read and write
310E000
stack
page read and write
3110000
unkown
page read and write
CB40000
heap
page read and write
400000
unkown
page readonly
1BCF4430000
trusted library allocation
page read and write
CCA8000
heap
page read and write
973B000
heap
page read and write
7E70000
unkown
page read and write
113D1000
unkown
page read and write
3EAF000
trusted library allocation
page read and write
9070000
unkown
page read and write
3440000
trusted library allocation
page read and write
F62F000
stack
page read and write
7D57000
heap
page read and write
310F000
stack
page read and write
97AC000
heap
page read and write
3F2E000
trusted library allocation
page read and write
7DF496680000
trusted library allocation
page readonly
9070000
unkown
page read and write
1BCF4560000
trusted library allocation
page read and write
9883000
unkown
page read and write
1842000
heap
page read and write
7FF5ED644000
unkown
page readonly
C96C000
heap
page read and write
BB1B000
stack
page read and write
786B000
unkown
page read and write
28FE000
stack
page read and write
210E6D00000
heap
page read and write
9070000
unkown
page read and write
4B2000
unkown
page write copy
CCCB000
heap
page read and write
2A10000
heap
page read and write
C872000
heap
page read and write
3450000
unkown
page read and write
8740000
unkown
page read and write
2C95000
unkown
page readonly
B1B8000
heap
page read and write
968B000
unkown
page read and write
3EFF000
trusted library allocation
page read and write
13B0000
unkown
page read and write
13B0000
unkown
page read and write
925F000
heap
page read and write
400000
unkown
page readonly
30C0000
heap
page read and write
7F50000
unkown
page read and write
920A000
heap
page read and write
B74F000
stack
page read and write
8780000
unkown
page read and write
278E000
stack
page read and write
7FF5ED412000
unkown
page readonly
7448000
heap
page read and write
7FF5ED7E9000
unkown
page readonly
9560000
stack
page read and write
647000
heap
page read and write
432B000
trusted library allocation
page read and write
3FBF000
trusted library allocation
page read and write
3EC4000
trusted library allocation
page read and write
7648000
trusted library allocation
page read and write
41F000
unkown
page readonly
765F000
trusted library allocation
page read and write
30BE000
heap
page read and write
9697000
heap
page read and write
2271B6D000
stack
page read and write
1BCF4464000
trusted library allocation
page read and write
7FF5ED8A4000
unkown
page readonly
30B1000
heap
page read and write
3570000
direct allocation
page read and write
9070000
unkown
page read and write
7E70000
unkown
page read and write
2271EFF000
stack
page read and write
FE9E000
unkown
page read and write
3F05000
trusted library allocation
page read and write
1BD2B919000
heap
page read and write
89C000
heap
page read and write
CAED000
heap
page read and write
7FF5ED4BB000
unkown
page readonly
CC54000
heap
page read and write
9070000
unkown
page read and write
C8CC000
heap
page read and write
30E2000
trusted library allocation
page read and write
A364000
unkown
page read and write
8C70000
unkown
page read and write
1390000
unkown
page read and write
CB1B000
heap
page read and write
A40000
heap
page read and write
4CC0000
unkown
page read and write
7D1D000
heap
page read and write
1BCF4420000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
BD30000
trusted library allocation
page read and write
96B0000
heap
page read and write
CAB2000
heap
page read and write
C731000
heap
page read and write
8D10000
unkown
page read and write
922B000
heap
page read and write
7E70000
unkown
page read and write
7FF5ED818000
unkown
page readonly
CA63000
unkown
page read and write
7FFE000
stack
page read and write
9070000
unkown
page read and write
1380000
heap
page read and write
92E3000
heap
page read and write
9070000
unkown
page read and write
9070000
unkown
page read and write
210E682B000
heap
page read and write
9070000
unkown
page read and write
8820000
unkown
page read and write
3450000
unkown
page read and write
497917E000
unkown
page readonly
58AE000
stack
page read and write
78F000
stack
page read and write
8F30000
unkown
page read and write
5A3B000
trusted library allocation
page read and write
401000
unkown
page execute read
7FF5ED9B8000
unkown
page readonly
9070000
unkown
page read and write
7E70000
unkown
page read and write
19B000
stack
page read and write
C894000
heap
page read and write
54D3000
heap
page read and write
2DED000
stack
page read and write
E2FD000
stack
page read and write
7FC000
stack
page read and write
B22C000
heap
page read and write
5103000
heap
page read and write
C700000
unkown
page read and write
3F18000
trusted library allocation
page read and write
4B2000
unkown
page write copy
DA60000
trusted library allocation
page read and write
7672000
trusted library allocation
page read and write
B1A0000
heap
page read and write
9622000
heap
page read and write
3570000
direct allocation
page read and write
FA52000
unkown
page read and write
C09D000
stack
page read and write
9070000
unkown
page read and write
3570000
direct allocation
page read and write
88F000
heap
page read and write
35A0000
unkown
page readonly
471000
unkown
page execute read
CCB0000
heap
page read and write
4B2000
unkown
page read and write
C810000
heap
page read and write
3F3D000
trusted library allocation
page read and write
583E000
heap
page read and write
9070000
unkown
page read and write
4D9000
unkown
page readonly
7F50000
unkown
page read and write
1BCF41F0000
trusted library allocation
page read and write
960A000
heap
page read and write
8C70000
unkown
page read and write
122A000
trusted library allocation
page execute and read and write
B10D000
stack
page read and write
30B0000
heap
page read and write
9342000
heap
page read and write
9070000
unkown
page read and write
3F3D000
trusted library allocation
page read and write
9688000
heap
page read and write
C87C000
heap
page read and write
210E6790000
heap
page read and write
83E000
heap
page read and write
7F50000
unkown
page read and write
186C000
heap
page read and write
CAED000
heap
page read and write
8CF0000
unkown
page read and write
83C000
heap
page read and write
CAF9000
heap
page read and write
401000
unkown
page execute read
C529000
heap
page read and write
179BB6C9000
heap
page read and write
2DFD000
stack
page read and write
2A6E000
stack
page read and write
7FF5ED295000
unkown
page readonly
31C0000
heap
page read and write
123B000
trusted library allocation
page execute and read and write
7FF5ED5C5000
unkown
page readonly
934E000
heap
page read and write
1BD2D640000
direct allocation
page read and write
CCDA000
heap
page read and write
1BCEEF02000
heap
page read and write
9C000
stack
page read and write
1BCF4444000
trusted library allocation
page read and write
40C000
unkown
page readonly
9070000
unkown
page read and write
1BCF4400000
trusted library allocation
page read and write
9070000
unkown
page read and write
7E70000
unkown
page read and write
2CF0000
heap
page read and write
17DE000
heap
page read and write
13B0000
unkown
page read and write
934C000
heap
page read and write
65A0000
trusted library allocation
page execute and read and write
202BE342000
heap
page read and write
3495000
trusted library allocation
page read and write
1505000
heap
page read and write
7E70000
unkown
page read and write
3428000
trusted library allocation
page read and write
CCDC000
heap
page read and write
CCC9000
heap
page read and write
D0A0000
trusted library allocation
page read and write
CCF4000
heap
page read and write
4FC0000
heap
page read and write
3570000
direct allocation
page read and write
1BCF425C000
heap
page read and write
4C50000
unkown
page read and write
9070000
unkown
page read and write
497907B000
stack
page read and write
1480000
heap
page read and write
823B000
stack
page read and write
9603000
heap
page read and write
1BD2BB40000
direct allocation
page read and write
DB7D000
stack
page read and write
7E70000
unkown
page read and write
B849000
stack
page read and write
953E000
heap
page read and write
9070000
unkown
page read and write
19B000
stack
page read and write
8780000
unkown
page read and write
CCAC000
heap
page read and write
9B000
stack
page read and write
3EA9000
trusted library allocation
page read and write
4F43000
trusted library allocation
page read and write
1390000
unkown
page read and write
921000
unkown
page execute read
976B000
heap
page read and write
7FF5ED4B0000
unkown
page readonly
3690000
heap
page read and write
C8D4000
heap
page read and write
400000
unkown
page readonly
CA85000
heap
page read and write
741C000
heap
page read and write
9070000
unkown
page read and write
C877000
heap
page read and write
7E70000
unkown
page read and write
7FF5ED3EA000
unkown
page readonly
4325000
trusted library allocation
page read and write
7E70000
unkown
page read and write
95C000
unkown
page readonly
C70F000
heap
page read and write
42FC000
trusted library allocation
page read and write
25FF000
stack
page read and write
1BD2BB10000
heap
page read and write
96AC000
heap
page read and write
3E96000
trusted library allocation
page read and write
3230000
unkown
page read and write
B230000
heap
page read and write
7E70000
unkown
page read and write
4148000
trusted library allocation
page read and write
4B2000
unkown
page read and write
66FE000
stack
page read and write
7FF5ED2A4000
unkown
page readonly
7FF6E93C7000
unkown
page readonly
CC54000
heap
page read and write
7F50000
unkown
page read and write
B4D0000
unkown
page read and write
CA02000
heap
page read and write
7FF5ED803000
unkown
page readonly
DB7000
stack
page read and write
CCDA000
heap
page read and write
1BD2BB40000
direct allocation
page read and write
497747E000
unkown
page readonly
314F000
stack
page read and write
13B0000
unkown
page read and write
9139000
stack
page read and write
2D30000
heap
page read and write
978D000
heap
page read and write
5FD000
heap
page read and write
8F30000
unkown
page read and write
785D000
unkown
page read and write
7FF5ED3CE000
unkown
page readonly
7FF5ED68C000
unkown
page readonly
7FF5ED8E7000
unkown
page readonly
CAD2000
heap
page read and write
9365000
heap
page read and write
1BCEEE9F000
heap
page read and write
3570000
direct allocation
page read and write
50FF000
heap
page read and write
9D64000
unkown
page read and write
137F000
unkown
page read and write
7FF6E93CC000
unkown
page write copy
956E000
heap
page read and write
9070000
unkown
page read and write
2B6D000
stack
page read and write
CCB6000
heap
page read and write
934C000
heap
page read and write
20890BB0000
direct allocation
page read and write
7655000
trusted library allocation
page read and write
A39B000
unkown
page read and write
37AE000
unkown
page read and write
96A7000
heap
page read and write
2CF8000
heap
page read and write
7DF4F3030000
unkown
page readonly
EEFD000
stack
page read and write
1872000
heap
page read and write
8D10000
unkown
page read and write
1020000
heap
page read and write
7BA3000
heap
page read and write
2F30000
heap
page read and write
7847000
unkown
page read and write
2E80000
heap
page read and write
CCDE000
heap
page read and write
4BE0000
trusted library allocation
page read and write
2F9F000
stack
page read and write
B170000
unkown
page readonly
8F30000
unkown
page read and write
379E000
unkown
page read and write
7FF6E9915000
unkown
page execute read
5D7000
heap
page read and write
C837000
heap
page read and write
7FF5EDA76000
unkown
page readonly
9286000
heap
page read and write
96C6000
heap
page read and write
4F40000
trusted library allocation
page read and write
4BD0000
trusted library allocation
page read and write
B22F000
heap
page read and write
9070000
unkown
page read and write
2C95000
unkown
page readonly
95C8000
heap
page read and write
59F0000
trusted library allocation
page read and write
7D4B000
heap
page read and write
CCEA000
heap
page read and write
51BE000
heap
page read and write
C90A000
heap
page read and write
3F2E000
trusted library allocation
page read and write
C41F000
stack
page read and write
8D10000
unkown
page read and write
1BCEEE2B000
heap
page read and write
433F000
trusted library allocation
page read and write
3570000
direct allocation
page read and write
7B8D000
heap
page read and write
CCE0000
heap
page read and write
179BB9B5000
heap
page read and write
30BA000
heap
page read and write
8D10000
unkown
page read and write
8C70000
unkown
page read and write
7859000
unkown
page read and write
C54C000
heap
page read and write
2E30000
trusted library allocation
page read and write
7F50000
unkown
page read and write
C8C8000
heap
page read and write
8F30000
unkown
page read and write
7FF6E9751000
unkown
page execute and read and write
CAE2000
heap
page read and write
A37B000
unkown
page read and write
858000
heap
page read and write
7632000
trusted library allocation
page read and write
7FF5ED471000
unkown
page readonly
1880000
heap
page read and write
49784FF000
stack
page read and write
7FF5ED59E000
unkown
page readonly
9581000
heap
page read and write
401000
unkown
page execute read
50C6000
heap
page read and write
3425000
trusted library allocation
page read and write
5E4000
heap
page read and write
2DFE000
stack
page read and write
1BCEEE69000
heap
page read and write
B60000
heap
page read and write
7F50000
unkown
page read and write
1872000
heap
page read and write
4B93000
unkown
page read and write
202BE331000
heap
page read and write
210E6915000
trusted library allocation
page read and write
96A000
unkown
page execute read
3570000
direct allocation
page read and write
8000000
unkown
page read and write
9070000
unkown
page read and write
3110000
unkown
page read and write
91DF000
heap
page read and write
7FF6E9751000
unkown
page execute and read and write
8C70000
unkown
page read and write
9359000
heap
page read and write
8F30000
unkown
page read and write
97AC000
heap
page read and write
3110000
unkown
page read and write
3230000
unkown
page read and write
40B000
unkown
page execute read
34C6000
stack
page read and write
7FF5ED7C4000
unkown
page readonly
7E70000
unkown
page read and write
7FF5ED864000
unkown
page readonly
36D5000
stack
page read and write
400000
unkown
page execute and read and write
7532000
heap
page read and write
348D000
trusted library allocation
page read and write
3570000
direct allocation
page read and write
8800000
unkown
page read and write
1255000
heap
page read and write
7861000
unkown
page read and write
5185000
heap
page read and write
1BCF4242000
heap
page read and write
4B2000
unkown
page write copy
8BE000
heap
page read and write
1F0000
heap
page read and write
29FF000
stack
page read and write
7C7E000
heap
page read and write
7BAD000
heap
page read and write
CCCB000
heap
page read and write
7D07000
heap
page read and write
197000
stack
page read and write
896B000
stack
page read and write
94A5000
heap
page read and write
9707000
heap
page read and write
AF8D000
stack
page read and write
9365000
heap
page read and write
37D2000
unkown
page read and write
9251000
heap
page read and write
9603000
heap
page read and write
3570000
direct allocation
page read and write
7FF5ED28E000
unkown
page readonly
CAC9000
heap
page read and write
BD20000
trusted library allocation
page read and write
CC90000
heap
page read and write
BD1D000
stack
page read and write
13B0000
unkown
page read and write
C6DE000
heap
page read and write
2D5E000
stack
page read and write
30E0000
trusted library allocation
page read and write
9416000
heap
page read and write
C9FD000
heap
page read and write
7C7F000
heap
page read and write
B19A000
heap
page read and write
9666000
heap
page read and write
3570000
direct allocation
page read and write
934C000
heap
page read and write
9070000
unkown
page read and write
210E6D00000
heap
page read and write
9070000
unkown
page read and write
10D0000
heap
page read and write
59AE000
stack
page read and write
973B000
heap
page read and write
9070000
unkown
page read and write
4B40000
heap
page read and write
C90A000
heap
page read and write
2CDA000
heap
page read and write
B1EF000
heap
page read and write
3450000
unkown
page read and write
923F000
heap
page read and write
7F930000
trusted library allocation
page execute and read and write
2C95000
unkown
page readonly
9689000
heap
page read and write
7D07000
heap
page read and write
13B0000
unkown
page read and write
7D45000
heap
page read and write
C8CC000
heap
page read and write
34F3000
trusted library allocation
page read and write
95FC000
heap
page read and write
197000
stack
page read and write
32E1000
heap
page read and write
13B0000
unkown
page read and write
7635000
trusted library allocation
page read and write
C6F4000
unkown
page read and write
E0FA000
stack
page read and write
1BCF4500000
trusted library allocation
page read and write
850E000
stack
page read and write
5851000
heap
page read and write
CCDE000
heap
page read and write
9070000
unkown
page read and write
339F000
trusted library allocation
page read and write
9070000
unkown
page read and write
20890BB0000
direct allocation
page read and write
9070000
unkown
page read and write
CCC9000
heap
page read and write
7CD9000
heap
page read and write
7FF6E96A4000
unkown
page execute and read and write
C8D4000
heap
page read and write
D3DC000
stack
page read and write
5A21000
trusted library allocation
page read and write
97AC000
heap
page read and write
9268000
heap
page read and write
400000
unkown
page readonly
3EAA000
trusted library allocation
page read and write
2CB0000
unclassified section
page read and write
9286000
heap
page read and write
2CA4000
heap
page read and write
7FF5ED507000
unkown
page readonly
93AE000
heap
page read and write
9070000
unkown
page read and write
854E000
stack
page read and write
CB23000
heap
page read and write
7FF5ED91A000
unkown
page readonly
CCC9000
heap
page read and write
7FF6E93CF000
unkown
page execute and read and write
1BCF451A000
trusted library allocation
page read and write
8720000
unkown
page readonly
4B90000
unkown
page read and write
C810000
heap
page read and write
1BD2BB40000
direct allocation
page read and write
9581000
heap
page read and write
966E000
heap
page read and write
185A000
heap
page read and write
CEE000
stack
page read and write
CCB6000
heap
page read and write
C8CE000
heap
page read and write
5814000
heap
page read and write
202BE300000
heap
page read and write
2A0F000
stack
page read and write
E97A000
stack
page read and write
2F63000
heap
page execute and read and write
9730000
heap
page read and write
FE82000
unkown
page read and write
7FF5ED9F2000
unkown
page readonly
7CDB000
heap
page read and write
687D000
stack
page read and write
7F50000
unkown
page read and write
2E50000
heap
page read and write
3FB1000
trusted library allocation
page read and write
5F4000
heap
page read and write
9461000
heap
page read and write
9070000
unkown
page read and write
CCEA000
heap
page read and write
9489000
heap
page read and write
960A000
heap
page read and write
CCEA000
heap
page read and write
3110000
unkown
page read and write
9570000
heap
page read and write
7D25000
heap
page read and write
3450000
unkown
page read and write
7F50000
unkown
page read and write
7E70000
unkown
page read and write
73C0000
trusted library allocation
page read and write
5F4000
heap
page read and write
B4D0000
unkown
page read and write
379E000
stack
page read and write
1220000
unkown
page read and write
186C000
heap
page read and write
9286000
heap
page read and write
24E6CC80000
heap
page read and write
93AE000
heap
page read and write
3142000
heap
page read and write
340F000
stack
page read and write
7BDE000
heap
page read and write
4B2000
unkown
page write copy
13B0000
unkown
page read and write
22720FE000
stack
page read and write
7639000
trusted library allocation
page read and write
7CA2000
heap
page read and write
848000
heap
page read and write
187C000
heap
page read and write
1870000
heap
page read and write
28FE000
stack
page read and write
7D4E000
heap
page read and write
509E000
heap
page read and write
96B4000
heap
page read and write
864E000
stack
page read and write
3E90000
trusted library allocation
page read and write
FE7D000
unkown
page read and write
1BCEEF13000
heap
page read and write
3E9D000
trusted library allocation
page read and write
C8A4000
heap
page read and write
E57E000
stack
page read and write
3230000
unkown
page read and write
3E9D000
trusted library allocation
page read and write
C350000
unkown
page read and write
3570000
direct allocation
page read and write
77B0000
trusted library allocation
page read and write
A530000
remote allocation
page read and write
9758000
heap
page read and write
9420000
heap
page read and write
A3BE000
unkown
page read and write
650000
heap
page read and write
95FA000
heap
page read and write
7FF5ED46A000
unkown
page readonly
CCD6000
heap
page read and write
586D000
heap
page read and write
9365000
heap
page read and write
41F000
unkown
page readonly
8CED000
stack
page read and write
BD50000
trusted library allocation
page read and write
8F30000
unkown
page read and write
CCDE000
heap
page read and write
1BCF45A0000
remote allocation
page read and write
6FD0000
trusted library allocation
page read and write
7FF5ED4E8000
unkown
page readonly
C79B000
heap
page read and write
7C01000
heap
page read and write
400000
unkown
page readonly
3449000
trusted library allocation
page read and write
210E6802000
unkown
page read and write
3EF1000
trusted library allocation
page read and write
41F000
unkown
page readonly
9581000
heap
page read and write
97AC000
heap
page read and write
27AE000
stack
page read and write
1BCF44FC000
trusted library allocation
page read and write
9416000
heap
page read and write
933E000
heap
page read and write
3570000
direct allocation
page read and write
9552000
heap
page read and write
1BCF421F000
heap
page read and write
9070000
unkown
page read and write
3EC7000
trusted library allocation
page read and write
9581000
heap
page read and write
C8E1000
unkown
page read and write
C9D8000
heap
page read and write
277E000
stack
page read and write
87BB000
stack
page read and write
400000
unkown
page readonly
C5D1000
heap
page read and write
8F30000
unkown
page read and write
3EE5000
trusted library allocation
page read and write
C777000
heap
page read and write
95AD000
heap
page read and write
3570000
direct allocation
page read and write
13B0000
unkown
page read and write
9070000
unkown
page read and write
B22B000
heap
page read and write
10F80000
heap
page read and write
2DC0000
heap
page read and write
9070000
unkown
page read and write
5641000
unkown
page read and write
3570000
direct allocation
page read and write
2C11000
unkown
page readonly
9070000
unkown
page read and write
C75E000
heap
page read and write
935B000
heap
page read and write
B22E000
heap
page read and write
3570000
direct allocation
page read and write
934E000
heap
page read and write
2FB1000
heap
page read and write
9707000
heap
page read and write
942B000
heap
page read and write
E64D000
unkown
page read and write
3EB8000
trusted library allocation
page read and write
7675000
trusted library allocation
page read and write
CCB6000
heap
page read and write
7FF6E96A9000
unkown
page execute and read and write
1877000
heap
page read and write
C523000
heap
page read and write
7C83000
heap
page read and write
C97E000
heap
page read and write
B224000
heap
page read and write
95FC000
heap
page read and write
9359000
heap
page read and write
9070000
unkown
page read and write
5F4000
heap
page read and write
28F15D70000
heap
page read and write
3110000
unkown
page read and write
36F12FF000
stack
page read and write
9622000
heap
page read and write
120D000
unkown
page readonly
7664000
trusted library allocation
page read and write
3EB1000
trusted library allocation
page read and write
3400000
remote allocation
page read and write
C92D000
unkown
page read and write
7F50000
unkown
page read and write
C7E8000
heap
page read and write
2CD3000
heap
page execute and read and write
30B0000
heap
page read and write
7C80000
unkown
page read and write
CCEE000
heap
page read and write
8780000
unkown
page read and write
3230000
unkown
page read and write
13B0000
unkown
page read and write
F07D000
stack
page read and write
401000
unkown
page execute read
4978C7E000
stack
page read and write
3EB0000
trusted library allocation
page read and write
3ED0000
trusted library allocation
page read and write
976D000
heap
page read and write
96C6000
heap
page read and write
547E000
trusted library allocation
page read and write
5F7000
heap
page read and write
CA4F000
heap
page read and write
3EF3000
trusted library allocation
page read and write
B629000
stack
page read and write
2FB1000
heap
page read and write
34B6000
trusted library allocation
page read and write
7D07000
heap
page read and write
3460000
unkown
page read and write
497997E000
unkown
page readonly
1858000
heap
page read and write
7FF5ED445000
unkown
page readonly
7FF6E96F1000
unkown
page execute and read and write
C7E8000
heap
page read and write
1BD2BB40000
direct allocation
page read and write
CCD1000
heap
page read and write
13B0000
unkown
page read and write
818D000
stack
page read and write
7FF5ED793000
unkown
page readonly
30BF000
stack
page read and write
337A000
trusted library allocation
page read and write
CCE0000
heap
page read and write
9070000
unkown
page read and write
32E1000
heap
page read and write
2CCA000
heap
page read and write
7E50000
unkown
page readonly
3EA8000
trusted library allocation
page read and write
9771000
heap
page read and write
C987000
heap
page read and write
1BCF4254000
heap
page read and write
A32A000
unkown
page read and write
3290000
unkown
page read and write
13B0000
unkown
page read and write
42E7000
trusted library allocation
page read and write
934E000
heap
page read and write
7F50000
unkown
page read and write
96B6000
heap
page read and write
41F000
unkown
page readonly
179A000
heap
page read and write
125E000
heap
page read and write
1204000
trusted library allocation
page read and write
CCDC000
heap
page read and write
DC7D000
stack
page read and write
3797000
unkown
page read and write
CA85000
heap
page read and write
7F50000
unkown
page read and write
95C8000
heap
page read and write
7CA8000
heap
page read and write
A8D0000
trusted library allocation
page read and write
96C6000
heap
page read and write
B4D0000
unkown
page read and write
27DF000
stack
page read and write
3430000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
95E8000
heap
page read and write
7C90000
heap
page read and write
976C000
heap
page read and write
9070000
unkown
page read and write
93AE000
heap
page read and write
9342000
heap
page read and write
4316000
trusted library allocation
page read and write
97AC000
heap
page read and write
94BB000
heap
page read and write
8740000
unkown
page read and write
8820000
unkown
page read and write
E5A3000
unkown
page read and write
CC54000
heap
page read and write
2C95000
unkown
page readonly
1275000
stack
page read and write
973B000
heap
page read and write
9342000
heap
page read and write
976B000
heap
page read and write
41F000
unkown
page readonly
9070000
unkown
page read and write
7FF5ED670000
unkown
page readonly
4F30000
trusted library allocation
page read and write
2C95000
unkown
page readonly
1BCF45A0000
remote allocation
page read and write
24E6CDD8000
heap
page read and write
7F50000
unkown
page read and write
7DF496671000
trusted library allocation
page execute read
324A000
stack
page read and write
3EC7000
trusted library allocation
page read and write
48B000
unkown
page write copy
8D10000
unkown
page read and write
610000
heap
page read and write
CC9A000
heap
page read and write
4F30000
trusted library allocation
page read and write
4977C7C000
stack
page read and write
1BCF42F8000
heap
page read and write
CA6B000
heap
page read and write
24E6CD60000
heap
page read and write
14B0000
unkown
page readonly
2FBE000
stack
page read and write
41F000
unkown
page readonly
97AC000
heap
page read and write
960A000
heap
page read and write
730000
heap
page read and write
3EE8000
trusted library allocation
page read and write
7BF9000
heap
page read and write
CCF4000
heap
page read and write
8F30000
unkown
page read and write
987F000
unkown
page read and write
7E70000
unkown
page read and write
7E70000
unkown
page read and write
9581000
heap
page read and write
7FF6E8EB1000
unkown
page execute read
3EA1000
trusted library allocation
page read and write
7FF5ED939000
unkown
page readonly
CA7C000
unkown
page read and write
CA26000
heap
page read and write
C983000
heap
page read and write
C77F000
heap
page read and write
5A3E000
trusted library allocation
page read and write
13CC000
heap
page read and write
9070000
unkown
page read and write
7DF496651000
trusted library allocation
page execute read
F34B000
heap
page read and write
8D10000
unkown
page read and write
51AA000
heap
page read and write
3F2E000
trusted library allocation
page read and write
276F000
stack
page read and write
2CFE000
stack
page read and write
95E8000
heap
page read and write
CCCB000
heap
page read and write
10D5000
heap
page read and write
6420000
trusted library allocation
page execute and read and write
3410000
heap
page read and write
8D10000
unkown
page read and write
3560000
heap
page read and write
963C000
heap
page read and write
7FF6E8EB0000
unkown
page readonly
6480000
trusted library allocation
page read and write
52B000
remote allocation
page execute and read and write
7FF5ED516000
unkown
page readonly
9261000
heap
page read and write
3570000
direct allocation
page read and write
968B000
heap
page read and write
95E4000
heap
page read and write
42F1000
trusted library allocation
page read and write
CCA8000
heap
page read and write
623E000
stack
page read and write
8D10000
unkown
page read and write
8C70000
unkown
page read and write
95EB000
heap
page read and write
9365000
heap
page read and write
995000
unkown
page execute read
B140000
unkown
page readonly
30B1000
heap
page read and write
C989000
heap
page read and write
9235000
heap
page read and write
9070000
unkown
page read and write
9070000
unkown
page read and write
CB05000
heap
page read and write
2D1E000
stack
page read and write
CCF4000
heap
page read and write
77C0000
trusted library allocation
page read and write
C516000
unkown
page read and write
A13B000
stack
page read and write
13B0000
unkown
page read and write
CCD1000
heap
page read and write
CC90000
heap
page read and write
CCF4000
heap
page read and write
1765000
heap
page read and write
9070000
unkown
page read and write
BD98000
stack
page read and write
87CA000
unkown
page read and write
7FF5ED92C000
unkown
page readonly
95F8000
heap
page read and write
CCF4000
heap
page read and write
3E9A000
trusted library allocation
page read and write
8820000
unkown
page read and write
7B97000
heap
page read and write
9070000
unkown
page read and write
9770000
heap
page read and write
3EE6000
trusted library allocation
page read and write
400000
unkown
page readonly
9070000
unkown
page read and write
7FF5ED933000
unkown
page readonly
7427000
heap
page read and write
9265000
heap
page read and write
9286000
heap
page read and write
C793000
heap
page read and write
7FF5ED81B000
unkown
page readonly
10F89000
heap
page read and write
3570000
direct allocation
page read and write
305F000
stack
page read and write
96C6000
heap
page read and write
7FF6E93CF000
unkown
page execute and read and write
C6D8000
heap
page read and write
CCB2000
heap
page read and write
1200000
trusted library allocation
page read and write
CCE0000
heap
page read and write
966E000
heap
page read and write
9080000
unkown
page read and write
91B1000
heap
page read and write
9753000
heap
page read and write
9070000
unkown
page read and write
978D000
heap
page read and write
CAE4000
heap
page read and write
E77D000
stack
page read and write
1270000
trusted library allocation
page execute and read and write
3570000
direct allocation
page read and write
7FF5ED3D0000
unkown
page readonly
1734000
heap
page read and write
3D7D000
stack
page read and write
C812000
heap
page read and write
5A30000
trusted library allocation
page read and write
E78D000
unkown
page read and write
C350000
unkown
page read and write
6470000
trusted library allocation
page read and write
7F50000
unkown
page read and write
C52C000
unkown
page read and write
8C70000
unkown
page read and write
94B0000
heap
page read and write
432000
remote allocation
page execute and read and write
9070000
unkown
page read and write
7FF6E93CA000
unkown
page readonly
1BCF41E0000
trusted library allocation
page read and write
30B0000
remote allocation
page read and write
7E70000
unkown
page read and write
E78D000
unkown
page read and write
19B000
stack
page read and write
5091000
heap
page read and write
1483000
heap
page read and write
C7A1000
heap
page read and write
8FB8000
stack
page read and write
2CCE000
heap
page read and write
8F30000
unkown
page read and write
C695000
heap
page read and write
30B1000
heap
page read and write
9C000
stack
page read and write
CCEE000
heap
page read and write
7FF5ED7F1000
unkown
page readonly
28F15D40000
heap
page read and write
CB0A000
heap
page read and write
9070000
unkown
page read and write
1490000
unkown
page read and write
934E000
heap
page read and write
51A2000
heap
page read and write
935B000
heap
page read and write
CCDC000
heap
page read and write
7900000
unkown
page read and write
1F0000
heap
page read and write
7FF6E96D0000
unkown
page execute and read and write
8F30000
unkown
page read and write
13B0000
unkown
page read and write
9C000
stack
page read and write
42E000
unkown
page write copy
88EE000
stack
page read and write
133C000
heap
page read and write
96EA000
heap
page read and write
EB7D000
stack
page read and write
91D9000
heap
page read and write
9875000
unkown
page read and write
52B000
remote allocation
page execute and read and write
93C0000
heap
page read and write
C881000
heap
page read and write
7FF5ED872000
unkown
page readonly
8F30000
unkown
page read and write
C503000
unkown
page read and write
59FB000
trusted library allocation
page read and write
8740000
unkown
page read and write
C660000
heap
page read and write
3795000
unkown
page read and write
3440000
unkown
page read and write
1854000
heap
page read and write
5115000
heap
page read and write
CA8A000
heap
page read and write
2CB0000
heap
page read and write
CCD8000
heap
page read and write
933E000
heap
page read and write
CCC2000
heap
page read and write
9070000
unkown
page read and write
CB03000
heap
page read and write
CB22000
heap
page read and write
95F8000
heap
page read and write
7E70000
unkown
page read and write
8800000
unkown
page read and write
C7D7000
heap
page read and write
7CD9000
heap
page read and write
1BCF446C000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
BD40000
trusted library allocation
page read and write
A49E000
unkown
page read and write
CB2C000
heap
page read and write
3EAF000
trusted library allocation
page read and write
B22F000
heap
page read and write
11201000
unkown
page read and write
9070000
unkown
page read and write
7CA1000
heap
page read and write
1280000
heap
page read and write
1BD2BB55000
heap
page read and write
C94E000
heap
page read and write
1260000
trusted library allocation
page read and write
953E000
heap
page read and write
7DF0000
heap
page read and write
CCD1000
heap
page read and write
CCE2000
heap
page read and write
95C8000
heap
page read and write
C10A000
stack
page read and write
13B0000
unkown
page read and write
A530000
remote allocation
page read and write
210E6C13000
heap
page read and write
13B0000
unkown
page read and write
5557000
stack
page read and write
7FF6E8EC4000
unkown
page readonly
7FF5ED409000
unkown
page readonly
9798000
unkown
page read and write
7CC7000
heap
page read and write
CCB5000
heap
page read and write
51A000
remote allocation
page execute and read and write
C9CC000
heap
page read and write
CCDC000
heap
page read and write
93AE000
heap
page read and write
3110000
unkown
page read and write
9070000
unkown
page read and write
B4D0000
unkown
page read and write
97B5000
unkown
page read and write
94A5000
heap
page read and write
28F15AC0000
heap
page read and write
9070000
unkown
page read and write
3570000
direct allocation
page read and write
CB29000
heap
page read and write
186C000
heap
page read and write
727E000
stack
page read and write
3753000
stack
page read and write
BD33000
trusted library allocation
page read and write
1133D000
unkown
page read and write
95E4000
heap
page read and write
3450000
unkown
page read and write
7CB0000
heap
page read and write
9707000
heap
page read and write
7B9C000
heap
page read and write
BBB0000
trusted library allocation
page read and write
7F50000
unkown
page read and write
7FF6E8EC8000
unkown
page read and write
9753000
heap
page read and write
CAD2000
heap
page read and write
9359000
heap
page read and write
1734000
heap
page read and write
CCD8000
heap
page read and write
CAC3000
heap
page read and write
9433000
heap
page read and write
CA91000
heap
page read and write
7E70000
unkown
page read and write
40C000
unkown
page readonly
7E70000
unkown
page read and write
3F09000
trusted library allocation
page read and write
934C000
heap
page read and write
13B0000
unkown
page read and write
A4A1000
unkown
page read and write
1BCF4418000
trusted library allocation
page read and write
3EED000
trusted library allocation
page read and write
9533000
heap
page read and write
CCDA000
heap
page read and write
179BB890000
heap
page read and write
CAE3000
heap
page read and write
9070000
unkown
page read and write
34F0000
trusted library allocation
page read and write
934C000
heap
page read and write
C781000
heap
page read and write
9365000
heap
page read and write
2F8F000
stack
page read and write
935B000
heap
page read and write
8820000
unkown
page read and write
10F95000
heap
page read and write
920000
unkown
page readonly
C881000
heap
page read and write
2D64000
heap
page read and write
2D5E000
stack
page read and write
703C000
stack
page read and write
7FF5ED279000
unkown
page readonly
7FF5ED33F000
unkown
page readonly
9070000
unkown
page read and write
7B90000
heap
page read and write
9070000
unkown
page read and write
19E000
stack
page read and write
314A000
heap
page read and write
1BCF424F000
heap
page read and write
210E6C02000
heap
page read and write
76C0000
unkown
page read and write
30D6000
trusted library allocation
page read and write
8D10000
unkown
page read and write
9256000
heap
page read and write
7FF5ED48A000
unkown
page readonly
C9EB000
heap
page read and write
2F31000
heap
page execute and read and write
1230000
trusted library allocation
page read and write
9070000
unkown
page read and write
B190000
unkown
page read and write
40C000
unkown
page readonly
1858000
heap
page read and write
9ABA000
stack
page read and write
7E80000
heap
page read and write
3F05000
trusted library allocation
page read and write
8B2000
heap
page read and write
4D7000
unkown
page execute and read and write
2E4E000
stack
page read and write
40C000
unkown
page readonly
20890B60000
heap
page read and write
2BBE000
stack
page read and write
C9F5000
heap
page read and write
CCA6000
heap
page read and write
7E70000
unkown
page read and write
3570000
direct allocation
page read and write
2C20000
heap
page read and write
3570000
direct allocation
page read and write
4B2000
unkown
page read and write
7F50000
unkown
page read and write
13B0000
unkown
page read and write
7CC7000
heap
page read and write
CAD2000
heap
page read and write
9070000
unkown
page read and write
187C000
heap
page read and write
19B000
stack
page read and write
C561000
unkown
page read and write
581E000
heap
page read and write
7E70000
unkown
page read and write
13B0000
unkown
page read and write
D090000
trusted library allocation
page read and write
CAB9000
heap
page read and write
7DF496691000
trusted library allocation
page execute read
68E000
stack
page read and write
8F0F000
stack
page read and write
89D000
heap
page read and write
CA79000
heap
page read and write
2E60000
remote allocation
page read and write
C557000
unkown
page read and write
320C000
stack
page read and write
F3F000
stack
page read and write
1BCF4261000
heap
page read and write
F320000
heap
page read and write
5411000
trusted library allocation
page read and write
9070000
unkown
page read and write
8820000
unkown
page read and write
7FF5ED46E000
unkown
page readonly
92E3000
heap
page read and write
94C3000
heap
page read and write
9744000
heap
page read and write
5763000
heap
page execute and read and write
37F6000
unkown
page read and write
6068000
heap
page read and write
4B2000
unkown
page read and write
1BD2BB40000
direct allocation
page read and write
95FA000
heap
page read and write
3110000
unkown
page read and write
C8B6000
heap
page read and write
1867000
heap
page read and write
C4D0000
unkown
page read and write
95F3000
heap
page read and write
275F000
stack
page read and write
1869000
heap
page read and write
1880000
heap
page read and write
8F30000
unkown
page read and write
94A3000
heap
page read and write
5A32000
trusted library allocation
page read and write
7FF5ED8FF000
unkown
page readonly
210E6900000
trusted library allocation
page read and write
14A2000
heap
page read and write
963C000
heap
page read and write
7DF496660000
trusted library allocation
page readonly
D2DC000
stack
page read and write
7FF5ED980000
unkown
page readonly
40C000
unkown
page readonly
7C68000
heap
page read and write
4B2000
unkown
page read and write
7FF5ED9A1000
unkown
page readonly
8D10000
unkown
page read and write
7BB2000
heap
page read and write
210E67C0000
trusted library allocation
page read and write
934C000
heap
page read and write
810000
heap
page read and write
7FF5ED625000
unkown
page readonly
3230000
unkown
page read and write
1845000
heap
page read and write
7CD9000
heap
page read and write
50AC000
stack
page read and write
8D10000
unkown
page read and write
C968000
heap
page read and write
883000
heap
page read and write
956E000
heap
page read and write
193000
stack
page read and write
963C000
heap
page read and write
963C000
heap
page read and write
3EF8000
trusted library allocation
page read and write
CD2000
unkown
page execute read
7C68000
heap
page read and write
C877000
heap
page read and write
CCB2000
heap
page read and write
1882000
heap
page read and write
40C000
unkown
page readonly
1BCF44E8000
trusted library allocation
page read and write
978D000
heap
page read and write
CA6F000
heap
page read and write
1760000
heap
page read and write
E4FD000
stack
page read and write
93BE000
stack
page read and write
9B000
stack
page read and write
CBF9000
heap
page read and write
2D1B000
heap
page read and write
9070000
unkown
page read and write
C795000
heap
page read and write
CAD7000
heap
page read and write
4B4000
unkown
page read and write
3570000
direct allocation
page read and write
3EB1000
trusted library allocation
page read and write
1F0000
heap
page read and write
C964000
unkown
page read and write
93FA000
heap
page read and write
7430000
heap
page read and write
7FF6E96A2000
unkown
page execute and read and write
6CE000
stack
page read and write
8D10000
unkown
page read and write
5156000
heap
page read and write
13B8000
heap
page read and write
9070000
unkown
page read and write
B8C0000
unkown
page readonly
7F30000
unkown
page read and write
3EDA000
trusted library allocation
page read and write
7E70000
unkown
page read and write
7DF4F3040000
unkown
page readonly
8D10000
unkown
page read and write
8C70000
unkown
page read and write
1BCEEF06000
heap
page read and write
828000
heap
page read and write
1BCEEE8F000
heap
page read and write
8F30000
unkown
page read and write
1867000
heap
page read and write
933E000
heap
page read and write
96AD000
heap
page read and write
9070000
unkown
page read and write
3570000
direct allocation
page read and write
CAE3000
heap
page read and write
137D000
heap
page read and write
93AE000
heap
page read and write
2E70000
direct allocation
page read and write
7F50000
unkown
page read and write
422C000
trusted library allocation
page read and write
CCE4000
heap
page read and write
7FF5ED556000
unkown
page readonly
20890C20000
heap
page read and write
1876000
heap
page read and write
15B0000
heap
page read and write
933E000
heap
page read and write
CCEE000
heap
page read and write
24E6CF70000
heap
page read and write
2C11000
unkown
page readonly
63E0000
trusted library allocation
page read and write
7FF5ED3F3000
unkown
page readonly
7FF5EDA0B000
unkown
page readonly
13B0000
unkown
page read and write
CCD8000
heap
page read and write
4B4000
unkown
page read and write
3570000
direct allocation
page read and write
202BE331000
heap
page read and write
8C70000
unkown
page read and write
9070000
unkown
page read and write
8D30000
unkown
page read and write
73BC000
stack
page read and write
52B000
remote allocation
page execute and read and write
41F000
unkown
page readonly
935B000
heap
page read and write
1870000
heap
page read and write
7FF5ED80C000
unkown
page readonly
E5FD000
stack
page read and write
7FF5EDA14000
unkown
page readonly
8F30000
unkown
page read and write
120D000
trusted library allocation
page execute and read and write
186E000
heap
page read and write
7FF5ED669000
unkown
page readonly
13B0000
unkown
page read and write
1790000
heap
page read and write
953E000
heap
page read and write
5A40000
trusted library allocation
page read and write
1BCEF713000
heap
page read and write
1BD2BB40000
direct allocation
page read and write
95F3000
heap
page read and write
CA45000
heap
page read and write
2E80000
unclassified section
page read and write
9603000
heap
page read and write
7E70000
unkown
page read and write
2C95000
unkown
page readonly
8780000
unkown
page read and write
73FA000
heap
page read and write
976C000
heap
page read and write
7FF5ED7D6000
unkown
page readonly
2DC0000
trusted library allocation
page read and write
210E681B000
unkown
page read and write
5A2000
heap
page read and write
CCD3000
heap
page read and write
C544000
unkown
page read and write
33C0000
unkown
page read and write
9070000
unkown
page read and write
1861000
heap
page read and write
7E70000
unkown
page read and write
9070000
unkown
page read and write
9359000
heap
page read and write
9070000
unkown
page read and write
10CE000
stack
page read and write
20890BB0000
direct allocation
page read and write
D77D000
stack
page read and write
98A8000
unkown
page read and write
943F000
heap
page read and write
3EC9000
trusted library allocation
page read and write
7CE000
stack
page read and write
9070000
unkown
page read and write
C872000
heap
page read and write
389F000
stack
page read and write
CCC9000
heap
page read and write
976B000
heap
page read and write
95F3000
heap
page read and write
90A0000
unkown
page read and write
8DA0000
unkown
page read and write
7F50000
unkown
page read and write
B218000
heap
page read and write
CCF4000
heap
page read and write
7E70000
unkown
page read and write
1BCF42E8000
heap
page read and write
7DF496661000
trusted library allocation
page execute read
4B2000
unkown
page read and write
3ED8000
trusted library allocation
page read and write
1133C000
unkown
page read and write
34ED000
trusted library allocation
page read and write
933E000
heap
page read and write
B1D7000
heap
page read and write
41F000
unkown
page readonly
9070000
unkown
page read and write
C29C000
stack
page read and write
C712000
heap
page read and write
2B5D000
stack
page read and write
8860000
unkown
page read and write
1BCF44E0000
trusted library allocation
page read and write
8710000
unkown
page readonly
13B0000
unkown
page read and write
9342000
heap
page read and write
C9CE000
heap
page read and write
7B80000
unkown
page read and write
7FF6E93CA000
unkown
page readonly
9270000
heap
page read and write
1BCF4850000
trusted library allocation
page read and write
EFFD000
stack
page read and write
7FF5ED660000
unkown
page readonly
3422000
trusted library allocation
page read and write
3450000
unkown
page read and write
7E70000
unkown
page read and write
B22B000
stack
page read and write
112AC000
unkown
page read and write
CCE0000
heap
page read and write
9070000
unkown
page read and write
28FE000
stack
page read and write
95F000
unkown
page read and write
9581000
heap
page read and write
CCCB000
heap
page read and write
1730000
heap
page read and write
20890C29000
heap
page read and write
83BE000
stack
page read and write
3363000
trusted library allocation
page read and write
400000
unkown
page readonly
193000
stack
page read and write
DD7D000
stack
page read and write
5450000
trusted library allocation
page read and write
AAF2000
unkown
page read and write
13B0000
unkown
page read and write
186B000
heap
page read and write
7FF5ED41C000
unkown
page readonly
7D16000
heap
page read and write
1F0000
heap
page read and write
42E8000
trusted library allocation
page read and write
7FF5ED87D000
unkown
page readonly
8F30000
unkown
page read and write
1BCF44F1000
trusted library allocation
page read and write
F52B000
stack
page read and write
CB4C000
unkown
page read and write
C765000
heap
page read and write
C789000
heap
page read and write
9365000
heap
page read and write
73F0000
heap
page read and write
8D6C000
stack
page read and write
C968000
heap
page read and write
28F15AB0000
heap
page read and write
CC90000
heap
page read and write
90A0000
unkown
page read and write
9070000
unkown
page read and write
65FE000
stack
page read and write
3342000
trusted library allocation
page read and write
9070000
unkown
page read and write
7E70000
unkown
page read and write
8F30000
unkown
page read and write
74A6000
heap
page read and write
CCE0000
heap
page read and write
32E1000
heap
page read and write
9753000
heap
page read and write
2960000
heap
page read and write
3570000
direct allocation
page read and write
C37000
heap
page read and write
7CD0000
unkown
page read and write
7FF5ED735000
unkown
page readonly
2B6E000
stack
page read and write
7B9A000
heap
page read and write
2CAF000
stack
page read and write
13B0000
unkown
page read and write
1235000
trusted library allocation
page execute and read and write
2BAE000
stack
page read and write
C79F000
heap
page read and write
3570000
direct allocation
page read and write
1BCF44D0000
trusted library allocation
page read and write
C71F000
heap
page read and write
4CB0000
unkown
page read and write
9771000
heap
page read and write
186C000
heap
page read and write
C9CC000
heap
page read and write
BAF9000
stack
page read and write
8D10000
unkown
page read and write
3570000
direct allocation
page read and write
3570000
direct allocation
page read and write
210E6839000
heap
page read and write
9666000
heap
page read and write
7FF5ED986000
unkown
page readonly
400000
unkown
page readonly
93AE000
heap
page read and write
7FF5ED4C2000
unkown
page readonly
3319000
stack
page read and write
CCCB000
heap
page read and write
968E000
heap
page read and write
8ABEDFE000
stack
page read and write
C787000
heap
page read and write
202BE2A0000
heap
page read and write
6063000
heap
page read and write
2BD0000
heap
page read and write
3EC3000
trusted library allocation
page read and write
9070000
unkown
page read and write
8F1000
heap
page read and write
C30000
heap
page read and write
7F50000
unkown
page read and write
D4E000
heap
page read and write
1BCEF702000
heap
page read and write
C6E3000
unkown
page read and write
CCEE000
heap
page read and write
4FFF000
heap
page read and write
94C3000
heap
page read and write
7E70000
unkown
page read and write
7C68000
heap
page read and write
1BCF4507000
trusted library allocation
page read and write
C7D8000
heap
page read and write
8CF0000
unkown
page read and write
934E000
heap
page read and write
7FF5ED781000
unkown
page readonly
3F3D000
trusted library allocation
page read and write
CCE0000
heap
page read and write
DA50000
trusted library allocation
page read and write
B150000
heap
page read and write
9581000
heap
page read and write
CCE2000
heap
page read and write
13B0000
unkown
page read and write
3570000
direct allocation
page read and write
7E70000
unkown
page read and write
152F000
stack
page read and write
9873000
unkown
page read and write
3570000
direct allocation
page read and write
737000
heap
page read and write
C6D8000
heap
page read and write
93AE000
heap
page read and write
13B0000
unkown
page read and write
DD0000
unkown
page readonly
7FF5ED94A000
unkown
page readonly
C87C000
heap
page read and write
9869000
unkown
page read and write
3F05000
trusted library allocation
page read and write
8D10000
unkown
page read and write
9070000
unkown
page read and write
577C000
heap
page read and write
A479000
unkown
page read and write
198F000
stack
page read and write
9070000
unkown
page read and write
B4D0000
unkown
page read and write
2CA0000
heap
page read and write
208928F0000
direct allocation
page read and write
CBA000
stack
page read and write
7BCF000
heap
page read and write
E67D000
stack
page read and write
B67000
heap
page read and write
9070000
unkown
page read and write
7CDB000
heap
page read and write
2FB1000
heap
page read and write
A391000
unkown
page read and write
13B0000
unkown
page read and write
9B000
stack
page read and write
1BCEEE13000
heap
page read and write
401000
unkown
page execute read
9070000
unkown
page read and write
9798000
heap
page read and write
1BCF44C2000
trusted library allocation
page read and write
97AC000
heap
page read and write
7FF5ED349000
unkown
page readonly
8F0000
heap
page read and write
888E000
stack
page read and write
CCD6000
heap
page read and write
13B0000
unkown
page read and write
C94E000
heap
page read and write
2FB0000
remote allocation
page read and write
330A000
stack
page read and write
8F30000
unkown
page read and write
D7FD000
stack
page read and write
1BD2BAF0000
heap
page read and write
186C000
heap
page read and write
5089000
heap
page read and write
9070000
unkown
page read and write
3110000
unkown
page read and write
3756000
unkown
page read and write
9070000
unkown
page read and write
17C6000
heap
page read and write
8F30000
unkown
page read and write
7E70000
unkown
page read and write
13B0000
unkown
page read and write
8C70000
unkown
page read and write
C54A000
unkown
page read and write
3570000
direct allocation
page read and write
There are 4353 hidden memdumps, click here to show them.